Policing Child Protection: Motivational Postures of Contesting Third Parties

نویسندگان

چکیده

Abstract Child protection reform has been difficult, despite evidence that practice should be more child-centred, respectful and responsively inclusive of family communities. An Australian survey 387 third parties working with statutory child authorities revealed widespread support for reform, but significant opposition to authorities. Only police aligned themselves Welfare workers were most likely have defiant postures resistance disengagement criticize their bureaucratic ritualism, poor accountability, low trustworthiness social exclusion. Lawyers special service providers shared some these criticisms, while health educational professionals remained neutral. System is grind a halt when essential are adopting oppositional positions. Principle-led communities multidisciplinary community-inclusive may offer the best hope cutting through gridlock broadening deepening capabilities.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Contracting with Third Parties

odels of bilateral contracting, such as the canonical holdup model, typically assume that third parties are not available. Given this assumption, the equilibrium outcome is not first-best efficient if contracts can be renegotiated. To be more specific, suppose an architect and a builder must cooperate to build a building. The quality of the building will depend on three things: the quality of t...

متن کامل

Towards Tiny Trusted Third Parties

Many security protocols hypothesize the existence of a trusted third party (TTP) to ease handling of computation and data too sensitive for the other parties involved. Subsequent discussion usually dismisses these protocols as hypothetical or impractical, under the assumption that trusted third parties cannot exist. However, the last decade has seen the emergence of hardware-based devices that,...

متن کامل

Specification of Dependable Trusted Third Parties

This document describes an architecture for secure service replication in an asynchronous network like the Internet, where a malicious adversary may corrupt some servers and control the network. The underlying protocols for Byzantine agreement and for atomic broadcast rely on recent developments in threshold cryptography. These assumptions are discussed in detail and compared to related work fr...

متن کامل

Faerieplay on Tiny Trusted Third Parties

Many security protocols refer to a trusted third party (TTP) as an ideal way of handling computation and data with conflicting stakeholders. Subsequent discussion usually dismisses a TTP as hypothetical or impractical. However, the last decade has seen the emergence of hardware-based devices like the IBM 4758 that, to high assurance, can carry out computation unmolested; TPM-based systems like ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Asian Journal of Criminology

سال: 2022

ISSN: ['1871-0131', '1871-014X']

DOI: https://doi.org/10.1007/s11417-022-09374-7