445 resultados para offender anonymity
Resumo:
Sex offending is typically understood from a pathology perspective with the origin of the behavior thought to be within the offending individual. Such a perspective may not be beneficial for those seeking to desist from sexual offending and reintegrate into mainstream society. A thematic analysis of 32 self-narratives of men convicted of sexual offences against children suggests that such individuals typically explain their pasts utilizing a script consistent with routine activity theory, emphasizing the role of circumstantial changes in both the onset of and desistance from sexual offending. It is argued that the self-framing of serious offending in this way might be understood as a form of ‘shame management’, a protective cognition that enables desistance by shielding individuals from internalizing stigma for past violence.
Resumo:
For the past three decades or so, criminal justice policies have been enacted under the assumption that individuals who have been convicted of a sex offense are life course persistent sex offenders. In that context, research has been heavily focused on the assessment of risk and the prediction of sexual recidivism.Simultaneously, little to no attention has been given to the majority of individuals convicted of sex offenses who are not arrested or convicted again.Researchers have witnessed a growing gap between scientific knowledge and the sociolegal response to sexual violence and abuse. The current legal landscapecarries important social implications and significant life course impact for a growing number of individuals. More recently, theoretical and research breakthroughs in the study of desistance from crime and delinquency have been made that can help shed some light on desistance from sex offending. Desistance research, in the context of sex offending, however, represents serious theoretical, ethical, legal, and methodological challenges. To that end, this article introduces a special issue exploring current themes in desistance research by examining the life course of individuals convicted of a sexual offense while contextualizing their experiences of desistance.
Resumo:
The arts in prison settings have provided an alternative or complimentary component to rehabilitation. Despite increased interest, studies capturing the voice of offenders participating in projects and the long-term impact are limited. Data from semistructured interviews with 18 men who had taken part in a music-based project while incarcerated, including one group of five participants who were tracked for 18 months with supplemented data from correctional staff and official documentation, is presented. Participants of the art-based projects comment on changes they believe to have derived from participating in the project, particularly relating to emotions, self-esteem, self-confidence, communication and social skills. An exoffender sample of participants reported that participation in art projects provide experiences that promote beneficial skills that have been useful for post prison life.
Resumo:
Abstract The Coalition Government's new Transforming Rehabilitation (TR) agenda jeopardises the work undertaken with perpetrators of domestic abuse by highly skilled, qualified probation staff. Under new changes outlined by Grayling, Lord Chancellor and Secretary of State for Justice, probation clients who are assessed as posing a medium/low risk of causing harm will be assigned to private sector/voluntary organisations rather than come under the remit of the National Probation Service. This article argues that victims of domestic abuse, primarily women and children, will be placed at an increased risk of harm given this latest TR strategy. The majority of domestic abuse cases will be assessed as posing a medium risk of causing harm and will receive lower levels of intervention by a variety of disparate agencies and organisations. The Ministry of Justice states that the National Probation Service will directly manage offenders who pose a high risk of serious harm to the public, this article will argue that all perpetrators of domestic abuse should be considered as an important exception to this stance, and should remain under the auspices of Probation supervision, irrespective of statistical risk assessment, as has sex offender case management and sex offender treatment programme delivery.
Resumo:
El breve commentum in Statii Achilleida resulta muy interesante para el estudio de la transmisión mitográfica de la Antigüedad tardía al Medievo, pues no sólo participa de las características propias de la mitografía (narraciones de mitos, exégesis racionalista y/o alegórica, interpretaciones etimológicas, anonimato, pseudepigrafía,…), sino que también es otro eslabón en la cadena textual de transmisión, simplificación y canonización de los mitos clásicos.
Resumo:
I wanted to explore whether traditional Forum Theatre approaches can be enhanced by the use of integrated voting software to empower young people. My research is based on two of a series of widening participation interactive TiE programmes focused on the decisions young people make on educational progression. I worked as a director alongside students studying Drama and Performance at The University of Worcester and the programmes have toured widely to schools across Worcestershire and Herefordshire. ‘It’s Up to You!’ (2013 – 2014) was aimed at years 8 and 9 choosing their GCSE options and ‘Move on Up!’ (2014 - 2015) looked at the hopes and fears of year 6 pupils about to go up to secondary school. Finding a voice in Boal’s framework as a ‘specactor’ does not always appeal to a pupil who does not want to stand out from the crowd or is not familiar with a classroom where drama conventions are practised or understood. The anonymity of the voting software with results of decisions made appearing instantly on screen is certainly appealing to some pupils: ‘I also loved the keypads they gave us so that we could answer the questions without having to put our hand up and wait..’ This paper aims to interrogate the idea that empowering needs to not simply be about giving voice to a few confident group members but allowing the silent majority to be able to experiment with decision making in an educational and social context.
Resumo:
There is a limited amount of research in the area of missing persons, especially adults. The aim of this research is to expand on the understanding of missing people, by examining adults' behaviours while missing and determining if distinct behavioural themes exist. Based on previous literature it was hypothesised that three behavioural themes will be present; dysfunctional, escape, and unintentional. Thirty-six behaviours were coded from 362 missing person police reports and analysed using smallest space analysis (SSA). This produced a spatial representation of the behaviours, showing three distinct behavioural themes. Seventy percent of the adult missing person reports were classified under one dominant theme, 41% were ‘unintentional’, 18% were ‘dysfunctional’, and 11% were ‘escape’. The relationship between a missing person's dominant behavioural theme and their assigned risk level and demographic characteristics were also analysed. A significant association was found between the age, occupational status, whether they had any mental health issues, and the risk level assigned to the missing person; and their dominant behavioural theme. The findings are the first step in the development of a standardised checklist for a missing person investigation. This has implications on how practitioners prioritise missing adults, and interventions to prevent individuals from going missing. Copyright © 2016 John Wiley & Sons, Ltd.
Resumo:
Internet users consume online targeted advertising based on information collected about them and voluntarily share personal information in social networks. Sensor information and data from smart-phones is collected and used by applications, sometimes in unclear ways. As it happens today with smartphones, in the near future sensors will be shipped in all types of connected devices, enabling ubiquitous information gathering from the physical environment, enabling the vision of Ambient Intelligence. The value of gathered data, if not obvious, can be harnessed through data mining techniques and put to use by enabling personalized and tailored services as well as business intelligence practices, fueling the digital economy. However, the ever-expanding information gathering and use undermines the privacy conceptions of the past. Natural social practices of managing privacy in daily relations are overridden by socially-awkward communication tools, service providers struggle with security issues resulting in harmful data leaks, governments use mass surveillance techniques, the incentives of the digital economy threaten consumer privacy, and the advancement of consumergrade data-gathering technology enables new inter-personal abuses. A wide range of fields attempts to address technology-related privacy problems, however they vary immensely in terms of assumptions, scope and approach. Privacy of future use cases is typically handled vertically, instead of building upon previous work that can be re-contextualized, while current privacy problems are typically addressed per type in a more focused way. Because significant effort was required to make sense of the relations and structure of privacy-related work, this thesis attempts to transmit a structured view of it. It is multi-disciplinary - from cryptography to economics, including distributed systems and information theory - and addresses privacy issues of different natures. As existing work is framed and discussed, the contributions to the state-of-theart done in the scope of this thesis are presented. The contributions add to five distinct areas: 1) identity in distributed systems; 2) future context-aware services; 3) event-based context management; 4) low-latency information flow control; 5) high-dimensional dataset anonymity. Finally, having laid out such landscape of the privacy-preserving work, the current and future privacy challenges are discussed, considering not only technical but also socio-economic perspectives.
Resumo:
Purpose The purpose of this paper was to review the effectiveness of telephone interviewing for capturing data and to consider in particular the challenges faced by telephone interviewers when capturing information about market segments. Design/methodology/approach The platform for this methodological critique was a market segment analysis commissioned by Sport Wales which involved a series of 85 telephone interviews completed during 2010. Two focus groups involving the six interviewers involved in the study were convened to reflect on the researchers’ experiences and the implications for business and management research. Findings There are three principal sets of findings. First, although telephone interviewing is generally a cost-effective data collection method, it is important to consider both the actual costs (i.e. time spent planning and conducting interviews) as well as the opportunity costs (i.e. missed appointments, “chasing participants”). Second, researchers need to be sensitised to and sensitive to the demographic characteristics of telephone interviewees (insofar as these are knowable) because responses are influenced by them. Third, the anonymity of telephone interviews may be more conducive for discussing sensitive issues than face-to-face interactions. Originality/value The present study adds to this modest body of literature on the implementation of telephone interviewing as a research technique of business and management. It provides valuable methodological background detail about the intricate, personal experiences of researchers undertaking this method “at a distance” and without visual cues, and makes explicit the challenges of telephone interviewing for the purposes of data capture.
Resumo:
Projeto de Graduação apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de licenciada em Criminologia
Resumo:
Introdução: no Brasil, a violência contra a mulher foi reconhecida somente com a Convenção Belém do Pará, em 1995. A partir daí, inúmeras medidas para prevenção e combate foram instituídas, entre elas a criação das Delegacias Especializadas de Atendimento às Mulheres (DEAM) e a Lei Maria da Penha. No entanto, muitas mulheres ainda são vitimadas, na maioria das vezes dentro do próprio lar. Objetivos: delinear o perfil das mulheres vítimas de violência; identificar as formas de violência registradas na DEAM da cidade do Rio Grande/RS; identificar os motivos que levam à prática da violência e descrever os atos violentos perpetrados, por parceiro íntimo, às mulheres que registraram ocorrência na DEAM. Metodologia: estudo documental, quanti e qualitativo, de natureza exploratória, descritiva e delineamento transversal. Fizeram parte do estudo todas as ocorrências cujas vítimas eram mulheres com 18 anos ou mais. O espaço temporal adotado estendeu-se de agosto de 2009, quando foi implantada a delegacia, a dezembro de 2011. Os dados foram coletados entre outubro de 2011 e março de 2012. Para a coleta, foi elaborado e aprovado, após testagem, um instrumento contendo informações acerca do agressor, da vítima, bem como do tipo de violência praticada. Os dados foram digitados em planilhas do tipo Excel. A análise quantitativa foi efetuada por meio de estatística descritiva e do software estatístico SPSS versão 17.0. Para o estudo qualitativo utilizou-se a análise de conteúdo. Esse projeto foi aprovado pelo Comitê de Ética em Pesquisa na Área da Saúde, da Universidade Federal do Rio Grande sob Parecer no 137/2011. Resultados: estão descritos em dois artigos. Analisaram-se 902 ocorrências policiais evidenciando-se que a maioria das vitimas eram mulheres brancas, jovens, com baixa escolaridade. Ainda foi possível identificar que o Centro da cidade ocupou a segunda posição como local de moradia das vítimas, desmitificando a idéia de que a violência predomina na periferia. A violência física prevaleceu nos registros notificados, seguida do descumprimento de ordem judicial. Além disso, encontrou-se a reincidência de denúncias, o que pode estar atrelado à morosidade judicial. Observou-se também, que existem diversos motivos desencadeadores da violência, no entanto todos eles apresentam como pano de fundo as questões associadas ao gênero. A simultaneidade da violência bem como a extensão aos filhos, família e sociedade retratam a gravidade do fenômeno e a necessidade de se rever a resolutividade das medidas protetivas e das penas atribuídas aos agressores. Conclusões: este estudo expôs, parcialmente, a situação da violência contra a mulher no município, pois se sabe que existem muitos casos velados que não chegam a ser notificados. Entretanto, evidenciou-se o predomínio da violência física cometida por parceiro íntimo repercutindo em graves consequências à vida das vítimas. Assim, julga-se ímpar a implementação de uma rede efetiva de apoio a essas mulheres bem como a atuação de equipe multidisciplinar capacitada, coesa e sensível ao problema, incluindo os profissionais da saúde, que precisam, ainda, estar ciente da obrigatoriedade da notificação compulsória, fundamental para a formulação de novas políticas públicas de combate e prevenção a esse fenômeno.
Resumo:
Estudos sobre notificação da violência intrafamiliar contra crianças e adolescentes têm suscitado, entre os profissionais, diversas abordagens e perspectivas de interpretação, mostrando a complexidade e amplitude desse fenômeno, tão presente na sociedade. Nesse estudo, apoiando-se em Foucault, defende-se a seguinte tese: O ato de implementação da notificação da violência constitui-se em exercício de poder do denunciante e um ato de resistência contra a sua manutenção. Como objetivo geral do estudo, buscou-se compreender o processo de notificação de violência intrafamiliar contra crianças e adolescentes, no Município do Rio Grande/RS; e como objetivos específicos: analisar as notificações realizadas entre janeiro de 2009 e maio de 2014, em uma instituição de proteção à crianças e adolescentes de Rio Grande/RS; conhecer como os profissionais da saúde tem se fortalecido e encorajado para proceder às notificações de violência contra crianças e adolescentes no Rio Grande/RS. O estudo foi desenvolvido em duas etapas, uma quantitativa, mediante pesquisa documental em 800 prontuários de um Centro de Referência Especializada em Assistência Social (CREAS) do Rio Grande, abertos entre janeiro de 2009 e maio de 2014, enfocando variáveis sociodemográficas das vítimas, agressores e a modalidade de violência e da notificação. Constata-se que o perfil prevalente foi de crianças e adolescentes brancas, do sexo feminino, com idades entre sete e 14 anos, residentes em bairros periféricos. A maioria dos agressores é do sexo masculino, com idades entre 20 e 40 anos, e baixo nível de escolaridade. Identificou-se também a mãe como a principal responsável pelas agressões, seguida do pai e padrasto. Houve o predomínio da violência sexual, física e psicológica. A maioria das notificações encaminhadas aos órgãos de proteção foi realizada pelos familiares, desencadeada, principalmente, pela evidência de sinais fisicos. A etapa qualitativa foi realizada através de entrevista semi-estruturada com profissionais de saúde que notificaram atos de violência. Realizou-se análise textual discursiva dos dados, emergindo duas categorias: Coragem da verdade fortalecida pelo conhecimento e Coragem da verdade: conhecimento de si e cuidado de si. Os profissionais de saúde adotaram a notificação como um exercício de poder frente ao agressor e uma forma de resistência e enfrentamento da violência. No exercício da sua liberdade, procederam a notificação, que se constitui em uma ação ética, especialmente porque se consideram profissionais comprometidos com o bem-estar e proteção de seus pacientes. Foram respeitados todos os procedimentos éticos, a partir da Resolução n. 466/2012.
Resumo:
Many existing encrypted Internet protocols leak information through packet sizes and timing. Though seemingly innocuous, prior work has shown that such leakage can be used to recover part or all of the plaintext being encrypted. The prevalence of encrypted protocols as the underpinning of such critical services as e-commerce, remote login, and anonymity networks and the increasing feasibility of attacks on these services represent a considerable risk to communications security. Existing mechanisms for preventing traffic analysis focus on re-routing and padding. These prevention techniques have considerable resource and overhead requirements. Furthermore, padding is easily detectable and, in some cases, can introduce its own vulnerabilities. To address these shortcomings, we propose embedding real traffic in synthetically generated encrypted cover traffic. Novel to our approach is our use of realistic network protocol behavior models to generate cover traffic. The observable traffic we generate also has the benefit of being indistinguishable from other real encrypted traffic further thwarting an adversary's ability to target attacks. In this dissertation, we introduce the design of a proxy system called TrafficMimic that implements realistic cover traffic tunneling and can be used alone or integrated with the Tor anonymity system. We describe the cover traffic generation process including the subtleties of implementing a secure traffic generator. We show that TrafficMimic cover traffic can fool a complex protocol classification attack with 91% of the accuracy of real traffic. TrafficMimic cover traffic is also not detected by a binary classification attack specifically designed to detect TrafficMimic. We evaluate the performance of tunneling with independent cover traffic models and find that they are comparable, and, in some cases, more efficient than generic constant-rate defenses. We then use simulation and analytic modeling to understand the performance of cover traffic tunneling more deeply. We find that we can take measurements from real or simulated traffic with no tunneling and use them to estimate parameters for an accurate analytic model of the performance impact of cover traffic tunneling. Once validated, we use this model to better understand how delay, bandwidth, tunnel slowdown, and stability affect cover traffic tunneling. Finally, we take the insights from our simulation study and develop several biasing techniques that we can use to match the cover traffic to the real traffic while simultaneously bounding external information leakage. We study these bias methods using simulation and evaluate their security using a Bayesian inference attack. We find that we can safely improve performance with biasing while preventing both traffic analysis and defense detection attacks. We then apply these biasing methods to the real TrafficMimic implementation and evaluate it on the Internet. We find that biasing can provide 3-5x improvement in bandwidth for bulk transfers and 2.5-9.5x speedup for Web browsing over tunneling without biasing.