Surveillance and Supervising Domestic Violence Order Instructions: Annotate the attached: Ibarra, P. R., Gur, O. M., & Erez, E. (2014).
Surveillance as casework: Supervising domestic violence defendants with GPS technology. Crime, Law and Social Change, 62(4), 417-444. doi:http://dx.doi.org/10.1007/s10611-014-9536-4
Provide the reference list entry for this article in APA Style followed by a three-paragraph annotation that includes:
-
-
- A summary
- An analysis
- An application as illustrated in the following example:
-
Example
The example annotation below includes the citation, a summary in the first paragraph, the critique/analysis in the second paragraph, and the application in the third paragraph.
Gathman, A. C., & Nessan, C. L. (1997). Fowler’s stages of faith development in an honors science-and-religion seminar. Zygon, 32(3), 407–414. Retrieved from http://www.zygonjournal.org/
The authors described the construction and rationale of an honors course in science and religion that was pedagogically based on Lawson’s learning cycle model. In Lawson’s model, the student writes a short paper on a subject before a presentation of the material and then writes a longer paper reevaluating and supporting his or her views. Using content analysis, the authors compared the students’ answers in the first and second essays, evaluating them based on Fowler’s stages of development. The authors presented examples of student writing with their analysis of the students’ faith stages. The results demonstrated development in stages 2 through 5.
The authors made no mention of how to support spiritual development in the course. There was no correlation between grades and level of faith development. Instead, they were interested in the interface between religion and science, teaching material on ways of knowing, creation myths, evolutionary theory, and ethics. They exposed students to Fowler’s ideas but did not relate the faith development theory to student work in the classroom. There appears to have been no effort to modify the course content based on the predominant stage of development, and it is probably a credit to their teaching that they were able to conduct the course with such diversity in student faith development. However, since Fowler’s work is based largely within a Western Christian setting, some attention to differences in faith among class members would have been a useful addition to the study.
Fowler’s work would seem to lend itself to the research of this sort, but this model is the only example found in recent literature. This study demonstrates the best use of the model, which is an assessment. While the theory claimed high predictive ability, the change process that the authors chronicled is so slow and idiosyncratic that it would be difficult to design and implement research that had as its goal measurement of movement in a faith development continuum.
Format your annotation in Times New Roman, 12-point font, double-spaced. A separate References list page is not needed. A separate References list page is needed.
Surveillance and Supervising Domestic Violence Sample Answer
Surveillance as Casework: Supervising Domestic Violence
Defendants with GPS Technology
Ibarra, P. R., Gur, O. M., & Erez, E. (2014). Surveillance as casework: Supervising domestic violence defendants with GPS technology. Crime, Law and Social Change, 62(4), 417-444. doi: http://dx.doi.org/10.1007/s10611-014-9536-4
The author’s topic is directed toward establishing domestic violence defendants through the use of TPS technology. According to the author, there has been a continued effort that ignored the relevance of traditional approaches directed towards supervising humans, an aspect that critically intrigues the need of a surveillance approach embedded in the judicial system casework. The author therefore makes an effort to conduct a comparative analysis with the aim of illustrating the manner in which the problem population differs across different segmented community correction agencies in the implementation of the surveillance regime. The author therefore conducts a study to establish the manner in which surveillance styles reflect the capacity of agencies that are directed towards curbing crime and managing risks, an aspect that provides assistance and treatment through an observed process. According to the author, the programmatic element of these systems expresses the manner in which officers relate with offenders in their cases, as an aspect that contrasts to the ambient approach of monitoring populations and the environment through the inclusion of data bank technology thus highlighting the essence of the surveillance style in caseworks. The methods depicted by the author in this material detail how the systems are utilized in collecting personal information that are accessed through the data banks that are needed by government and market based actors. These efforts reflect a digitalized form of data that is conducted routinely and silently, an aspect that entails the visiting of websites, the acquisition of telephone dials, swiping of ID cards on entering a secured entity and using the images that are captured from a closed-circuit television (CCTV). The primary theoretic basis of the study lies on the use of surveillance as an object of inquiry, an aspect that achieves the objective of applying technology within the criminal justice systems.
The study provides no theoretical framework and extensively reviews existing literature in validating the views of the author. The author clearly communicates the need to examine the styles of surveillance among different community correction officers through the use of an EM through a comparative analysis that establishes the studies objectives through a review of several literatures, an aspect that uses and builds on the existing literature in establishing the study’s goal. On the other hand, the material provides a research method that is not fully appropriate since it only details the data collection method and does not detail the research methodology used in the collection and analysis of data. The sample size detailed in this study involves the inclusion of three jurisdictions-West, Midwest and the South criminal justice workforce that are involved in the dispensation of GPS in DV caseworks either directly or indirectly. The sample size is therefore appropriate since these agencies have distinct approaches in the operation of GPS in DV programs, an aspect that enables the study to conduct a comparative analysis of the surveillance systems and its application. Considering the several biases noted in the research, the study does not provide adequate control measures in addressing some of the research biases noted. This depicts the fact that the study did not consider using a paradigm solution in eliminating the biases, an aspect that intrigues the need for s strategy that handles the validity of the study. This study may therefore be replicable considering the fact that technology evolves and different surveillance systems are bound to change with time. The limitations of this study are evident in its inefficiency in establishing the difference between interactive and ambient systems, an aspect that effaces the responsibility and roles of human labor in the use of surveillance systems. This clearly makes the studies objective obscure, thus giving the study a different interpretation. Lastly, the study’s conclusions are justifiable, in consideration of the fact that the surveillance regime is quickly gaining prominence within the judicial system. However, the author does not take into account the different cultural and social contexts since the study is only based on single research demography.
This source is primarily different in structure as compared to other studies; since it details the legitimacy of different approaches of interactive surveillance an aspect that denotes the varying philosophies and approaches of community corrections. To clarify this, the author addresses the manner in which supervision is conceptualized in the literature review on using EM technology an aspect that is affirmed by an examination of the surveillance systems in three U.S based programs. This source therefore informs my future research since it creates a gap in addressing the roles of human labor in the use of surveillance systems a gap that the material fails to fill in the study. The application of these methods within my project will be centered on an effort to enhance security within my work environment considering the constant threats that the society is currently experiencing from terroristic activities. On the other hand, the study would be applied in establishing some of the erroneous activities of different individuals who commit to upheaval activities in the community by detecting their missions and curbing them before they turn harmful. The article may not be considered universal since the context of the study varies.