13 resultados para victim blaming
em Digital Commons at Florida International University
Resumo:
The purpose of this study was to assess the prevalence of bullying and victimization in a metropolitan area. A cross-sectional study with kindergarten (n = 127) and first grade (n = 126) children was conducted in two Miami-Dade County Public Schools and three private schools in the same area. Bullying and victimization behavior and social acceptance were assessed through peer nomination and the mental health outcomes of depression and anxiety were assessed through children's self-report. Teachers and parents also completed a social behavior scale for each child. Three areas of analyses were conducted pertaining to membership classification of social roles and the social acceptance and mental health outcomes associated with those roles, reporter agreement within the social roles, and the psychometric properties of the Childhood Social Behavior Scale. Results showed an overall negative pattern of adjustment for children identified as a member of any of the negative social roles. Also, the results support a new analytic approach to the investigation of social roles. The implication of these findings for early identification, social policy, and effective prevention strategies are discussed. ^
Resumo:
The purpose of this study was to assess the prevalence of bullying and victimization in a metropolitan area. A cross-sectional study with kindergarten (n = 127) and first grade (n = 126) children was conducted in two Miami-Dade County Public Schools and three private schools in the same area. Bullying and victimization behavior and social acceptance were assessed through peer nomination and the mental health outcomes of depression and anxiety were assessed through children's self-report. Teachers and parents also completed a social behavior scale for each child. Three areas of analyses were conducted pertaining to membership classification of social roles and the social acceptance and mental health outcomes associated with those roles, reporter agreement within the social roles, and the psychometric properties of the Childhood Social Behavior Scale. Results showed an overall negative pattern of adjustment for children identified as a member of any of the negative social roles. Also, the results support a new analytic approach to the investigation of social roles. The implication of these findings for early identification, social policy, and effective prevention strategies are discussed.
Resumo:
This study investigated the factors considered by forensic examiners when evaluating sexually violent predators (SVP) for civil commitment under Florida's “Jimmy Ryce Act.” The project was funded by a pre-doctoral research grant awarded by the Association for the Treatment of Sexual Abusers (ATSA). ^ This study proposed two specific research questions. First, what is the direct relationship between actuarial risk assessment scores and recommendations for sex offender civil commitment? Second, which other variables are likely to influence SVP commitment decisions, and to what degree? The purpose of the study was to determine if risk assessment practices are evidence-based, and whether offenders selected for commitment meet statutory criteria. ^ The purposive sample of 450 SVPs was drawn from the population of sex offenders evaluated for civil commitment in Florida between July 1, 2000 and June 30, 2001. Data were extracted from SVP evaluations provided by the Florida Department of Children and Families. Using multivariate logistic regression, this correlational research design examined the relationship between the dependent variable, commitment decision, and several sets of independent variables. The independent variables were derived from a review of the literature, and were grouped conceptually according to their degree of correlation with sex offense recidivism. Independent variables included diagnoses, actuarial risk assessment scores, empirically validated static and dynamic risk factors, consensus based risk factors, evaluator characteristics, and demographics. This study investigated the degree to which the identified variables predicted civil commitment decisions. ^ Logistic regression results revealed that the statistically significant predictors of recommendations for sex offender civil commitment were actuarial risk assessment scores, diagnoses of Pedophilia and Paraphilia NOS, psychopathy, younger age of victim, and non-minority race. Discriminant function analysis confirmed that these variables correctly predicted commitment decisions in 90% of cases. ^ It appears that civil commitment evaluators in Florida used empirically-based assessment procedures, and did not make decisions that were heavily influenced by extraneous factors. SVPs recommended for commitment consistently met the criteria set forth by the U.S. Supreme Court in Hendricks v. Kansas (1997): they suffered from a mental abnormality predisposing them to sexual violence, and risk assessment determined that they were likely to reoffend. ^
Resumo:
This thesis developed a conceptual framework aimed at enhancing our understanding of contemporary child slavery. A new variety of slavery exists today, the result of forms of forced servitude that existed alongside slavery many centuries ago. This is tantamount to slavery. There is, however, a critical lack of awareness about important aspects of the reality of this new child slavery. The framework and definitions of slavery in usage today, though interesting and sufficient to cover historical situations, are unable to adequately describe the conditions of the child slavery. Using existing literature and research, this thesis conceptualized children's labor in a manner that allows a clearer perception of the exploitation of their labor within and beyond the household. Explanatory factors such as culture, the age of victims, the number of hours worked and the ability or not of the victim to volunteer or withdraw their participation in the specific activities were employed to determine if particular situations should be considered as child slavery, repressive child labor or merely as child work. Important distinctions were made between the use of children's mental and physical energy in defined activities. ^
Resumo:
This study explores the interaction of expatriates in Qatar and their perception of their subordination. The study design included participant observation in an all female University and University housing as well as interviews with Qatari government agencies and ministries, expatriate embassies and expatriates. Semi-structured interviews were conducted across seven expatriate groups: domestic workers, unskilled laborers, semiskilled, professionals, housewives, second-generation expatriates with host country other than Qatar, second-generation expatriates with host country Qatar, and Gulf Cooperation Council citizens. Forty-two subjects completed the interview schedule while 87 interviews were incomplete. ^ Physical control of expatriates occurs through the Gulf practice of sponsorship (The Kafeel System), and local cultural and Islamic related controls intertwined with the Arab Code of honor. Interviews and observations revealed rankings of Arabs and foreigners which emphasize Qatari superiority such as tribal identity, moral ranking of female groups by dress, legal protection and power, sexual consideration and desexualization and salaries and job opportunities based on nationality and ethnicity. Individuals who desire to transcend boundaries into the Qatari realm through citizenship or marriage view Qataris as possessing the “image of the unlimited good” and have acquired Qatari social and cultural capital. Members from all expatriate groups engaged in various forms of resistance to labor and gender domination which ranged from forms of “exit,” expressing a hidden transcript in the privacy of their own group, disguised resistance in public, and occasionally, direct confrontation with the Qatari. Although the legal arena created the appearance that worker's needs were being addressed, laborers engaged in forms of “exit” to escape their oppression. Omani students in the hostel disguised their resistance by spreading gossip, nick-naming homosexual Qatari students at the University, acting out a skit depicting their exclusion from Qatari privilege, spreading rumors of impending freedom, and singing songs of despair in the courtyard. Other sites of resistance were expatriate embassies, the road, the newspaper and technology. This study emphasizes that blaming oppression of the expatriate worker on globalization is a simplistic view of oppression in the Gulf, and ignores complex issues within Qatari society and other Gulf States. Sponsorship, servitude, and gender segregation intersect in Qatar to create a system of segregation and domination of expatriates. ^
Resumo:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. ^ This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document. ^
Resumo:
This research involves the design, development, and theoretical demonstration of models resulting in integrated misbehavior resolution protocols for ad hoc networked devices. Game theory was used to analyze strategic interaction among independent devices with conflicting interests. Packet forwarding at the routing layer of autonomous ad hoc networks was investigated. Unlike existing reputation based or payment schemes, this model is based on repeated interactions. To enforce cooperation, a community enforcement mechanism was used, whereby selfish nodes that drop packets were punished not only by the victim, but also by all nodes in the network. Then, a stochastic packet forwarding game strategy was introduced. Our solution relaxed the uniform traffic demand that was pervasive in other works. To address the concerns of imperfect private monitoring in resource aware ad hoc networks, a belief-free equilibrium scheme was developed that reduces the impact of noise in cooperation. This scheme also eliminated the need to infer the private history of other nodes. Moreover, it simplified the computation of an optimal strategy. The belief-free approach reduced the node overhead and was easily tractable. Hence it made the system operation feasible. Motivated by the versatile nature of evolutionary game theory, the assumption of a rational node is relaxed, leading to the development of a framework for mitigating routing selfishness and misbehavior in Multi hop networks. This is accomplished by setting nodes to play a fixed strategy rather than independently choosing a rational strategy. A range of simulations was carried out that showed improved cooperation between selfish nodes when compared to older results. Cooperation among ad hoc nodes can also protect a network from malicious attacks. In the absence of a central trusted entity, many security mechanisms and privacy protections require cooperation among ad hoc nodes to protect a network from malicious attacks. Therefore, using game theory and evolutionary game theory, a mathematical framework has been developed that explores trust mechanisms to achieve security in the network. This framework is one of the first steps towards the synthesis of an integrated solution that demonstrates that security solely depends on the initial trust level that nodes have for each other.^
Resumo:
Small states that lack capacity and act on their own may fall victim to international and domestic terrorism, transnational organized crime or criminal gangs. The critical issue is not whether small Caribbean states should cooperate in meeting security challenges, but it is rather in what manner, and by which mechanisms can they overcome obstacles in the way of cooperation. The remit of the Regional Security System (RSS) has expanded dramatically, but its capabilities have improved very slowly. The member governments of the RSS are reluctant to develop military capacity beyond current levels since they see economic and social development and disaster relief as priorities, requiring little investment in military hardware. The RSS depends on international donors such as the USA, Canada, Great Britain, and increasingly China to fund training programs, maintain equipment and acquire material. In the view of most analysts, an expanded regional arrangement based on an RSS nucleus is not likely in the foreseeable future. Regional political consensus remains elusive and the predominance of national interests over regional considerations continues to serve as an obstacle to any CARICOM wide regional defense mechanism. Countries in the Caribbean, including the members of the RSS, have to become more responsible for their own security from their own resources. While larger CARICOM economies can do this, it would be difficult for most OECS members of the RSS to do the same. The CARICOM region including the RSS member countries, have undertaken direct regional initiatives in security collaboration. Implementation of the recommendations of the Regional Task Force on Crime and Security (RTFCS) and the structure and mechanisms created for the staging of the Cricket World Cup (CWC 2007) resulted in unprecedented levels of cooperation and permanent legacy institutions for the regional security toolbox. The most important tier of security relationships for the region is the United States and particularly USSOUTHCOM. The Caribbean Basin Security Initiative [CBSI] in which the countries of the RSS participate is a useful U.S. sponsored tool to strengthen the capabilities of the Caribbean countries and promote regional ownership of security initiatives. Future developments under discussion by policy makers in the Caribbean security environment include the granting of law enforcement authority to the military, the formation of a single OECS Police Force, and the creation of a single judicial and law enforcement space. The RSS must continue to work with its CARICOM partners, as well as with the traditional “Atlantic Powers” particularly Canada, the United States and the United Kingdom to implement a general framework for regional security collaboration. Regional security cooperation should embrace wider traditional and non-traditional elements of security appropriate to the 21st century. Security cooperation must utilize to the maximum the best available institutions, mechanisms, techniques and procedures already available in the region. The objective should not be the creation of new agencies but rather the generation of new resources to take effective operations to higher cumulative levels. Security and non-security tools should be combined for both strategic and operational purposes. Regional, hemispheric, and global implications of tactical and operational actions must be understood and appreciated by the forces of the RSS member states. The structure and mechanisms, created for the staging of Cricket World Cup 2007 should remain as legacy institutions and a toolbox for improving regional security cooperation in the Caribbean. RSS collaboration should build on the process of operational level synergies with traditional military partners. In this context, the United States must be a true partner with shared interests, and with the ability to work unobtrusively in a nationalistic environment. Withdrawal of U.S. support for the RSS is not an option.
Resumo:
In his dialogue - Near Term Computer Management Strategy For Hospitality Managers and Computer System Vendors - by William O'Brien, Associate Professor, School of Hospitality Management at Florida International University, Associate Professor O’Brien initially states: “The computer revolution has only just begun. Rapid improvement in hardware will continue into the foreseeable future; over the last five years it has set the stage for more significant improvements in software technology still to come. John Naisbitt's information electronics economy¹ based on the creation and distribution of information has already arrived and as computer devices improve, hospitality managers will increasingly do at least a portion of their work with software tools.” At the time of this writing Assistant Professor O’Brien will have you know, contrary to what some people might think, the computer revolution is not over, it’s just beginning; it’s just an embryo. Computer technology will only continue to develop and expand, says O’Brien with citation. “A complacent few of us who feel “we have survived the computer revolution” will miss opportunities as a new wave of technology moves through the hospitality industry,” says ‘Professor O’Brien. “Both managers who buy technology and vendors who sell it can profit from strategy based on understanding the wave of technological innovation,” is his informed opinion. Property managers who embrace rather than eschew innovation, in this case computer technology, will benefit greatly from this new science in hospitality management, O’Brien says. “The manager who is not alert to or misunderstands the nature of this wave of innovation will be the constant victim of technology,” he advises. On the vendor side of the equation, O’Brien observes, “Computer-wise hospitality managers want systems which are easier and more profitable to operate. Some view their own industry as being somewhat behind the times… They plan to pay significantly less for better computer devices. Their high expectations are fed by vendor marketing efforts…” he says. O’Brien warns against taking a gamble on a risky computer system by falling victim to un-substantiated claims and pie-in-the-sky promises. He recommends affiliating with turn-key vendors who provide hardware, software, and training, or soliciting the help of large mainstream vendors such as IBM, NCR, or Apple. Many experts agree that the computer revolution has merely and genuinely morphed into the software revolution, informs O’Brien; “…recognizing that a computer is nothing but a box in which programs run.” Yes, some of the empirical data in this article is dated by now, but the core philosophy of advancing technology, and properties continually tapping current knowledge is sound.
Resumo:
This dissertation examined the formation of Japanese identity politics after World War II. Since World War II, Japan has had to deal with a contradictory image of its national self. On the one hand, as a nation responsible for colonizing fellow Asian countries in the 1930s and 1940s, Japan has struggled with an image/identity as a regional aggressor. On the other hand, having faced the harsh realities of defeat after the war, Japan has seen itself depicted as a victim. By employing the technique of discourse analysis as a way to study identity formation through official foreign policy documents and news media narratives, this study reconceptualized Japanese foreign policy as a set of discursive practices that attempt to produce renewed images of Japan's national self. The dissertation employed case studies to analyze two key sites of Japanese postwar identity formation: (1) the case of Okinawa, an island/territory integral to postwar relations between Japan and the United States and marked by a series of US military rapes of native Okinawan girls; and (2) the case of comfort women in Japan and East Asia, which has led to Japan being blamed for its wartime sexual enslavement of Asian women. These case studies found that it was through coping with the haunting ghost of its wartime past that Japan sought to produce "postwar Japan" as an identity distinct from "wartime imperial Japan" or from "defeated, emasculated Japan" and, thus, hoped to emerge as a "reborn" moral and pacifist nation. The research showed that Japan struggled to invent a new self in a way that mobilized gendered dichotomies and, furthermore, created "others" who were not just spatially located (the United States, Asian neighboring nations) but also temporally marked ("old Japan"). The dissertation concluded that Japanese foreign policy is an ongoing struggle to define the Japanese national self vis-à-vis both spatial and historical "others," and that, consequently, postwar Japan has always been haunted by its past self, no matter how much Japan's foreign policy discourses were trying to make this past self into a distant or forgotten other.
Resumo:
This study evaluated the early development and pilot-testing of Project IMPACT, a case management intervention for victims of stalking. The Design and Development framework (Rothman & Thomas, 1994) was used as a guide for program development and evaluation. Nine research questions examined the processes and outcomes associated with program implementation. ^ The sample included all 36 clients who participated in Project IMPACT between February of 2000 and June of 2001, as well as the victim advocates who provided them with services. Quantitative and qualitative data were drawn from client case files, participant observation field notes and interview transcriptions. Quantitative data were entered into three databases where: (1) clients were the units of analysis (n = 36), (2) services were the units of analysis (n = 1146), and (3) goals were the units of analysis (n = 149). These data were analyzed using descriptive statistics, Pearson's Chi-square, Spearman's Rho, Phi, Cramer's V, Wilcoxon's Matched Pairs Signed-Ranked Test and McNemar's Test Statistic. Qualitative data were reduced via open, axial and selective coding methods. Grounded theory and case study frameworks were utilized to analyze these data. ^ Results showed that most clients noted an improved sense of well-being and safety, although residual symptoms of trauma remained for numerous individuals. Stalkers appeared to respond to criminal and civil justice-based interventions by reducing violent and threatening behaviors; however, covert behaviors continued. The study produced findings that provided preliminary support for the use of several intervention components including support services, psycho-education, safety planning, and boundary spanning. The psycho-education and safety planning in particular seemed to help clients cognitively reframe their perceptions of the stalking experience and gain a sense of increased safety and well-being. A 65% level of satisfactory goal achievement was observed overall, although goals involving justice-based organizations were associated with lower achievement. High service usage was related to low-income clients and those lacking in social support. Numerous inconsistencies in program implementation were found to be associated with the skills and experiences of victim advocates. Thus, recommendations were made to further refine, develop and evaluate the intervention. ^
Resumo:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document.
Resumo:
This dissertation examined the formation of Japanese identity politics after World War II. Since World War II, Japan has had to deal with a contradictory image of its national self. On the one hand, as a nation responsible for colonizing fellow Asian countries in the 1930s and 1940s, Japan has struggled with an image/identity as a regional aggressor. On the other hand, having faced the harsh realities of defeat after the war, Japan has seen itself depicted as a victim. By employing the technique of discourse analysis as a way to study identity formation through official foreign policy documents and news media narratives, this study reconceptualized Japanese foreign policy as a set of discursive practices that attempt to produce renewed images of Japan’s national self. The dissertation employed case studies to analyze two key sites of Japanese postwar identity formation: (1) the case of Okinawa, an island/territory integral to postwar relations between Japan and the United States and marked by a series of US military rapes of native Okinawan girls; and (2) the case of comfort women in Japan and East Asia, which has led to Japan being blamed for its wartime sexual enslavement of Asian women. These case studies found that it was through coping with the haunting ghost of its wartime past that Japan sought to produce “postwar Japan” as an identity distinct from “wartime imperial Japan” or from “defeated, emasculated Japan” and, thus, hoped to emerge as a “reborn” moral and pacifist nation. The research showed that Japan struggled to invent a new self in a way that mobilized gendered dichotomies and, furthermore, created “others” who were not just spatially located (the United States, Asian neighboring nations) but also temporally marked (“old Japan”). The dissertation concluded that Japanese foreign policy is an ongoing struggle to define the Japanese national self vis-à-vis both spatial and historical “others,” and that, consequently, postwar Japan has always been haunted by its past self, no matter how much Japan’s foreign policy discourses were trying to make this past self into a distant or forgotten other.