The Role of Empathy Through Storytelling in Young Driver Road Safety Education’

Total Page:16

File Type:pdf, Size:1020Kb

The Role of Empathy Through Storytelling in Young Driver Road Safety Education’ ‘THE ROLE OF EMPATHY THROUGH STORYTELLING IN YOUNG DRIVER ROAD SAFETY EDUCATION’ JAMI BLYTHE A doctoral report and portfolio submitted in partial fulfilment of the requirements of the University of Sunderland for the degree of Professional Doctorate September 2017 Acknowledgments Firstly, my thanks go to Professor Ian Neal and Dr Lynne McKenna of the University of Sunderland, whose guidance has not only helped shaped this study but also me, as a researcher and academic. To my parents Mary-Rose and Jim, and siblings Jodi and Dominic, whose understanding of the commitment required to undertake such a project has been unwavering. To my partner Andrew whose patience, particularly at such a personally difficult time, is something for which I will be eternally grateful and in the hope that it provides us with the best future possible. Finally, to the families and speakers of the Road Sense presentation, whose stories they have told so passionately. They will continue to be heard in the minds of young people, long after they have been spoken. 2 Contents Chapter one: Introduction to research study and portfolio 10 ‘Road Sense Common Sense’ 10 Introduction to this research 14 Chapter two: Literature review Introducing the literature – spanning boundaries 16 ‘A serious and societal problem’ 16 Road Safety Education 17 Young driver road safety education – an historical perspective 18 Brain in transition 23 More than just a mode of transport 23 Road safety initiatives 24 The role of emotions in preventative health communications 25 The use of fear 29 The use of sadness 29 Big budget productions 30 Empathy 31 The many definitions of empathy 31 Types of empathy 34 The nature of empathy 37 Evolution of empathy 39 What makes us human? 39 3 The pathway of empathy 42 The concept of mirroring 43 Empathic time travel 44 “Look into the eye of your mind” - Imaginative inquiry in the classroom 45 Emotional intelligence 46 How can empathy be measured? 47 Situational empathy 48 Dispositional empathy 49 The brain in transition, again 51 The role of the emergency services – can we play teacher? 51 Creating a culture of empathy 52 Humanising education – a ‘humane classroom’ 55 Constraints on empathy 55 The future of research into empathy 55 Overview of empathy 55 Road safety communications 57 ‘Blood-and-warped-steel’ 60 Subject matter experts 62 Storytelling 64 Storytelling as a learning approach 65 Fact or fiction? 67 4 Chapter three: Methodology 68 Introduction 68 Philosophical perspectives 68 Reflections on knowledge production 69 Drawing metaphorical battle lines – interpretivism versus positivism 71 Operating as an insider researcher 74 Reflections on reflexivity 74 Research framework 76 Action Research 78 Design cycle 79 Data collection 80 Design research instrument 80 Recruit participants 81 Focus groups 81 Interviews 83 Ethical considerations 85 Make inferences 87 Analytical cycle 87 Develop codes 87 Describe and compare 90 Develop theory – an introduction to semi-grounded theory 90 The history of grounded theory 91 Paradigm wars 92 To read or not to read? 93 5 What is grounded theory, and what is not? 94 Chapter four: Methods 96 Action research approach 96 Evaluations 97 Focus discussion groups one and two 98 Further focus discussion group 100 Semi-structured interviews 101 Transcriptions 104 Approach to coding - developing codes 104 Key themes 105 Sub-themes 109 Counting of codes 114 Semi-grounded theory in conclusion 118 Chapter five: Presentation of findings and discussion 119 Summary of findings 119 Evaluations 119 Focus discussion groups 120 Semi-structured interviews 121 First main finding: Emotional time travel – the use of empathy as a learning tool 123 Second main finding: Challenging the mindset ‘it won’t happen to me’ 133 6 Third main finding: Using real stories over fiction is key 140 Chapter six: Conclusions 150 Limitations of study and future opportunities 152 Recommendations for road safety educators 154 Final words - A new paradigm in young driver road safety education 155 Appendices Appendix one: Observation notes made during data gathering 156 Appendix two: Ethical statements for Schools X, Y & Z 160 Appendix three: Ethical statements for Speakers X, Y and Z 162 Appendix four: Ethical overview of study 163 Appendix five: Evaluation sheets 165 Appendix six: Overview of audience preference to speakers and films 168 Appendix seven: Questions for focus discussion groups 169 Appendix eight: Notes made during focus discussion group School Y 171 Appendix nine: Transcription of focus group School X 178 Appendix ten: Transcription of focus group School Y 182 Appendix eleven: Outline of focus discussion groups with Schools X and Y 206 Appendix twelve: Questions for semi-structured interviews 207 Appendix thirteen: Transcript of interview with Speaker X 209 7 Appendix fourteen: Transcript of interview with Speaker Y 227 Appendix fifteen: Transcript of interview with Speaker Z 254 Appendix sixteen: Outline of semi-structured interviews with Speakers X, Y & Z 275 Appendix seventeen: Participant demographics 277 Appendix eighteen: Breakdown of codes - School Y evaluations 278 Appendix nineteen: Breakdown of codes - University of Sunderland evaluations 280 Appendix twenty: Breakdown of codes - School Z evaluations 282 Appendix twenty-one: Breakdown of codes - School X focus discussion group 284 Appendix twenty-two: Breakdown of codes - School Y focus discussion group 285 Appendix twenty-three: Breakdown of codes - School Y further focus discussion group 286 Appendix twenty-four: Breakdown of codes - Speaker X semi-structured interview 288 Appendix twenty-five: Breakdown of codes- Speaker Y semi-structured interview 290 Appendix twenty-six: Breakdown of codes - Speaker Z semi-structured interview 292 Appendix twenty-seven: Coding totals for all evaluations 294 Appendix twenty-eight: Coding totals for all focus discussion groups 296 8 Appendix twenty-nine: Coding totals for all semi-structured interviews 298 Appendix thirty: Coding totals - across all sets of data gathered 300 References 302 List of figures Figure one: Qualitative research cycle (Hennik et al, 2013) 76 Figure two: Work-based research cycle adapted from Hennik et al (2013) 76 Figure three: Sequences of action – reflection (Lewin, 1946) 78 Figure four: Final layout of most commonly occurring sub-themes after coding 118 Figure five: Pie-chart demonstrating preference of audience towards speakers or films 120 9 Chapter one: Introduction to research study and portfolio 1.2 million people die worldwide on roads every year (World Health Organisation, 2013). The biggest ‘unnatural killer’ of young people, road death claims more lives than disease such as malaria and tuberculosis. In 2013 the World Health Organisation described the problem as an ‘epidemic’. In the UK, whilst road death accounts for only 0.5% of the mortality rate, 25% of these deaths are of 15 to 19 year olds, outweighing any other cause of death in this age group (Box and Wengraf, 2013). Those responsible for young driver road safety education range from law enforcement agencies such as the police, to local authority road safety officers, government organisations, for example THINK! and charitable bodies such as like BRAKE. The number of road safety education interventions available in the UK alone is testament to the problem, ranging from online resources, case studies and fictional stories shown on DVD and online video channels such as YouTube, to teacher led lesson plans and theatrical performances. The hunt to seek a solution to reducing the risk to young drivers through educational intervention by the road safety education community appears never ending. Indeed, in 2006 the European Commission urged, ‘to improve road safety is not an end in itself, it is an urgent social task’. ‘Road Sense Common Sense’ ‘Road Sense Common Sense’ is an emergency services multi-partner young driver road safety presentation provided by police, fire and ambulance personnel, delivered to sixth form students in high schools and colleges in the Northumbria Police force area. Since July 2014, over 2500 students have watched the presentation in 12 educational establishments. It is a one hour long, short film and live speaker staged presentation. Introduced by a host, four short films based on real and local cases are shown featuring families bereaved by road collisions lasting between four to eight minutes. These films are interspersed with ten minute story telling pieces delivered in person by a police traffic officer, fire officer and paramedic who relive their 10 encounters with serious and fatal young driver collisions in person, on stage. The presentation is not unique in its nature and follows a format seen in other parts of the country. It aims to not only raise the profile of road safety amongst this vulnerable group, but also to promote better decision making through reflective accounts and authentic stories. ‘Road Sense Common Sense’ has not always taken this format however. As a project it began in 2013, when a small budget (£6000) was released from local road safety funds to launch a young driver initiative. At this time, I was studying on the BA Applied Investigation programme at the University of Sunderland and had encountered the concept of using critical incidents (Brookfield, 1995) as a means of reflection and Mezirow’s (Mezirow and Taylor, 2009) model of transformative learning as a means of educating others about public health matters. A group of sixth form students at a local high school were asked to write a short, fictional story about a life changing collision involving young people. The stories featured six main characters. Six further schools were invited to use one character from this fictional story and consider the ‘ripple effect’ of the incident on the lives of their character and that of their family and friends. They were asked to consider what their ‘meta-narrative’ would be and then retell their story in a creative form. Their artefacts would then be showcased at Sage, Gateshead during National Road Safety Week in 2014.
Recommended publications
  • Lesson Plans and Resources for There There by Tommy Orange
    Lesson Plans and Resources for There There by Tommy Orange Table of Contents 1. Overview and Essential Questions 2. In-Class Introduction 3. Common Core Standards Alignment 4. Reader Response Questions 5. Literary Log Prompts + Worksheets 6. Suggested Analytical Assessments 7. Suggested Creative Assessments 8. Online Resources 9. Print Resources - “How to Talk to Each Other When There’s So Little Common Ground” by Tommy Orange - Book Review from The New York Times - Book Review from Tribes.org - Interview with Tommy Orange from Powell’s Book Blog These resources are all available, both separately and together, at www.freelibrary.org/onebook Please send any comments or feedback about these resources to [email protected]. OVERVIEW AND ESSENTIAL QUESTIONS The materials in this unit plan are meant to be flexible and easy to adapt to your own classroom. Each chapter has discussion questions provided in a later section. Through reading the book and completing any of the suggested activities, students can achieve any number of the following understandings: - A person’s identity does not form automatically – it must be cultivated. - Trauma is intergenerational -- hardship is often passed down through families. - A physical place can both define and destroy an individual. Students should be introduced to the following key questions as they begin reading. They can be discussed both in universal terms and in relation to specific characters in the book: Universal - How has your family cultivated your identity? How have you cultivated it yourself?
    [Show full text]
  • Unit 5: Understanding and Resolving Guest Problems
    Unit 5: Understanding and Resolving Guest Problems Project Hotel T.E.A.C.H Curriculum Center for Immigrant Education and Training (ACE) LaGuardia Community College Hotel TEACH Lesson Plan Unit 5, Lesson 1 Career Counseling: Listening with Empathy Objectives Sts will learn to resolve problems and listen empathetically for improved customer service. EFF Skill Sets addressed Cooperate with Others: Try to adjust one’s actions to take into the account the needs of others and/or the task to be accomplished. Industry Skill Sets addressed Resolve Guest Problems Exceed Customer Expectations Activity 1: Empathy Skills T introduces another important component of active listening: empathy. T asks the Sts to define “empathy.” As Sts call out answers, T leads responses towards the following definition and writes it on the board. Empathy is the ability to recognize and understand the emotions, beliefs, moods and desires of another person. Empathy is often characterized as the ability to “put oneself into another’s shoes.” T elicits from Sts the reasons why it would be important for hotel workers to have empathy. Some examples might be as follows: 1. Listening empathetically makes people feel as if they are truly being heard and that their needs will be taken care of. 2. Listening with empathy gives guests a positive experience of the hotel and of you as a worker. Guests will always remember the worker who truly listened and cared about their problem, as opposed to the worker who offers a quick solution. 3. When you acknowledge how people are feeling, you reassure them that they are understood.
    [Show full text]
  • Prism Vol. 9, No. 2 Prism About Vol
    2 021 PRISMVOL. 9, NO. 2 | 2021 PRISM VOL. 9, NO. 2 NO. 9, VOL. THE JOURNAL OF COMPLEX OPER ATIONS PRISM ABOUT VOL. 9, NO. 2, 2021 PRISM, the quarterly journal of complex operations published at National Defense University (NDU), aims to illuminate and provoke debate on whole-of-government EDITOR IN CHIEF efforts to conduct reconstruction, stabilization, counterinsurgency, and irregular Mr. Michael Miklaucic warfare operations. Since the inaugural issue of PRISM in 2010, our readership has expanded to include more than 10,000 officials, servicemen and women, and practi- tioners from across the diplomatic, defense, and development communities in more COPYEDITOR than 80 countries. Ms. Andrea L. Connell PRISM is published with support from NDU’s Institute for National Strategic Studies (INSS). In 1984, Secretary of Defense Casper Weinberger established INSS EDITORIAL ASSISTANTS within NDU as a focal point for analysis of critical national security policy and Ms. Taylor Buck defense strategy issues. Today INSS conducts research in support of academic and Ms. Amanda Dawkins leadership programs at NDU; provides strategic support to the Secretary of Defense, Chairman of the Joint Chiefs of Staff, combatant commands, and armed services; Ms. Alexandra Fabre de la Grange and engages with the broader national and international security communities. Ms. Julia Humphrey COMMUNICATIONS INTERNET PUBLICATIONS PRISM welcomes unsolicited manuscripts from policymakers, practitioners, and EDITOR scholars, particularly those that present emerging thought, best practices, or train- Ms. Joanna E. Seich ing and education innovations. Publication threshold for articles and critiques varies but is largely determined by topical relevance, continuing education for national and DESIGN international security professionals, scholarly standards of argumentation, quality of Mr.
    [Show full text]
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • A Conceptual Framework
    Supply Chain Practice, Supply Chain Performance Indicators and Competitive Advantage of Australian Beef Enterprises: A Conceptual Framework Conference : Australian Agricultural and Resource Economics Society (AARES 51st Annual Conference) Place : Rydges Lakeland Resort Queenstown, New Zealand Date : 13-16 February 2007 Topic Area of the submission : Agribusiness Supply Chain Management Presentation format : Full Paper Name of the author(s) : 1. Jie, Ferry 2. Parton, Kevin 3. Cox, Rodney Department and Affiliation : Faculty of Rural Management University of Sydney Mailing Address : Leeds Parade, Orange NSW PO Box 883-Orange, NSW 2800 Australia Email Addresses : 1. [email protected] 2. [email protected] 3. [email protected] Phone Number : +61-2-63605500 1 Supply Chain Practice, Supply Chain Performance Indicators and Competitive Advantage of Australian Beef Enterprises: A Conceptual Framework Authors: 1. Ferry Jie – PhD Candidature, Faculty of Rural Management, University of Sydney, Australia 2. Prof Kevin Parton – Principal Supervisor, School of Rural Management, Charles Sturt University 3. Mr. Rod Cox – Co Supervisor, School of Rural Management, Charles Sturt University Abstract This research focuses on an Australian agribusiness supply chain, the Australian Beef Supply Chain. The definition of the Australian Beef Supply Chain is the chain or sequence of all activities from the breeding property to the domestic or overseas consumers. The beef sector in Australia is undergoing rapid change because of globalisation, a highly competitive beef market (local and export), quicker production cycle and delivery times and consequently reduced inventories, a general speed-up of the rate of change in the business environment, the trend toward more outsourcing of activities, and the rapid development of IT.
    [Show full text]
  • Artificial Intelligence and Machine Learning
    ISSUE 1 · 2018 TECHNOLOGY TODAY Highlighting Raytheon’s Engineering & Technology Innovations SPOTLIGHT EYE ON TECHNOLOGY SPECIAL INTEREST Artificial Intelligence Mechanical the invention engine Raytheon receives the 10 millionth and Machine Learning Modular Open Systems U.S. Patent in history at raytheon Architectures Discussing industry shifts toward open standards designs A MESSAGE FROM Welcome to the newly formatted Technology Today magazine. MARK E. While the layout has been updated, the content remains focused on critical Raytheon engineering and technology developments. This edition features Raytheon’s advances in Artificial Intelligence RUSSELL and Machine Learning. Commercial applications of AI and ML — including facial recognition technology for mobile phones and social applications, virtual personal assistants, and mapping service applications that predict traffic congestion Technology Today is published by the Office of — are becoming ubiquitous in today’s society. Furthermore, ML design Engineering, Technology and Mission Assurance. tools provide developers the ability to create and test their own ML-based applications without requiring expertise in the underlying complex VICE PRESIDENT mathematics and computer science. Additionally, in its 2018 National Mark E. Russell Defense Strategy, the United States Department of Defense has recognized the importance of AI and ML as an enabler for maintaining CHIEF TECHNOLOGY OFFICER Bill Kiczuk competitive military advantage. MANAGING EDITORS Raytheon understands the importance of these technologies and Tony Pandiscio is applying AI and ML to solutions where they provide benefit to our Tony Curreri customers, such as in areas of predictive equipment maintenance, SENIOR EDITORS language classification of handwriting, and automatic target recognition. Corey Daniels Not only does ML improve Raytheon products, it also can enhance Eve Hofert our business operations and manufacturing efficiencies by identifying DESIGN, PHOTOGRAPHY AND WEB complex patterns in historical data that result in process improvements.
    [Show full text]
  • Latest Release file from the Application Is Conveniently Packaged As an Executable Self-Contained JAR file
    JAMI Supplemental Material Release 1.0 Andrea Hornakova, Markus List, Jilles Vreeken, Marcel Schulz Jul 01, 2020 Contents 1 General Description 1 1.1 Conditional Mutual Information.....................................1 2 Installation 3 3 Usage 4 4 Input 6 4.1 Expression data..............................................6 5 Output 8 6 Usage Examples 9 6.1 Downloading example data.......................................9 6.2 Using JAMI with the triplet format...................................9 6.3 Using JAMI with the set format.....................................9 6.4 Using JAMI for a subset of genes or a single gene........................... 10 7 Use case: A ceRNA network constructed from TCGA breast cancer data 11 8 Using JAMI in R 15 9 Performance and Advantages over CUPID 16 10 Dealing with zero expression values 19 11 References 24 Bibliography 25 i CHAPTER 1 General Description This document describes the usage of the JAMI software. Source code and executables are available on github. The goal of JAMI is to infer ceRNA networks from paired gene and miRNA expression data. The ceRNA hypothesis proposed by Salmena et al. [Salmena2011] suggests that mRNA transcript are in competition over a limited pool of miRNAs they share binding sites for. A competing endogenous RNA is thus a mRNA that excerts regulatory control over the expression of other mRNAs (coding or non-coding genes) via draining them of repressive miRNAs. To quantify the regulatory effect of one gene (the modulator) over another gene (the target) via a specific miRNA, Sumazin et al. [Sumazin2011] proposed the use of conditional mutual information, which was implemented as part of the CUPID software [Chiu2015] implemented in Matlab.
    [Show full text]
  • Traffic Safety Resource Prosecutors Miriam Norman- TSRP
    Traffic Safety Resource Prosecutors Miriam Norman- TSRP Re: Potential Impeachment Disclosure (PID) of WSP Toxicology Laboratory Date: August 7, 2020 We have received information from the WSP Toxicology Laboratory that is potential impeachment information (“PII”). This PID (potential impeachment disclosure) relates environmental contamination of portions of the WSP Toxicology Laboratory of methamphetamine. By environmental contamination, we mean that the methamphetamine level found in various areas exceeded the levels specified in WAC 246-205-541. The environmental contamination possibly contaminated some blood samples during the extraction process. In March of 2018, the toxicology laboratory took over laboratory and office space from the crime lab. The toxicology laboratory moved one ethanol instrument into that space. In addition, extractions of evidence were to be conducted in that space. Prior to becoming toxicology laboratory space, the crime lab used one of the lab areas to house a methamphetamine production laboratory for training purposes; this information was not known to the Toxicology laboratory at the time. It is hypothesized that this use resulted in environmental contamination of the area. During the extraction process performed in the contaminated area, analysts observed that some preliminary tests were positive for methamphetamine, while confirmation tests were negative for methamphetamine. There is a possibility that these “false presumptive positives” were due to the environmental contamination. The environmental methamphetamine contamination did not affect any results reported by the toxicology laboratory for two reasons: First, the one ethanol instrument in the room cannot read/detect methamphetamine. The ethanol instruments can only detect volatiles not drugs. Second, as to the drug cases, the toxicology laboratory discovered this environmental contamination due to the drug testing process.
    [Show full text]
  • Bulloch Times (Statesboro News-Statesboro Eagle)
    Georgia Southern University Digital Commons@Georgia Southern Bulloch County Newspapers (Single Issues) Bulloch County Historical Newspapers 12-22-1949 Bulloch Times (Statesboro News-Statesboro Eagle) Notes Condition varies. Some pages missing or in poor condition. Originals provided for filming by the publisher. Gift of tS atesboro Herald and the Bulloch County Historical Society. Follow this and additional works at: https://digitalcommons.georgiasouthern.edu/bulloch-news- issues Recommended Citation "Bulloch Times (Statesboro News-Statesboro Eagle)" (1949). Bulloch County Newspapers (Single Issues). 2511. https://digitalcommons.georgiasouthern.edu/bulloch-news-issues/2511 This newspaper is brought to you for free and open access by the Bulloch County Historical Newspapers at Digital Commons@Georgia Southern. It has been accepted for inclusion in Bulloch County Newspapers (Single Issues) by an authorized administrator of Digital Commons@Georgia Southern. For more information, please contact [email protected]. EIGHT DULUX:B TIMBS AND STATESBoRO Nh.vs �,1 ." , ·Z��\�) -.'. « • The True Memon.1 Social • Clubs • 18 AN UNWRI1TEN BU1'. RIAl­ QURNT STORY THAT OF ALL TEN YEARS AGO 18 .BEST IN LIFE. From Bulloeh Tim.... , Dec. .1989. 21, flF.RVICE MIS Flmmett Scott has ned In retui Our work to relied � preparation for census of Bal- helps loch Irom a VISit In county, George HIli, of Savannah spmt which to Sylvama, WHERE NEEDED 'Personal prompts you erect and Tm ner have Purely Wade Brewton, Claxton, (STATESBORO C Hodges and LUCIUS An­ tbe stone as an act of NBWS-STATBBBORO , reverenee opened offices In Statesboro. '\ EAGLE) •. (}HE£nNC' derson Wei e business VISitors In Ata •• I and devotion • • • Our kid sale advertised to 8etweenUs experieoc.
    [Show full text]
  • Reading for Empathy, Reflecting for Awareness
    READING FOR EMPATHY, REFLECTING FOR AWARENESS: A PILOT STUDY FOR IMPROVING SELF AND OTHER AWARENESS THROUGH WRITING A DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN THE GRADUATE SCHOOL OF THE TEXAS WOMAN’S UNIVERSITY DEPARTMENT OF ENGLISH, SPEECH, AND FOREIGN LANGUAGES COLLEGE OF ARTS AND SCIENCES BY RACHAEL GRAY REYNOLDS B.A., M.A. DENTON, TEXAS MAY 2018 Copyright © 2018 by Rachael Gray Reynolds DEDICATION To my wife and daughter. For your patience, love, inspiration, and silliness. This may not change the world, but I hope it helps our understanding of it a bit better. ii ACKNOWLEDGEMENTS First, I want to thank my committee members: Dr. Gretchen Busl, Dr. Dundee Lackey, and Dr. Genevieve West. I appreciate all of your thoughtful comments, recommendations, and the discussions we have had throughout the dissertation process, as well as all of those that came before it. Without your brilliance, support, and patience, I do not know that this would have ever made it off the ground, much less become a completed project. I would like to extend a huge thank you to my fellow Graduate Teaching Assistants in the First-Year Composition program for allowing me to visit your classrooms for recruitment, as well as all of the encouragement throughout the process. I am also grateful to all of those who participated in the study and trusted me to get them through a semester long research project without taking too much time away from their own personal educational goals. It was definitely a huge learning process for me; I hope it was a positive learning one for all those involved.
    [Show full text]
  • Forensic Artefacts Left by Pidgin Messenger 2.0
    digital investigation 4 (2007) 138–145 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin Forensic artefacts left by Pidgin Messenger 2.0 Wouter S. van Dongen Fox-IT Forensic IT Experts, Olof Palmestraat 6, 2616 LM Delft, The Netherlands article info abstract Article history: Pidgin, formerly known as Gaim, is a multi-protocol instant messaging (IM) client that sup- Received 23 July 2007 ports communication on most of the popular IM networks. Pidgin is chiefly popular under Revised 23 November 2007 Linux, and is available for Windows, BSD and other UNIX versions. This article presents Accepted 21 January 2008 a number of traces that are left behind after the use of Pidgin on Linux, enabling digital in- vestigators to search for and interpret instant messaging activities, including online con- Keywords: versations and file transfers. Specifically, the contents and structures of user settings, log Pidgin files, contact files and the swap partition are discussed. In addition looking for such infor- Gaim mation in active files on a computer, forensic examiners can recover deleted items by Instant messenger searching a hard drive for file signatures and known file structures detailed in this article. Internet chat ª 2008 Elsevier Ltd. All rights reserved. Linux messenger MSN ICQ Yahoo! IRC 1. Introduction Gaim would become Pidgin, libgaim would become libpurple, and gaim-text would become finch. The name Pidgin was cho- This article is a continuation of the series of articles dealing sen as a reference to the term ‘Pidgin’, which describes com- with artefacts left by popular instant messaging clients.
    [Show full text]
  • Tivoli 329 2, 7, 2020 Call to Order (9:49)
    CCD Student Government Association Agenda; Tivoli 329 2, 7, 2020 I. Call to Order (9:49) II. Roll Call President – Teagan Divel Student Rep. – Hugo Zuniga-Sierra Vice President – Lorraine Seals-Williams Student Rep. – Lena Lund Treasurer – VACANT SACAB Rep. – Jami Helmig SSAC Rep. – Emanuel Walker SACAB Rep. – Vacant SSAC Rep. – Sergio Cisneros-Arteaga Lowry Rep. – Vacant AMC Rep. – Caleb Boyd Secretary – Don Dang Student Rep. – Melissa De La O Advisor – Kathryn Mahoney Student Rep. – Kelly Shanley Advisor – Ashley Jaramillo Student Rep. – Amber Maler Parliamentarian – Vacant III. Approval of Agenda and Minutes: Approved agenda 2/7 IV. Guests: Jennifer Arreola - Student V. Reports A. President’s Report: B. Vice-President’s Report: C. Treasurer’s Report: D. Secretary’s Report: E. Advisor’s Report: F. SACAB Report: G. SSAC Report: H. Student Rep. Reports: I. Committee Report (Budget, Events, Engagement): J. Special Committee Report (Elections) VI. Unfinished Business/General Orders VII. New Business 1. Retreat Recap – What did we each learn about our leadership/communication skills? Discussed our feelings on retreat. 2. Meeting Norms – The process of how each meeting will be ran. Expectations. Meetings at 9:00 in the Senate room. Finish at 10:30 because there will be another meeting. Sending reports and new business items two days before. Meetings start on the dot! Don’t interrupted and save questions for the end. Two minutes report. Just an update. New business will be voting and questions, or feedback. New business will be rebuttal. Reports is a QUICK update. Follows up will be in new business. Fill out report form beforehand to help.
    [Show full text]