The Correlation Between The Three Reading Fluency Subskills And Reading Comprehension In At-Risk Adolescent Readers, 2012 Liberty University
The Correlation Between The Three Reading Fluency Subskills And Reading Comprehension In At-Risk Adolescent Readers, Craig Courbron
Doctoral Dissertations and Projects
The purpose of this study was to determine which of the three reading fluency subskills were most strongly correlated with reading comprehension in adolescent at-risk readers. The participants were 82 adolescent males (ages 13-19) who had been committed to a juvenile detention facility. Archival data from a two-year period was collected from a maximum security juvenile detention facility in a rural section of the Northeastern United States. The Measures of Academic Progress test was used to collect reading comprehension data; the Qualitative Reading Inventory-4 test was used to collect reading speed and reading accuracy data; the Multidimensional Fluency Scale was …
Deliver Us From Evil - Police Tactical Psychology Bulletin, 2012 Utah Valley University
Deliver Us From Evil - Police Tactical Psychology Bulletin, Rodger E. Broome Phd
Rodger E. Broome
There is no hero or protector without a menace from which to protect or save others. Therefore, it is essential to understanding our adversaries better so that we may better appreciate our service to our citizens
Assessment Of Firesetters, 2012 Bond University
Assessment Of Firesetters, Rebekah Doley, Bruce Watt
Bruce Watt
Extract This chapter will equip readers with the information required to screen and assess arsonists effectively using a number of modalities. The appropriate tools are presented and discussed, along with the evidence base underlying them. The focus of the discussion is on risk assessment, recidivism and dangerousness. In particular, these issues are discussed with reference to mental health and psychiatric patients as arsonists. The terms ’arson’ and ’firesetting’ will be used interchangeably throughout this chapter; the term ‘arson’ is commonly acknowledged to have a legal definition, while firesetting describes the behaviour itself.
Assessment Of Firesetters, 2012 Bond University
Assessment Of Firesetters, Rebekah Doley, Bruce Watt
Rebekah Doley
Extract This chapter will equip readers with the information required to screen and assess arsonists effectively using a number of modalities. The appropriate tools are presented and discussed, along with the evidence base underlying them. The focus of the discussion is on risk assessment, recidivism and dangerousness. In particular, these issues are discussed with reference to mental health and psychiatric patients as arsonists. The terms ’arson’ and ’firesetting’ will be used interchangeably throughout this chapter; the term ‘arson’ is commonly acknowledged to have a legal definition, while firesetting describes the behaviour itself.
Power And Excitement In Arson: The Case Of Firefighter Arson, 2012 Bond University
Power And Excitement In Arson: The Case Of Firefighter Arson, Rebekah Doley, Kenneth Fineman
Rebekah Doley
Extract Perhaps more than most crimes, the crime of arson is often shrouded in anecdotal descriptions concerning what actually motivates the offender. Arson in any form is repugnant, but even more so when the individual involved is a serving member of the fire service. Fire department personnel and the community alike abhor incidents of this nature. Although the incidence of fire-fighter arson is low in comparison with the total number of currently serving fire-fighters, the impact on community faith and fire service morale is disproportionately great. The integrity of the service is demonstrated in the performance of its personnel. While …
Bushfire And Wildfire Arson: Arson Risk Assessment In The Australian Context, 2012 Bond University
Bushfire And Wildfire Arson: Arson Risk Assessment In The Australian Context, Troy Mcewan, Rebekah Doley, Mairead Dolan
Rebekah Doley
Extract Deliberately lit vegetation fires have the greatest destructive potential of any intentionally lit blaze. The ’Black Saturday’ bushfires of 7 February 2009 in Victoria, Australia, killed 173 people, injured 414 and destroyed 3500 buildings, including two entire towns (Teagne et al, 2010). Even before the fires had abated police and fire-fighters revealed that several had been deliberately lit (Silvester, 2009). The subsequent Royal Commission attributed four of the large fires to arson. These four fires caused 52 deaths and burnt approximately 2000 km2 of land, an area slightly larger than that of Greater London (Teague et aI, 2010). The …
The Technological Trajectory Of The Automatic Identification Industry: The Application Of The Systems Of Innovation (Si) Framework For The Characterisation And Prediction Of The Auto-Id Industry, 2012 University of Wollongong
The Technological Trajectory Of The Automatic Identification Industry: The Application Of The Systems Of Innovation (Si) Framework For The Characterisation And Prediction Of The Auto-Id Industry, Katina Michael
Professor Katina Michael
Traditionally the approach used to analyse technological innovation focused on the application of the techno-economic paradigm with the production function as its foundation. This thesis explores the rise of the evolutionary paradigm as a more suitable conceptual approach to investigating complex innovations like automatic identification (auto-ID) devices. Collecting and analysing data for five auto-ID case studies, (bar codes, magnetic-stripe cards, smart cards, biometrics and RF/ID transponders), it became evident that a process of migration, integration and convergence is happening within the auto-ID technology system (TS). The evolution of auto-ID is characterised by a new cluster of innovations, primarily emerging through …
Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, 2012 University of Wollongong
Integrating Value-Driven Feedback And Recommendation Mechanisms Into Business Intelligence Systems, Byron Keating, Tim Coltman, Michael Katina, Valeria Baker
Professor Katina Michael
Most leading organizations, in all sectors of industry, commerce and government are dependent upon
ERP for their organizational survival. Yet despite the importance of the decision to adopt ERP and its
impact on the entire firm’s performance the IT literature has been in the large part silent on the nature
of the ERP investment decision. This study is the first of its kind to determine the preference structure
of senior managers around the organizational benefits and risks of adopting ERP. We present the
results which provide interesting insights into how managers’ perceive the benefit and risk factors
salient to the …
Occupational Therapy In Criminal Justice, 2012 Department of Occupational Therapy, Dominican University of Calfornia
Occupational Therapy In Criminal Justice, Jane Dressler
Jane Dressler
The Criminalization Of Immigration: Value Conflicts For The Social Work Profession, 2012 University of Washington, Tacoma
The Criminalization Of Immigration: Value Conflicts For The Social Work Profession, Rich Furman, Alissa R. Ackerman, Melody Loya, Susanna Jones, Nalini Negi
The Journal of Sociology & Social Welfare
This article examines the impact of the criminalization of immigration on non-documented immigrants and the profession of social work. To meet its aims, the article explores the new realities for undocumented immigrants within the context of globalization. It then assesses the criminal justice and homeland security responses to undocumented immigrants, also referred to as the criminalization of immigration. It subsequently explores the ethical dilemmas and value discrepancies for social workers that are implicated in some of these responses. Finally, it presents implications for social workers and the social work profession.
The Social Contagion Of Violence; A Theoretical Exploration Of The Nature Of Violence In Society, 2012 California Polytechnic State University - San Luis Obispo
The Social Contagion Of Violence; A Theoretical Exploration Of The Nature Of Violence In Society, Kayla Kirkpatrick
Social Sciences
No abstract provided.
Human Rights, Regulation, And National Security, 2012 University of Wollongong
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Professor Katina Michael
Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.
Editorial: "You Talkin' To Me?", 2012 University of Wollongong
Editorial: "You Talkin' To Me?", Katina Michael
Professor Katina Michael
Advancing knowledge through robust research is an honourable aim- being scientific, finding the right methodology, executing project phases meticulously, and reporting on the outcomes as objectively and accurately as possible. But may I begin my inaugural editorial by saying that an even higher ideal to advancing knowledge is critiquing it as it happens. Reflective practice is not just something to be done by academics in their teaching- reflective practice is what we should all be doing as we go about undertaking our various day-to-day work tasks. For the engineer engaged in research and development, whether in industry or government, reflective …
A Rose By Any Other Name: State Criminality And The Limits Of Social Learning Theory, 2012 Western Michigan University
A Rose By Any Other Name: State Criminality And The Limits Of Social Learning Theory, Elizabeth A. Bradshaw
The Hilltop Review
Over the past thirty years, social learning theory has emerged as one of the top criminological theories of the time. Capitalizing on Edwin Sutherland’s differential association theory, social learning theory provided the means for a quantitative assessment of Sutherland’s propositions. Advanced largely by Ronald Akers, the vast majority of research conducted on social learning theory has been limited to self-report studies of adolescents and college students, largely due to convenience. The limitations of the methods developed to empirically test social learning theory combined with the difficulty of gaining access to people in positions of power, has been the primary impediment …
Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, 2012 University of Wollongong
Sousveillance And The Social Implications Of Point Of View Technologies In The Law Enforcement Sector, Katina Michael, M.G. Michael
Associate Professor Katina Michael
Policing today has become a high-tech affair; especially in the provision of incident event tracking and reporting systems increasingly being used to provide evidence in a court of law. These in-car video (ICV) and body worn recording systems are said to increase convictions and eliminate false claims made by defendants, providing documentary support to police officers and their associated actions in an incident. But today, new technologies such as smart phones equipped with cameras and global positioning system chipsets can also be found in the hands of the everyday citizen, used to capture everyday happenings and distributed to social networks …
Family Systems - Police Tactical Psychology Bulletin, 2012 Utah Valley University
Family Systems - Police Tactical Psychology Bulletin, Rodger E. Broome Phd
Rodger E. Broome
In the criminal justice system, we deal with people in terms of their individual rights and actions. But often times, police officers are called to deal with families in conflict or turmoil. In these situations, police have to work within the framework of individual rights, responsibilities, and duties, but often are frustrated, confounded or inhibited by complex family dynamics.
Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, 2012 University of Wollongong
Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael
Associate Professor Katina Michael
In an age of outsourcing tasks that are not considered to be a core competency of the business, organisations have often relied on external consultants for matters pertaining to security. In actual fact, most companies could have utilized existing skill-sets in-house to produce a security risk management program, if only they knew what steps to take, and how to go about it all. Evan Wheeler in his book on information security risk management does just that- he equips professionals tasked with security, with the thinking required to create a program that is more preoccupied with the complex strategic-level questions than …
Extralegal Punishment Factors: A Study Of Forgiveness, Hardship, Good-Deeds, Apology, Remorse, And Other Such Discretionary Factors In Assessing Criminal Punishment, 2012 University of Pennsylvania Carey Law School
Extralegal Punishment Factors: A Study Of Forgiveness, Hardship, Good-Deeds, Apology, Remorse, And Other Such Discretionary Factors In Assessing Criminal Punishment, Paul H. Robinson, Sean Jackowitz, Daniel M. Bartels
All Faculty Scholarship
The criminal law's formal criteria for assessing punishment are typically contained in criminal codes, the rules of which fix an offender's liability and the grade of the offense. A look at how the punishment decision-making process actually works, however, suggests that courts and other decisionmakers frequently go beyond the formal legal factors and take account of what might be called "extralegal punishment factors" (XPFs).
XPFs, the subject of this Article, include matters as diverse as an offender's apology, remorse, history of good or bad deeds, public acknowledgment of guilt, special talents, old age, extralegal suffering from the offense, as well …
Juvenile Injustice: Disproportionate Minority Contact In Oklahoma's Juvenile Justice System, 2012 Loyola University Chicago
Juvenile Injustice: Disproportionate Minority Contact In Oklahoma's Juvenile Justice System, Patrick M. Polasek
Dissertations
Statistics show that minority overrepresentation in the juvenile justice system is not a new phenomenon. The problem, however, is not going away and might even be getting worse. In 2008, the FBI's Uniform Crime Report showed that 52% of juvenile Violent Crime Index arrests, and 33% of juvenile Property Crime Index arrests, are black youths. This occurring while black youth only accounted for 16% of the youth population. These statistics illustrate disproportionate minority contact. The question is whether disproportionate minority contact has improved, and what is influencing minority overrepresentation.
In this dissertation, I examine whether minorities are overrepresented in Oklahoma's …
Family In Context: (Re)Entry Narratives Of Formerly Incarcerated Individuals, 2012 Loyola University Chicago
Family In Context: (Re)Entry Narratives Of Formerly Incarcerated Individuals, Jennifer Elena Cossyleon
Master's Theses
The current study is informed by narrative accounts of 39 released prisoners, who provide day-to-day understandings of how they have experienced and continue to experience community reintegration. This study digs deeper into the intricacies of returning to free society, one that often disenfranchises and labels ex-offenders, and attempts to reveal how released prisoners themselves see family as pertinent in their reentry experiences. Respondents' stories are telling of the resources they draw upon, and in particular how their families are involved in that process. Findings suggest that families at times provide material and emotional support, but may also facilitate drug use …