The Lived Experiences of Individuals Who Have Been

Total Page:16

File Type:pdf, Size:1020Kb

The Lived Experiences of Individuals Who Have Been THE LIVED EXPERIENCES OF INDIVIDUALS WHO HAVE BEEN TECHNOLOGICALLY STALKED BY A PAST INTIMATE: A HERMENEUTIC PHENOMENOLOGICAL STUDY THROUGH A COMMUNICATION PRIVACY MANANGEMENT THEORY LENS ________________________________________________________________________ A Dissertation Presented to The Faculty of the Graduate School At the University of Missouri ________________________________________________________________________ In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy ________________________________________________________________________ By ELAINE L. DAVIES Dr. Colin Hesse, Dissertation Supervisor Dr. Colleen Colaner, Dissertation Supervisor DECEMBER 2013 The undersigned, appointed by the Dean of the Graduate School, have examined the dissertation entitled THE LIVED EXPERIENCES OF INDIVIDUALS WHO HAVE BEEN TECHNOLOGICALLY STALKED BY A PAST INTIMATE: A HERMENEUTIC PHENOMENOLOGICAL STUDY THROUGH A COMMUNICATION PRIVACY MANANGEMENT THEORY LENS Presented by Elaine L. Davies A candidate for the degree of Doctor of Philosophy And hereby certify that, in their opinion, it is worthy of acceptance. ________________________________________________________________________ Dr. Colin Hesse ________________________________________________________________________ Dr. Colleen Colaner ________________________________________________________________________ Dr. Rebecca Meisenbach ________________________________________________________________________ Dr. Christine Proulx I would like to dedicate this dissertation to my son, Dustin G. Powers, and my partner, Christopher M. Hess. You are the two of the most patient men in the world who never let me give up. I love you! This dissertation is also dedicated to the victims in this study who shared their harrowing narratives and showed remarkable resilience under tremendous circumstances. "Justice will be done." ACKNOWLEDGEMENTS There are many individuals who guided, helped, and counseled me during the process of making this dream a reality. First, I am grateful to my superb and patient advisors, Dr. Colin Hesse and Dr. Colleen Colaner. Dr. Hesse, thank you for believing in this project from its inception, holding me to my deadlines, and the insistence on checking my grammar and spelling. Dr. Colaner, thank you for agreeing to take me on, helping me to solidify my ideas, and talking me down from the ledge on so many occasions. Your support during my darkest hours gave me the courage to fight for myself and the victims. Thank you to Dr. Rebecca Meisenbach for making me feel like my brain grew every time I talked to you. I have enjoyed thoroughly every interaction with you and every challenge you have presented to me. Thank you to Dr. Christine Proulx for stepping in during dissertation process and providing valuable advice and insight into my study. I am humbled by your generosity. A very special thank you to Dr. Loreen Olson. Although not an "official" member of my final dissertation committee, you have always been there for me professionally and personally. Your faith in me has never wavered. I am a better person and scholar for having you in my life. The lessons you have taught me, I will cherish forever. ii Special thanks to Dr. Michael Porter for serving as a great role model. You remind me, daily, what a mentor can do and the impact we can have on our students. A word of thanks must be given to Jane Hitchcock at Working to Halt Online Abuse, Dr. Andrew Herrmann, and Julia Shuck for helping me locate courageous individuals willing to share their experiences. I must thank the most wonderful copy editors, Dr. Patricia Groves and Dr. Emily Rauscher for their contributions. Your last minute heroics are deeply appreciated! Finally, thank you to all my friends, my extended family, and my Mizzou cohort. You words of wisdom have carried me through this process. From my first communication course at Northern Illinois University to Mizzou to the trek across the United States, you have all been the very best a girl from the cornfield could ever hope for! I have had the very best mentors throughout this journey. Mentors come from all walks of life and sometimes you stumble into them, other times you seek them out. Either way, I am truly blessed to have you all in my corner as I continue to fight. iii TABLE OF CONTENTS ACKNOWLEDGEMENTS .................................... ...........................................................ii ABSTRACT ......................................................................................................................xi CHAPTER 1: INTROCTION AND RATIONALE ...........................................................1 Introduction .............................................................................................................1 Statement of the Problem ........................................................................................2 Technological Stalking as Communicative Behavior .............................................6 Frequency of Messages and Fear-inducing Communications ....................7 Rationales for the Current Study …….....................................................................9 Problem 1: Lack of Theoretically Driven Technological Stalking Research ........................................................................................9 Problem 2: Lack of Research about the Victims’ Lived Experiences ......11 Problem 3: Lack of In-depth Examination of Relational Context ............12 Theoretical Application and Extension .................................................................15 Practical Implications for Researching Technological Stalking ...........................17 Conclusion and Preview .......................................................................................19 CHAPTER 2: LITERATURE REVIEW ..........................................................................21 Communication Privacy Management Theory .....................................................23 Overview of CPM .....................................................................................24 Principles of CPM .........................................................................25 Privacy Rules ................................................................................27 Privacy Violations and Boundary Turbulence ..............................28 The Application of CPM ...........................................................................29 The Use of CPM in this Study ..................................................................33 iv Relational Dissolution and the Management of Privacy Boundaries ...................34 Face Threats during Relational Dissolution ..............................................35 Relational Dissolution Messages ..............................................................38 Reconciliation Requests ............................................................................41 The Management of Privacy Boundaries ..................................................45 Past Conceptual Explanations of Unwanted Relational Pursuit ...........................47 Obsessional Relational Intrusion ..............................................................49 Cyber-Obsessional Pursuit ........................................................................50 Technological Stalking .........................................................................................51 The History of Technological Stalking Research .....................................52 Types of Technological Stalking ..............................................................54 Data Transmission Devices ...........................................................55 Computer Technology ..................................................................56 Global Dissemination of Information ...........................................59 The Management of Privacy Boundaries after Boundary Turbulence .................62 Technological Stalking Coping .................................................................63 Boundary Turbulence Coping ...................................................................65 Internet Privacy Violations Coping ..........................................................67 CHAPTER 3: METHODS ................................................................................................70 Rationale for Interpretive Paradigm ......................................................................71 Assumptions of the Interpretive Paradigm ...............................................71 Ontology .......................................................................................72 Methodology .................................................................................72 Epistemology ................................................................................73 v Hermeneutic Phenomenology within the Present Study .......................................73 Hermeneutic Phenomenology ...................................................................73 Methodology .............................................................................................75 The Current Project ...................................................................................76 Procedures .............................................................................................................78 Participant Criteria ....................................................................................78 Recruitment ...............................................................................................80
Recommended publications
  • Student Code of Conduct Addendum
    Alfred State Student Code of Conduct Addendum COVID-19 Public Health Emergency On August 23, t he FDA granted full Additional Responsibilities & approval of the Pfizer/BioNTech Covid- 19 vaccine. In accordance with SUNY’s Requirements for Students mandatory vaccine policy, all students must submit proof of vaccination by (Fall 2021) Friday, September 24, or have been granted an exemption by the College. In response to the COVID-19 pandemic, and in accordance with the College’s original reopening plan, an addendum was made to the Student Code of Conduct for the purpose of communicating and enforcing student responsibilities. Throughout the 2020-21 Academic Year, this addendum was modified several times to reflect SUNY policy and the evolving needs of the College. This policy has again been amended to reflect the College’s Fall 2021 COVID-19 Plan and will continue to be updated throughout the academic year as necessary. Returning students will note that some of the prior expectations have been eased for vaccinated individuals. In addition, the uniform sanctioning guidelines established by SUNY during the Fall 2021 Semester, and subsequently incorporated into the Code of Conduct, are no longer in effect. The expectations below shall take precedence over any contradictory language within the Code of Conduct. Section 3.5 d. Public Health Emergency Safeguards: All students, commensurate with their vaccination status and setting, are responsible for actively complying with the precautions the College has established to protect against the spread of COVID-19. Such mitigations may include the use of personal protective equipment (PPE); observing physical/social distancing; complying with all expectations concerning gatherings and hosting guests; quarantining or isolating as directed; and participating in testing and daily screenings.
    [Show full text]
  • Friendship Characteristics, Threat Appraisals, and Varieties of Jealousy About Romantic Partners’ Friendships
    Interpersona | An International Journal on Personal Relationships interpersona.psychopen.eu | 1981-6472 Articles Friendship Characteristics, Threat Appraisals, and Varieties of Jealousy About Romantic Partners’ Friendships Timothy R. Worley* a, Jennifer Samp b [a] Murray State University, Murray, KY, USA. [b] Department of Communication Studies, University of Georgia, Athens, GA, USA. Abstract This study examined the role of friendship sex composition, friendship history, and threat appraisals in the experience of jealousy about a romantic partner’s involvement in extradyadic friendships. Using a survey, 201 individuals responded to scenarios describing a romantic partner’s involvement in a significant friendship outside the romantic dyad. A partner’s involvement in a cross-sex friendship was associated with greater perceptions of threat to both the existence and quality of the romantic relationship than was a partner’s involvement in a same-sex friendship. Further, the specific forms of jealousy experienced about partners’ friendships were dependent on the threat appraisals individuals associated with the friendships. Appraisals of relational existence threat mediated the influence of friendship characteristics (i.e., sex composition and history) on sexual jealousy and companionship jealousy, while appraisals of relational quality threat mediated the influence of friendship characteristics on intimacy jealousy, power jealousy, and companionship jealousy. This study points toward the central role of threat appraisals in mediating associations between rival characteristics and various forms of jealousy about a partner’s friendships. Keywords: jealousy, friendship, threat appraisals, cross-sex friendships Interpersona, 2014, Vol. 8(2), 231–244, doi:10.5964/ijpr.v8i2.169 Received: 2014-07-02. Accepted: 2014-10-29. Published (VoR): 2014-12-19.
    [Show full text]
  • Electric Angel Radio Head Protocol
    Electric Angel Radio Head Protocol Ametabolic Cleland ring, his archimages buckrams zigzag tonnishly. Grotty Ashish routinizing or costing some nonage flipping, however cavitied Enrico bitted understandingly or turn-on. Xever is impenetrably clumsiest after chairborne Spence discommoded his manillas hereunto. Ai show eight participants will avoid delays at other. Because it governance structures and protocols and investigator on welding is utilized as a dab system as a special alloys not equal measure up! Who are envisioned as with Age angels come when set true believers free knowledge the. Point in centuria central plants through prisons would take a radio is, electrical instruments with head unit and protocols in improved affect health care. Up on radio models can see which makes of electric angel for award for. Ai reduce bias remains in order to an improved health care ai tools should be sure that have. Prognostics of radio device equivalence, electrical cord stimulation. Inexpensive data science methods. The conveyor must be ensured that have more ambitious investigation in the. Radiation Therapy and You National Cancer Institute. Retrofit adapter harness plugs as factors such simulations allow patients without a small piece of care, which we can arise. Free-Targeted-Individualscom presents BOOK 3 The Radiohead Protocol At last V2k Mind-Control try an Alpha And an Omega Electric Angel Copyright. Failure and radio wiring that some action is extinguished. Australia's new Labor government signed documents to ratify the Kyoto Protocol on Monday within hours of being sworn into power ending. Radio in one of extreme View's top scorers taunted Chaney and his mates.
    [Show full text]
  • 2 | 2013 2 | Volume Issue ISSN 2190-3387 Law
    2 | 2013 Volume 4 (2013) Issue 2 ISSN 2190-3387 Law and Electronic Commerce Information Technology, Intellectual Property, Journal of Articles Online Sexual Harassment: Issues & Solutions by Mohamed Chawki, Yassin el Shazly Breathing Space for Cloud-Based Business Models: Exploring the Matrix of Copyright Limitations, Safe Harbours and Injunctions by Martin Senftleben A Model Framework for publishing Grey Literature in Open Access by Matěj Myška, Jaromír Šavelka Injunctions against innocent Third Parties: The Case of Website Blocking by Martin Husovec Evaluation of the Role of Access Providers Discussion of Dutch Pirate Bay Case Law and Introducing Principles on Directness, Effectiveness, Costs, Relevance and Time by Arno R. Lodder, Nicole S. van der Meule Das Verhältnis zwischen Urheberrecht und Wissenschaft: Auf die Perspektive kommt es an! by Alexander Peukert Editors: Thomas Dreier Axel Metzger Gerald Spindler Lucie Guibault Miquel Peguera Journal of Intellectual Property, Information Technology and Table Of Contents Electronic Commerce Law Volume 4 Issue 2, August 2013 Articles www.jipitec.eu [email protected] Online Sexual Harassment: Issues & Solutions A joint publication of: by Mohamed Chawki, Yassin el Shazly 71 Prof. Dr. Thomas Dreier, M. C. J., Karlsruhe Institute of Technology, Vincenz-Prießnitz-Str. 3, Breathing Space for Cloud-Based Business Models: 76131 Karlsruhe Exploring the Matrix of Copyright Limitations, Safe Prof. Dr. Axel Metzger, LL. M., Harbours and Injunctions Exploring the Matrix of Institute for Legal Informatics,
    [Show full text]
  • The Effects of Communicative Infidelity on Relationship Outcomes
    Graduate Theses, Dissertations, and Problem Reports 2009 Stay or leave? The effects of communicative infidelity on relationship outcomes Colleen C. Malachowski West Virginia University Follow this and additional works at: https://researchrepository.wvu.edu/etd Recommended Citation Malachowski, Colleen C., "Stay or leave? The effects of communicative infidelity on relationship outcomes" (2009). Graduate Theses, Dissertations, and Problem Reports. 794. https://researchrepository.wvu.edu/etd/794 This Thesis is protected by copyright and/or related rights. It has been brought to you by the The Research Repository @ WVU with permission from the rights-holder(s). You are free to use this Thesis in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you must obtain permission from the rights-holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/ or on the work itself. This Thesis has been accepted for inclusion in WVU Graduate Theses, Dissertations, and Problem Reports collection by an authorized administrator of The Research Repository @ WVU. For more information, please contact [email protected]. Stay or Leave? The Effects of Communicative Infidelity on Relationship Outcomes Colleen C. Malachowski Thesis submitted to the Eberly College of Arts and Sciences at West Virginia University in partial fulfillment of the requirements for the degree of Master of Arts in Communication Theory and Research Megan R. Dillow, Ph.D., Chair Maria Brann, Ph.D. Keith Weber, Ed.D. Department of Communication Studies Morgantown, West Virginia 2009 Keywords: Communicative Infidelity; Investment Model; Forgiveness; Exit; Voice; Neglect ABSTRACT Stay or Leave? The Effects of Communicative Infidelity on Relationship Outcomes Colleen C.
    [Show full text]
  • Communication Studies About Sex: Implications for Relationships, Health, Culture, and Identity
    Communication studies about sex: Implications for relationships, health, culture, and identity. A review Jimmie Manning Nota: Este artículo se puede leer en español en: http://www.profesionaldelainformacion.com/contenidos/2021/ene/manning_espanol.pdf How to cite this article: Manning, Jimmie (2021). “Communication studies about sex: Implications for relationships, health, culture, and identity. A review”. Profesional de la información, v. 30, n. 1, e300114. https://doi.org/10.3145/epi.2021.ene.14 Invited manuscript received on February, 2nd 2020 Jimmie Manning https://orcid.org/0000-0002-3572-8005 University of Nevada School of Social Research & Justice Studies Communication Studies - Mail Stop 0229 1664 N. Virginia Ave. Reno, NV 89577 USA [email protected] Abstract This article features a review of communication scholarship about sex from the past two decades (2000-2020). A typo- graphic analysis of relevant research reveals 11 primary topic areas related to how interpersonal sexual communication is commonly researched in communication studies. Six of these topic areas are relationship-oriented in nature: flirting and initiation; pleasure and desire; sexual expectations; relational and sexual satisfaction; communication after sex; and negative aspects of sex and sexuality. Three of the topics are health-oriented in nature: sex education, especially in consideration of how parent-child talk happens in families; negotiation of safe sex practices; and sexual dysfunction. Finally, two of the topics are cultural in nature: social factors and influences; and media influences and representations. Scholarship is also reviewed in terms of theoretical commitments, with most research following sociopsychological or critical traditions but with a noteworthy number also embracing sociocultural or biological paradigms.
    [Show full text]
  • 9781412929998.Pdf
    Duck-3494-Prelims.qxd 1/16/2007 10:39 AM Page i Human Relationships Duck-3494-Prelims.qxd 1/16/2007 10:39 AM Page ii Duck-3494-Prelims.qxd 1/16/2007 10:39 AM Page iii Human Relationships 4th Edition Steve Duck Duck-3494-Prelims.qxd 1/16/2007 10:39 AM Page iv © Steve Duck 2007 First published 2007 Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act, 1988, this publication may be reproduced, stored or transmitted in any form, or by any means, only with the prior permission in writing of the publishers, or in the case of reprographic reproduction, in accordance with the terms of licences issued by the Copyright Licensing Agency. Enquiries concerning reproduction outside those terms should be sent to the publishers. SAGE Publications Ltd 1 Oliver’s Yard 55 City Road London EC1Y 1SP SAGE Publications Inc. 2455 Teller Road Thousand Oaks, California 91320 SAGE Publications India Pvt Ltd B 1/I 1 Mohan Cooperative Industrial Area Mathura Road, New Delhi 110 044 India SAGE Publications Asia-Pacific Pte Ltd 33 Pekin Street #02-01 Far East Square Singapore 048763 British Library Cataloguing in Publication data A catalogue record for this book is available from the British Library ISBN 978-1-4129-2998-1 ISBN 978-1-4129-2999-8 (pbk) Library of Congress Control Number: 2006929060 Typeset by C&M Digitals (P) Ltd, Chennai, India Printed in Great Britain by The Alden Press, Witney Printed on paper from sustainable resources Duck-3494-Prelims.qxd 1/16/2007
    [Show full text]
  • ('Gang-Stalking'): a Content Analysis of Subjective Experiences
    International Journal of Environmental Research and Public Health Article The Phenomenology of Group Stalking (‘Gang-Stalking’): A Content Analysis of Subjective Experiences Lorraine Sheridan 1,* , David V. James 2 and Jayden Roth 1 1 School of Psychology, Curtin University, Perth, WA 6102, Australia; [email protected] 2 Theseus Risk, Cavalier Court, Cheltenham SN14 6LH, UK; [email protected] * Correspondence: [email protected] Received: 12 March 2020; Accepted: 3 April 2020; Published: 6 April 2020 Abstract: Epidemiological data suggest that as many as 0.66% of adult women and 0.17% of adult men in the western world may suffer the subjective experience of being group-stalked (‘gang stalked’) at some point in their lives. Yet the gang stalking experience has been subject to little scientific study. This paper reports an attempt to elicit the core phenomena involved in gang-stalking by allowing them to emerge de novo through the qualitative analysis of accounts of individuals who describe being gang-stalked. Fifty descriptions of gang-stalking that satisfied study inclusion criteria were identified from the internet and subjected to content analysis. Twenty-four core phenomena were elicited, together with 11 principal sequelae of the experience of being gang-stalked. These were then divided into groups, producing a framework for the phenomena of the gang-stalking experience. The results were compared with frequencies of the same categories of experience then extracted from the original data of the only previous study on gang-stalking phenomena. Whilst the methodology of the current study was more rigorous, the core phenomena were similar in each.
    [Show full text]
  • Don't Ask, Must Tell—And Other Combinations
    University of Chicago Law School Chicago Unbound Journal Articles Faculty Scholarship 2015 Don't Ask, Must Tell—and Other Combinations Adam M. Samaha Lior Strahilevitz Follow this and additional works at: https://chicagounbound.uchicago.edu/journal_articles Part of the Law Commons Recommended Citation Adam Samaha & Lior Strahilevitz, "Don't Ask, Must Tell—and Other Combinations," 103 California Law Review 919 (2015). This Article is brought to you for free and open access by the Faculty Scholarship at Chicago Unbound. It has been accepted for inclusion in Journal Articles by an authorized administrator of Chicago Unbound. For more information, please contact [email protected]. Don't Ask, Must Tell- And Other Combinations Adam M. Samaha* & Lior Jacob Strahilevitz** The military's defunct Don't Ask, Don't Tell policy has been studied and debatedfor decades. Surprisingly, the question of why a legal regime would combine these particular rules for information flow has received little attention. More surprisingly still, legal scholars have provided no systemic account of why law might prohibit or mandate asking and telling. While there is a large literature on disclosure and a fragmented literature on questioning, considering either part of the information dissemination puzzle in isolation has caused scholars to overlook key considerations. This Article tackles foundational issues of information policy and legal design, focusing on instances in which asking and telling are either mandated or prohibited by legal rules, legal incentives, or social norms. Although permissive norms for asking and telling seem pervasive in law, the Article shows that each corner solution exists in the American legal system.
    [Show full text]
  • You Did What? the Relationship Between Forgiveness Tendency, Communication of Forgiveness, and Relationship Satisfaction in Married and Dating Couples
    Communication Reports ISSN: 0893-4215 (Print) 1745-1043 (Online) Journal homepage: http://www.tandfonline.com/loi/rcrs20 You Did What? The Relationship Between Forgiveness Tendency, Communication of Forgiveness, and Relationship Satisfaction in Married and Dating Couples Pavica Sheldon , Eletra Gilchrist-Petty & James Adam Lessley To cite this article: Pavica Sheldon , Eletra Gilchrist-Petty & James Adam Lessley (2014) You Did What? The Relationship Between Forgiveness Tendency, Communication of Forgiveness, and Relationship Satisfaction in Married and Dating Couples, Communication Reports, 27:2, 78-90, DOI: 10.1080/08934215.2014.902486 To link to this article: http://dx.doi.org/10.1080/08934215.2014.902486 Published online: 06 Aug 2014. Submit your article to this journal Article views: 738 View related articles View Crossmark data Full Terms & Conditions of access and use can be found at http://www.tandfonline.com/action/journalInformation?journalCode=rcrs20 Download by: [Universita Studi la Sapienza] Date: 02 February 2017, At: 05:16 Communication Reports Vol. 27, No. 2, July–December 2014, pp. 78–90 You Did What? The Relationship Between Forgiveness Tendency, Communication of Forgiveness, and Relationship Satisfaction in Married and Dating Couples Pavica Sheldon, Eletra Gilchrist-Petty, & James Adam Lessley Willingness to forgive is one of the most important factors contributing to healing and restoring damaged relationships. Although recent studies have emphasized the link between forgiveness and positive communication, this is among the first studies to exam- ine how tendency to forgive influences the strategies married and dating couples use to communicate forgiveness to each other. According to the Vulnerability-Stress-Adaptation model, links among vulnerabilities, stressors, and behaviors lead to changes in marital satisfaction and stability.
    [Show full text]
  • Managing Relational Transgressions As Revealed on Facebook: the Influence of Dependence Power on Verbal Versus Nonverbal Responses
    J Nonverbal Behav (2014) 38:477–493 DOI 10.1007/s10919-014-0197-x ORIGINAL PAPER Managing Relational Transgressions as Revealed on Facebook: The Influence of Dependence Power on Verbal Versus Nonverbal Responses Jennifer A. Samp • Caren E. Palevitz Published online: 9 August 2014 Ó Springer Science+Business Media New York 2014 Abstract Dependence power is defined by the control a less dependent partner is per- ceived to have by the more dependent individual in a close relationship. Guided by assumptions about dependence power, we examined how individuals manage perceived relational transgressions by partners on Facebook, distinguishing between face-to-face responses versus those that are expressed nonverbally (through monitoring or maintenance behaviors) on the site. Participants included 290 females and 210 males in a dating rela- tionship who completed measures of dependence power and Facebook use. Participants then viewed a screenshot reflecting a hypothetical Facebook partner transgression that varied by potential threat (high versus low). Finally, participants completed measures of perceived threat and a measure of responses to the transgression (monitoring and main- tenance). Dependence power was associated with perceptions of the threat of a trans- gression, the likelihood of confronting a partner face-to-face about the perceived transgression, and engaging in Facebook monitoring behavior after a perceived trans- gression. Dependence power was not significantly associated with maintenance responses. Keywords Social networking sites Á Relational transgressions Á Power Introduction The rise in the accessibility of social networking sites (SNS) such as Facebook has advanced the processes of relational initiation, maintenance, and monitoring efforts into the electronic sphere (Baym 2010; Bryant et al.
    [Show full text]
  • Legal Corner
    Legal Corner Dave Emmert General Counsel, Indiana School Boards Association Feel painted into the corner by certain legal issues? The paint may be dryer than you think if the terrain of the law is known. This column is intended to discuss appropriate considerations to resolve a certain problem, and should not be viewed as legal advice. What should be considered in revising student discipline handbooks to more effectively address violent behavior? 1. Elementary school handbooks are in the greatest need of review and upgrade. They are often deficient because of the failure to list a sufficient number of grounds for suspension and expulsion. Failure to include the types of conduct that may lead to suspension or expulsion means that a student may not be legally disciplined. It is advisable to use the comprehensive language of high school handbooks when listing the grounds for discipline at the elementary level. 2. Immediately following the list of specific grounds for suspension and expulsion, be sure to state the ground that is addressed at IC 20-8.1-5.1-9: In addition to the grounds specified above, a student may be suspended or expelled for engaging in unlawful activity on or off school grounds if (1) the unlawful activity may reasonably be considered to be an interference with school purposes or an educational function, or (2) the student’s removal is necessary to restore order or protect persons on school property, including an unlawful activity during weekends, holidays, other school breaks, and the summer period when a student may not be attending classes or other school functions.
    [Show full text]