A Grounded Theory Study of Cyberbullying Among Young Women

Total Page:16

File Type:pdf, Size:1020Kb

A Grounded Theory Study of Cyberbullying Among Young Women Loyola University Chicago Loyola eCommons Dissertations Theses and Dissertations 2016 Restoring Trust: A Grounded Theory Study of Cyberbullying Among Young Women Nancy H. Camp Loyola University Chicago Follow this and additional works at: https://ecommons.luc.edu/luc_diss Part of the Nursing Commons Recommended Citation Camp, Nancy H., "Restoring Trust: A Grounded Theory Study of Cyberbullying Among Young Women" (2016). Dissertations. 2123. https://ecommons.luc.edu/luc_diss/2123 This Dissertation is brought to you for free and open access by the Theses and Dissertations at Loyola eCommons. It has been accepted for inclusion in Dissertations by an authorized administrator of Loyola eCommons. For more information, please contact [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License. Copyright © 2016 Nancy H Camp LOYOLA UNIVERSITY CHICAGO RESTORING TRUST: A GROUNDED THEORY STUDY OF CYBERBULLYING AMONG YOUNG WOMEN A DISSERTATION SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL IN CANDIDACY FOR THE DEGREE OF DOCTOR OF PHILOSOPHY PROGRAM IN NURSING BY NANCY HAND CAMP CHICAGO, IL AUGUST 2016 Copyright by Nancy H Camp, 2016 All rights reserved. ACKNOWLEDGEMENTS The journey toward a Ph.D. is never easy, but it is made more manageable by those who support us in that journey, especially the dissertation committee. I would like to thank my chair, Dr. Nancy Hogan, for her support, wisdom, and patience throughout this process. She taught me the tenets of classical grounded theory and the beauty of “trusting the process”. Dr. Barbara Velsor-Friedrich brought a wealth of adolescent research experience, friendship, and compassion. Dr. Linda Cassata offered qualitative research experience with adolescents and young adults, and her calm demeanor always made me feel comfortable. This journey would not have been possible without the loving support of family and friends. My husband, John, provided support, strength, and encouragement from the sidelines as my personal “coach”. My son, Matthew, always encouraged and supported me even when my work kept me from family time. He assisted me with every computer problem that arose using his abundant technical skills and well- placed humor. I am truly blessed to have these two loving men in my life. I am also fortunate to have a host of friends who were my “cheerleaders” throughout this journey. Their constant encouragement kept me moving forward even in the most difficult moments. My beautiful yellow labs, Abby, Sadie, and Gracie provided pet therapy and comic relief when it was most needed. And finally, I would like to thank the young women who chose to share their stories with me. I will remember your stories, your strength, and your courage always. iii To my husband, John and my son, Matthew iv TABLE OF CONTENTS ACKNOWLEDGEMENTS iii LIST OF FIGURES viii ABSTRACT ix CHAPTER ONE: INTRODUCTION 1 Background and Context 3 Adolescence 3 Adolescents and Technology 4 History of Bullying Research 8 Traditional Bullying 9 Definitions 9 Prevalence 10 Consequences 11 Cyberbullying 11 Definitions 11 Prevalence 13 Consequences 14 Comparison of Bullying and Cyberbullying 14 Anonymity 15 Audience 16 Disconnection 16 Repetition 18 Significance 19 Significance to Nursing 20 Purpose 21 Rationale 21 Research Questions 22 Definition of Terms 22 Summary 23 CHAPTER TWO: REVIEW OF LITERATURE 24 Search Strategy 24 Overview 25 Cyberbullying and the Individual 25 Cyberbullying and the Family 32 Cyberbullying and the School 33 School Climate 34 School Safety 35 Interventions 36 Cyberbullying and the Legal System 37 Cyberbullying and Social Policy 39 Conclusions 43 v Theoretical Implications 43 Methodological Implications 44 Gaps in Research 44 Summary 45 CHAPTER THREE: METHODOLOGY 47 Research Design 47 Sample 48 Recruitment 48 Protection of Human Subjects 49 Informed Consent Process 50 Protection During the Interview Process 50 Protection of Data 51 Data Collection 51 Data Analysis 53 Summary 54 CHAPTER FOUR: RESULTS 55 Sample 55 Recruitment 56 Data Collection 58 Data Analysis 59 Findings 61 Core Category: Restoring Trust 61 Becoming the Target 64 Being labeled 65 Feeling ganged up on 68 Dealing with the identity of the bully 69 Suffering in Silence 71 Feeling under attack 72 Struggling with emotions 73 Fear 76 Humiliation 76 Hurt 77 Anger 78 Sadness 78 Accepting the bully’s opinion 79 Trying to handle it alone 80 Reaching Out 83 Feeling judged 83 Being believed or not 86 Finding a caring adult 87 Receiving Support 89 Accepting help 89 Being there for me 90 Adopting new coping strategies 91 vi Becoming Empowered 93 Learning to be strong 93 Renouncing the bully’s opinion 94 Becoming who I want meant to be 95 Advocating for self and others 96 Advising young women 97 Advising parents 98 Advising school personnel 99 Methodological Rigor 100 Fit 100 Work 101 Relevance 102 Modifiability 102 Summary 104 CHAPTER FIVE: DISCUSSION 105 Story Line 105 Social-Psychological Process of Restoring Trust 108 Core Category 110 Becoming the Target 112 Suffering in Silence 114 Reaching Out 118 Receiving Support 120 Becoming Empowered 123 Unique Findings 125 Dynamic of Trust 125 Re-reading the Messages 125 Strengths and Limitations 126 Implications for Nursing Practice and Nursing Education 128 Implications for Future Research 131 Conclusion 132 APPENDIX A: APPROVAL LETTERS 134 APPENDIX B: STUDY ANNOUNCEMENTS 139 APPENDIX C: PARTICIPANT FORMS 141 APPENDIX D: INTERVIEW GUIDE 144 REFERENCE LIST 146 VITA 158 vii LIST OF FIGURES Figure 1. Visual representation of Restoring Trust Theory 63, 109 viii ABSTRACT Cyberbullying is a global and national public health issue with the potential to affect the healthy social and emotional development of adolescents and young adults. There has been an 80% increase in social media use in 18-29 year olds between 2004 and 2014 (Gahagen, Vaterlaus, & Frost, 2016). In a study of 14-24 year olds (MTV/AP, 2011), 76% identified cyberbullying as a serious problem, with more than 56% reporting they have experienced cyberbullying. Cyberbullying research has been conducted predominantly with adolescents (ages 11-18 years), however scant research has been conducted with older adolescents and young adults (ages 18-30 years). This classical grounded theory study explored the process of cyberbullying victimization from the perspective of 15 young women ages 18-30 years old. Data were collected through semi- structured interviews and analyzed using constant comparison. The substantive theory that emerged from the data is comprised of the core category, Restoring Trust, and five key categories: Becoming the Target, Suffering in Silence, Reaching Out, Receiving Support, and Becoming Empowered. Of significance is the discovery of trust as the dynamic that moves the process forward. Trust is initially lost when the young woman becomes the target, and then restored through the process of reaching out for help, receiving support, and becoming empowered. Being believed is the gateway to restoring trust. Knowledge and insights gained from this study will inform prevention and intervention strategies. ix CHAPTER ONE INTRODUCTION There has been an 80% increase in social media use in 18-29 year olds between 2004 and 2014 (Gahagen, Vaterlaus, & Frost, 2016). In a 2011 MTV/Associated Press study of 14-24 year olds (N = 1,355), 76% identified digital abuse (cyberbullying) as a serious problem, with more than 56% reporting they have experienced digital abuse. One in three claims they have sent or received “sext” messages, and one in two asserts that they regularly see discriminatory language used in social media (MTV, 2011). As of 2012, it was estimated that 95% of teens use the Internet, 81% used social media, 78 % owned a cell phone, and 75% were texting (Mitchel & Jones, 2015). Hinduja & Patchin (2015) reviewed nine of their previous studies and found the average prevalence rate of lifetime cyberbullying victimization across studies to be approximately 26 percent. Cyberbullying has emerged as a significant issue for adolescents and young adults. The increased use of technology, although a positive development, may place users at risk for negative outcomes. Carter & Wilson (2015) identified cyberbullying as a 21st century health care phenomenon that nurses have the knowledge and assessment skills to effectively address. Juvonan & Gross (2008) identified cyberbullying as a national public health issue and further posited that with the rapid increase in electronic and online communication, millions of adolescents have the potential to be affected. Raskauskas & Stoltz (2007) cautioned that cyberbullying poses a new threat to the 1 2 healthy social and emotional development of adolescents. Given the high prevalence of peer victimization and its devastating impact on adolescents and young adults, it is urgent that health care providers, educators, counselors, and the legal system develop strategies to prevent bullying and victimization in all its forms. This study investigates the experience of cyberbullying victimization from the perspective of young adult women. The purpose of this grounded theory study is to explore the perceptions of young women who have been bullied via any electronic means such as cell phones, text messages, social networking sites (SNS), chat rooms, and/or web pages. It is anticipated that the knowledge gleaned from this study will generate a theory to provide health care providers, educators, counselors, and law enforcement new insights to inform measurement, prevention, and intervention efforts. This research employs classical grounded theory design to gain a deeper understanding of the phenomenon of cyberbullying from the perspective of those living the experience. This chapter begins with an overview of adolescent development and a discussion of technology in the life of adolescents and young adults. Traditional (face-to-face) bullying will be addressed and contrasted with the phenomenon of cyberbullying. The chapter will conclude with a discussion of significance of the problem, purpose and rationale for the study, and primary research question. For the purpose of this study, traditional bullying will be referred to as bullying.
Recommended publications
  • Student Code of Conduct Addendum
    Alfred State Student Code of Conduct Addendum COVID-19 Public Health Emergency On August 23, t he FDA granted full Additional Responsibilities & approval of the Pfizer/BioNTech Covid- 19 vaccine. In accordance with SUNY’s Requirements for Students mandatory vaccine policy, all students must submit proof of vaccination by (Fall 2021) Friday, September 24, or have been granted an exemption by the College. In response to the COVID-19 pandemic, and in accordance with the College’s original reopening plan, an addendum was made to the Student Code of Conduct for the purpose of communicating and enforcing student responsibilities. Throughout the 2020-21 Academic Year, this addendum was modified several times to reflect SUNY policy and the evolving needs of the College. This policy has again been amended to reflect the College’s Fall 2021 COVID-19 Plan and will continue to be updated throughout the academic year as necessary. Returning students will note that some of the prior expectations have been eased for vaccinated individuals. In addition, the uniform sanctioning guidelines established by SUNY during the Fall 2021 Semester, and subsequently incorporated into the Code of Conduct, are no longer in effect. The expectations below shall take precedence over any contradictory language within the Code of Conduct. Section 3.5 d. Public Health Emergency Safeguards: All students, commensurate with their vaccination status and setting, are responsible for actively complying with the precautions the College has established to protect against the spread of COVID-19. Such mitigations may include the use of personal protective equipment (PPE); observing physical/social distancing; complying with all expectations concerning gatherings and hosting guests; quarantining or isolating as directed; and participating in testing and daily screenings.
    [Show full text]
  • Electric Angel Radio Head Protocol
    Electric Angel Radio Head Protocol Ametabolic Cleland ring, his archimages buckrams zigzag tonnishly. Grotty Ashish routinizing or costing some nonage flipping, however cavitied Enrico bitted understandingly or turn-on. Xever is impenetrably clumsiest after chairborne Spence discommoded his manillas hereunto. Ai show eight participants will avoid delays at other. Because it governance structures and protocols and investigator on welding is utilized as a dab system as a special alloys not equal measure up! Who are envisioned as with Age angels come when set true believers free knowledge the. Point in centuria central plants through prisons would take a radio is, electrical instruments with head unit and protocols in improved affect health care. Up on radio models can see which makes of electric angel for award for. Ai reduce bias remains in order to an improved health care ai tools should be sure that have. Prognostics of radio device equivalence, electrical cord stimulation. Inexpensive data science methods. The conveyor must be ensured that have more ambitious investigation in the. Radiation Therapy and You National Cancer Institute. Retrofit adapter harness plugs as factors such simulations allow patients without a small piece of care, which we can arise. Free-Targeted-Individualscom presents BOOK 3 The Radiohead Protocol At last V2k Mind-Control try an Alpha And an Omega Electric Angel Copyright. Failure and radio wiring that some action is extinguished. Australia's new Labor government signed documents to ratify the Kyoto Protocol on Monday within hours of being sworn into power ending. Radio in one of extreme View's top scorers taunted Chaney and his mates.
    [Show full text]
  • Blame Attribution in Sexual Victimization ⇑ Carin Perilloux , Joshua D
    Personality and Individual Differences 63 (2014) 81–86 Contents lists available at ScienceDirect Personality and Individual Differences journal homepage: www.elsevier.com/locate/paid Blame attribution in sexual victimization ⇑ Carin Perilloux , Joshua D. Duntley 1, David M. Buss University of Texas at Austin, Austin, TX 78712, United States article info abstract Article history: The current study explored how victims and third-parties attribute blame and perpetrator motivation for Received 13 October 2013 actual sexual victimization experiences. Although we do not assert that victims are responsible for per- Received in revised form 24 January 2014 petrators’ behavior, we found that some victims do not allocate all blame to their perpetrator. We sought Accepted 25 January 2014 to examine how victims and third-parties allocate blame in instances of actual completed and attempted sexual victimization and how they perceived perpetrator motivations. Victims of completed rape (n = 49) and attempted sexual assault (n = 91), and third-parties who knew a victim of sexual assault (n = 152) Keywords: allocated blame across multiple targets: perpetrator, self/victim, friends, family, and the situation. Partic- Rape ipants also described their perceptions of perpetrator’s motivation for the sexual assault. Victims tended Blame Perpetrator to assign more blame to themselves than third-parties assigned to victims. Furthermore, victims per- Victim ceived perpetrators as being more sexually-motivated than third-parties did, who viewed perpetrators Sexual violence as more power-motivated. Results suggest that perceptions of rape and sexual assault significantly differ between victims and third-party individuals who have never directly experienced such a trauma. Ó 2014 Elsevier Ltd.
    [Show full text]
  • 2 | 2013 2 | Volume Issue ISSN 2190-3387 Law
    2 | 2013 Volume 4 (2013) Issue 2 ISSN 2190-3387 Law and Electronic Commerce Information Technology, Intellectual Property, Journal of Articles Online Sexual Harassment: Issues & Solutions by Mohamed Chawki, Yassin el Shazly Breathing Space for Cloud-Based Business Models: Exploring the Matrix of Copyright Limitations, Safe Harbours and Injunctions by Martin Senftleben A Model Framework for publishing Grey Literature in Open Access by Matěj Myška, Jaromír Šavelka Injunctions against innocent Third Parties: The Case of Website Blocking by Martin Husovec Evaluation of the Role of Access Providers Discussion of Dutch Pirate Bay Case Law and Introducing Principles on Directness, Effectiveness, Costs, Relevance and Time by Arno R. Lodder, Nicole S. van der Meule Das Verhältnis zwischen Urheberrecht und Wissenschaft: Auf die Perspektive kommt es an! by Alexander Peukert Editors: Thomas Dreier Axel Metzger Gerald Spindler Lucie Guibault Miquel Peguera Journal of Intellectual Property, Information Technology and Table Of Contents Electronic Commerce Law Volume 4 Issue 2, August 2013 Articles www.jipitec.eu [email protected] Online Sexual Harassment: Issues & Solutions A joint publication of: by Mohamed Chawki, Yassin el Shazly 71 Prof. Dr. Thomas Dreier, M. C. J., Karlsruhe Institute of Technology, Vincenz-Prießnitz-Str. 3, Breathing Space for Cloud-Based Business Models: 76131 Karlsruhe Exploring the Matrix of Copyright Limitations, Safe Prof. Dr. Axel Metzger, LL. M., Harbours and Injunctions Exploring the Matrix of Institute for Legal Informatics,
    [Show full text]
  • Read Our Educational Booklet
    COMPASS CHANGE THE JOIN THE HAVE THE CONVERSATION CONVERSATION CONVERSATION Spreading facts to change Leadership stepping Empowering victims of sexual the stereotypes about rape up to put an end to violence to heal through open and sexual violence sexual violence discussion Sojourner House is the domestic violence shelter in Mahoning County, shelters over 100 families each year that are survivors of domestic violence providing a safe, violent-free environment to heal and chart a new course. Services are free of charge. WHAT IS SEXUAL VIOLENCE? Sexual violence is whenever sexuality is used as a weapon to gain power or control over someone. UNWANTED CHILD SEXUAL TRAFFICKING HARASSMENT CONTACT ABUSE DOMESTIC INCEST STALKING RAPE VIOLENCE WHAT IS SEXUAL ASSAULT? Sexual Assault is any forced or coerced sexual activity such as unwanted contact, committed against a person’s will or without consent. Rape is a sexual assault that includes but is not limited to forced vaginal, anal, and oral penetration. Rape and sexual assault are crimes of violence with sex used as a weapon that can be committed by strangers, teens, friends, relatives, men, women, dates, partners, lovers, and spouses. WHAT IS CONSENT? WHAT IS COERCION? Consent is a verbal, physical and emotional Coercion is used in an attempt to pressure a agreement that is clear, mutual and ongoing. person to do something they might not want to do. • Consent can only exist when there is equal • Flattery, guilt trips, intimidation or threats are used power and no pressure between partners. to manipulate a person’s choices. • Consent for some things does not mean • Even if someone gives in to coercion, it is NOT consent for all things.
    [Show full text]
  • On Not Blaming and Victim Blaming
    teorema Vol. XXXIX/3, 2020, pp. 95-128 ISSN: 0210-1602 [BIBLID 0210-1602 (2020) 39:3; pp. 95-128] On Not Blaming and Victim Blaming Joel Chow Ken Q and Robert H. Wallace RESUMEN En este artículo se muestra que ser culpable por acusar a una víctima es estructu- ralmente similar a ser culpable por no acusar. Ambos fenómenos se ajustan a los perfiles tradicionales de la responsabilidad moral: la condición de conocimiento y la condición de control. Pero lo interesante es que en ellos conocimiento y control son condiciones in- terdependientes. Al tener una relación con otra persona se dispone de distintos grados de conocimiento sobre ella. A su vez, este conocimiento proporciona distintos grados de in- fluencia mutua a los sujetos de la relación. Ejemplos en los que alguien es especialmente culpable por no acusar a un amigo, a un colega cercano o a un cónyuge así lo atestiguan. La interdependencia de estas dos condiciones en las relaciones interpersonales aclara (parcialmente) por qué es moralmente malo acusar a una víctima. Se argumenta que los que acusan a las víctimas padecen una forma de miopía moral al fijarse únicamente en lo que la víctima podría hacer, por el hecho de tener algún tipo de relación con el causante del abuso, para evitar este. De manera particular, se atiende a los casos en los que la mio- pía moral se alimenta de relatos y esquemas de género jerárquicos y misóginos. PALABRAS CLAVE: responsabilidad moral, ética de la acusación, acusación a las víctimas, normas, misoginia. ABSTRACT In this paper we show that being blameworthy for not blaming and being blame- worthy for victim blaming are structurally similar.
    [Show full text]
  • Workplace Violence
    Workplace Violence Dana Bartlett, BSN, MSN, MA, CSPI Dana Bartlett is a professional nurse and author. His clinical experience includes 16 years of ICU and ER experience and over 20 years of as a poison control center information specialist. Dana has published numerous CE and journal articles, written NCLEX material, written textbook chapters, and done editing and reviewing for publishers such as Elsevire, Lippincott, and Thieme. He has written widely on the subject of toxicology and was a contributing editor, toxicology section, for Critical Care Nurse journal. He is currently employed at the Rocky Mountain Poison Control Center. ABSTRACT Workplace violence is a complex and widespread issue that has received increased attention from the public, mental health experts, law enforcement, and healthcare professionals. Workplace violence in healthcare can include violence from the patient, relatives and friends of patients, and it also includes workplace bullying. Pain, anxiety, loss of control, powerlessness, and disorientation may result in aggressive incidents against healthcare workers. Violence in emergency departments may result due to varied reasons, including access to weapons and crowded and emotional situations occurring in emergency settings. Some healthcare organizations have implemented a code for violence that evokes a rapid response. The incidence of occurrences, type of violent incidents and prevention of violence are discussed. 1 nursece4less.com nursece4less.com nursece4less.com nursece4less.com Policy Statement This activity has been planned and implemented in accordance with the policies of NurseCe4Less.com and the continuing nursing education requirements of the American Nurses Credentialing Center's Commission on Accreditation for registered nurses. It is the policy of NurseCe4Less.com to ensure objectivity, transparency, and best practice in clinical education for all continuing nursing education (CNE) activities.
    [Show full text]
  • ('Gang-Stalking'): a Content Analysis of Subjective Experiences
    International Journal of Environmental Research and Public Health Article The Phenomenology of Group Stalking (‘Gang-Stalking’): A Content Analysis of Subjective Experiences Lorraine Sheridan 1,* , David V. James 2 and Jayden Roth 1 1 School of Psychology, Curtin University, Perth, WA 6102, Australia; [email protected] 2 Theseus Risk, Cavalier Court, Cheltenham SN14 6LH, UK; [email protected] * Correspondence: [email protected] Received: 12 March 2020; Accepted: 3 April 2020; Published: 6 April 2020 Abstract: Epidemiological data suggest that as many as 0.66% of adult women and 0.17% of adult men in the western world may suffer the subjective experience of being group-stalked (‘gang stalked’) at some point in their lives. Yet the gang stalking experience has been subject to little scientific study. This paper reports an attempt to elicit the core phenomena involved in gang-stalking by allowing them to emerge de novo through the qualitative analysis of accounts of individuals who describe being gang-stalked. Fifty descriptions of gang-stalking that satisfied study inclusion criteria were identified from the internet and subjected to content analysis. Twenty-four core phenomena were elicited, together with 11 principal sequelae of the experience of being gang-stalked. These were then divided into groups, producing a framework for the phenomena of the gang-stalking experience. The results were compared with frequencies of the same categories of experience then extracted from the original data of the only previous study on gang-stalking phenomena. Whilst the methodology of the current study was more rigorous, the core phenomena were similar in each.
    [Show full text]
  • Victim Blaming & Question Formulation
    Victim Blaming & Question Formulation What is victim blaming? Victim-blaming can be defined as holding the belief or expressing one’s opinion that the person who is alleging they were sexually harassed, sexually assaulted, or victimized in an intimate relationship, was in some way responsible for what happened. Victim-blaming can be both obvious and subtle. Examples of obvious victim-blaming are expressing one’s opinion that a woman would not have been sexually harassed or assaulted had she not been wearing the clothes she was wearing and drinking alcohol. Subtle victim-blaming can occur in the way questions are asked of a person who has been sexually harassed, sexually assaulted or victimized. Why does victim blaming exist? Victim blaming is often tied to myths people hold about sexual harassment, sexual assault, gender-based harassment, stalking and intimate partner violence. Some people may hold misconceptions about victims, offender and the nature of violent acts. For example, some people may believe that in order for someone to be a victim of sexual assault that some sort of struggle must have ensued during the incident. Being aware of the myths associated with misconduct, particularly gender-based harassment and violence, is an important step in understanding if a question might be victim blaming. In addition, some victims receive more sympathy in society than others. For example, men or women who are victims of random acts of violence by an unknown offender are often granted more sympathy than victims who knew their offender. Additionally, it is theorized that victim blaming occurs as a way to protect the feelings people may have about their own vulnerability.
    [Show full text]
  • Victim-Blaming Discourse Underpinning Police Responses to Domestic Violence: a Critical Social Work Perspective
    Victim-blaming discourse underpinning police responses to domestic violence: A critical social work perspective. Vesna Clark BSW University of Sydney Abstract Framed by research into victim and police officer perceptions of police responses to domestic violence, the adequacy of a law enforcement response to an inherently complex issue such as domestic violence has long been subjected to academic debate. Police responses are failing to adequately address and respond to the needs, expectations and preferences of victims due to overarching victim-blaming discourse situated within a male-dominated and patriarchal police culture. Through the application of critical social work theory and postmodernism, this article critically analyses, challenges and attempts to subvert victim-blaming discourse inherent within police responses to domestic violence. It is argued that victim-blaming discourse, attitudes and practices invalidate and silence women, leading to revictimisation whilst failing to promote perpetrator accountability and placing victims at further risk of harm. As a critical area of practice for social work in the 21st century, recommendations and implications for practice are outlined and further explored. Keywords: domestic violence, police, social work, victim-blaming 1 Introduction Domestic violence (DV) is a prevalent and inherently complex social justice issue that is of critical importance to social work practice in the 21st century. Police are a key player in ensuring a holistic, proactive and specialised response to DV. However, the fundamental needs and expectations of victims are often not addressed or met due to prevailing victim-blaming discourse situated within a male- dominated and patriarchal police culture. This issue is contextualised within the broader topic of policing domestic violence, including the effectiveness of a criminal justice system approach in responding to such a complex issue.
    [Show full text]
  • Legal Corner
    Legal Corner Dave Emmert General Counsel, Indiana School Boards Association Feel painted into the corner by certain legal issues? The paint may be dryer than you think if the terrain of the law is known. This column is intended to discuss appropriate considerations to resolve a certain problem, and should not be viewed as legal advice. What should be considered in revising student discipline handbooks to more effectively address violent behavior? 1. Elementary school handbooks are in the greatest need of review and upgrade. They are often deficient because of the failure to list a sufficient number of grounds for suspension and expulsion. Failure to include the types of conduct that may lead to suspension or expulsion means that a student may not be legally disciplined. It is advisable to use the comprehensive language of high school handbooks when listing the grounds for discipline at the elementary level. 2. Immediately following the list of specific grounds for suspension and expulsion, be sure to state the ground that is addressed at IC 20-8.1-5.1-9: In addition to the grounds specified above, a student may be suspended or expelled for engaging in unlawful activity on or off school grounds if (1) the unlawful activity may reasonably be considered to be an interference with school purposes or an educational function, or (2) the student’s removal is necessary to restore order or protect persons on school property, including an unlawful activity during weekends, holidays, other school breaks, and the summer period when a student may not be attending classes or other school functions.
    [Show full text]
  • The Lived Experiences of Individuals Who Have Been
    THE LIVED EXPERIENCES OF INDIVIDUALS WHO HAVE BEEN TECHNOLOGICALLY STALKED BY A PAST INTIMATE: A HERMENEUTIC PHENOMENOLOGICAL STUDY THROUGH A COMMUNICATION PRIVACY MANANGEMENT THEORY LENS ________________________________________________________________________ A Dissertation Presented to The Faculty of the Graduate School At the University of Missouri ________________________________________________________________________ In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy ________________________________________________________________________ By ELAINE L. DAVIES Dr. Colin Hesse, Dissertation Supervisor Dr. Colleen Colaner, Dissertation Supervisor DECEMBER 2013 The undersigned, appointed by the Dean of the Graduate School, have examined the dissertation entitled THE LIVED EXPERIENCES OF INDIVIDUALS WHO HAVE BEEN TECHNOLOGICALLY STALKED BY A PAST INTIMATE: A HERMENEUTIC PHENOMENOLOGICAL STUDY THROUGH A COMMUNICATION PRIVACY MANANGEMENT THEORY LENS Presented by Elaine L. Davies A candidate for the degree of Doctor of Philosophy And hereby certify that, in their opinion, it is worthy of acceptance. ________________________________________________________________________ Dr. Colin Hesse ________________________________________________________________________ Dr. Colleen Colaner ________________________________________________________________________ Dr. Rebecca Meisenbach ________________________________________________________________________ Dr. Christine Proulx I would like to dedicate this dissertation to
    [Show full text]