Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
3,098 result(s) for "Intimidation"
Sort by:
Hitting Them With Carrots: Voter Intimidation and Vote Buying in Russia
Scholars have identified many ways that politicians use carrots, such as vote buying, to mobilize voters, but have paid far less attention to how they use sticks, such as voter intimidation. This article develops a simple argument which suggests that voter intimidation should be especially likely where vote buying is expensive and employers have greater leverage over employees. Using survey experiments and crowd-sourced electoral violation reports from the 2011–12 election cycle in Russia, the study finds evidence consistent with these claims. Moreover, it finds that where employers have less leverage over employees, active forms of monitoring may supplement intimidation in order to encourage compliance. These results suggest that employers can be reliable vote brokers; that voter intimidation can persist in a middle-income country; and that, under some conditions, intimidation may be employed without the need for active monitoring.
A very private school : a memoir
\"A Very Private School offers a clear-eyed, first-hand account of a culture of cruelty at the school Charles Spencer attended in his youth and provides important insights into an antiquated boarding system. Drawing on the memories of many of his schoolboy contemporaries, as well as his own letters and diaries from the time, he reflects on the hopelessness and abandonment he felt at aged eight, viscerally describing the intense pain of homesickness and the appalling inescapability of it all. Exploring the long-lasting impact of his experiences, Spencer presents a candid reckoning with his past and a reclamation of his childhood\"-- Provided by publisher.
Deep Fakes
Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring certain benefits, it also will introduce many harms. The marketplace of ideas already suffers from truth decay as our networked information environment interacts in toxic ways with our cognitive biases. Deep fakes will exacerbate this problem significantly. Individuals and businesses will face novel forms of exploitation, intimidation, and personal sabotage. The risks to our democracy and to national security are profound as well. Our aim is to provide the first in-depth assessment of the causes and consequences of this disruptive technological change, and to explore the existing and potential tools for responding to it. We survey a broad array of responses, including: the role of technological solutions; criminal penalties, civil liability, and regulatory action; military and covert-action responses; economic sanctions; and market developments. We cover the waterfront from immunities to immutable authentication trails, offering recommendations to improve law and policy and anticipating the pitfalls embedded in various solutions.
The robot lesson
\"Ten Carat thinks he is the best robot in Robotica City! Although Ten Carat is shiny, he is mean and rude. Ten Carat boasts of his importance while pushing every other robot out of his way. But when Ten Carat runs completely out of power, a silver stranger helps him. Ten Carat learns that it is better to be kind than to be mean and to bully others. The stranger named Silver teaches Ten Carat kindness by helping him when no other robot would. This one act of kindness changes Robotica City forever\"--Back cover.
Carrots and sticks
How do parties target intimidation and vote-buying during elections? Parties prefer the use of carrots over sticks because they are in the business of getting voters to like them and expect higher legitimacy costs if observers expose intimidation. However, their brokers sometimes choose intimidation because it is cheaper and possibly more effective than vote-buying. Specifically, we contend that brokers use intimidation when the cost of buying votes is prohibitively high; in interactions with voters among whom the commitment problem inherent to clientelistic transactions is difficult to overcome; and in contexts where the risk of being denounced for violence is lower. We probe our hypotheses about the different profile of voters targeted with vote-buying and intimidation using two list experiments included in an original survey conducted during the 2011 Guatemalan general elections. The list experiments were designed to overcome the social desirability bias associated with direct questions about illegal or stigmatized behaviors. Our quantitative analysis is supplemented by interviews with politicians from various parties. The analysis largely confirms our expectations about the diametrically opposed logics of vote-buying and intimidation targeting, and illuminates how both are key components of politics in a country with weak parties and high levels of violence.
Karen's school picture
\"Karen has to get glasses--two pairs! One pair for reading and one for all the time. Karen does not want glasses. Her school pictures are going to be taken soon! But Karen has to ... so she picks out some pretty pink and blue ones. Karen thinks she looks very grown-up. Then Yicky Ricky calls her Four-eyes. If Karen wears her glasses for the school picture, Ricky will make fun of her. But Karen is not a wimp! Glasses or no glasses--that Ricky is going to get it!\"--Page 4 of cover
The Distinct Wrong of Deepfakes
Deepfake technology presents significant ethical challenges. The ability to produce realistic looking and sounding video or audio files of people doing or saying things they did not do or say brings with it unprecedented opportunities for deception. The literature that addresses the ethical implications of deepfakes raises concerns about their potential use for blackmail, intimidation, and sabotage, ideological influencing, and incitement to violence as well as broader implications for trust and accountability. While this literature importantly identifies and signals the potentially far-reaching consequences, less attention is paid to the moral dimensions of deepfake technology and deepfakes themselves. This article will help fill this gap by analysing whether deepfake technology and deepfakes are intrinsically morally wrong, and if so, why. The main argument is that deepfake technology and deepfakes are morally suspect, but not inherently morally wrong. Three factors are central to determining whether a deepfake is morally problematic: (i) whether the deepfaked person(s) would object to the way in which they are represented; (ii) whether the deepfake deceives viewers; and (iii) the intent with which the deepfake was created. The most distinctive aspect that renders deepfakes morally wrong is when they use digital data representing the image and/or voice of persons to portray them in ways in which they would be unwilling to be portrayed. Since our image and voice are closely linked to our identity, protection against the manipulation of hyper-realistic digital representations of our image and voice should be considered a fundamental moral right in the age of deepfakes.
The burning
\"Anna and her mother have moved hundreds of miles to put the past behind them. Anna hopes to make a fresh start and escape the harassment she's been subjected to. But then rumors and whispers start, and Anna tries to ignore what is happening by immersing herself in learning about Maggie, a local woman accused of witchcraft in the seventeenth century. A woman who was shamed. Silenced. And whose story has unsettling parallels to Anna's own. From Laura Bates, internationally renowned feminist and founder of the Everyday Sexism Project, comes a debut novel for the #metoo era. It's a powerful call to action, reminding all readers of the implications of sexism and the role we can each play in ending it.\"-- Amazon.
The Bullying Phenomenon and Handling Efforts in Reducing Cases of Bullying: A Systematic Review
Introduction: Bullying is behavior that deliberately wants to dominate, hurt, or get rid of its victims, both directly (physical) or indirectly (verbal). The impact of bullying can cause psychological distress and if left untreated will worsen the victim to the point of committing suicide. This study aims to find out the most appropriate types of interventions that can be implemented to reduce intimidation and prevent the risk of suicide by using systematic reviews based on PRISMA guidelines. Methods: The studies were searched in five databases: Scopus, ScienceDirect, Proquest, Pubmed and CINHL and had to be published from 2014-2019. The articles were identified using the keywords “bullying” AND “intervention”, “anti-bullying program”. Results: 14 articles found were used using this systematic review. The article reviewed mentions that an antibullying program that involves several parties has the benefit of reducing bullying. Conclusion: Several intervention efforts can be used in preventing recurring breaches and can also be used as promotive and preventive efforts in cases of bullying in schools and communities.