Cybernetic Model of Correctional Treatment
ثبت نشده
چکیده
In the past thirty years, treatment in correctional facilities has been severely criticized. Many studies, including meta-analyses, have emphasized the low efficacy of correctional treatment. The efficacy of correctional treatment (and every kind of treatment) is related to the three main questions. The first is a clear definition of the features that have to be the object of treatment the second is the question of methods or programs which are used in the course of treatment; while the third, is the question of the monitoring of the treatment process. Adequate monitoring of the treatment process is possible only in the event that the treatment programming and the evaluation of its effects are undertaken individually, in short intervals or, in other words, at several transition time points from the initialto the final treatment point. The feedback about the effects of treatment is analysed by a personal computer at each transition time point. According to the results obtained, modification in group and individualized treatment programming takes place successively at each transition time point. The proposed model consists of three levels; the first level performs a comparison of results between the transition time points; the second level, using hierarchical cluster analysis, forms larger groups of inmates convenient for group programming, and the third level, using hierarchical cluster analysis again, forms small target groups of inmates convenient for individualized programming. Thanks to their great speed of data processing and immense possibilities of data storage, personal computers allow quick decision making about the continuation of treatment at each transition time point. Combining group and individualized programming, provisional treatment programs are modified to satisfy the needs of inmates throughout the treatment process.
منابع مشابه
Correctional and education center in Iran: analysis of the current situation and design of the desired situation
Introduction: Children and adolescents build the future of a country. When they commit a crime based on circumstances and are kept in a correctional center, their age needs should be taken into account in order to prevent them from committing a crime again. The purpose of the current research is to identify the most important problems and challenges in the management and treatment of children a...
متن کاملCorrectional and education center in Iran: analysis of the current situation and design of the desired situation
Introduction: Children and adolescents build the future of a country. When they commit a crime based on circumstances and are kept in a correctional center, their age needs should be taken into account in order to prevent them from committing a crime again. The purpose of the current research is to identify the most important problems and challenges in the management and treatment of children a...
متن کاملApplication of a Heuristic Cybernetic Model in Peer-reviewing Process of Scholarly Papers
Background and Aim: This study attempts to show the cybernetics approach on peer reviewing articles to recommend an appropriate solution for increasing the qualitative level of published articles in scientific journals. Method: Heuristic Cybernetics method is suggested, based on the scientific experiences of related researches and also the mathematical principles that is an appropriate formed s...
متن کاملIran and the future of security arrangements in the Gulf region
The purpose of this paper is to examine the Persian Gulf system of cybernetics and the possibility of Iran's role and influence on the future of security arrangements in the Persian Gulf region. In this regard, the author describes the cybernetic theory in regional studies as a conceptual framework of the research to implement the hegemonic security system of the Persian Gulf. Then, by showing ...
متن کاملDesign of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کامل