427 research outputs found

    Impulsive and Neurotic Inmates: A Study in Personality and Perception

    Get PDF

    Self-harming behaviors in prison: a comparison of suicidal processes, self-injurious behaviors, and mixed events

    Get PDF
    Self-harming behaviors occurring in prison disproportionately consume resources and cause considerable disruption. To date, theoretical paradigms have explained self-injurious behaviors and suicidal processes either via a continuum or dichotomy of self-harm. This current study examines all documented acts of self-harm (n=1,158) occurring in South Carolina's 28 prisons over a 50 month period. We test and find support for a tripartite schema of self-harm; differentiated with regard to suicidal processes, self-injurious behaviors, and a 'mixed group' of self-harming behaviors. These groups of behaviors were distinct with regard to situational variables (i.e. body part targeted, injury severity) as well as institutional responses (i.e., medical treatment needed, employment of suicide protocols). Findings indicate that self-injurious behaviors are likely to result in physical injury and/or hospitalizations

    Violence today

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/45468/1/11089_2005_Article_BF01768523.pd

    Singing the same tune? International continuities and discontinuities in how police talk about using force

    Full text link
    This article focuses on a research project conducted in six jurisdictions: England, The Netherlands, Germany, Australia, Venezuela, and Brazil. These societies are very different ethnically, socially, politically, economically, historically and have wildly different levels of crime. Their policing arrangements also differ significantly: how they are organised; how their officers are equipped and trained; what routine operating procedures they employ; whether they are armed; and much else besides. Most relevant for this research, they represent policing systems with wildly different levels of police shootings, Police in the two Latin American countries represented here have a justified reputation for the frequency with which they shoot people, whereas at the other extreme the police in England do not routinely carry firearms and rarely shoot anyone. To probe whether these differences are reflected in the way that officers talk about the use of force, police officers in these different jurisdictions were invited to discuss in focus groups a scenario in which police are thwarted in their attempt to arrest two youths (one of whom is a known local criminal) by the youths driving off with the police in pursuit, and concludes with the youths crashing their car and escaping in apparent possession of a gun, It might be expected that focus groups would prove starkly different, and indeed they were, but not in the way that might be expected. There was little difference in affirmation of normative and legal standards regarding the use of force. It was in how officers in different jurisdictions envisaged the circumstances in which the scenario took place that led Latin American officers to anticipate that they would shoot the suspects, whereas officers in the other jurisdictions had little expectation that they would open fire in the conditions as they imagined them to be

    A Literature Survey and Classifications on Data Deanonymisation

    Get PDF
    The problem of disclosing private anonymous data has become increasingly serious particularly with the possibility of carrying out deanonymisation attacks on publishing data. The related work available in the literature is inadequate in terms of the number of techniques analysed, and is limited to certain contexts such as Online Social Networks. We survey a large number of state-of-the-art techniques of deanonymisation achieved in various methods and on different types of data. Our aim is to build a comprehensive understanding about the problem. For this survey, we propose a framework to guide a thorough analysis and classifications. We are interested in classifying deanonymisation approaches based on type and source of auxiliary information and on the structure of target datasets. Moreover, potential attacks, threats and some suggested assistive techniques are identified. This can inform the research in gaining an understanding of the deanonymisation problem and assist in the advancement of privacy protection
    corecore