Academic Consequences of Multiple Victimization and the Role of School Security Measures

2016 ◽  
Vol 58 (1-2) ◽  
pp. 36-46 ◽  
Author(s):  
Joseph H. Gardella ◽  
Emily E. Tanner-Smith ◽  
Benjamin W. Fisher
2021 ◽  
Vol 75 (1) ◽  
pp. 9-32
Author(s):  
Rahaf Aldoughli

This article analyzes the role of Sunni Islam in speeches given to religious scholars by Syrian president Bashar al-Asad in 2014 and 2017. I discuss how religion was used in these speeches as a security tool to consolidate authority, legitimize the Ba'thist regime, and marginalize political dissidents. I specifically highlight the emphasis Asad placed on convincing government-recognized 'ulama to support state security measures and to the novel links he constructed between Islam and national unity.


Author(s):  
Сергей Владиславович Владимиров

В статье раскрывается актуальность борьбы с пенитенциарными преступлениями силами и средствами сотрудников уголовно-исполнительной системы, обеспечивающих режим в исправительных учреждениях. Большое значение в повышении эффективности противодействия пенитенциарной преступности имеют результаты проведения досмотра и обыска как режимных мероприятий. Проведено сравнение режимных досмотра и обыска со следственными осмотром и обыском. Указано на значительное сходство в сущности, тактике, порядке оформления и уведомления контролирующих должностных лиц рассматриваемых следственных и режимных мероприятий. Установлено, что для раскрытия и дальнейшего расследования пенитенциарных преступлений важное значение имеет возможность обнаружения, фиксации и изъятия в ходе обыска и досмотра следов преступления. В этом случае акты режимных мероприятий выступают полноценными источниками доказательств при условии составления их в соответствии с нормативно-правовыми актами, в том числе ограниченного пользования. Обоснована необходимость осматривать, фиксировать и изымать следы преступной деятельности в ходе режимных мероприятий в соответствии с криминалистическими требованиями к следственным действиям, поскольку в этом случае доказательственное значение получаемых сведений в ходе режимных мероприятий существенно возрастает. Предложено разработать нормативный акт, регламентирующий порядок предоставления результатов режимных мероприятий в органы уголовной юстиции, что, несомненно, повысит эффективность доказывания пенитенциарных преступлений. The article reveals the relevance of the fight against penitentiary crimes by the forces and means of the employees of the penitentiary system who ensure the regime in correctional institutions. An important role in the effectiveness of countering criminality is played by the results of conducting searches and searches as security measures. A comparison of routine inspections and searches with investigative inspections and searches is made. It is pointed out that there are significant similarities in the nature, tactics, procedure for registration and notification of controlling officials of the investigative and regime measures under consideration. It is established that for the disclosure and further investigation of penitentiary crimes, the possibility of detecting, fixing and removing traces of the crime during the search and inspection is of great importance. In this case, the acts of regime measures act as full-fledged sources of evidence, provided that they are compiled in accordance with regulatory legal acts, including those of limited use. The necessity to examine, record and remove traces of criminal activity during security procedures in accordance with the forensic requirements for investigative actions is justified, since in this case the evidentiary value of the information obtained during security procedures increases significantly. It is proposed to develop a normative act regulating the procedure for submitting the results of security procedures to the criminal justice authorities, which will undoubtedly increase the effectiveness of proving penitentiary crimes.


2021 ◽  
pp. 0044118X2110466
Author(s):  
Faraneh Shamserad

Although school violence statistics indicate that schools are safe places, anxiety over school shootings continues to influence school safety reform to the extent that security measures in American public schools include the arming of schoolteachers. Furthermore, not only have youths’ perceptions of school security been relatively unexplored, existing research points to racial inequalities in the use of and the effects of school security practices. This study uses data from high school students across multiple school districts in a Midwestern county to examine how race and perceptions of fairness intersect to influence attitudes on arming teachers. The results suggest that, relative to White students, Black students are less supportive of arming teachers and anticipate greater decreases in safety if teachers are armed. In addition, perceptions of fairness mediate the effect of race on support and feelings of safety. Implications for policy and future research are discussed.


2021 ◽  
pp. 004723952110526
Author(s):  
LeAnne J. Schmidt ◽  
Michael DeSchryver

As educators and administrators look to countless mobile apps, software programs, and web-based learning tools to meet the demands of students in remote, virtual, and hybrid settings, risks and assumptions of online platforms and assessments must be considered. With the urgency of the COVID-response closure of many schools and the unusual methods employed during the return to school in Fall 2020, there is no better time to examine the digital application literacy which is necessary for students to effectively transition to online learning and assessment. “Digital application literacy” (DAppLit), a specific form of media literacy, involves the nimble use of an app (web-based) or application (computer-based) for education, including assessment. Learners with impaired DAppLit face academic consequences, when insufficient literacy in the platform is the culprit. This paper first explores various skills and strategies from both traditional and digital assessments that digital application literacy requires. Then, it presents the value of low-stakes assessment experiences with applications to introduce navigation techniques and troubleshoot barriers users may face before undertaking weighted assessments. The importance of skills instruction and practice of DAppLit methods is presented. A four-step process is introduced to: 1) set learning goals; 2) guide learners through the application with explicit instructions before use; 3) provide low-stakes explorations; and 4) debrief to address any issues which could represent a failing of application literacy and not content knowledge in an assessment.


Author(s):  
Kowsigan Mohan ◽  
P. Balasubramanie Palanisamy ◽  
G.R. Kanagachidambaresan ◽  
Siddharth Rajesh ◽  
Sneha Narendran

This chapter describes how security plays a vital role in cloud computing, as the name itself specifies the data can be stored from any place and can be owned by anyone. Even though the cloud offers many benefits such as flexibility, scalability and agility, security issues are still backlog the cloud infrastructure. Much research is being done on cloud security equal to the scheduling problems in the cloud environment. The customers under the cloud providers are very concerned about their data, which has been stored in the cloud environment. In this regard, it is essential for a cloud provider to implement some powerful tools for security, to provide a secure cloud infrastructure to the customers. Generally speaking, there are some foundational needs to be attained and some actions to be combined to ensure data security in both cloud, as well as, non-cloud infrastructure. This book chapter concentrates only on the security issues, security measures, security mechanisms, and security tools of the cloud environment.


Author(s):  
Heru Susanto ◽  
Leu Fang Yie ◽  
Didi Rosiyadi ◽  
Akbari Indra Basuki ◽  
Desi Setiana

Digital ecosystems have grown rapidly over the years, and governments are investing in digital provision for their processes and services. Despite the advantages of distributed technologies, there are many security issues as well that result in breaches of data privacy with serious impact including legal and reputational implications. To deal with such threats, government agencies need to thoughtfully improve their security defences to protect data and systems by using automation and artificial intelligence (AI), as well as easing the data security measures including early warning of threats and detection. This study provides a comprehensive view of AI and automaton to highlight challenges and issues concerning data security and suggests steps to combat the issues. The authors demonstrate the role of AI-driven security tools and automation to mitigate the impact of data breaches to also propose recommendations for government agencies to enhance their data security protection.


Author(s):  
Rajan R. ◽  
Venkata Subramanian Dayanandan ◽  
Shankar P. ◽  
Ranganath Tngk

A smart city aims at developing an ecosystem wherein the citizens will have instant access to amenities required for a healthy and safe living. Since the mission of smart city is to develop and integrate many facilities, it is envisaged that there is a need for making the information available instantly for right use of such infrastructure. So, there exists a need to design and implement a world-class physical security measures which acts as a bellwether to protect people life from physical security threats. It is a myth that if placing adequate number of cameras alone would enhance physical security controls in smart cities. There is a need for designing and building comprehensive physical security controls, based on the principles of “layered defense-in-depth,” which integrates all aspects of physical security controls. This chapter will review presence of existing physical security technology controls for smart cities in line with the known security threats and propose the need for an AI-enabled physical security premise.


Sign in / Sign up

Export Citation Format

Share Document