1,752 research outputs found
Aggressive Encounters & White Fragility: Deconstructing the Trope of the Angry Black Woman
Black women in the United States are the frequent targets of bias-filled interactions in which aggressors: (1) denigrate Black women; and (2) blame those women who elect to challenge the aggressorâs acts and the bias that fuels them. This Article seeks to raise awareness of these âaggressive encountersâ and to challenge a prevailing narrative about Black women and anger. It examines the myriad circumstances (both professional and social) in which aggressive encounters occur and the ways in which these encounters expose gender and racial hierarchies. It then explores how the intersectional nature of Black womenâs identities triggers a particularized stereotype or trope of the âAngry Black Womanâ and explains how this trope is often invoked in aggressive encounters to deflect attention from the aggressor and to project blame onto the target. After discussing the harmful effects of aggressive encounters and the absence of effective legal mechanisms to address them, the Article sets forth tangible steps that individuals can take to minimize their incidence
Internet-Facilitated Commercial Sexual Exploitation of Children.
This bulletin summarizes findings from the InternetâFacilitated Commercial Sexual Exploitation of Children (IFâCSEC) component of the 2006 Second National Juvenile Online Victimization study. Following are some key findings from the Office of Juvenile Justice and Delinquency Preventionâsponsored study: ⢠An estimated 569 arrests for IFâCSEC were made in the United States in 2006; more than half of the arrests involved the offender marketing and selling child pornography. ⢠Most offenders (83%) purchased child pornography or sex with a minor, but an important minority (17%) profited from the exploitation. Profiteers appeared to be more seasoned offenders who were involved in larger, organized networks of criminals, such as prostitution and human trafficking rings. ⢠Many offenders (39%) were acquaintances of the IFâCSEC victims, 23% were family members, and 17% were people the victims had met online. The rest were mostly pimps. ⢠Compared with victims of Internet sexual crimes that do not involve a commercial aspect, a greater perâ centage of IFâCSEC victims, as part of the current crime, were assaulted, given drugs or alcohol, and were the subject of child pornography
Youth Internet Safety Study (YISS): Methodology Report.
The Youth Internet Safety Surveys (YISSâ1, YISSâ2, and YISSâ3) were conducted in order to quantify and detail youth experiences with unwanted or problematic Internet experiences including sexual solicitations, harassment, and unwanted exposure to pornography on the Internet. YISSâ3 collected additional information about youth produced sexual images (YPSI) or âsexting.â The YISSâ1, YISSâ2 and YISSâ3 studies were conducted in 2000, 2005 and 2010, respectively, providing important comparative information on changes in the numbers of youth reporting unwanted or problematic Internet experiences at 5âyear intervals since 2000. This is a critical timeframe for observation given the sharp rise in the use of Internet and new technologies by youth from 2000â2010 1 . The YISS were conducted via telephone surveys with separate national samples of 1500 youth Internet users, ages 10 to 17, and their parents. A sample size of 1,500 was preâdetermined based upon a maximum expected sampling error of +/â2.5% at the 5% significance level. Human subject participation in the YISS studies were reviewed and approved by the University of New Hampshire Institutional Review Board (IRB) and conformed to the rules mandated for research projects funded by the U.S. Department of Justice
The Role of American Tyranny in Iran\u27s Nuclear Production: The Framework of Public Law 112-158 Iran Threat Reduction Act of 2011
The use of war pretext in foreign policy has been studied for decades. Several theories have established how pretext are used to manage public opinions about war. Arguably, the U.S. government uses pretext to obscure the awkwardness of justifying aggressive or offensive activities to the public. U.S. accusations of Iranâs development of nuclear weapons give justification for imposing economic sanctions, but it is an act of war. Public Law 112-158 penalizes states that pay Iran for its oil. Given its current economic weakness, the U.S. government must wield its military power to retain its global preeminence. Oil that is not traded in dollars threatens to collapse the U.S. economic system and the dollarâs dominance as the worldâs currency. This paper contends that Public Law 112-158 is a war pretext to escalate plans to attack Iran. The U.S. government is ultimately fighting for its continued hegemonic existence
A Content Analysis of Youth Internet Safety Programs: Are Effective Prevention Strategies Being Used?
ABSTRACT: Almost half of youth in the U.S. report receiving internet safety education (ISE) in their schools. Unfortunately, we know little about what educational messages make a difference in problems such as cyberbullying, sexting, or online predators. To consider directions for improving effectiveness, a content analysis was conducted on materials from four ISE programs. Results indicate that ISE programs are mostly not incorporating proven educational strategies. Common ISE messages have proliferated without a clear rationale for why they would be effective. It is recommended that program developers and other stakeholders reconsider ISE messages, improve educational strategies, and participate in evaluation. The field must also consider whether ISE messages would be better delivered through broader youth safety prevention programs versus stand-alone lessons
A Systematic Review of Effective Youth Prevention Education: Implications for Internet Safety Education.
ABSTRACT: Over the past two decades, a wide array of internet safety education materials and programs have developed to increase positive youth behavior and safety online. Although it is a new area of prevention, programs should incorporate practices that prior prevention evaluation studies tell us work best. To inform internet safety education, 31 youth prevention education meta-analyses across a wide range of youth prevention (substance abuse, risky sex behavior, delinquency, etc.) were coded to identify prevention program characteristics shown by research to be most effective. The review identified that active, skill-based lessons, focused on research based causal and risk factors, and provided with adequate dosage were key. Such strategies must be included as a starting place when developing prevention in new areas of youth risk concerns. Implications of the finding suggest some need for reevaluating how internet safety education is delivered in the future
From Planning to Management & Assessment: The May River Watershed Action Plan in Bluffton
2014 S.C. Water Resources Conference - Informing Strategic Water Planning to Address Natural Resource, Community and Economic Challenge
Bringing Librarianship Back Home: Information Literacy as a Return to Method
Information literacy (IL) has arisen as a response to the reification of information. As information has been commodified, it has lost its fluidity as a term and an idea. Librarianship, as a result, has lost its footing, its philosophy. IL seeks to restore method to librarianship and, as a result, return subjectivity to information
Bluffton, SC - Continuous Monitoring and Stormwater Sampling by a Municipality
2008 S.C. Water Resources Conference - Addressing Water Challenges Facing the State and Regio
- âŚ