CINXE.COM
Search results for: offender strategy
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: offender strategy</title> <meta name="description" content="Search results for: offender strategy"> <meta name="keywords" content="offender strategy"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="offender strategy" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="offender strategy"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 3837</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: offender strategy</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3837</span> Journey to Cybercrime and Crime Opportunity: Quantitative Analysis of Cyber Offender Spatial Decision Making</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sinchul%20Back">Sinchul Back</a>, <a href="https://publications.waset.org/abstracts/search?q=Sun%20Ho%20Kim"> Sun Ho Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Jennifer%20LaPrade"> Jennifer LaPrade</a>, <a href="https://publications.waset.org/abstracts/search?q=Ilju%20Seong"> Ilju Seong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the advantage of using the Internet, cybercriminals can reach target(s) without border controls. Prior research on criminology and crime science has largely been void of empirical studies on journey-to-cybercrime and crime opportunity. Thus, the purpose of this study is to understand more about cyber offender spatial decision making associated with crime opportunity factors (i.e., co-offending, offender-stranger). Data utilized in this study were derived from 306 U.S. Federal court cases of cybercrime. The findings of this study indicated that there was a positive relationship between co-offending and journey-to-cybercrime, whereas there was no link between offender-stranger and journey-to-cybercrime. Also, the results showed that there was no relationship between cybercriminal sex, age, and journey-to-cybercrime. The policy implications and limitations of this study are discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=co-offending" title="co-offending">co-offending</a>, <a href="https://publications.waset.org/abstracts/search?q=crime%20opportunity" title=" crime opportunity"> crime opportunity</a>, <a href="https://publications.waset.org/abstracts/search?q=journey-to-cybercrime" title=" journey-to-cybercrime"> journey-to-cybercrime</a>, <a href="https://publications.waset.org/abstracts/search?q=offender-stranger" title=" offender-stranger"> offender-stranger</a> </p> <a href="https://publications.waset.org/abstracts/133013/journey-to-cybercrime-and-crime-opportunity-quantitative-analysis-of-cyber-offender-spatial-decision-making" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/133013.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">179</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3836</span> Investigating Homicide Offender Typologies Based on Their Clinical Histories and Crime Scene Behaviour Patterns</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Valeria%20Abreu%20Minero">Valeria Abreu Minero</a>, <a href="https://publications.waset.org/abstracts/search?q=Edward%20%20Barker"> Edward Barker</a>, <a href="https://publications.waset.org/abstracts/search?q=Hannah%20Dickson"> Hannah Dickson</a>, <a href="https://publications.waset.org/abstracts/search?q=Francois%20Husson"> Francois Husson</a>, <a href="https://publications.waset.org/abstracts/search?q=Sandra%20Flynn"> Sandra Flynn</a>, <a href="https://publications.waset.org/abstracts/search?q=Jennifer%20Shaw"> Jennifer Shaw</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Purpose – The purpose of this paper is to identify offender typologies based on aspects of the offenders’ psychopathology and their associations with crime scene behaviours using data derived from the National Confidential Enquiry into Suicide and Safety in Mental Health concerning homicides in England and Wales committed by offenders in contact with mental health services in the year preceding the offence (n=759). Design/methodology/approach – The authors used multiple correspondence analysis to investigate the interrelationships between the variables and hierarchical agglomerative clustering to identify offender typologies. Variables describing: the offender’s mental health history; the offenders’ mental state at the time of offence; characteristics useful for police investigations; and patterns of crime scene behaviours were included. Findings – Results showed differences in the offender’s histories in relation to their crime scene behaviours. Further, analyses revealed three homicide typologies: externalising, psychosis and depression. Analyses revealed three homicide typologies: externalising, psychotic and depressive. Practical implications – These typologies may assist the police during homicide investigations by: furthering their understanding of the crime or likely suspect; offering insights into crime patterns; provide advice as to what an offender’s offence behaviour might signify about his/her mental health background; findings suggest information concerning offender psychopathology may be useful for offender profiling purposes in cases of homicide offenders with schizophrenia, depression and comorbid diagnosis of personality disorder and alcohol/drug dependence. Originality/value – Empirical studies with an emphasis on offender profiling have almost exclusively focussed on the inference of offender demographic characteristics. This study provides a first step in the exploration of offender psychopathology and its integration to the multivariate analysis of offence information for the purposes of investigative profiling of homicide by identifying the dominant patterns of mental illness within homicidal behaviour. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=offender%20profiling" title="offender profiling">offender profiling</a>, <a href="https://publications.waset.org/abstracts/search?q=mental%20illness" title=" mental illness"> mental illness</a>, <a href="https://publications.waset.org/abstracts/search?q=psychopathology" title=" psychopathology"> psychopathology</a>, <a href="https://publications.waset.org/abstracts/search?q=multivariate%20analysis" title=" multivariate analysis"> multivariate analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=homicide" title=" homicide"> homicide</a>, <a href="https://publications.waset.org/abstracts/search?q=crime%20scene%20analysis" title=" crime scene analysis"> crime scene analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=crime%20scene%20behviours" title=" crime scene behviours"> crime scene behviours</a>, <a href="https://publications.waset.org/abstracts/search?q=investigative%20advice" title=" investigative advice"> investigative advice</a> </p> <a href="https://publications.waset.org/abstracts/120571/investigating-homicide-offender-typologies-based-on-their-clinical-histories-and-crime-scene-behaviour-patterns" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/120571.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">129</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3835</span> Male Versatile Sexual Offenders in Taiwan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Huang%20Yueh%20Chen">Huang Yueh Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Sheng%20Ang%20Shen"> Sheng Ang Shen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Purpose: Sexual assault has always been a highly anticipated crime in Taiwan. People assume that the career of sexual offenders tends to be highly specialized. This study hopes to analyze the crime career and risk factors of offenders by means of another classification. Methods: A total of 145 sexual offenders were sentenced on the parole or expiration date from 2009 to 2011, through analysis of official existing documents such as ‘Re-infringement risk assessment report’ and ‘case assessment report’. Results: The section ‘Various Types of Crimes ‘ of criminal career is analyzed. The highest number of ‘ versatile sexual offender’ followed by ‘adult sexual offender’ is about 2.5, representing more than 1.5 kinds of non-sex crimes besides sexual crimes. Different specialized sexual offenders have had extensive experience in the ‘Sexual Assault Experiences in Children and School’, ‘Static 99 Levels’, ‘Pre-Commuted Substance Use’, ‘Excited Deviant Sexual Behavior’, ‘Various Types of Crimes,’ and ‘Sexual Crime in Forerunner’ , ‘Type of Index Crime’ and other projects to achieve significant differences. Conclusions: Resources continue to be devoted to specialized offenders, the character of first-time sexual offender depends on further research and makes the public aware of the different assumptions of diversified offenders from traditional professional offenses that reduce unnecessary panic in society. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=versatile%20sexual%20offender" title="versatile sexual offender">versatile sexual offender</a>, <a href="https://publications.waset.org/abstracts/search?q=specialized%20sexual%20offender" title=" specialized sexual offender"> specialized sexual offender</a>, <a href="https://publications.waset.org/abstracts/search?q=criminal%20career" title=" criminal career"> criminal career</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20factor" title=" risk factor"> risk factor</a> </p> <a href="https://publications.waset.org/abstracts/103629/male-versatile-sexual-offenders-in-taiwan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/103629.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">166</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3834</span> Defending Motherhood: Strategic Comparisons and the Management of Moral Self-Worth among Ex-Offender Mothers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Geniece%20%20Mond%C3%A9">Geniece Mondé</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article examines how formerly incarcerated mothers deploy strategic comparisons to support their claims of moral self-worth. In depth interviews with 69 ex-offender mothers show that although women occupy a morally ambiguous space, they frame their roles as “good” mothers as independent of past illegal activity. In substantiating the “good” mother narrative women draw comparisons with two groups of women. Some respondents identify individuals perceived as morally disadvantaged and draw comparisons that illustrate their comparative strength in relation to mothers who fail to adequately meet the needs of their children. Women also compared themselves to morally advantaged mothers and expressed a desire to embody the ideals and values of women they viewed as superior mothers. Findings reveal that respondents’ use of strategic comparisons substantiates their framing of personal moral identity, as well as their goals for the future. The paper concludes by examining the theoretical implications of strategic comparisons for the study of morality and identity construction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ex-Offender" title="Ex-Offender">Ex-Offender</a>, <a href="https://publications.waset.org/abstracts/search?q=Rehabilitation" title=" Rehabilitation"> Rehabilitation</a>, <a href="https://publications.waset.org/abstracts/search?q=Incarceration" title=" Incarceration"> Incarceration</a>, <a href="https://publications.waset.org/abstracts/search?q=Motherhood" title=" Motherhood"> Motherhood</a> </p> <a href="https://publications.waset.org/abstracts/113956/defending-motherhood-strategic-comparisons-and-the-management-of-moral-self-worth-among-ex-offender-mothers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/113956.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">139</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3833</span> The Effects of Vocational Training on Offender Rehabilitation in Nigerian Correctional Institutions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hadi%20Mohammed">Hadi Mohammed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The introduction of vocational education and training (VET) in correctional institutions as part of prisoner rehabilitation program is to help offenders develop marketable job skills and reduce re-offending thereby increasing the likely hood of successful reintegration back to their community. Offenders who participate in vocational education and training are significantly less likely to return to prison after released and are more likely to find employment after released than offenders who do not received such training. Those who participated in vocational training were 28% more likely to be employed after released from prison than those who did not received such training. This paper examined the effects of vocational training on offender rehabilitation as well as the effects of vocational training on the relationship between reformation and reintegration in Nigerian correctional institution. To address this two research question were formulated to guide the research. A survey research was employed. The participants were 200 offenders in Nigerian correctional institutions. Questionnaire items were administered. Mean, standard deviation and Partial Correlation were used for the data analysis. The findings revealed that vocational training has helped in offender rehabilitation in Nigerian correctional institutions. Similarly there was a moderate significant positive partial correlation between reformation and reintegration, controlling for vocational training, r=0.461, n=221, p<0.005 with moderate level of reformation and being associated with moderate level of reintegration. Based on the findings of the study, it was recommended that Nigerian Correctional Institutions should strengthen their vocational training program for offenders to be properly rehabilitated. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=correctional%20institutions" title="correctional institutions">correctional institutions</a>, <a href="https://publications.waset.org/abstracts/search?q=vocational%20education%20and%20training" title=" vocational education and training"> vocational education and training</a>, <a href="https://publications.waset.org/abstracts/search?q=offender%20rehabilitation" title=" offender rehabilitation"> offender rehabilitation</a> </p> <a href="https://publications.waset.org/abstracts/124203/the-effects-of-vocational-training-on-offender-rehabilitation-in-nigerian-correctional-institutions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/124203.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">168</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3832</span> Ex-Offenders’ Labelling, Stigmatisation and Unsuccessful Re-Integration as Factors Leading into Recidivism: A South African Context</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tshimangadzo%20Oscar%20Magadze">Tshimangadzo Oscar Magadze</a> </p> <p class="card-text"><strong>Abstract:</strong></p> For successful re-integration, the individual offender must adapt and transform, which requires that the offender should adopt and internalise socially approved norms, attitudes, values, and beliefs. However, the offender’s labelling and community stigmatisation decide the destination of the offender. Community involvement in ex-offenders’ re-integration is an important issue in efforts to reduce recidivism and to control overcrowding in our correctional facilities. Crime is a social problem that requires society to come together to fight against it. This study was conducted in the Limpopo Province in Vhembe District Municipality within four local municipalities, namely Musina, Makhado, Mutale, and Thulamela. A total number of 30 participants were interviewed, and all were members of the Community Corrections Forums. This was necessitated by the fact that Musina is a very small area, which compelled the Department of Correctional Services to combine the two (Musina and Makhado) into one social re-integration entity. This is a qualitative research study where participants were selected through the use of purposive sampling. Participants were selected based on the value they would add to this study in order to achieve the objectives. The data collection method of this study was the focus group, which comprised of three groups of 10 participants each. Thulamela and Mutale local municipalities formed a group with (10) participants each, whereas Musina (2) and Makhado (8) formed another. Results indicate that the current situation is not conducive for re-integration to be successful. Participants raised many factors that need serious redress, namely offenders’ discrimination, lack of forgiveness by members of the community, which is fuelled by lack of community awareness due to the failure of the Department of Correctional Services in educating communities on ex-offenders’ re-integration. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ex-offender" title="ex-offender">ex-offender</a>, <a href="https://publications.waset.org/abstracts/search?q=labeling" title=" labeling"> labeling</a>, <a href="https://publications.waset.org/abstracts/search?q=re-integration" title=" re-integration"> re-integration</a>, <a href="https://publications.waset.org/abstracts/search?q=stigmatization" title=" stigmatization"> stigmatization</a> </p> <a href="https://publications.waset.org/abstracts/129297/ex-offenders-labelling-stigmatisation-and-unsuccessful-re-integration-as-factors-leading-into-recidivism-a-south-african-context" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129297.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">147</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3831</span> Defining the Term of Strategy within Military Point of View</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ismail%20Menderes%20Sema">Ismail Menderes Sema</a>, <a href="https://publications.waset.org/abstracts/search?q=Murat%20S%C3%B6zen"> Murat Sözen</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20K.%20Bar%C4%B1%C5%9F"> M. K. Barış </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The strategy is about winning or preventing your enemy from winning. The origin of the term comes from the military. After utilizing the strategy for limited military purposes in early ages, soldiers and statesmen used the term together to achieve the goals of states. In ancient times, those people who made strategy and implemented it was the same. With the industrial revolution, the strategy changed like everything and the term “grand strategy” came forward. Today, from business to economy, management to philosophy there is a broad using of the term strategy. Economic strategy, business strategy, trade strategy, irrigation strategy, and even recruitment strategy are used by professionals. The purpose of this study is to analyze the evolution of the strategy and clarify actually what is about. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=strategy" title="strategy">strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=military" title=" military"> military</a>, <a href="https://publications.waset.org/abstracts/search?q=art" title=" art"> art</a>, <a href="https://publications.waset.org/abstracts/search?q=grand%20strategy" title=" grand strategy"> grand strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=strategist" title=" strategist"> strategist</a> </p> <a href="https://publications.waset.org/abstracts/31137/defining-the-term-of-strategy-within-military-point-of-view" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31137.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">454</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3830</span> Compensation for Victims of Crime and Abuse of Power in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kolawole%20Oyekan%20Jamiu">Kolawole Oyekan Jamiu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Nigerian criminal law, a victim of an offence plays little or no role in the prosecution of an offender. The state concentrates only on imposing punishment on the offender while the victims of crime and abuse of power by security agencies are abandoned without any compensation either from the State or the offender. It has been stated that the victim of crime is the forgotten man in our criminal justice system. He sets the criminal law in motion but then goes into oblivion. Our present criminal law does not recognise the right of the victim to take part in the prosecution of the case or his right to compensation. The victim is merely a witness in a state versus case. This paper examines the meaning of the phrase ‘the victims of crime and abuse of power’. It needs to be noted that there is no definition of these two categories of victims in any statute in Nigeria. The paper also considers the United Nations General Assembly Declaration of Basic Principle of Justice for Victims and abuse of power. This declaration was adopted by the United Nations General Assembly on the 25th of November 1985. The declaration contains copious provisions on compensation for the victims of crime and abuse of power. Unfortunately, the declaration is not, in itself a legally binding instrument and has been given little or no attention since the coming into effect in1985. This paper examines the role of the judiciary in ensuring that victims of crime and abuse of power in Nigeria are compensated. While some Judges found it difficult to award damages to victims of abuse of power others have given some landmark rulings and awarded substantial damages. The criminal justice ( victim’s remedies) Bill shall also be examined. The Bill comprises of 74 sections and it spelt out the procedures for compensating the victims of crime and abuse of power in Nigeria. Finally, the paper also examines the practicability of awarding damages to victims of crime whether the offender is convicted or not and in addition, the possibility of granting all equitable remedies available in civil cases to victims of crime and abuse of power so that the victims will be restored to the earlier position before the crime. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=compensation" title="compensation">compensation</a>, <a href="https://publications.waset.org/abstracts/search?q=damages" title=" damages"> damages</a>, <a href="https://publications.waset.org/abstracts/search?q=restitution" title=" restitution"> restitution</a>, <a href="https://publications.waset.org/abstracts/search?q=victims" title=" victims"> victims</a> </p> <a href="https://publications.waset.org/abstracts/37192/compensation-for-victims-of-crime-and-abuse-of-power-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37192.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">727</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3829</span> A Cultural-Sensitive Approach to Counseling a Samoan Sex Offender</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Byron%20Malaela%20Sotiata%20Seiuli">Byron Malaela Sotiata Seiuli</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sexual violation is any form of sexual violence, including rape, child molestation, incest, and similar forms of non-consensual sexual contact. Much of these acts of violation are perpetuated, but not entirely, by men against women and children. <em>Moetolo</em> is a Samoan term that is used to describe a person who sexually violates another while they or their family are asleep. This paper presents and discusses sexual abuse from a Samoan viewpoint. Insights are drawn from the authors’ counseling engagement with a Samoan sex offender as part of his probation review process. Relevant literature is also engaged to inform and provide interpretation to the therapeutic work carried out. This article seeks to contribute new understanding to patterned responses of some Samoan people to sexual abuse behaviors, and steps to remedy arising concerns with perpetrators seeking reintegration back into their communities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fa%27asamoa" title="Fa'asamoa">Fa'asamoa</a>, <a href="https://publications.waset.org/abstracts/search?q=Samoan%20identity" title=" Samoan identity"> Samoan identity</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20abuse%20counseling" title=" sexual abuse counseling"> sexual abuse counseling</a>, <a href="https://publications.waset.org/abstracts/search?q=Uputaua%20therapeutic%20approach" title=" Uputaua therapeutic approach"> Uputaua therapeutic approach</a> </p> <a href="https://publications.waset.org/abstracts/60889/a-cultural-sensitive-approach-to-counseling-a-samoan-sex-offender" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/60889.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">301</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3828</span> Nature of Traffic Robbery Victimisation Experience 2015-2023</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Idenyi%20Goshen%20Peter">Idenyi Goshen Peter</a>, <a href="https://publications.waset.org/abstracts/search?q=Oludayo%20Tade"> Oludayo Tade</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Traffic robbery is a prevalent issue in Lagos State, impacting commuters and transport workers, necessitating an examination of victimization experiences and offender-victim dynamics. The research aim is to investigate the nature of traffic robbery victimization experiences, strategies employed by offenders, and the extent of the crime as reported in newspapers. Utilizing content analysis, the study examines 167 traffic robbery cases from 2015 to 2023 reported in five newspapers using the routine activity theory to understand the dynamics between offenders and victims. The research discusses the victimization experience and convergence of the offenders and victims, it documents the extent of the crime as captured by various newspapers (Vanguard, Punch. Tribune, Sun and Guardian ), and it also interrogates the strategies, methods deployed by traffic robbers. The study addresses the nature, strategies, and extent of traffic robbery victimization experiences, shedding light on the dynamics of the crime over an eight-year period. The paper implored secondary research from newspaper publications, and also content analysis for the research. Routine activity theory was used to explain the phenomenon that exists between the offender and the victim. Consequently, the common method used by offenders is dispossessing victims of their valuables, leading to fear-driven victim experiences, with spikes in incidents observed in June and December, particularly in Vanguard and Punch publications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=traffic%20robbery" title="traffic robbery">traffic robbery</a>, <a href="https://publications.waset.org/abstracts/search?q=victimisation%20experience" title=" victimisation experience"> victimisation experience</a>, <a href="https://publications.waset.org/abstracts/search?q=offender" title=" offender"> offender</a>, <a href="https://publications.waset.org/abstracts/search?q=routine%20activity" title=" routine activity"> routine activity</a> </p> <a href="https://publications.waset.org/abstracts/192641/nature-of-traffic-robbery-victimisation-experience-2015-2023" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/192641.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">21</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3827</span> Effectiveness of Language Learning Strategy Instruction Based on CALLA on Iranian EFL Language Strategy Use</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Reza%20Khani">Reza Khani</a>, <a href="https://publications.waset.org/abstracts/search?q=Ziba%20Hosseini"> Ziba Hosseini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ever since the importance of language learning strategy instruction (LLS) has been distinguished, there has been growing interest on how to teach LLS in language learning classrooms. So thus this study attempted to implement language strategy instruction based on CALLA approach for Iranian EFL learners in a real classroom setting. The study was testing the hypothesis that strategy instruction result in improved linguistic strategy of students. The participant of the study were 240 EFL learners who received language learning instruction for four months. The data collected using Oxford strategy inventory for language learning. The results indicated the instruction had statistically significant effect on language strategy use of intervention group who received instruction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CALLA" title="CALLA">CALLA</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20learning%20strategy" title=" language learning strategy"> language learning strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20learning%20strategy%20instruction" title=" language learning strategy instruction"> language learning strategy instruction</a>, <a href="https://publications.waset.org/abstracts/search?q=Iranian%20EFL%20language%20strategy" title=" Iranian EFL language strategy"> Iranian EFL language strategy</a> </p> <a href="https://publications.waset.org/abstracts/23853/effectiveness-of-language-learning-strategy-instruction-based-on-calla-on-iranian-efl-language-strategy-use" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23853.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">570</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3826</span> Advertising Message Strategy on Ghana’s TV</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aisha%20Iddrisu">Aisha Iddrisu</a>, <a href="https://publications.waset.org/abstracts/search?q=Ferruh%20Uztu%C4%9F"> Ferruh Uztuğ</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study is a quantitative content analysis of advertising message strategies used in Ghana’s TV commercials (2020-2021) using the modified strategy of Wang and Praet (2016) with the objective of exploring the various advertising message strategies used in Ghana’s TV advertisement, its variation according to product category including the most widely used message strategy. The findings indicate that, out of the 220 commercials used in the study, the Affective message strategy (n=122, 55%) was the dominant message strategy used in Ghana’s TV commercials. The most advertised product category in Ghana’s TV commercials (2020-2021) was the food category, and a significant relationship was observed between message strategy and product category as well as message strategy and brand type. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=advertising" title="advertising">advertising</a>, <a href="https://publications.waset.org/abstracts/search?q=message%20strategy" title=" message strategy"> message strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=Ghana" title=" Ghana"> Ghana</a>, <a href="https://publications.waset.org/abstracts/search?q=television" title=" television"> television</a> </p> <a href="https://publications.waset.org/abstracts/170306/advertising-message-strategy-on-ghanas-tv" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/170306.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">184</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3825</span> Exploring Visual Methodologies for Measuring Public Perception of Sex Offenders</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sasha%20Goodwin">Sasha Goodwin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Sex offenders are often viewed as a homogenous group, but they encompass a diverse range of individuals with varying characteristics and offenses. The principal aim of this study was to ascertain how members of the Australian public perceive and define a sex offender while also investigating the emotional underpinnings associated with these attitudes and definitions. To assess public attitude, this study used the innovative utilization of visual methodologies to assess the public's perception of sex offenders. The study employed the iSquare approach, a visual methodology framework that offers unique viewpoints and insights into public attitudes toward sex offenders. Through the utilization of this approach, this study established an academic foundation for a deeper understanding of the public's perception of sex offenders. The data analysis revealed that most participants associated sex offenders with strong negative emotions, primarily disgust and anger. The findings of this research point towards the potential for fostering a social environment characterized by evidence-based discussions instead of reactionary punitive responses. Promoting a comprehensive understanding of the diverse nature of sexual offenders aims to broaden perceptions, fostering constructive attitudes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=visual%20methodologies" title="visual methodologies">visual methodologies</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20perception" title=" public perception"> public perception</a>, <a href="https://publications.waset.org/abstracts/search?q=sex%20offenders" title=" sex offenders"> sex offenders</a>, <a href="https://publications.waset.org/abstracts/search?q=offender%20characteristics" title=" offender characteristics"> offender characteristics</a>, <a href="https://publications.waset.org/abstracts/search?q=emotional%20attitudes" title=" emotional attitudes"> emotional attitudes</a>, <a href="https://publications.waset.org/abstracts/search?q=isquare%20approach" title=" isquare approach"> isquare approach</a>, <a href="https://publications.waset.org/abstracts/search?q=attitudes" title=" attitudes"> attitudes</a> </p> <a href="https://publications.waset.org/abstracts/181888/exploring-visual-methodologies-for-measuring-public-perception-of-sex-offenders" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/181888.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">63</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3824</span> Simulating the Interaction of Strategy Development and Project Delivery</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nipun%20Agarwal">Nipun Agarwal</a>, <a href="https://publications.waset.org/abstracts/search?q=David%20Paul"> David Paul</a>, <a href="https://publications.waset.org/abstracts/search?q=Fareed%20Un%20Din"> Fareed Un Din</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Every organization develops a strategy that needs to be implemented and is undertaken through project delivery. In essence, project requirements should exactly replicate an organization’s strategy. In reality this does not happen, and behavioral factors deviate the project delivery from the strategic objectives. This occurs as project stakeholders can have competing objectives. Resultantly, requirements that are implemented through projects are less aligned to the strategy. This paper develops a game theoretic model to simulate why such deviations occur. That explains the difference between strategy development and implementation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=strategy" title="strategy">strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation" title=" simulation"> simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=project%20management" title=" project management"> project management</a>, <a href="https://publications.waset.org/abstracts/search?q=game%20theory" title=" game theory"> game theory</a> </p> <a href="https://publications.waset.org/abstracts/148015/simulating-the-interaction-of-strategy-development-and-project-delivery" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148015.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">138</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3823</span> Everyday Interactions among Imprisoned Sex Offenders: A Qualitative Study within the 'Due Palazzi' Prison in Padua</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Matteo%20Mazzucato">Matteo Mazzucato</a>, <a href="https://publications.waset.org/abstracts/search?q=Elena%20Faccio"> Elena Faccio</a>, <a href="https://publications.waset.org/abstracts/search?q=Antonio%20Iudici"> Antonio Iudici</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Prison is a social reality constructed by everyday interactions between an inmate, other social actors (cellmates, prison officers, educationalists and psychologists or other detainees) and the external world which participates in this complex construction through the social discourses on prison reality and its problems. Being a detainee means performing a self dealing with processes of stereotypization, attribution of a social role and prejudices assigned by various interlocutors and depending on what kind of crime one has been convicted of. Among all inmates, sex offenders are the ones who risk more to be socially condemned beyond a legal sentence since they have committed one of the most hated and disapproved crime. Regarding this, prison has to be considered as a critical context in which all community expectations and beliefs are converged: for common sense, rapists and child molesters are dangerous people who have to be stigmatized, punished and isolated. Furthermore, other detainees share a code of conduct by which the ‘sex offender’ is collocated at the lowest level of the social hierarchy of the prison. The penitentiary administration too defines this kind of detainee as a ‘vulnerable person to protect’ while prison staff considers him as a particular inmate who has to be treated and definitely changed. Considering all the complexities connected with being imprisoned as a sex offender, our research aimed at exploring how people convicted of sex crimes are called upon to manage all these hetero-narrations about their selves. Set this goal, textual data retrieved from this qualitative research show that sex offenders tend to not face the stigma assigned to them. They are rather used to minimize the story telling about their selves and costruct alternative biographies to be shared with other inmates. Managing narrations about their selves in this way permits to distance them from all the threats perceived living together with other detainees but it blocks sex offenders’ ri-signification of their offences during prison treatment. Given these results, prison administration should develop activities in order to create fields of interaction between detainees where experiencing new versions of their selves spendable even in external social situations. Regarding this it’s important to re-consider prison as part of the community and the sex offenders as a member of it. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=interactions" title="interactions">interactions</a>, <a href="https://publications.waset.org/abstracts/search?q=qualitative%20research" title=" qualitative research"> qualitative research</a>, <a href="https://publications.waset.org/abstracts/search?q=prison%20reality" title=" prison reality"> prison reality</a>, <a href="https://publications.waset.org/abstracts/search?q=sex%20offender" title=" sex offender"> sex offender</a> </p> <a href="https://publications.waset.org/abstracts/58457/everyday-interactions-among-imprisoned-sex-offenders-a-qualitative-study-within-the-due-palazzi-prison-in-padua" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58457.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">220</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3822</span> Alignment of Information System Strategy and Green Information System Strategy: Comprehension and A Review of the Literature</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wartika%20Memed%20Purawinata">Wartika Memed Purawinata</a>, <a href="https://publications.waset.org/abstracts/search?q=Kridanto%20Surendro"> Kridanto Surendro</a>, <a href="https://publications.waset.org/abstracts/search?q=Husni%20Sastramiharja"> Husni Sastramiharja</a>, <a href="https://publications.waset.org/abstracts/search?q=Iping%20Supriana%20S."> Iping Supriana S.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The information system is one of the contributors to environmental degradation and pollution are known to be released, such as the increasing of use of IT equipment and energy consumption , life cycles of IT equipment are getting shorter, IT equipment waste disposal and so on, therefore the information system should have a role in related environmental issues. Organization need to develop the ability of green to minimize negative impacts on the environment. Although the green information system is an important topic, many organizations fail to manage the environment in a way that is adequate because they ignore aspect of strategy. Alignment strategy is very important to ensure that all people do the activities of the organization headed in the same direction. Alignment strategy helps organization, determine which is more important for organization, and then make road mad to achieve the organization goal. Therefore, this paper discusses the review of the alignment, information systems strategy, and IS green strategy. With this discussion is expected there is an understanding about the alignment of information systems strategy and strategy of green IS, and its relationship with the achievement of business goals that have commitment to reduce the negative impact of information systems on the environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=alignment" title="alignment">alignment</a>, <a href="https://publications.waset.org/abstracts/search?q=strategy" title=" strategy"> strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20system" title=" information system"> information system</a>, <a href="https://publications.waset.org/abstracts/search?q=green" title=" green "> green </a> </p> <a href="https://publications.waset.org/abstracts/37273/alignment-of-information-system-strategy-and-green-information-system-strategy-comprehension-and-a-review-of-the-literature" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37273.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">456</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3821</span> India’s Strategy toward Afghanistan since 9\11</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Saifurahman%20Fayiz">Saifurahman Fayiz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> overall, India had friendly relation with different governments in Afghanistan except for the Taliban regime amongst the years 1996 to 2001. The terrorist attack in the United States provided India a chance to follow its strategy in Afghanistan. India support Afghanistan since 9\11. The objectives of this study to study India’s strategy towards Afghanistan and its implication to neighbor countries. The research method conducted based on qualitative research method with descriptive. The research findings propose that; India has chosen a soft power policy to implement its strategy in Afghanistan. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=strategy" title="strategy">strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=policy" title=" policy"> policy</a>, <a href="https://publications.waset.org/abstracts/search?q=soft%20power" title=" soft power"> soft power</a>, <a href="https://publications.waset.org/abstracts/search?q=Afghanistan" title=" Afghanistan"> Afghanistan</a> </p> <a href="https://publications.waset.org/abstracts/143156/indias-strategy-toward-afghanistan-since-911" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143156.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">256</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3820</span> Homogeneity among Diversity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yu%20Guang">Yu Guang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> “Case studies are the preferred strategy when ‘how’ or ‘why’ questions are being posed.” Therefore, the study is based on two cases: strategy performed in JingNan War and by NIKE. The two samples are chosen as they are of comparability. Data are gathered and PEST and SWOT are used as analysis models to examine their strategic employment in order that the answer to brilliant strategies in variety is found. The niche strategy has been used in the past and present, in the battle fields and business. The homogeneity among diversity is the skill of performing strategies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=challenger" title="challenger">challenger</a>, <a href="https://publications.waset.org/abstracts/search?q=homogeneity" title=" homogeneity"> homogeneity</a>, <a href="https://publications.waset.org/abstracts/search?q=managing%20diversity" title=" managing diversity"> managing diversity</a>, <a href="https://publications.waset.org/abstracts/search?q=niche%20strategy" title=" niche strategy"> niche strategy</a> </p> <a href="https://publications.waset.org/abstracts/23070/homogeneity-among-diversity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23070.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">524</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3819</span> Pure and Mixed Nash Equilibria Domain of a Discrete Game Model with Dichotomous Strategy Space</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20S.%20Mousa">A. S. Mousa</a>, <a href="https://publications.waset.org/abstracts/search?q=F.%20Shoman"> F. Shoman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We present a discrete game theoretical model with homogeneous individuals who make simultaneous decisions. In this model the strategy space of all individuals is a discrete and dichotomous set which consists of two strategies. We fully characterize the coherent, split and mixed strategies that form Nash equilibria and we determine the corresponding Nash domains for all individuals. We find all strategic thresholds in which individuals can change their mind if small perturbations in the parameters of the model occurs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=coherent%20strategy" title="coherent strategy">coherent strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=split%20strategy" title=" split strategy"> split strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=pure%20strategy" title=" pure strategy"> pure strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=mixed%20strategy" title=" mixed strategy"> mixed strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=Nash%20equilibrium" title=" Nash equilibrium"> Nash equilibrium</a>, <a href="https://publications.waset.org/abstracts/search?q=game%20theory" title=" game theory"> game theory</a> </p> <a href="https://publications.waset.org/abstracts/128019/pure-and-mixed-nash-equilibria-domain-of-a-discrete-game-model-with-dichotomous-strategy-space" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/128019.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">148</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3818</span> Representing a Methodology for Refinement of Strategic Objectives in Strategy Map Establishment: Combining Quality Function Deployment and Fuzzy Screening</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bijan%20Nahavandi">Bijan Nahavandi</a>, <a href="https://publications.waset.org/abstracts/search?q=Navid%20Jafarinejad"> Navid Jafarinejad</a>, <a href="https://publications.waset.org/abstracts/search?q=Somayeh%20Mehrafzad"> Somayeh Mehrafzad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Strategy maps represent the way of value creation in in each organization. Nowadays, implementation of strategy is the main concern for all organizations. Strategy map establishment is the start-up point of strategy implementation and this shows the critical importance of this concept. After some years past since emergence of strategy map, there are some shortcomings in its methodology that frequently quoted by many of researchers. One of these shortcomings is the shortage of a mechanism for refinement of objectives candidate for entrance to map. Organizations in practice have obsession and avidity to determine more number of objectives in strategy map. This study wants to represent a step by step approach to help obviate this problem using quality function deployment (QFD) as a helpful tool and fuzzy screening method. Finally, represented approach applies in a practical case and conclusions have been explained. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=balanced%20scorecard" title="balanced scorecard">balanced scorecard</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20screening" title=" fuzzy screening"> fuzzy screening</a>, <a href="https://publications.waset.org/abstracts/search?q=house%20of%20strategic%20objectives%20%28HoSO%29" title=" house of strategic objectives (HoSO)"> house of strategic objectives (HoSO)</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20function%20deployment" title=" quality function deployment"> quality function deployment</a>, <a href="https://publications.waset.org/abstracts/search?q=strategy%20map" title=" strategy map"> strategy map</a> </p> <a href="https://publications.waset.org/abstracts/34777/representing-a-methodology-for-refinement-of-strategic-objectives-in-strategy-map-establishment-combining-quality-function-deployment-and-fuzzy-screening" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34777.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">353</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3817</span> Hedonistic Utilitarianism: The Strategic Use of Digital Media along the Online-Offline Continuum of Sexualised Violence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Katharina%20Kargel">Katharina Kargel</a>, <a href="https://publications.waset.org/abstracts/search?q=Frederic%20Vobbe"> Frederic Vobbe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The present study examines how offenders targeting children and adolescents strategically use digital media when committing acts of sexualised violence along the online-offline continuum. Even offenders who are previously known to their victims use digital media extensively. The choice to instrumentalise digital media in order to initiate, threaten, exploit and humiliate victims demonstrates the rationale of offenders when committing acts of digitally supported violence. Through digital media, offenders can assume the power of interpretation over their victims’ situations. The ways in which digital media is used to commit violence along the online-offline continuum are a direct manifestation of the hedonistic utilitarianism demonstrated by offenders: a disposition characterised by the weighing of pleasures (“mental states”) and intrinsic value expected from using digital media against the risk of an outcome subjectively experienced as uncomfortable. Thus, sexualised violence using digital media goes beyond the traditional understanding of sexual online grooming. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=sexualized%20violence" title="sexualized violence">sexualized violence</a>, <a href="https://publications.waset.org/abstracts/search?q=offender%20strategy" title=" offender strategy"> offender strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=grooming" title=" grooming"> grooming</a>, <a href="https://publications.waset.org/abstracts/search?q=children%20and%20adolescents" title=" children and adolescents"> children and adolescents</a>, <a href="https://publications.waset.org/abstracts/search?q=qualitative%20research" title=" qualitative research"> qualitative research</a>, <a href="https://publications.waset.org/abstracts/search?q=methodology" title=" methodology"> methodology</a> </p> <a href="https://publications.waset.org/abstracts/139518/hedonistic-utilitarianism-the-strategic-use-of-digital-media-along-the-online-offline-continuum-of-sexualised-violence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139518.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">221</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3816</span> Reading Strategy Awareness of English Major Students</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hsin-Yi%20Lien">Hsin-Yi Lien</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study explored the role of metacognition in foreign language anxiety on a sample of 411 Taiwanese students of English as a Foreign Language. The reading strategy inventory was employed to evaluate the tertiary learners’ level of metacognitive awareness and a semi-structured background questionnaire was also used to examine the learners’ perceptions of their English proficiency and satisfaction of their current English learning. In addition, gender and academic level differences in employment of reading strategies were investigated. The results showed the frequency of reading strategy use increase slightly along with academic years and males and females actually employ different reading strategies. The EFL tertiary learners in the present study utilized cognitive strategies more frequently than metacognitive strategies or support strategies. Male students use metacognitive strategy more often while female students use cognitive and support strategy more frequently. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cognitive%20strategy" title="cognitive strategy">cognitive strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=gender%20differences" title=" gender differences"> gender differences</a>, <a href="https://publications.waset.org/abstracts/search?q=metacognitive%20strategy" title=" metacognitive strategy"> metacognitive strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=support%20strategy" title=" support strategy"> support strategy</a> </p> <a href="https://publications.waset.org/abstracts/11924/reading-strategy-awareness-of-english-major-students" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11924.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">415</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3815</span> Modelling Strategy Planning in Multi Business Companies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gelareh%20Changizi">Gelareh Changizi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahsa%20Khajavi"> Mahsa Khajavi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ladan%20Shahhosseini"> Ladan Shahhosseini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Corporate-level strategy, or simply ‘parent strategy’, is a topic that has received much attention since the very early days of the strategic planning field. Since the multi level enterprises have different sub enterprises which deal with different business environments, we cannot define the same strategic perspective for all of them. Therefore, the determination of a perspective to manage and deal with affiliates of such enterprises is the main challenge. The parent strategy in mother enterprises' level has been analyzed in this research. A case study has been carried to comprehensively describe the proposed model. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=parent%20strategy" title="parent strategy">parent strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-business%20companies" title=" multi-business companies"> multi-business companies</a>, <a href="https://publications.waset.org/abstracts/search?q=performance%20evaluation" title=" performance evaluation"> performance evaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=lifecycle" title=" lifecycle"> lifecycle</a> </p> <a href="https://publications.waset.org/abstracts/53443/modelling-strategy-planning-in-multi-business-companies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53443.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">367</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3814</span> Defense Strategy: Perang Semesta Strategy as a Reliable National Security System of Indonesia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Erdianta%20S">Erdianta S</a>, <a href="https://publications.waset.org/abstracts/search?q=Chastiti%20M.%20Wulolo"> Chastiti M. Wulolo</a>, <a href="https://publications.waset.org/abstracts/search?q=IDK%20Kerta%20Widana"> IDK Kerta Widana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Perang Semesta strategy is a national security system used by Republic of Indonesia. It comes from local wisdom, cultural, and hereditary of Indonesia itself. This system involves all people and all nation resources, and it is early prepared by government and conducted totality, integratedly, directly, and continously to enforce a sovereignty of country, teritorial integrity and the safety of the whole nation from threats. This study uses a qualitative content analysis method by studying, recording, and analyzing government policy. The Perang Semesta strategy divided into main, backup, and supporting components. Every component has its function and responsibility in security perspective. So when an attack comes, all people of Indonesia will voluntary to defend the country. Perang Semesta strategy is a national security system which becomes the most reliable strategy toward geography and demography of Indonesia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Indonesia" title="Indonesia">Indonesia</a>, <a href="https://publications.waset.org/abstracts/search?q=Perang%20Semesta%20strategy" title=" Perang Semesta strategy"> Perang Semesta strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20security" title=" national security"> national security</a>, <a href="https://publications.waset.org/abstracts/search?q=local%20wisdom" title=" local wisdom"> local wisdom</a> </p> <a href="https://publications.waset.org/abstracts/80513/defense-strategy-perang-semesta-strategy-as-a-reliable-national-security-system-of-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80513.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">454</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3813</span> Working at the Interface of Health and Criminal Justice: An Interpretative Phenomenological Analysis Exploration of the Experiences of Liaison and Diversion Nurses – Emerging Findings</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sithandazile%20Masuku">Sithandazile Masuku</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: Public health approaches to offender mental health are driven by international policies and frameworks in response to the disproportionately large representation of people with mental health problems within the offender pathway compared to the general population. Public health service innovations include mental health courts in the US, restorative models in Singapore and, liaison and diversion services in Australia, the UK, and some other European countries. Mental health nurses are at the forefront of offender health service innovations. In the U.K. context, police custody has been identified as an early point within the offender pathway where nurses can improve outcomes by offering assessments and share information with criminal justice partners. This scope of nursing practice has introduced challenges related to skills and support required for nurses working at the interface of health and the criminal justice system. Parallel literature exploring experiences of nurses working in forensic settings suggests the presence of compassion fatigue, burnout and vicarious trauma that may impede risk harm to the nurses in these settings. Published research explores mainly service-level outcomes including monitoring of figures indicative of a reduction in offending behavior. There is minimal research exploring the experiences of liaison and diversion nurses who are situated away from a supportive clinical environment and engaged in complex autonomous decision-making. Aim: This paper will share qualitative findings (in progress) from a PhD study that aims to explore the experiences of liaison and diversion nurses in one service in the U.K. Methodology: This is a qualitative interview study conducted using an Interpretative Phenomenological Analysis to gain an in-depth analysis of lived experiences. Methods: A purposive sampling technique was used to recruit n=8 mental health nurses registered with the UK professional body, Nursing and Midwifery Council, from one UK Liaison and Diversion service. All participants were interviewed online via video call using semi-structured interview topic guide. Data were recorded and transcribed verbatim. Data were analysed using the seven steps of the Interpretative Phenomenological Analysis data analysis method. Emerging Findings Analysis to date has identified pertinent themes: • Difficulties of meaning-making for nurses because of the complexity of their boundary spanning role. • Emotional burden experienced in a highly emotive and fast-changing environment. • Stress and difficulties with role identity impacting on individual nurses’ ability to be resilient. • Challenges to wellbeing related to a sense of isolation when making complex decisions. Conclusion Emerging findings have highlighted the lived experiences of nurses working in liaison and diversion as challenging. The nature of the custody environment has an impact on role identity and decision making. Nurses left feeling isolated and unsupported are less resilient and may go on to experience compassion fatigue. The findings from this study thus far point to a need to connect nurses working in these boundary spanning roles with a supportive infrastructure where the complexity of their role is acknowledged, and they can be connected with a health agenda. In doing this, the nurses would be protected from harm and the likelihood of sustained positive outcomes for service users is optimised. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=liaison%20and%20diversion" title="liaison and diversion">liaison and diversion</a>, <a href="https://publications.waset.org/abstracts/search?q=nurse%20experiences" title=" nurse experiences"> nurse experiences</a>, <a href="https://publications.waset.org/abstracts/search?q=offender%20health" title=" offender health"> offender health</a>, <a href="https://publications.waset.org/abstracts/search?q=staff%20wellbeing" title=" staff wellbeing"> staff wellbeing</a> </p> <a href="https://publications.waset.org/abstracts/154017/working-at-the-interface-of-health-and-criminal-justice-an-interpretative-phenomenological-analysis-exploration-of-the-experiences-of-liaison-and-diversion-nurses-emerging-findings" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154017.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">135</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3812</span> Modern Problems: Solutions from the Prophetic Leadership Strategy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sajjad%20Azeez">Sajjad Azeez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Leadership of prophet(PBUH) indicates the basic norms of leadership to the society to be lead in the best possible manner. The prophet (PBUH) manifests the world with Justice, equality, humanity, and respect. Because of his leadership strategy, the companions who had to be depicted in the history as uncivilised and ignorant people became someone who caught the eyes of the world. Therefore, it is need of the today to understand the strategy of prophetic leadership in order to construct a good and generous society. However, this paper discusses some of the modern problems which can be solved through implementing the prophetic leadership strategy. References for preparing this paper are taken mainly from the traditions of the prophet (PBUH) <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=prophet%20Muhammad%20PBUH" title="prophet Muhammad PBUH">prophet Muhammad PBUH</a>, <a href="https://publications.waset.org/abstracts/search?q=leadership%20strategy" title=" leadership strategy"> leadership strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=modern%20problems" title=" modern problems"> modern problems</a>, <a href="https://publications.waset.org/abstracts/search?q=solutions" title=" solutions"> solutions</a> </p> <a href="https://publications.waset.org/abstracts/159705/modern-problems-solutions-from-the-prophetic-leadership-strategy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159705.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">161</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3811</span> A3 Strategy Deployment: A Case Study Applied to a City Government Department for Healthcare in Brazil</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samuel%20Bonato">Samuel Bonato</a>, <a href="https://publications.waset.org/abstracts/search?q=Cineia%20Santos"> Cineia Santos</a>, <a href="https://publications.waset.org/abstracts/search?q=Roberta%20Leite"> Roberta Leite</a>, <a href="https://publications.waset.org/abstracts/search?q=Carla%20Ten%20Caten"> Carla Ten Caten</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper aims to apply the A3 strategy deployment in a local department for healthcare. As a literature review, it was evaluated articles related to the period 2009 - 2018, considering the key-words A3, healthcare, public services and strategy deployment. The methodology used was action research, involving all the actors inside the secretary, beginning with the top management and deploying it through meetings and evaluation conferences with the participation of all secretary coordination. As main results, it is possible to highlight the development of 8 A3, one as the "mother A3" and 7 as "son A3", each one related to each coordination. In each A3, past results, new goals, new projects to achieve these goals and control deadlines were defined and implemented to a management strategy. In addition to this result, this paper is planning to present the use of this A3 during 6 months in 2019. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=A3%20Strategy" title="A3 Strategy">A3 Strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=strategy%20deployment" title=" strategy deployment"> strategy deployment</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare" title=" healthcare"> healthcare</a>, <a href="https://publications.waset.org/abstracts/search?q=Public%20services" title=" Public services"> Public services</a> </p> <a href="https://publications.waset.org/abstracts/105041/a3-strategy-deployment-a-case-study-applied-to-a-city-government-department-for-healthcare-in-brazil" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/105041.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">149</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3810</span> Improving Students' Critical Thinking in Understanding Reading Material Through Bloom's Critical Thinking Questioning Strategy in English for Specific Purposes (ESP) Class</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hevriani%20Sevrika%20Mayuasti">Hevriani Sevrika Mayuasti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research deals in improving college students’ critical thinking at English for Specific Purposes Subject. The strategy that is applied is Bloom’s Critical Thinking Questioning Strategy. The positive side of this strategy is that the given questions are developed based on Bloom’s taxonomy level. It is an action research because the researcher uses own class in doing this research. The processes of this research have been done from April to Mei 2014. There are two cycles and each cycle consists of two meetings. After doing the research, it is gotten that Bloom’s Critical Thinking Questioning Strategy improves college students’ critical thinking. It helps the students to build and elaborate their ideas. Hence, it increases students’ reading comprehension. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20thinking" title="critical thinking">critical thinking</a>, <a href="https://publications.waset.org/abstracts/search?q=blooms%E2%80%99%20critical%20thinking" title=" blooms’ critical thinking"> blooms’ critical thinking</a>, <a href="https://publications.waset.org/abstracts/search?q=questioning" title=" questioning"> questioning</a>, <a href="https://publications.waset.org/abstracts/search?q=strategy" title=" strategy"> strategy</a> </p> <a href="https://publications.waset.org/abstracts/21716/improving-students-critical-thinking-in-understanding-reading-material-through-blooms-critical-thinking-questioning-strategy-in-english-for-specific-purposes-esp-class" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21716.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">656</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3809</span> Problem Solving Courts for Domestic Violence Offenders: Duluth Model Application in Spanish-Speaking Offenders</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=I.%20Salas-Menotti">I. Salas-Menotti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Problem-solving courts were created to assist offenders with specific needs that were not addressed properly in traditional courts. Problem-solving courts' main objective is to pursue solutions that will benefit the offender, the victim, and society as well. These courts were developed as an innovative response to deal with issues such as drug abuse, mental illness, and domestic violence. In Brooklyn, men who are charged with domestic violence related offenses for the first time are offered plea bargains that include the attendance to a domestic abuse intervention program as a condition to dismiss the most serious charges and avoid incarceration. The desired outcome is that the offender will engage in a program that will modify his behavior avoiding new incidents of domestic abuse, it requires accountability towards the victim and finally, it will hopefully bring down statistic related to domestic abuse incidents. This paper will discuss the effectiveness of the Duluth model as applied to Spanish-speaking men mandated to participate in the program by the specialized domestic violence courts in Brooklyn. A longitudinal study was conducted with 243 Spanish- speaking men who were mandated to participated in the men's program offered by EAC in Brooklyn in the years 2016 through 2018 to determine the recidivism rate of domestic violence crimes. Results show that the recidivism rate was less than 5% per year after completing the program which indicates that the intervention is effective in preventing new abuse allegations and subsequent arrests. It's recommended that comparative study with English-speaking participants is conducted to determine cultural and language variables affecting the program's efficacy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=domestic%20violence" title="domestic violence">domestic violence</a>, <a href="https://publications.waset.org/abstracts/search?q=domestic%20abuse%20intervention%20programs" title=" domestic abuse intervention programs"> domestic abuse intervention programs</a>, <a href="https://publications.waset.org/abstracts/search?q=Problem%20solving%20courts" title=" Problem solving courts"> Problem solving courts</a>, <a href="https://publications.waset.org/abstracts/search?q=Spanish-speaking%20offenders" title=" Spanish-speaking offenders"> Spanish-speaking offenders</a> </p> <a href="https://publications.waset.org/abstracts/117056/problem-solving-courts-for-domestic-violence-offenders-duluth-model-application-in-spanish-speaking-offenders" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/117056.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">132</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3808</span> Language Learning Strategies of Chinese Students at Suan Sunandha Rajabhat University in Thailand </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gunniga%20Anugkakul">Gunniga Anugkakul</a>, <a href="https://publications.waset.org/abstracts/search?q=Suwaree%20Yordchim"> Suwaree Yordchim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The objectives were to study language learning strategies (LLSs) employed by Chinese students, and the frequency of LLSs they used, and examine the relationship between the use of LLSs and gender. The Strategy Inventory for Language Learning (SILL) by Oxford was administered to thirty-six Chinese students at Suan Sunandha Rajabhat University in Thailand. The data obtained was analyzed using descriptive statistics and chi-square tests. Three useful findings were found on the use of LLSs reported by Chinese students. First, Chinese students used overall LLSs at a high level. Second, among the six strategy groups, Chinese students employed compensation strategy most frequently and memory strategy least frequently. Third, the research results also revealed that gender had significant effect on Chinese Student’s use of overall LLSs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=English%20language" title="English language">English language</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20learning%20strategy" title=" language learning strategy"> language learning strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=Chinese%20students" title=" Chinese students"> Chinese students</a>, <a href="https://publications.waset.org/abstracts/search?q=compensation%20strategy" title=" compensation strategy"> compensation strategy</a> </p> <a href="https://publications.waset.org/abstracts/12405/language-learning-strategies-of-chinese-students-at-suan-sunandha-rajabhat-university-in-thailand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12405.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">679</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=offender%20strategy&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=offender%20strategy&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=offender%20strategy&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=offender%20strategy&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=offender%20strategy&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=offender%20strategy&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=offender%20strategy&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=offender%20strategy&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=offender%20strategy&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=offender%20strategy&page=127">127</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=offender%20strategy&page=128">128</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=offender%20strategy&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>