Teenage Victims: a National Crime Survey Report

Total Page:16

File Type:pdf, Size:1020Kb

Teenage Victims: a National Crime Survey Report DOCUMENT RESUME ED 295 062 CG 020 802 AUTHOR Whitaker, Catherine J. TITLE 'il,enage Victims: A National Crime Survey Report. INSTITUTION Department of Justice, Washington, D.C. Bureau of Justice Statistics. REPORT NO NCJ-103138 PUB DATE Nov 86 NOTE 21p. PUB TYPE Reports - Research/Technical (143) EDRS FRICF MF01/PC01 Plus Postage. DESCRIPTORS *Adolescents; *Age Differences; *Crime; Criminals; Racial Differences; Sex Differences; Trend Analysis; *Victims of Crime IDENTIFIERS *National Crime Survey ABSTRACT The information in this report on teenage victims of crime is based on data obtained from the National Crime Survey for the years 1982 through 1984. The introduction summarizes crimes against teenagers, highlighting numbers, rates of victimization, and dtifferences in crimes against teenagers and adults. These topics are discussed in detail: (1) victimization rates; (2) trends in types of crimes committed against teenagers; (3) crime characteristics, including the use of weapons in crimes, self-Trotective measures, injuries and medical care, and number of victims and offenders; (4) offender characteristics, including the relationship to victim, sex of offenders, race of offenders, and age of offenders; (5) rates of reporting crimes to the police; and (6) methodology of the National Crime Survey including definitions of terms and reliability of comparisons. Results are discussed which showed that teenagers had higher annual violent and theft crime victimization rates than did adults; older teenagers had higher violent crime victimization rates than did younger teenagers; male teenagers had higher violent and theft crime victimization rates than did female teenagers; and black teenagers had higher violent crime victimization rates than did teenagers of other racial groups. One figure and 18 tables illustrate the document. (ABL) **********************************************************************t * Reproductions supplied by EDRS are the best that can be made * * from the original document. * *********************************************************************** U.S. Department of Justice Bureau of Justice Statistics ,...m.s.. Teenage Victims A National Crime Survey Report NCJ-103138, November 1986 (NI0 CO0 0CV CD C-.) U.S. DEPARTMENT OF EDUCATION Office of Educational Research and Improvement UCATIONAL RESOURCES INFORMATION CENTER (ERIC) This document has been reproduced as received from the person or organization originating it, O Minor changes have been made to improve reproduction quality Points of view or opinions st ated in thisdatv ment do not necessarily represent official OERI position or policy. BEST COPYAVAILABLE Bureau of Justice Statistics Corrections Courts Federal justice statistics reports BJS bulletins and special report:: BJS bulletins: The Federal civil justice system (BJS (revised January 19cM) Capital punishment 1986, NCJ106483. State felony courts and felony laws, bulletin). NCJ-104769. 7/87 9/87 NCJ - 106273.8/87 Employer perceptions of workplace Call toll-free 800-732-3277 (local Prisoners in 1986, N CJ-104864. 5/87 TM growth of appeals: 19-343 trends, crime, NCJ - 101851.7/87 301-251-5500) to order BJS reports, Imprisonment In four countries, NCJ - N C.1.96381. 2/85 Federal offenses and offenders to be added to one of the BJS mailing 103967,2/87 Case filings In State courts 1983, lists, or to speak to a reference Population density in Stale Prisons, NCJ - 95111.10/84 BJS special reports: White-collar crime, NCJ.106876. 9/87 specialist in statistics at the Justice NCJ-103204, 12/86 BJS special reports: Stets and srederal prisoners, 1925-65, Pretrial release and misoc.:euct, NCJ, Statistics Clearinghouse, National Felony case - processing time, NCJ - 96132.1/85 Criminal Justice Ref er011;:e Service. 102494.11/86 101985.8/86 Prison admiseslon and releases, 1983, Felony sentencing In 18 local jurisdic- BJS bulletins: Box 6000;Rockville, MD 20850. NCJ-100582. 3/86 Single copies of reports are free; use tions, NCJ-97681. 6/85 Bank robbery, NCJ4463. 8/84 Examining recidivism, NCJ - 96501.2/85 TM prevalence of guilty pleas, NCJ - Federal drug law violators, NCJ - NCJ number to order. Postage and Returning to prison, NCJ-95700. 11/84 96018.12/84 92692.2/84 handling are charged for bulk orders Time served In prison, NCJ-93924. 6/84 Sentencing practices in 13 States, Federal Justice statistics, NCJ- of single reports. For single copies of Correctional populations In the U.S. NCJ-95399. 10/84 80814. 3/82 multiple titles, up to 10 titles are free; 1965, NCJ-103957. 1/88 Criminal defense systems: A national 11-40 titles $10; more than 40, $20; 1984 lemma of MO adult correctional survey, NCJ94630. 8/84 General Hoboes corpus, NCJ - 92948.3/84 libraries call for special rates. facilities, NCJ- 115585.7/87 BJS bulletins and special reports: Public-use tapes of BJS data sets Historical corrections statistics in the State court caseload statistics, 1977 and 1981, NCJ-87587, 2/83 EIJ1S0t201979h. 1o2786contacts '87, NCJ and other criminal justice data are U.S., 1650.1964, NCJ- 102529.4/87 available from the Criminal Justice Prisoners In State and Federal Milkier Sentencing outcomes in 28 felony Tracking offenders: White-collar crime, tons or. Dec. 31,1984, NCJ-103768. courts, NCJ-105748. 8/87 NCJ102867. 11/86 Archive and Information Network, P.O. 3/87 Box 1248, Ann Arbor, MI 48106 National criminal defense systems study, Police employment and expenditure, Capital punishment 1984 (final), NCJ- NCJ - 94702.10/86 NCJ - 100117.2/86 (313-763-5010). 99562. 5/86 Tracking offenders: The child victim, The prosecution of felony arrests: 1979 survey of inmates of State correctional NCJ- 95785,12/84 National Crime Survey 1982, NCJ-106990. 1/88 Tracking offenders, NCJ-91572. 11/83 facilities and 1979 census of State 1981, NCJ-101360, 9/86.57.60 Criminal victimization in the U.S.: correctional facilities: Victim and witness assistanci: New 1965 (final report). NCJ-104273, 5/87 1980, NCJ-97684. 10/85 State laws and the system's 1964 (final report), NCJ-100435. 5/86 BJS special reports: 1979, NCJ-86482. 5/84 response, NCJ-87934. 5/83 1983 (final report), NCJ.96459. 10/85 The prevalence of imprisonment, Felony Jews Is 50 Motes and the District NCJ-93657, 7/85 of Columbia, 1986, NCJ- 105066. BJS data report, 1986, NCJ 106679. BJS special reports: Career patterns in crime, NCJ-88672. 12/87.$14.70 --,10/117 Elderly victims, NCJ-107676. 11/87 6/83 Sate court model statistical dictionary, Sourcebook of &minal Justice statistics, Violent crime trends, N_ CJ-107217. Supplement, NCJ-98326. 9185 1986, NC..1105287. 9/87 11/87 BJS bulletins: 1st edition, NCJ - 62320.9/80 BJS annual report, fiscal 1986; NCJ - Robbery victims, NCJ-104638. 4/87 Prisoners and drugs, NCJ87575. State court organization 1980, NCJ 103985.4/87 Violent crime by strangers and 3/83 76711, 7/82 1986 directory of automated criminal nonstrangers, NCJ - 103702.1/87 Prisoners and alcohol, NCJ86223. ju Mice Information sytems, NCJ - Preventing domestic violence against 1/83 Computer crime: 102260,1/87, $20 women, NCJ - 102037.8/86 Prisons and prisoners, NCJ80697. Publications of BJS, 1971-84: A topical Crime prevention measures, 2/32 BJS special reports: bibliography, 713030012. 10/86.$17.5) NCJ - 10(438.3/86 Veterans in prison, NC.J.79232. 11/81 Electronic fund transfer fraud, NC.J BJS publications: Selected librarY111 96666, 3/85 TM use of weapons In committing Census of jails and survey of jail inmates: microfiche, 1971.84, PR030012. crimes, NCJ-99643. 1/86 Electronic fund transfer and crime, 10/86. $203 domestic Jail inmates, 1966, NCJ107123. 10/87 N C.1.92650. 2/84 Reporting crimes to the Police. NW' Jail Inmates 1985, NC.1105586. 7/87 Na9t6ioonla71.sluongy5 of crime severity, NCJ- 99432. 12/85 TM 1963 Jail census (BJS bulletin). Electronic fund transfer systems fraud, Locating city, suburban, and rural NCJ95536. 11/84 N C.1.100461. 4/86 Criminal victimization of District of crime, NCJ-99535. 12/85 Census of jails, 197e: Data for Computer security techniques, NC.J Columbia residents and Capitol Hill TM risk of violent crime, NCJ97119. individual oils, vois.1.1./. Northeast. 84049.9/82 employees, 1962413, NCJ97982: 5/85 North Central. South. West. NCJ. Electronic fund transfer systems and Summary, NCJ.98567. 9/85 The economic cost of crime to victims, 72279. 72282.12/81 crime, Ne..1.83736. 9/82 DC household victimization survey data NCJ9345. 4/84 Profile of jail inmates, 1978, Expert witness manual, NCJ77927. 9/81 Family violence, NCJ93449. 4/84 NCJ - 65412.2/81 Criminal justice resource manual, Study dy implementation. NCJ.38595.37.60 BJS bulletins' NCJ61550. 12/79 Criminal victimization 1986, NCJ Documentation, NCJ98596.36 40 Parole and probation User manual, NCJ98597.38 20 106989.10/87 4 Privacy and security Households touched by crime, 1986, BJS burelins: How to gain access to BJS data Probation and parole 1986, NCJ Privacy and security of criminal history (brochure). 8C-000022. 9/84 NCJ.105289. 6/87 information: Compendium of State TM crime of rape, NC..196777. 3/85 108012.12/87 Report to the nation on crime and justice: legislation: 1984 overview, NCJ The data, NCJ87068. 10/83 Household hurglarv, NC..196021. 1/85 Probation and parole 1985, NCJ 98077.9/85 Violent crime by strangers, NCJ80829, 103683.1/87 BJS maintains the following 4/82 Setting prison terms, NC..176218. 8/83 Criminal justice information Policy: mailing lists: Crime and the elderly, N C.1.79614. 1/82 BJS special reports: Automated fingerprint identification Drugs and crime data (new) Measuring crime, NCJ.75710,2/81 Time served in prison and on parole, systems: Technology and policy White-Collar crime (new) issues, NCJ-104342. 4/87 National Crime Survey (annual) Series crimes: Report of a field test (13J S NCJ108544, 1/88 Recidivism of young parolees, NC.1 Criminal Justice "hot.' files, Corrections (annual) technical report). NC.1104615. 4/87 Juvenile corrections (annual) Crime and older Americans information 104916.5/87 NCJ.101850.
Recommended publications
  • Transaction-Tax Evasion in the Housing Market José G
    Transaction-tax Evasion in the Housing Market José G. Montalvo Amedeo Piolatto Josep Raya This version: January 2020 (March 2019) Barcelona GSE Working Paper Series Working Paper nº 1080 Transaction-tax evasion in the housing market Revised Version January 2020 Jos´eG. Montalvo 1 Amedeo Piolatto2 Josep Raya3 U. Pompeu Fabra-ICREA, Autonomous U. Barcelona, U. Pompeu Fabra, Research Professor BGSE BGSE, IEB, MOVE ESCSE (Tecnocampus) Acknowledgements: We gratefully acknowledges the financial sup- port of the Spanish Ministry of Economy and Competitiveness (Mont- alvo: ECO2017-82696P, Piolatto: PGC2018-094348; Raya: ECO2016- 78816R), the Government of Catalonia (Montalvo: ICREA-Academia and SGR2017-616; Piolatto: 2017SGR711), the Programa Ram´ony Cajal (Piolatto: RYC-2016-19371), the Severo Ochoa Programme for Centres of Excellence in R&D of the Spanish Ministry of Economy and Competitiveness (Montalvo and Piolatto: SEV-2015-0563) and the Barcelona GSE. 1Universitat Pompeu Fabra, Ramon Trias Fargas 25-27, 08005 Barcelona. Tel.: +34 935 422 509. E-mail: [email protected] 2[Corresponding Author] Autonomous U. Barcelona (UAB), Bellaterra Campus, 08193, Barcelona. Tel.: Phone: +34 935 868 493 E-mail: [email protected] 3Universitat Pompeu Fabra, Ramon Trias Fargas 25-27, 08005 Barcelona. Tel.: +34 931 696 501. E-mail: [email protected] Abstract We model the behaviour of a mortgagor considering to evade the real estate transfer tax. We build an observable measure of over-appraisal that is in- versely related with tax evasion and conclude that the tax authority could focus auditing efforts on low-appraisal transactions. We include `behavi- oural' components (shame and stigma) allowing to introduce buyers' and societal characteristics that explain individual and idiosyncratic variations.
    [Show full text]
  • Recovering from Childhood Abuse
    Recovering from Childhood Abuse Sarah Kelly and Jonathan Bird This book is written by survivors for all survivors who experienced any form of abuse or neglect in childhood and for those who provide support. 2014 Copyright © NAPAC 2014 1 Dedication To all the brave survivors and their supporters who have helped us learn what works in recovering from childhood abuse. In memory of those people who could not find the support they needed to survive as adults and tragically took their own lives. All happy families are alike; each unhappy family is unhappy in its own way. Leo Tolstoy, Anna Karenina People are not disturbed by things, but by the view they take of them. Epictetus, first century AD Thanks to BIG Lottery and all our other generous funders and donors who have made NAPAC’s work and this book possible. Grateful thanks also go to Peter Saunders, Helen Munt, Julie Brock, Kathryn Livingston and Melanie Goodwin of First Person Plural, and Tracey Storey of Irwin Mitchell, who have all contributed to the writing of this book. Proof reading and layout were kindly donated by James Badenoch QC, Ann Watkins and Katie John, and our thanks go to them for their time and efforts. Copyright © NAPAC 2014 2 Contents Page About the authors 4 Foreword – Tim Lambert 5 Introduction 6 Chapter 1: What is abuse? 9 Chapter 2: Maladaptive coping strategies 25 Chapter 3: Mental health 32 Chapter 4: Dissociative spectrum – Katherine and Melanie of FPP 41 Chapter 5: Impacts 49 Chapter 6: Therapy and appropriate coping mechanisms 56 Chapter 7: Transfer of responsibility 67 Chapter 8: How to disclose and how to hear disclosure 80 Chapter 9: The legal process – Tracey Storey, solicitor, Irwin Mitchell 86 Conclusions 96 Bibliography 98 Useful contacts 99 Copyright © NAPAC 2014 3 About the authors Sarah Kelly is a survivor of childhood emotional and sexual abuse.
    [Show full text]
  • “Is Deterrence Approach Effective in Combating Tax Evasion? a Meta-Analysis”
    “Is deterrence approach effective in combating tax evasion? A meta-analysis” Muh Dularif https://orcid.org/0000-0002-4905-2595 AUTHORS Sutrisno T. Nurkholis Erwin Saraswati Muh Dularif, Sutrisno T., Nurkholis and Erwin Saraswati (2019). Is deterrence ARTICLE INFO approach effective in combating tax evasion? A meta-analysis. Problems and Perspectives in Management, 17(2), 93-113. doi:10.21511/ppm.17(2).2019.07 DOI http://dx.doi.org/10.21511/ppm.17(2).2019.07 RELEASED ON Thursday, 25 April 2019 RECEIVED ON Sunday, 20 January 2019 ACCEPTED ON Wednesday, 06 March 2019 LICENSE This work is licensed under a Creative Commons Attribution 4.0 International License JOURNAL "Problems and Perspectives in Management" ISSN PRINT 1727-7051 ISSN ONLINE 1810-5467 PUBLISHER LLC “Consulting Publishing Company “Business Perspectives” FOUNDER LLC “Consulting Publishing Company “Business Perspectives” NUMBER OF REFERENCES NUMBER OF FIGURES NUMBER OF TABLES 89 2 10 © The author(s) 2021. This publication is an open access article. businessperspectives.org Problems and Perspectives in Management, Volume 17, Issue 2, 2019 Muh Dularif (Indonesia), Sutrisno T. (Indonesia), Nurkholis (Indonesia), Erwin Saraswati (Indonesia) Is deterrence approach BUSINESS PERSPECTIVES effective in combating tax evasion? A meta-analysis Abstract LLC “СPС “Business Perspectives” The purpose of this paper is to present the results of a meta-analysis of the relationship Hryhorii Skovoroda lane, 10, Sumy, between determinant factors and tax evasion based on deterrence approach. Using 40022, Ukraine the meta-analysis method, each statistical result of empirical studies is converted into www.businessperspectives.org r-pearson as standardized effect size, and then synthesized into a mean effect size in order to increase power and to resolve uncertainty.
    [Show full text]
  • The Career Benefits of Writing Without Bullshit Josh Bernoff
    The Career Benefits of Writing Without Bullshit Josh Bernoff ChangeThis | 145.05 Clarity. Boldness. We say that we value these qualities in communication at work. So why is nearly everything we read so full of bullshit? Our inboxes, browsers, and smartphone screens are filled with jargon-laden, meandering drivel. Why can’t people get to the point and say what they mean? This is a pervasive problem that erodes all of our productivity, and I can prove it. I surveyed 547 businesspeople just like you—people who write at least two hours per day for work, outside of email. Here’s what they told me. First off, they average 46 hours per week spent reading and writing for work. Consuming and creating text has become a full-time job. Taken together, the email, Web pages, reports, and social media posts we all create and consume have taken over our time at work. ChangeThis | 145.05 Second, people are frustrated as hell with what they read. More than 80% say that poorly written material wastes a lot of their time. They rate the average effectiveness of what they read as a pathetic 5.4 on a ten-point scale. Most of them agree that what they read is too long, poorly organized, unclear, and filled with jargon. After 35 years of reading and writing for work, I decided to face this problem head-on: to determine what causes bullshit, and how we can all learn to write without it. The problem is real. And the solution is within reach. It’s just a question of committing yourself to writing without bullshit.
    [Show full text]
  • Tax Crimes Handbook
    TAX CRIMES HANDBOOK Office of Chief Counsel Criminal Tax Division 2009 PREFACE The goal in developing this handbook was to provide a resource for Criminal Tax Attorneys to use in the course of advising their client on criminal tax matters, and in evaluating recommendations for prosecution. This handbook is not intended to create or confer any rights, privileges, or benefits on any person. It is not intended to have the force of law, or of a statement of Internal Revenue Service policy. See, United States v. Caceres, 440 U.S. 741 (1979). _________/s/______________ EDWARD F. CRONIN Division Counsel/Associate Chief Counsel (Criminal Tax) Internal Revenue Service This Page is Blank – NO BORDER CHAPTER 1 TITLE 26 TAX VIOLATIONS SECTION 1 TAX EVASION - I.R.C. § 7201 1-1.01 Statutory Language 2 1-1.02 Generally 2 1-1.03 Evasion of Assessment 4 [1] Elements of the Offense 4 [2] The Attempt 4 [3] Additional Tax Due and Owing 6 [4] Willfulness 9 [5] Venue 13 [6] Statute of Limitations 14 1-1.04 Evasion of Payment 15 [1] Elements of the Offense 15 [2] The Attempt 15 [3] Additional Tax Due and Owing 17 [4] Willfulness 17 [5] Venue 18 [6] Statute of Limitations 18 1-1.05 Collateral Estoppel 18 1-1.06 Lesser Included Offenses 19 1-1.07 Table of Cases 20 i CHAPTER 1 TITLE 26 TAX VIOLATIONS SECTION 2 WILLFUL FAILURE TO COLLECT OR PAY OVER TAX I.R.C. § 7202 1-2.01 Statutory Language 30 1-2.02 Generally 30 1-2.03 Elements of the Offense 30 [1] Duty to Collect and/or to Truthfully Account for and Pay Over 31 [2] Failure to Collect or Truthfully Account for and Pay Over 31 [3] Willfulness 31 1-2.04 Motor Fuel Excise Tax Prosecutions 33 1-2.05 Venue 33 1-2.06 Statute of Limitations 33 1-2.07 Table of Cases 35 ii CHAPTER 1 TITLE 26 TAX VIOLATIONS SECTION 3 FAILURE TO FILE, SUPPLY INFORMATION OR PAY TAX - I.R.C.
    [Show full text]
  • Psyc 337 Learning
    PSYC 337 LEARNING Session 6 – Instrumental and Operant Conditioning – Part Two Lecturer: Dr. Inusah Abdul-Nasiru Contact Information: [email protected] College of Education School of Continuing and Distance Education 2014/2015 – 2016/2017 godsonug.wordpress.com/blog Session Overview • This session continues with Instrumental and Operant Conditioning • The focus in this session will be the mechanism by which behaviour is learned through reinforcement and punishment, and how to apply this to learning situations • It will also look at comparison between reinforcement and punishment as strategies for effective use in shaping behavior completely Slide 2 Session Objectives • At the end of the session, students will be able to – Understand the various schedules of reinforcement – Explain Aversive Conditioning – Demonstrate skills in applications of Operant Conditioning in Everyday Situation Slide 3 Session Outline • The key topics to be covered in the session are as follows: – Topic One: Schedules of Reinforcement – Topic Two: Aversive Conditioning – Topic Three: Applications of Operant Conditioning in Everyday Situation Slide 4 Reading List • Relevant text/chapters and reading materials are available on Sakai Slide 5 Topic One SCHEDULES OF REINFORCEMENT Slide 6 What is a Schedule of Reinforcement? • A schedule of reinforcement tells when and after what number of responses of desired behaviour to give reinforcement • The procedure of giving reinforcement can be on a regular basis or an intermittent schedule • Therefore, there are two main
    [Show full text]
  • Logic and the Common Law Trial
    University of Kentucky UKnowledge Law Faculty Scholarly Articles Law Faculty Publications Summer 1994 Logic and the Common Law Trial Richard H. Underwood University of Kentucky College of Law, [email protected] Follow this and additional works at: https://uknowledge.uky.edu/law_facpub Part of the Legal Profession Commons, and the Litigation Commons Right click to open a feedback form in a new tab to let us know how this document benefits ou.y Recommended Citation Richard H. Underwood, Logic and the Common Law Trial, 18 Am. J. Trial Advoc. 151 (1994). This Article is brought to you for free and open access by the Law Faculty Publications at UKnowledge. It has been accepted for inclusion in Law Faculty Scholarly Articles by an authorized administrator of UKnowledge. For more information, please contact [email protected]. Logic and the Common Law Trial Notes/Citation Information American Journal of Trial Advocacy, Vol. 18, No. 1 (Summer 1994), pp. 151-199 This article is available at UKnowledge: https://uknowledge.uky.edu/law_facpub/261 Logic and the Common Law Trial Richard H. Underwoodt The only certain ground for discovering truth is the faculty of discriminat- ing false from true.... Otherwise, I can assure you, you will be led by the nose by anyone who chooses to do it, and you will run after anything they hold out to you, as cattle do after a green bough.' I. Introduction Throughout history, right up to the present day, there have been persistent, if somewhat contradictory, attempts by members of the legal guild to attribute to the practice of law some of the characteristics of religion and science.' Fortunately, references to the trial lawyer as "the priest in the [T]emple of [J]ustice" 3 have pretty much disappeared from the literature.
    [Show full text]
  • EQUAL PROTECTION: the JURISPRUDENCE of DENIAL and Evasiont
    American University Law Review Volume 40 | Issue 4 Article 1 1991 Equal Protection: The urJ isprudence of Denial and Evasion Donald Lively Stephen Plass Follow this and additional works at: http://digitalcommons.wcl.american.edu/aulr Part of the Law Commons Recommended Citation Lively, Donald and Stephen Plass. "Equal Protection: The urJ isprudence of Denial and Evasion." American University Law Review 40, no.4 (1991): 1307-1355. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. Equal Protection: The urJ isprudence of Denial and Evasion Keywords Equal rights, Race discrimination This article is available in American University Law Review: http://digitalcommons.wcl.american.edu/aulr/vol40/iss4/1 ARTICLES EQUAL PROTECTION: THE JURISPRUDENCE OF DENIAL AND EVASIONt DONALD E. LIVELY* STEPHEN PLASS** TABLE OF CoNTENTs Introduction ................................................ 1308 I. The Jurisprudential Culture of Denial and Evasion: Conditioning Factors and Consequences ............... 1315 A. Dominant Morals and Values ...................... 1315 B. Legal Education: The Indoctrination of Denial .... 1316 C. The Result: Evasion .............................. 1322 II. Reinvesting in Discredited Constitutional Stock ........ 1324 A. Overview: A Jurisprudential Portfolio of Denial and Evasion ........................................... 1324 B. Desegregation: The Imagery of Constitutional Achievement ...................................... 1326 C. Constitutional Retraction and Counter-Insurgency . 1330 D. The Modem Litany of Denial and Evasion: Motive- Based Inquiry ..................................... 1333 E. Beyond Denial and Evasion: Affirmative Action and the Manipulation of Reality .......................
    [Show full text]
  • Fallacies of Relevance1
    1 Phil 2302 Logic Dr. Naugle Fallacies of Relevance1 "Good reasons must, of force, give place to better." —Shakespeare "There is a mighty big difference between good, sound reasons, and reasons that sound good." —Burton Hillis "It would be a very good thing if every trick could receive some short and obviously appropriate name, so that when a man used this or that particular trick, he could at once be reproved for it." —Arthur Schopenhauer Introduction: There are many ways to bring irrelevant matters into an argument and the study below will examine many of them. These fallacies (pathological arguments!) demonstrate the lengths to which people will go to win an argument, even if they cannot prove their point! Fallacies of relevance share a common characteristic in that the arguments in which they occur have premises that are logically irrelevant to the conclusion. Yet, the premises seem to be relevant psychologically, so that the conclusion seems to follow from the premises. The actual connection between premises and conclusion is emotional, not logical. To identify a fallacy of relevance, you must be able to distinguish between genuine evidence and various unrelated forms of appeal. FALLACIES THAT ATTACK I. Appeal to Force (Argumentum ad Baculum ="argument toward the club or stick") "Who overcomes by force has overcome but half his foe." Milton. "I can stand brute force, but brute reason is quite unbearable. There is something unfair about its use. It is like hitting below the intellect." Oscar Wilde 1 NB: This material is taken from several logic texts authored by N.
    [Show full text]
  • Avoidance, Evasion, and Taxpayer Morality
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Washington University St. Louis: Open Scholarship Washington University Journal of Law & Policy Volume 44 Conceptualizing a New Institutional Framework for International Taxation 2014 Avoidance, Evasion, and Taxpayer Morality Allison Christians McGill University Follow this and additional works at: https://openscholarship.wustl.edu/law_journal_law_policy Part of the Tax Law Commons Recommended Citation Allison Christians, Avoidance, Evasion, and Taxpayer Morality, 44 WASH. U. J. L. & POL’Y 039 (2014), https://openscholarship.wustl.edu/law_journal_law_policy/vol44/iss1/8 This Article is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Journal of Law & Policy by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. Avoidance, Evasion, and Taxpayer Morality Allison Christians INTRODUCTION On April 1, 2013, the Washington University School of Law hosted a colloquium on the topic of “Conceptualizing a New Institutional Framework for International Taxation,” inviting participants to consider the pressures on the current institutional tax governance structure and the prospects for reform. In my opening remarks, I sought to outline the pressures being brought upon national tax systems through media coverage of the observed tax behaviors of various multinationals and wealthy individuals, which have provoked social protest and sustained campaigns for tax justice by activist individuals and global nongovernmental organizations (NGOs).1 I suggested that both the media and the activists were, in effect, combining tax evasion and tax avoidance into a single tax compliance framework with which to build a single message about the integral role of morality in taxpayer behavior.
    [Show full text]
  • Self-Punishment As Guilt Evasion: Theoretical Issues1
    Self-Punishment as Guilt Evasion: Theoretical Issues1 Donald L. Carveth Whereas Freud commonly associates guilt with the self-directed aggression of the punitive superego and invariably equates unconscious guilt with the unconscious need for punishment expressed in patterns of self-torment and self-sabotage, Klein views guilt as what Winnicott called “the capacity for concern,” the depressive anxiety that our hate may damage or destroy the good object and self. Without calling into question Freud’s equation of unconscious guilt with the unconscious need for punishment, writers in the Kleinian tradition have addressed the ways in which self-torment, rather than being a manifestation of guilt, serves as a defence against it. As a guilt-substitute, the unconscious need for punishment should not be conflated with the guilt it evades. As depressive anxiety or concern for the object, guilt is a manifestation of attachment and love (Eros) and moti- vates the desire to make reparation. In contrast, the unconscious need for punishment involves the persecutory anxiety and shame characterizing the paranoid-schizoid position and is a manifestation of narcissism and hate (Thanatos). The discontent Freud links with civilization is not a manifestation of guilt but of the self-torment resulting from its evasion. The enlarged capacity to experience and bear guilt (i.e., to love and thereby have conscience) that is a mark of civilization reflects the healing, not the deepening, of our cultural malaise. 1. Presented to the Toronto Psychoanalytic Society, September 13, 2006, this paper is a much revised and expanded version of a paper entitled “The Unconscious Need for Punishment: Expression or Evasion of the Sense of Guilt?” first pre- sented at an International Symposium on Freud’s Civilization and Its Discontents (McMaster University, Hamilton, Ontario, September 1999) and subsequently published in Psychoanalytic Studies, 3(1), 9–21.
    [Show full text]
  • Measuring, Explaining, and Controlling Tax Evasion: Lessons from Theory, Experiments, and Field Studies
    Tulane Economics Working Paper Series Measuring, Explaining, and Controlling Tax Evasion: Lessons from Theory, Experiments, and Field Studies James Alm Department of Economics Tulane University New Orleans, LA [email protected] Working Paper 1213 July 2012 Abstract In this paper, I assess what we have learned about tax evasion since Michael Allingham and Agnar Sandmo launched the modern analysis of tax evasion in 1972. I focus on three specific questions and the answers to these questions that have emerged over the years. First, how do we measure the extent of evasion? Second, how can we explain these patterns of behavior? Third, how can we use these insights to control evasion? In the process, I illustrate my own answers to these questions by highlighting various specific examples of research. My main conclusion is that we have learned many things but that we also still have many gaps in our understanding of how to measure, explain, and control tax evasion. I also give some suggestions and some predictions about where promising avenues of future research may lie. Keywords: Tax evasion, behavioral economics, experimental economics JEL: H2, H26, D03, C9 Measuring, explaining, and controlling tax evasion: Lessons from theory, experiments, and field studies James Alm* Abstract In this paper, I assess what we have learned about tax evasion since Michael Allingham and Agnar Sandmo launched the modern analysis of tax evasion in 1972. I focus on three specific questions and the answers to these questions that have emerged over the years. First, how do we measure the extent of evasion? Second, how can we explain these patterns of behavior? Third, how can we use these insights to control evasion? In the process, I illustrate my own answers to these questions by highlighting various specific examples of research.
    [Show full text]