Spelling suggestions: "subject:"defending"" "subject:"defendingc""
1 |
The role of individual and classroom moral disengagement in bullying and bystanding behaviorsHufstetler, Schell 06 January 2017 (has links)
There is much research studying bullying and bystanding behaviors during adolescence. Recently, research has focused on social variables in an attempt to prevent or discourage bullying and encourage defending behaviors. This dissertation attempts to merge this research with a sociocognitive perspective. Moral disengagement, a sociocognitive variable, may help researchers have a better understanding of why adolescents bully their peers. This dissertation studies the role of moral disengagement in predicting bullying and bystander behaviors in adolescents from the US and Sweden. Results and implications of these findings are also discussed.
|
2 |
Aggressive, Assertive and Non-confrontational Forms of Defending: Differentiation of Forms and Consequences of DefendingMeter, Diana J. January 2015 (has links)
The factor structure of the newly created Enacted Defending Scale (EDS) was investigated to better understand what strategies of defending children and adolescents enact to defend their peers from peer victimization. This investigation resulted in a 5-factor model, representative of assertive, overt aggressive, relationally aggressive, and two non-confrontational strategies of defending, telling an adult and comforting the victim. Aggressive forms of defending could be differentiated; whether the defending strategy was enacted in response to overt or relational victimization could not be differentiated. In general, aggressive strategies were associated with dependent variables indicative of poorer adjustment, while assertive and non-confrontational strategies were either related to positive dependent variables or unrelated to the psychosocial adjustment outcomes. Only one of the associations varied by age. The results suggest, first, that attention must be given to multiple forms of defending and that not all defending of peer victimization may have a prosocial effect, and second, that there is a need to carefully consider the potential consequences of defending for defenders themselves.
|
3 |
Minnen från en parallell framtid / Memories from a parallel futureDalunde, Tilda January 2014 (has links)
Vi lever i en ömtålig vardag. Vi gör den än ömtåligare genom vårt sätt att leva. Det är ingen idé att jag säger det med ord; jag har redan sagt det så många gånger att människorna runt omkring mig har slutat lyssna. Kanske är objekt en bättre ingång till samtal. I det här arbetet har jag, genom såväl text som praktiskt arbete inom corpuskonstfältet, undersökt vad som händer med oss när vardagen faller sönder och kaos utbryter. Genom en startpunkt i klimatkatastrofen år 536, som ledde till att närmare hälften av Nordens befolkning dog, har jag spekulerat kring om samma sak skulle hända idag, eller kanske att det händer idag. Resursbrist leder alltid till våld. Trots att vi vet det fortsätter vi knapra i oss jorden en liten bit i taget. Vad är tanken att vi ska göra när den tar slut? / We live in a fragile everyday. We make it even more fragile by the way we live it. There is no point in saying it with words any more, I've already tried that so many times that people have stopped listening. Maybe objects are a better way to start a conversation. In this project, that consists of this thesis and the physical body of work "Memories from a parallel future", I've been investigating what happens to us when the everyday falls apart and chaos erupts. With a starting point in the climate-crisis of the year 536, that led to the death of almost half of the Norse population, I've been speculating what would have happened today. Or maybe that it is actually happening today. Depletion of resources always results in violence. We know this, but still we keep nibbling at the earth, a little chunk at a time. What do we plan to do when there is nothing left? / <p>Bilder av verk av konstnärerna Iain Baxter&, Naoko Ito och Luiana Rondolini har tagits bort av upphovsrättsliga skäl. Titlarna på verken står dock kvar. </p>
|
4 |
Kombinační hra ve fotbale a její bránění / Combination game at football and its defendingKlamt, Ondřej January 2011 (has links)
Thesis is focused on a combination game of football as a way of consecutive offensive and also on the way of defending in this game style. It is based on both theoretical sources and original research conducted in the club SK Slavia Prague and also on the analysis of Champions League matches from year 2011. The outcomes of this thesis will be found in use as a source of information for practice trainers. Key words: Football, combination, offensive phase, defending, pass
|
5 |
Testing a social-cognitive model of bystander responses to bullying: Towards and understanding of why bystanders respond as they doCwinn, Eli 06 September 2013 (has links)
The current study tests a social-cognitive model of bystander responses to bullying in an attempt to better understand why bystanders respond as they do. Three forms of bystander responses were predicted by adult and friend responses to bullying and the bystander’s reasons for intervening. The present study involved 326 children from grades 4-8 who completed the PREVNet Assessment Survey, a novel wide-ranging measure of bullying phenomena. Sound psychometric properties were found for the four measures used in the present study. In elucidating the effects of social context, the differential impact of adult and friend responses on bystander responses was examined. Results indicate that friends are more influential than are adults in predicting bystander responses. Further, results of serial multiple mediation analysis generally support a social-cognitive model, suggesting that social context impacts intervention reasoning, which in turn, impact bystander responses. Implications for future research and policy are discussed. / SSHRC Joseph-Armand Bombardier CGS Master's Scholarship
|
6 |
Rozpouštění politických stran jako nástroj obranyschopné demokracie : srovnání české a německé debaty. / Dissolution of political parties as a tool for defending democracy: a comparison of the Czech and German debatesMacháčková, Michaela January 2018 (has links)
This master thesis focusses on the issues of sanctioning antidemocratic political parties in the Czech Republic and in the Federal Republic of Germany, as well as the discussion of the expert public in reaction to practice of the Supreme Administrative Court or Federal Constitutional Court. It is a comparative paper, therefore all issues are analysed from the Czech as well as the German point of view and the comparative chapter summarizing main coherences and differences always follows. The thesis is divided into six parts, which aim to map the matters related to banning political parties. Firstly, the theses is focused on the regulation of political parties in the Czech Republic and in the in the Federal Republic of Germany to provide theoretical backgrounds for better understanding of the topic. Consequently, both the introduction into problematic of the concept of defending democracy and the analysis of its demonstration in the constitutional law of the Czech Republic and of the Federal Republic of Germany follow. Moreover, substantive law aspects as well as procedural law aspects of dissolution of political parties are introduced ending up with comparison of both. The thesis contains also detailed insight into Czech case regarding Dělnická strana and in German case the NPD...
|
7 |
In Defense of Consuming Animal Products : How Human Suffering Can Justify the Consumption of Animal Products in Developed CountriesMagyari Djerdj, Dennis January 2024 (has links)
Within the area of animal ethics, there has been ongoing discussion around whether people in developed countries are justified in consuming animal based products or not, some argue that we are, and some argue that we aren't. In this paper I present a kind of middle-way position in response to the ongoing discussion, in which I argue that a decent chunk of a population in developed countries are justified in consuming certain animal products, but only so far as the exclusion of these animal based products would cause harm to the boycotter. Many of the arguments that are raised in order to defend the consumption of animal products, often rely on controversial assumptions or stances in order to make their claim. In this paper I attempt to distance myself from these types of arguments, by giving an argument that only relies on already commonly held moral beliefs that we all already take to be true, and the argument I make is therefore just an extension of a moral belief that we already have, which is that it is morally justifiable to consume animal products in order to avoid a personal harm. The claim very simply put is the following: We already believe that a person is morally justified to consume animal products from animals that yield relatively low amounts of food in order to survive, if we take this to be true, then we should also believe that a person is morally justified to consume animal products from animals that have a much greater yield of food, but where the food is used not to survive, but to avoid personal harms that stem from boycotting animal products. To give a more precise description on why the former (to survive) entails the latter (to avoid harms from boycotting) is because firstly, the amount of harm that's being done to the animal to avoid both cases is the same, and secondly, the level of harm that's being prevented by consuming the products that come from that animal are also the same. I conclude therefore, that if we want to remain morally consistent, we should accept the latter case to also be justified, which is that we are justified in consuming animal products in order to reduce a personal harm, but only so far as those harms would be prevalent if the person where to exclude animal based products from their diet.
|
8 |
FROM STANDING BY TO TAKING A STAND: THE MOTIVATION AND ABILITY TO DEFEND AGAINST BULLYINGSink, Holli E. 30 July 2007 (has links)
No description available.
|
9 |
Distributed Denial of Service Attacks (DDoS)- Consequences and FutureNamuduri, Sarita January 2006 (has links)
<p>Denial of Service and the Distributed Denial of Service Attacks have recently emerged as one of the most newsworthy, if not the greatest, weaknesses of the Internet. This paper attempt to explain how they work, why they are hard to combat today, and what will need to happen if they are to be brought under control. It is divided into eight sections. The first is an overview of the current situation and also brief explanatory of the rest of the chapters being covered. The second is a detailed description of exactly how this attack works, and why it is hard to cope with today; of necessity it includes a description of how the Internet works today. The third section is totally about the different attacks in recent years and how they affected the people or the bigorganizations. The fourth section describes the short-term prospects, the tools which are used to rectify these attacks. The fifth is problems being faced with an explanatory of the percentage of attack in recent years and comparing the problems. The sixth is what can be done today to help alleviate this problem. The seventh section describes the legal actions and also legal actions that can be followed against the attack by the victim; and the eighth section describes the long-term picture, what will change to bring this class of problem under control, if not eliminate it entirely. And finally there are some appendices: a bibliography, giving references to original research work and announcements; a brief article on securing servers; and acknowledgments for the many people who helped make this paper possible.</p>
|
10 |
Distributed Denial of Service Attacks (DDoS)- Consequences and FutureNamuduri, Sarita January 2006 (has links)
Denial of Service and the Distributed Denial of Service Attacks have recently emerged as one of the most newsworthy, if not the greatest, weaknesses of the Internet. This paper attempt to explain how they work, why they are hard to combat today, and what will need to happen if they are to be brought under control. It is divided into eight sections. The first is an overview of the current situation and also brief explanatory of the rest of the chapters being covered. The second is a detailed description of exactly how this attack works, and why it is hard to cope with today; of necessity it includes a description of how the Internet works today. The third section is totally about the different attacks in recent years and how they affected the people or the bigorganizations. The fourth section describes the short-term prospects, the tools which are used to rectify these attacks. The fifth is problems being faced with an explanatory of the percentage of attack in recent years and comparing the problems. The sixth is what can be done today to help alleviate this problem. The seventh section describes the legal actions and also legal actions that can be followed against the attack by the victim; and the eighth section describes the long-term picture, what will change to bring this class of problem under control, if not eliminate it entirely. And finally there are some appendices: a bibliography, giving references to original research work and announcements; a brief article on securing servers; and acknowledgments for the many people who helped make this paper possible.
|
Page generated in 0.0415 seconds