1,752 research outputs found

    Aggressive Encounters & White Fragility: Deconstructing the Trope of the Angry Black Woman

    Get PDF
    Black women in the United States are the frequent targets of bias-filled interactions in which aggressors: (1) denigrate Black women; and (2) blame those women who elect to challenge the aggressor’s acts and the bias that fuels them. This Article seeks to raise awareness of these “aggressive encounters” and to challenge a prevailing narrative about Black women and anger. It examines the myriad circumstances (both professional and social) in which aggressive encounters occur and the ways in which these encounters expose gender and racial hierarchies. It then explores how the intersectional nature of Black women’s identities triggers a particularized stereotype or trope of the “Angry Black Woman” and explains how this trope is often invoked in aggressive encounters to deflect attention from the aggressor and to project blame onto the target. After discussing the harmful effects of aggressive encounters and the absence of effective legal mechanisms to address them, the Article sets forth tangible steps that individuals can take to minimize their incidence

    Internet-Facilitated Commercial Sexual Exploitation of Children.

    Get PDF
    This bulletin summarizes findings from the Internet‐Facilitated Commercial Sexual Exploitation of Children (IF‐CSEC) component of the 2006 Second National Juvenile Online Victimization study. Following are some key findings from the Office of Juvenile Justice and Delinquency Prevention‐sponsored study: • An estimated 569 arrests for IF‐CSEC were made in the United States in 2006; more than half of the arrests involved the offender marketing and selling child pornography. • Most offenders (83%) purchased child pornography or sex with a minor, but an important minority (17%) profited from the exploitation. Profiteers appeared to be more seasoned offenders who were involved in larger, organized networks of criminals, such as prostitution and human trafficking rings. • Many offenders (39%) were acquaintances of the IF‐CSEC victims, 23% were family members, and 17% were people the victims had met online. The rest were mostly pimps. • Compared with victims of Internet sexual crimes that do not involve a commercial aspect, a greater per‐ centage of IF‐CSEC victims, as part of the current crime, were assaulted, given drugs or alcohol, and were the subject of child pornography

    Youth Internet Safety Study (YISS): Methodology Report.

    Get PDF
    The Youth Internet Safety Surveys (YISS‐1, YISS‐2, and YISS‐3) were conducted in order to quantify and detail youth experiences with unwanted or problematic Internet experiences including sexual solicitations, harassment, and unwanted exposure to pornography on the Internet. YISS‐3 collected additional information about youth produced sexual images (YPSI) or “sexting.” The YISS‐1, YISS‐2 and YISS‐3 studies were conducted in 2000, 2005 and 2010, respectively, providing important comparative information on changes in the numbers of youth reporting unwanted or problematic Internet experiences at 5‐year intervals since 2000. This is a critical timeframe for observation given the sharp rise in the use of Internet and new technologies by youth from 2000‐2010 1 . The YISS were conducted via telephone surveys with separate national samples of 1500 youth Internet users, ages 10 to 17, and their parents. A sample size of 1,500 was pre‐determined based upon a maximum expected sampling error of +/‐2.5% at the 5% significance level. Human subject participation in the YISS studies were reviewed and approved by the University of New Hampshire Institutional Review Board (IRB) and conformed to the rules mandated for research projects funded by the U.S. Department of Justice

    The Role of American Tyranny in Iran\u27s Nuclear Production: The Framework of Public Law 112-158 Iran Threat Reduction Act of 2011

    Get PDF
    The use of war pretext in foreign policy has been studied for decades. Several theories have established how pretext are used to manage public opinions about war. Arguably, the U.S. government uses pretext to obscure the awkwardness of justifying aggressive or offensive activities to the public. U.S. accusations of Iran’s development of nuclear weapons give justification for imposing economic sanctions, but it is an act of war. Public Law 112-158 penalizes states that pay Iran for its oil. Given its current economic weakness, the U.S. government must wield its military power to retain its global preeminence. Oil that is not traded in dollars threatens to collapse the U.S. economic system and the dollar’s dominance as the world’s currency. This paper contends that Public Law 112-158 is a war pretext to escalate plans to attack Iran. The U.S. government is ultimately fighting for its continued hegemonic existence

    A Content Analysis of Youth Internet Safety Programs: Are Effective Prevention Strategies Being Used?

    Get PDF
    ABSTRACT: Almost half of youth in the U.S. report receiving internet safety education (ISE) in their schools. Unfortunately, we know little about what educational messages make a difference in problems such as cyberbullying, sexting, or online predators. To consider directions for improving effectiveness, a content analysis was conducted on materials from four ISE programs. Results indicate that ISE programs are mostly not incorporating proven educational strategies. Common ISE messages have proliferated without a clear rationale for why they would be effective. It is recommended that program developers and other stakeholders reconsider ISE messages, improve educational strategies, and participate in evaluation. The field must also consider whether ISE messages would be better delivered through broader youth safety prevention programs versus stand-alone lessons

    A Systematic Review of Effective Youth Prevention Education: Implications for Internet Safety Education.

    Get PDF
    ABSTRACT: Over the past two decades, a wide array of internet safety education materials and programs have developed to increase positive youth behavior and safety online. Although it is a new area of prevention, programs should incorporate practices that prior prevention evaluation studies tell us work best. To inform internet safety education, 31 youth prevention education meta-analyses across a wide range of youth prevention (substance abuse, risky sex behavior, delinquency, etc.) were coded to identify prevention program characteristics shown by research to be most effective. The review identified that active, skill-based lessons, focused on research based causal and risk factors, and provided with adequate dosage were key. Such strategies must be included as a starting place when developing prevention in new areas of youth risk concerns. Implications of the finding suggest some need for reevaluating how internet safety education is delivered in the future

    From Planning to Management & Assessment: The May River Watershed Action Plan in Bluffton

    Get PDF
    2014 S.C. Water Resources Conference - Informing Strategic Water Planning to Address Natural Resource, Community and Economic Challenge

    Bringing Librarianship Back Home: Information Literacy as a Return to Method

    Get PDF
    Information literacy (IL) has arisen as a response to the reification of information. As information has been commodified, it has lost its fluidity as a term and an idea. Librarianship, as a result, has lost its footing, its philosophy. IL seeks to restore method to librarianship and, as a result, return subjectivity to information

    Bluffton, SC - Continuous Monitoring and Stormwater Sampling by a Municipality

    Get PDF
    2008 S.C. Water Resources Conference - Addressing Water Challenges Facing the State and Regio
    • …
    corecore