This assignment asks you to view the documentary, Private Violence, and then analyze it using concepts from assigned course content.
Additional requirements:
Use ONLY objective, neutral language. Do not use any evaluative or loaded language like “crazy,” “horrible, “awful,” “sick,” etc. There are substantial deductions for doing so. Do NOT discuss personal experiences with intimate partner or family violence. Most HUS professionals will interact with persons who have been abused either as children or adults. It is extremely important that you master the ability to remain calm and use neutral language when describing these events, as to otherwise risks further traumatizing your client and creating secondary trauma or burnout for yourself.
.
Before you watch the film
To watch the film
Use this link, Private Violence, to access the film. If you prefer, a transcript is attached above (Transcript_PrivateViolence.pdf).
Introduction
Module 3 continues the discussion of child abuse. In this module, we explore sibling abuse, child exploitation, and finally, professional response to child abuse. Let’s begin with a discussion of sibling abuse. Experts believe that this form of abuse is the most common form of family violence in the United States; however, there are no accurate data on the extent of sibling abuse. Your text (Chapter 8) defines sibling abuse as any form of physical, mental, or sexual abuse inflicted by one child in a family unit on another. This definition does not require that the siblings be related by birth, because many live in reconstituted families due to divorce, separation and remarriage. Like other forms of violence, sibling abuse can be divided into physical, emotional, and sexual categories. Sibling abuse is more likely among children in families in which both child abuse and intimate partner abuse are present; however, sibling assaults are more frequent in families with child abuse than in those with intimate partner abuse. While boys are more likely than girls to engage in sibling abuse, both sexes participate in this form of family violence. Sibling abuse is an understudied area, and more research is needed to understand this type of abuse.
Next, Module 3 examines child exploitation. As discussed in Chapter 9, child exploitation is a severe form of violence against children, and may include sex tourism, prostitution, child pornography, and forced labor, recruitment into armed conflict, and human smuggling or trafficking. Trafficking can take place within or between countries. The internet often plays a key role in child exploitation, especially child pornography. In many instances, families play a direct or indirect role in allowing or promoting the exploitation of their own children. The United States government and those of other countries, as well as numerous NGOs (non-governmental organizations) are actively involved in efforts to eradicate child exploitation. For example, the U.S. Department of Justice maintains the Child Exploitation and Obscenity Section (CEOS) website and, in Thailand, ECPAT (End Child Prostitution, Child Pornography, and Trafficking of Children for Sexual Purposes), is an international NGO which seeks to eliminate sexual exploitation of children.
Module 3 concludes by discussing the professional’s response to child abuse. Chapter 11 notes that all states have mandated reporters—persons who are required by law to report suspected child abuse under specific circumstances. This reporting is a major form of intervention in the U.S. In addition, the U.S. government mandates data collection on child abuse by the National Child Abuse and Neglect Data System (NCANDS). The Children’s Bureau in the Administration on Children, Youth and Families, Administration for Children and Families, U.S. Department of Health and Human Services, collects and analyzes the data. The data are submitted voluntarily by the states, the District of Columbia, and the Commonwealth of Puerto Rico. NCANDS data are used for the Child Maltreatment Report, which is available on the Children’s Bureau web site or by contacting the Child Welfare Information Gateway. Sex offender notification laws are another form of intervention. By 2000, all states had adopted laws requiring notification to individuals and organizations. Many communities believe that sex offender notification laws afford them the opportunity to protect themselves from sex offenders. If child abuse is suspected, appropriate interviewing is critical. Skilled interviewers know how to avoid charges that they primed or suggested “correct” answers to the child. In some cases, the courts can remove children from their families, so the interview and rules of evidence are extremely important.
Readings and Resources
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more