Why Do Bullies Bully?: an Examination of the Role of Intrinsic and Extrinsic Factors in Motivating and Enabling
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Incurable Psychopaths?
Incurable Psychopaths? Marianne Kristiansson, MD Treatment, comprising pharmacotherapy and an educational program based on cognitive behavior therapy, of four psychopathic, criminal men fulfilling the crite- ria for borderline personality disorder and antisocial personality disorder is de- scribed. The diagnoses were made during a forensic psychiatric evaluation. An estimation of the capacity of the central serotonergic system was performed by analysing the platelet monoamine oxidase (MAO) activity. The pharmacotherapy was combined with an educational program involving strategies for developing better impulse control. All four men had earlier been regarded as resistant to conventional therapy. In the present cases, a combined psychosocial and biolog- ical approach seemed to be effective in developing an increased control of im- pulses, leading to improved coping strategies. Controlled studies are needed in order to clarify whether the described treatment program proves beneficial. Psychopathy, as originally described by personality disorder according to DSM- Cleckley,' comprises a set of clinical 111-R.~ characteristics including superficial The possibility of curing or even trying charm, unreliability, untruthfulness, lack to treat criminal psychopathic individuals of remorse or shame, failure to learn by is often looked upon as futile. Most treat- experience, incapacity for love, general ment programs involve various psycho- poverty in major affective relations, and social interventions and little effort has failure to follow any life -
White Collar Criminality: a Prediction Model Judith M
Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1991 White collar criminality: a prediction model Judith M. Collins Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Industrial and Organizational Psychology Commons, Personality and Social Contexts Commons, Social Psychology Commons, and the Social Psychology and Interaction Commons Recommended Citation Collins, Judith M., "White collar criminality: a prediction model " (1991). Retrospective Theses and Dissertations. 9607. https://lib.dr.iastate.edu/rtd/9607 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand corner and continuing from left to right in equal sections with small overlaps. -
Action to End Child Sexual Abuse and Exploitation
ACTION TO END CHILD SEXUAL ABUSE AND EXPLOITATION Published by UNICEF Child Protection Section Programme Division 3 United Nations Plaza New York, NY 10017 Email: [email protected] Website: www.unicef.org © United Nations Children’s Fund (UNICEF) December 2020. Permission is required to reproduce any part of this publication. Permission will be freely granted to educational or non-profit organizations. For more information on usage rights, please contact: [email protected] Cover photo: © UNICEF/UNI303881/Zaidi Design and layout by Big Yellow Taxi, Inc. Suggested citation: United Nations Children’s Fund (2020) Action to end child sexual abuse and exploitation, UNICEF, New York This publication has been produced with financial support from the End Violence Fund. However, the opinions, findings, conclusions, and recommendations expressed herein do not necessarily reflect those of the End Violence Fund. Click on section bars to navigate publication CONTENTS 1. Introduction ............................................3 6. Service delivery ...................................21 2. A Global Problem...................................5 7. Social & behavioural change ................27 3. Building on the evidence .................... 11 8. Gaps & challenges ...............................31 4. A Theory of Change ............................13 Endnotes .................................................32 5. Enabling National Environments ..........15 1 Ending Child Sexual Abuse and Exploitation: A Review of the Evidence ACKNOWLEDGEMENTS -
The Political Construction of Collective Insecurity: from Moral Panic To
Center for European Studies Working Paper Series 126 (October 2005) The Political Construction of Collective Insecurity: From Moral Panic to Blame Avoidance and Organized Irresponsibility by Daniel Béland Department of Sociology University of Calgary 2500 University Drive NW Calgary, Alberta, Canada T2N 1N4 Fax: (403) 282-9298 E-mail: [email protected]; web page: http://www.danielbeland.org/ Abstract This theoretical contribution explores the role of political actors in the social construction of collective insecurity. Two parts comprise the article. The first one briefly defines the concept of collective insecurity and the second one bridges existing sociological and political science literatures relevant for the analysis of the politics of insecurity. This theoretical framework articulates five main claims. First, although interesting, the concept of moral panic applies only to a limited range of insecurity episodes. Second, citizens of contemporary societies exhibit acute risk awareness and, when new collective threats emerge, the logic of “organized irresponsibility” often leads citizens and interest groups alike to blame elected officials. Third, political actors mobilize credit claiming and blame avoidance strategies to respond to these threats in a way that enhances their position within the political field. Fourth, powerful interests and institutional forces as well as the “threat infrastructure” specific to a policy area create constraints and opportunities for these strategic actors. Finally, their behavior is proactive or reactive, as political actors can either help push a threat onto the agenda early, or, at a later stage, simply attempt to shape the perception of this threat after other forces have transformed it into a major political issue. -
Social Engineering
Social Engineering Blurring reality and fake: A guide for the insurance professional www.cybcube.com Deception and disguise are criminal the radar of insurance professionals, as they methods that are as old as time. become more widely used. Numerous examples - from Ulysses Cyber insurance products do - and will and his Trojan Horse in Greek continue to - cover claims from social Mythology, to Fagan, the pickpocket, engineering attacks. This paper is designed in Charles Dicken’s Oliver Twist - to educate insurers on developing strains reinforce the long history of criminals of social engineering, so they can engage achieving their goals by hoodwinking with their clients meaningfully on their targets into believing that an cybersecurity and risk management interaction is something that it is not. strategies against these new attacks. Today, that deception is largely being carried CyberCube invests heavily in cybersecurity out in the non-physical realm. Recent huge expertise - both human capital with deep strides made in technology take historic social engineering techniques to new levels experience in the cyber security domain and in terms of both scale and sophistication. also in data sources and security signals that might flag vulnerabilities and risk areas. In this paper, we will outline some of the forms of social engineering and explore This paper combines those resources, to some of the criminal motivations for carrying offer some pointers on what warning signs out these attacks. We will take a deeper enterprises should be alert to, and how dive into four developing areas of social insurers could address this growing trend engineering, which we believe should be on before it becomes a major claims event. -
Social Media's Use of Psychology of Persuasion 1
1 Running head: SOCIAL MEDIA’S USE OF PSYCHOLOGY OF PERSUASION How social media uses the psychology of persuasion to influence the purchase of beauty products to the young generations By Kiersten Denton A thesis submitted to the University Honors Program at Southern New Hampshire University to complete HON 401, and as part of the requirements for graduation from the University Honors Program Manchester, New Hampshire May 2019 ___________May, 2019__________ *Your year and month of graduation 2 Running head: SOCIAL MEDIA’S USE OF PSYCHOLOGY OF PERSUASION Abstract As someone who currently works in the beauty industry and follows the industry intensely. I noticed how much impact persuasive methods have on the young generation of consumers through social media and digital marketing. This was illustrated through the various sources on social media such as influencers, bloggers, celebrities, social media outlets and much more. This thesis sought to determine if these persuasive techniques that brands use to market their products to younger generations are increasing the amount of purchases these consumers make or influence their decisions to purchase beauty products. A survey was conducted through Qualtrics and distributed to the target market, comprised of the Millennial Generation and Generation Z between the ages of 18-40 years old to determine how much of an impact these persuasive methods conducted by the beauty industry has on them overall; as well as to gather demographic information. Results showed that although these methods have a strong impact on the purchasing decisions of young consumers on beauty products many still rely on word of mouth recommendations from trusted friends and family members. -
Social Engineering
Social Engineering Blurring reality and fake: A guide for the insurance professional www.cybcube.com Deception and disguise are criminal the radar of insurance professionals, as they methods that are as old as time. become more widely used. Numerous examples - from Ulysses Cyber insurance products do - and will and his Trojan Horse in Greek continue to - cover claims from social Mythology, to Fagan, the pickpocket, engineering attacks. This paper is designed in Charles Dicken’s Oliver Twist - to educate insurers on developing strains reinforce the long history of criminals of social engineering, so they can engage achieving their goals by hoodwinking with their clients meaningfully on their targets into believing that an cybersecurity and risk management interaction is something that it is not. strategies against these new attacks. Today, that deception is largely being carried CyberCube invests heavily in cybersecurity out in the non-physical realm. Recent huge expertise - both human capital with deep strides made in technology take historic social engineering techniques to new levels experience in the cyber security domain and in terms of both scale and sophistication. also in data sources and security signals that might flag vulnerabilities and risk areas. In this paper, we will outline some of the forms of social engineering and explore This paper combines those resources, to some of the criminal motivations for carrying offer some pointers on what warning signs out these attacks. We will take a deeper enterprises should be alert to, and how dive into four developing areas of social insurers could address this growing trend engineering, which we believe should be on before it becomes a major claims event. -
1 the Effects of Naming and Shaming on Public Support for Compliance
The Effects of Naming and Shaming on Public Support for Compliance with International Agreements: An Experimental Analysis of the Paris Agreement1 Research Note Dustin Tingley, Harvard University Michael Tomz, Stanford University June, 2021 Forthcoming, International Organization How does naming and shaming affect public support for compliance with international agreements? We investigated this question by conducting survey experiments about the Paris Agreement, which relies on social pressure for enforcement. Our experiments, administered to national samples in the United States, produced three sets of findings. First, shaming by foreign countries shifted domestic public opinion in favor of compliance, increasing the political incentive to honor the Paris Agreement. Second, the effects of shaming varied with the behavior of the target. Shaming was more effective against partial compliers than against targets that took no action or honored their obligations completely. Moreover, even partial compliers managed to reduce the effects of shaming through the strategic use of counter-rhetoric. Third, identity moderated responses to shaming. Shaming by allies was not significantly more effective than shaming by non-allies, but Democrats were more receptive to shaming than Republicans. Overall, our experiments expose both the power and the limits of shaming as a strategy for enforcing the Paris Agreement. At the same time, they advance our understanding of the most significant environmental problem facing the planet. 1 For feedback on earlier -
Bullying and the Peer Group: a Review
Aggression and Violent Behavior 15 (2010) 112–120 Contents lists available at ScienceDirect Aggression and Violent Behavior Bullying and the peer group: A review Christina Salmivalli ⁎ University of Turku, Finland University of Stavanger, Norway article info abstract Article history: It is often stated that bullying is a “group process”, and many researchers and policymakers share the belief Received 15 June 2009 that interventions against bullying should be targeted at the peer-group level rather than at individual Received in revised form 26 August 2009 bullies and victims. There is less insight into what in the group level should be changed and how, as the Accepted 28 August 2009 group processes taking place at the level of the peer clusters or school classes have not been much Available online 6 September 2009 elaborated. This paper reviews the literature on the group involvement in bullying, thus providing insight into the individuals' motives for participation in bullying, the persistence of bullying, and the adjustment of Keywords: fl Bullying victims across different peer contexts. Interventions targeting the peer group are brie y discussed and future Victimization directions for research on peer processes in bullying are suggested. Participant roles © 2009 Elsevier Ltd. All rights reserved. Peer group Classroom context Contents 1. What does the bully want? ....................................................... 113 2. Peer involvement during bullying incidents: participant roles ....................................... 114 3. Why -
A Researcher Speaks to Ombudsmen About Workplace Bullying LORALE IGH KEASHLY
Journal of the International Ombudsman Association Keashly Some Things You Need to Know but may have been Afraid to Ask: A Researcher Speaks to Ombudsmen about Workplace Bullying LORALE IGH KEASHLY ABSTRACT In the early 1990’s, I became interested in understand- ing persistent and enduring hostility at work. That Workplace bullying is repeated and prolonged hostile interest was spurred by a colleague’s experience at mistreatment of one or more people at work. It has the hands of her director. He yelled and screamed tremendous potential to escalate, drawing in others at her (and others), accusing her of not completing beyond the initial actor-target relationship. Its effects assignments, which she actually had. He lied about can be devastating and widespread individually, her and other subordinates. He would deliberately organizationally and beyond. It is fundamentally a avoid when staff needed his input and then berate systemic phenomenon grounded in the organization’s them for not consulting with him. At other times, he culture. In this article, I identify from my perspective was thoughtful, apologetic, and even constructive. My as a researcher and professional in this area current colleague felt like she was walking on eggshells, never thinking and research findings that may be useful for sure how he would be. Her coworkers had similar ombudsmen in their deliberations and investigations experiences and the group developed ways of coping as well as in their intervention and management of and handling it. For example, his secretary would these hostile behaviors and relationships. warn staff when it was not a good idea to speak with him. -
Inequalities in Victimisation: Alcohol, Violence, and Anti-Social Behaviour
Inequalities in victimisation: alcohol, violence, and anti-social behaviour An Institute of Alcohol Studies report May 2020 Contents Executive summary 4 Introduction 5 Method 11 Results 18 Discussion 38 Conclusion 41 AN INSTITUTE OF ALCOHOL STUDIES REPORT PAGE 2 Inequalities in victimisation: alcohol, violence, and anti-social behaviour Author Lucy Bryant, Research and Policy Officer for the Institute of Alcohol Studies. Acknowledgements We are grateful to: Dr Carly Lightowlers, Professor Jonathan Shepherd, the team at the Office for National Statistics, the London School of Economics Methology Surgery, Aveek Bhattacharya, Katherine Severi, Dr Sadie Boniface, Habib Kadiri, Richard Fernandez, Dr Kieran Bunn, Sarah Schoenberger, and Emma Vince. The work was presented at KBS 2019, the 45th Annual Alcohol Epidemiology Symposium of the Kettil Bruun Society. For copyright of all statistical results in this paper, source: ONS. Image credit George-Standen - iStock About the Institute of Alcohol Studies IAS is an independent institute bringing together evidence, policy and practice from home and abroad to promote an informed debate on alcohol’s impact on society. Our purpose is to advance the use of the best available evidence in public policy discussions on alcohol. The IAS is a company limited by guarantee (no. 05661538) and a registered charity (no. 1112671). All Institute of Alcohol Studies reports are subject to peer review by at least two academic researchers that are experts in the field. Contact us Location: Alliance House, 12 Caxton Street, London SW1H 0QS Telephone: 020 7222 4001 Email: [email protected] Twitter: @InstAlcStud Web: www.ias.org.uk AN INSTITUTE OF ALCOHOL STUDIES REPORT PAGE 3 Executive summary Introduction • The links between alcohol and violence, as well as alcohol and anti-social behaviour (ASB), are widely recognised. -
CRC/C/156 Convention on the Rights of the Child
United Nations CRC/C/156 Convention on the Distr.: General 10 September 2019 Rights of the Child Original: English Guidelines regarding the implementation of the Optional Protocol to the Convention on the Rights of the Child on the sale of children, child prostitution and child pornography* * Adopted by the Committee at its eighty-first session (13–31 May 2019). GE.19-15447(E) CRC/C/156 Contents Page I. Introduction ................................................................................................................................... 3 A. Recent developments related to the sale and sexual exploitation of children ....................... 3 B. An increasing body of recommendations from various international stakeholders .............. 4 II. Objectives of the guidelines .......................................................................................................... 4 III. General measures of implementation ............................................................................................ 4 A. Legislation ............................................................................................................................ 5 B. Data collection ...................................................................................................................... 5 C. Comprehensive policy and strategy ...................................................................................... 6 D. Coordination, monitoring and evaluation ............................................................................