SlideShare uma empresa Scribd logo
1 de 9
Rosalin Zein
13 Pius
Assignment 5: Extended research
on topics
Topic 1 : Does social deprivation
cause crime?
What you would learn:
 What is social deprivation.
 How it could affect people and cause them to turn to crime.
 The different theorists who agree and disagree.
 Statistics on the crime rate for those who are socially deprived.
 Whether it is social deprivation of emotional deprivation that causes people to commit crime.
Debate:
For:
•People who are socially deprived are more likely to turn to crime in order to satisfy basic living necessities
•We acquire knowledge of what is right and wrong through education
•People feel crime is the only way for their frustrations to be heard
Against:
•Some of the biggest crimes that affect society are committed by huge multinational companies or wealthy
individuals
•As we live in a consumerist society the primary cause of crime is greed or desperation to ‘fit in’
For:
Sociologists:
Left Realists –
 Left realists acknowledge that relative deprivation can occur at any socioeconomic
level, but that the social structure has left youths in the bottom tier of society without
jobs and without hope for improving their situations.
 They form subcultures with other disenfranchised young people in their areas, and
those subcultures may support delinquent and criminal behaviour.
James -
 When greater affluence is combined with growing inequality and the rise of what has
been called a winner/loser culture, crime has climbed even more steeply.
Source: Sociological Theories of Criminal Behavior I: The Social-Structural Approach
Comparing the level of deprivation with the level of
crime.
Measuring the level of relative deprivation in
the boroughs within London.
From this we can see that the crime rate is
higher in the more deprived areas and lower in
the less deprived.
Source for table http://www.londonspovertyprofile.org.uk/about/an-
overview-of-londons-borough/
Source for crime rate
:http://maps.met.police.uk/access.php?area=MPS&sort=rate&order=a
Against:
Sociologists:
Lea and Young – poverty or unemployment do not directly cause crime, as despite the high
employment experienced in the economic depression in Britain from the late 1920’s to the
1930’s, crime rates were considerably lower than they were in the boom years of the 1980’s.
Other explanations
Albert Cohen, Richard Cloward and Lloyd Ohlin:
 They viewed the most serious and pervasive forms of crime and delinquency as generated
by a combination of complex experiences born of relative deprivation in a highly competitive,
increasingly fragmented social order.
Source – British Society of Criminology
Topic 2: The impact of social media
on culture.
What you would learn:
• The diversity and development of social media
• The impact social media has already had.
• The negative and positive effects
• How it has created a global culture.
• Social networking sites (Facebook, YoutTube, Twitter, Tumblr)
Debate:
• Whether social media has had a positive or negative affect on society and culture.
• What are the affects it has already had.
• Could it change the way in which we interact and communicate with each other even
more than it already has.
• Will its impact grow.
• Is there anything we can do stop it ?
What is social media?
Social media refers to the means of interactions among people in which they create, share, and exchange information
and ideas in virtual communities and networks.
A social networking service is a platform to build social networks or social relations among people who, for example,
share interests, activities, backgrounds, or real-life connections.
Examples of social
media:
Users upload their own stories a chapter at
a time.
A social networking site.Photo and video sharing site.
A social networking siteA Video sharing site A blogging + social
networking site
Social networking service
Pros
Pros: How? Examples:
Social media facilitates political
change.
Social networking sites give social
movements a quick, no-cost method
to organize, disseminate information,
and mobilize people.
The 2011 Egyptian uprising (part of
the Arab Spring), organized largely
via social media, motivated tens of
thousands of protestors for
eighteen days of demonstrations
and, ultimately led to the
resignation of Egyptian President
Mubarak on Feb. 11, 2011.
Social media sites empower
individuals to make social
change and do social good on a
community level.
Social media allows us to be
connected, thus allowing us to share
problems, ideas and communicate
with others to fix these problems.
Nine-year old Scottish student,
Martha Payne, and her blog,
"Never Seconds," and the
formation of "Friends of Never
Seconds" charity to feed children
globally.
Social networking provides
academic research to a wider
audience, allowing many people
access to previously unavailable
educational resources
We are now able to access a variety
of educational resources and
information online making it easier to
do research.
Photos, videos, books, essays,
revision resources, the ability to
contact others.
Social networking sites spread
information faster than any other
media.
Over 50% of people learn about
breaking news on social media. 65%
of traditional media reporters and
editors use sites like Facebook and
LinkedIn for story research, and 52%
use Twitter.
Source: http://socialnetworking.procon.org/
Cons:
Cons: How? Examples:
Criminals use social media
to commit and promote
crimes.
Gangs use the sites to recruit younger
members, coordinate violent crimes, and
threaten other gangs.
For example during the London
riots.
Social networking sites
facilitate cyber bullying.
It allows everyone to communicate with
each other meaning that people can
message you privately/publically.
49.5% of students reported being
the victims of bullying online and
33.7% reported committing
bullying behaviour online.
Children may endanger
themselves by not
understanding the public
and viral nature of social
networking sites.
Children might upload statuses/pictures
which can be traced back to them. Also,
as they are so young children are
ignorant to what happens on social
networking sites and what could possibly
happen if you put out too much
ibnformation.
Up to 600 Dutch riot police had to
be called in to break up a teen's
birthday party to which about
30,000 people were accidentally
invited after a Facebook post
thought to be private went viral
(quickly moving on to Twitter and
YouTube as well).
As a result, at least three people
were hurt and 20 people were
arrested for vandalism, looting,
setting cars on fire, and damaging
lampposts.

Mais conteúdo relacionado

Mais procurados

Right Realism
Right RealismRight Realism
Right RealismBeth Lee
 
The Dress vs. Ebola: The Effect of Different News Sources on Social Action.
The Dress vs. Ebola: The Effect of Different News Sources on Social Action.The Dress vs. Ebola: The Effect of Different News Sources on Social Action.
The Dress vs. Ebola: The Effect of Different News Sources on Social Action.Deborah Tuggy
 
Copied research extra research
Copied research extra research Copied research extra research
Copied research extra research shaunaeleacy
 
Crime and Deviance - Left and Right Realism
Crime and Deviance - Left and Right RealismCrime and Deviance - Left and Right Realism
Crime and Deviance - Left and Right RealismRachel Jones
 
Crime and Deviance - Subcultural Approach
Crime and Deviance - Subcultural ApproachCrime and Deviance - Subcultural Approach
Crime and Deviance - Subcultural ApproachRachel Jones
 
We Media 10 surveillance 1
We Media 10 surveillance 1We Media 10 surveillance 1
We Media 10 surveillance 1chrisianwelch
 
Left Realism
Left RealismLeft Realism
Left RealismBeth Lee
 
We Media L20 mock exam revision
We Media L20 mock exam revisionWe Media L20 mock exam revision
We Media L20 mock exam revisionchrisianwelch
 
Right realism powerpoint def
Right realism powerpoint defRight realism powerpoint def
Right realism powerpoint defmattyp99
 
Is203 Lecture 5 Social Implications Of Internet
Is203 Lecture 5 Social Implications Of InternetIs203 Lecture 5 Social Implications Of Internet
Is203 Lecture 5 Social Implications Of Internetzmiers
 
Crime and deviance and the media
Crime and deviance and the mediaCrime and deviance and the media
Crime and deviance and the mediasmccormac7
 
We media’ and democracy – student revision ppt
We media’ and democracy – student revision pptWe media’ and democracy – student revision ppt
We media’ and democracy – student revision pptchrisianwelch
 
Social Media: the good, the bad and the ugly
Social Media: the good, the bad and the uglySocial Media: the good, the bad and the ugly
Social Media: the good, the bad and the uglyJosh Cowls
 

Mais procurados (17)

Coveringthe city
Coveringthe cityCoveringthe city
Coveringthe city
 
Right Realism
Right RealismRight Realism
Right Realism
 
The Dress vs. Ebola: The Effect of Different News Sources on Social Action.
The Dress vs. Ebola: The Effect of Different News Sources on Social Action.The Dress vs. Ebola: The Effect of Different News Sources on Social Action.
The Dress vs. Ebola: The Effect of Different News Sources on Social Action.
 
Social Media Today
Social Media TodaySocial Media Today
Social Media Today
 
Copied research extra research
Copied research extra research Copied research extra research
Copied research extra research
 
Crime and Deviance - Left and Right Realism
Crime and Deviance - Left and Right RealismCrime and Deviance - Left and Right Realism
Crime and Deviance - Left and Right Realism
 
Crime and Deviance - Subcultural Approach
Crime and Deviance - Subcultural ApproachCrime and Deviance - Subcultural Approach
Crime and Deviance - Subcultural Approach
 
Crime and deviance
Crime and devianceCrime and deviance
Crime and deviance
 
We Media 10 surveillance 1
We Media 10 surveillance 1We Media 10 surveillance 1
We Media 10 surveillance 1
 
Left Realism
Left RealismLeft Realism
Left Realism
 
We Media L20 mock exam revision
We Media L20 mock exam revisionWe Media L20 mock exam revision
We Media L20 mock exam revision
 
Right realism powerpoint def
Right realism powerpoint defRight realism powerpoint def
Right realism powerpoint def
 
Realist perspectives of crime
Realist perspectives of crimeRealist perspectives of crime
Realist perspectives of crime
 
Is203 Lecture 5 Social Implications Of Internet
Is203 Lecture 5 Social Implications Of InternetIs203 Lecture 5 Social Implications Of Internet
Is203 Lecture 5 Social Implications Of Internet
 
Crime and deviance and the media
Crime and deviance and the mediaCrime and deviance and the media
Crime and deviance and the media
 
We media’ and democracy – student revision ppt
We media’ and democracy – student revision pptWe media’ and democracy – student revision ppt
We media’ and democracy – student revision ppt
 
Social Media: the good, the bad and the ugly
Social Media: the good, the bad and the uglySocial Media: the good, the bad and the ugly
Social Media: the good, the bad and the ugly
 

Semelhante a Assignment 5

Semelhante a Assignment 5 (9)

Argumentative Essay On Media
Argumentative Essay On MediaArgumentative Essay On Media
Argumentative Essay On Media
 
What are the implications of citizens broadcasting the events of
What are the implications of citizens broadcasting the events ofWhat are the implications of citizens broadcasting the events of
What are the implications of citizens broadcasting the events of
 
FINAL-PPT-FOR-SNN.pptx
FINAL-PPT-FOR-SNN.pptxFINAL-PPT-FOR-SNN.pptx
FINAL-PPT-FOR-SNN.pptx
 
Behaviour science project
Behaviour science projectBehaviour science project
Behaviour science project
 
Privacy Matters
Privacy MattersPrivacy Matters
Privacy Matters
 
Awareness Of Social Media
Awareness Of Social MediaAwareness Of Social Media
Awareness Of Social Media
 
Social-Media
Social-MediaSocial-Media
Social-Media
 
The Digital Divide
The Digital DivideThe Digital Divide
The Digital Divide
 
Sm
SmSm
Sm
 

Mais de Rosiezein

Alterations along the way
Alterations along the wayAlterations along the way
Alterations along the wayRosiezein
 
Alterations along the way
Alterations along the wayAlterations along the way
Alterations along the wayRosiezein
 
Alterations along the way
Alterations along the wayAlterations along the way
Alterations along the wayRosiezein
 
Final draft ancillary
Final draft ancillaryFinal draft ancillary
Final draft ancillaryRosiezein
 
Assignment 24
Assignment 24Assignment 24
Assignment 24Rosiezein
 
Assignment 20
Assignment 20Assignment 20
Assignment 20Rosiezein
 
Photo records for draft 2 ancillary
Photo records for draft 2 ancillaryPhoto records for draft 2 ancillary
Photo records for draft 2 ancillaryRosiezein
 
Assignment 3
Assignment 3Assignment 3
Assignment 3Rosiezein
 
Draft 5 shot list
Draft 5 shot listDraft 5 shot list
Draft 5 shot listRosiezein
 
Final draft ancillary
Final draft ancillaryFinal draft ancillary
Final draft ancillaryRosiezein
 
Draft 3 timeline
Draft 3 timelineDraft 3 timeline
Draft 3 timelineRosiezein
 
Assignment 30
Assignment 30Assignment 30
Assignment 30Rosiezein
 
Assignment 30
Assignment 30Assignment 30
Assignment 30Rosiezein
 
Assignment 32 group
Assignment 32 groupAssignment 32 group
Assignment 32 groupRosiezein
 
Assignment 29 draft 2
Assignment 29   draft 2Assignment 29   draft 2
Assignment 29 draft 2Rosiezein
 
Assignment 29 - draft 1
Assignment 29   - draft 1 Assignment 29   - draft 1
Assignment 29 - draft 1 Rosiezein
 
Assignment 21 draft 2
Assignment 21 draft 2Assignment 21 draft 2
Assignment 21 draft 2Rosiezein
 
Shot list draft 1
Shot list draft 1Shot list draft 1
Shot list draft 1Rosiezein
 
Script draft 1
Script   draft 1Script   draft 1
Script draft 1Rosiezein
 
Assignment 25
Assignment 25Assignment 25
Assignment 25Rosiezein
 

Mais de Rosiezein (20)

Alterations along the way
Alterations along the wayAlterations along the way
Alterations along the way
 
Alterations along the way
Alterations along the wayAlterations along the way
Alterations along the way
 
Alterations along the way
Alterations along the wayAlterations along the way
Alterations along the way
 
Final draft ancillary
Final draft ancillaryFinal draft ancillary
Final draft ancillary
 
Assignment 24
Assignment 24Assignment 24
Assignment 24
 
Assignment 20
Assignment 20Assignment 20
Assignment 20
 
Photo records for draft 2 ancillary
Photo records for draft 2 ancillaryPhoto records for draft 2 ancillary
Photo records for draft 2 ancillary
 
Assignment 3
Assignment 3Assignment 3
Assignment 3
 
Draft 5 shot list
Draft 5 shot listDraft 5 shot list
Draft 5 shot list
 
Final draft ancillary
Final draft ancillaryFinal draft ancillary
Final draft ancillary
 
Draft 3 timeline
Draft 3 timelineDraft 3 timeline
Draft 3 timeline
 
Assignment 30
Assignment 30Assignment 30
Assignment 30
 
Assignment 30
Assignment 30Assignment 30
Assignment 30
 
Assignment 32 group
Assignment 32 groupAssignment 32 group
Assignment 32 group
 
Assignment 29 draft 2
Assignment 29   draft 2Assignment 29   draft 2
Assignment 29 draft 2
 
Assignment 29 - draft 1
Assignment 29   - draft 1 Assignment 29   - draft 1
Assignment 29 - draft 1
 
Assignment 21 draft 2
Assignment 21 draft 2Assignment 21 draft 2
Assignment 21 draft 2
 
Shot list draft 1
Shot list draft 1Shot list draft 1
Shot list draft 1
 
Script draft 1
Script   draft 1Script   draft 1
Script draft 1
 
Assignment 25
Assignment 25Assignment 25
Assignment 25
 

Último

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Último (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Assignment 5

  • 1. Rosalin Zein 13 Pius Assignment 5: Extended research on topics
  • 2. Topic 1 : Does social deprivation cause crime? What you would learn:  What is social deprivation.  How it could affect people and cause them to turn to crime.  The different theorists who agree and disagree.  Statistics on the crime rate for those who are socially deprived.  Whether it is social deprivation of emotional deprivation that causes people to commit crime. Debate: For: •People who are socially deprived are more likely to turn to crime in order to satisfy basic living necessities •We acquire knowledge of what is right and wrong through education •People feel crime is the only way for their frustrations to be heard Against: •Some of the biggest crimes that affect society are committed by huge multinational companies or wealthy individuals •As we live in a consumerist society the primary cause of crime is greed or desperation to ‘fit in’
  • 3. For: Sociologists: Left Realists –  Left realists acknowledge that relative deprivation can occur at any socioeconomic level, but that the social structure has left youths in the bottom tier of society without jobs and without hope for improving their situations.  They form subcultures with other disenfranchised young people in their areas, and those subcultures may support delinquent and criminal behaviour. James -  When greater affluence is combined with growing inequality and the rise of what has been called a winner/loser culture, crime has climbed even more steeply. Source: Sociological Theories of Criminal Behavior I: The Social-Structural Approach
  • 4. Comparing the level of deprivation with the level of crime. Measuring the level of relative deprivation in the boroughs within London. From this we can see that the crime rate is higher in the more deprived areas and lower in the less deprived. Source for table http://www.londonspovertyprofile.org.uk/about/an- overview-of-londons-borough/ Source for crime rate :http://maps.met.police.uk/access.php?area=MPS&sort=rate&order=a
  • 5. Against: Sociologists: Lea and Young – poverty or unemployment do not directly cause crime, as despite the high employment experienced in the economic depression in Britain from the late 1920’s to the 1930’s, crime rates were considerably lower than they were in the boom years of the 1980’s. Other explanations Albert Cohen, Richard Cloward and Lloyd Ohlin:  They viewed the most serious and pervasive forms of crime and delinquency as generated by a combination of complex experiences born of relative deprivation in a highly competitive, increasingly fragmented social order. Source – British Society of Criminology
  • 6. Topic 2: The impact of social media on culture. What you would learn: • The diversity and development of social media • The impact social media has already had. • The negative and positive effects • How it has created a global culture. • Social networking sites (Facebook, YoutTube, Twitter, Tumblr) Debate: • Whether social media has had a positive or negative affect on society and culture. • What are the affects it has already had. • Could it change the way in which we interact and communicate with each other even more than it already has. • Will its impact grow. • Is there anything we can do stop it ?
  • 7. What is social media? Social media refers to the means of interactions among people in which they create, share, and exchange information and ideas in virtual communities and networks. A social networking service is a platform to build social networks or social relations among people who, for example, share interests, activities, backgrounds, or real-life connections. Examples of social media: Users upload their own stories a chapter at a time. A social networking site.Photo and video sharing site. A social networking siteA Video sharing site A blogging + social networking site Social networking service
  • 8. Pros Pros: How? Examples: Social media facilitates political change. Social networking sites give social movements a quick, no-cost method to organize, disseminate information, and mobilize people. The 2011 Egyptian uprising (part of the Arab Spring), organized largely via social media, motivated tens of thousands of protestors for eighteen days of demonstrations and, ultimately led to the resignation of Egyptian President Mubarak on Feb. 11, 2011. Social media sites empower individuals to make social change and do social good on a community level. Social media allows us to be connected, thus allowing us to share problems, ideas and communicate with others to fix these problems. Nine-year old Scottish student, Martha Payne, and her blog, "Never Seconds," and the formation of "Friends of Never Seconds" charity to feed children globally. Social networking provides academic research to a wider audience, allowing many people access to previously unavailable educational resources We are now able to access a variety of educational resources and information online making it easier to do research. Photos, videos, books, essays, revision resources, the ability to contact others. Social networking sites spread information faster than any other media. Over 50% of people learn about breaking news on social media. 65% of traditional media reporters and editors use sites like Facebook and LinkedIn for story research, and 52% use Twitter. Source: http://socialnetworking.procon.org/
  • 9. Cons: Cons: How? Examples: Criminals use social media to commit and promote crimes. Gangs use the sites to recruit younger members, coordinate violent crimes, and threaten other gangs. For example during the London riots. Social networking sites facilitate cyber bullying. It allows everyone to communicate with each other meaning that people can message you privately/publically. 49.5% of students reported being the victims of bullying online and 33.7% reported committing bullying behaviour online. Children may endanger themselves by not understanding the public and viral nature of social networking sites. Children might upload statuses/pictures which can be traced back to them. Also, as they are so young children are ignorant to what happens on social networking sites and what could possibly happen if you put out too much ibnformation. Up to 600 Dutch riot police had to be called in to break up a teen's birthday party to which about 30,000 people were accidentally invited after a Facebook post thought to be private went viral (quickly moving on to Twitter and YouTube as well). As a result, at least three people were hurt and 20 people were arrested for vandalism, looting, setting cars on fire, and damaging lampposts.