This assignment asks you to view the documentary, Private Violence, and then analyze it using concepts from assigned course content.
Use ONLY objective, neutral language. Do not use any evaluative or loaded language like “crazy,” “horrible, “awful,” “sick,” etc. There are substantial deductions for doing so. Do NOT discuss personal experiences with intimate partner or family violence. Most HUS professionals will interact with persons who have been abused either as children or adults. It is extremely important that you master the ability to remain calm and use neutral language when describing these events, as to otherwise risks further traumatizing your client and creating secondary trauma or burnout for yourself.
Before you watch the film
To watch the film
Use this link, Private Violence, to access the film. If you prefer, a transcript is attached above (Transcript_PrivateViolence.pdf).
Module 3 continues the discussion of child abuse. In this module, we explore sibling abuse, child exploitation, and finally, professional response to child abuse. Let’s begin with a discussion of sibling abuse. Experts believe that this form of abuse is the most common form of family violence in the United States; however, there are no accurate data on the extent of sibling abuse. Your text (Chapter 8) defines sibling abuse as any form of physical, mental, or sexual abuse inflicted by one child in a family unit on another. This definition does not require that the siblings be related by birth, because many live in reconstituted families due to divorce, separation and remarriage. Like other forms of violence, sibling abuse can be divided into physical, emotional, and sexual categories. Sibling abuse is more likely among children in families in which both child abuse and intimate partner abuse are present; however, sibling assaults are more frequent in families with child abuse than in those with intimate partner abuse. While boys are more likely than girls to engage in sibling abuse, both sexes participate in this form of family violence. Sibling abuse is an understudied area, and more research is needed to understand this type of abuse.
Next, Module 3 examines child exploitation. As discussed in Chapter 9, child exploitation is a severe form of violence against children, and may include sex tourism, prostitution, child pornography, and forced labor, recruitment into armed conflict, and human smuggling or trafficking. Trafficking can take place within or between countries. The internet often plays a key role in child exploitation, especially child pornography. In many instances, families play a direct or indirect role in allowing or promoting the exploitation of their own children. The United States government and those of other countries, as well as numerous NGOs (non-governmental organizations) are actively involved in efforts to eradicate child exploitation. For example, the U.S. Department of Justice maintains the Child Exploitation and Obscenity Section (CEOS) website and, in Thailand, ECPAT (End Child Prostitution, Child Pornography, and Trafficking of Children for Sexual Purposes), is an international NGO which seeks to eliminate sexual exploitation of children.
Module 3 concludes by discussing the professional’s response to child abuse. Chapter 11 notes that all states have mandated reporters—persons who are required by law to report suspected child abuse under specific circumstances. This reporting is a major form of intervention in the U.S. In addition, the U.S. government mandates data collection on child abuse by the National Child Abuse and Neglect Data System (NCANDS). The Children’s Bureau in the Administration on Children, Youth and Families, Administration for Children and Families, U.S. Department of Health and Human Services, collects and analyzes the data. The data are submitted voluntarily by the states, the District of Columbia, and the Commonwealth of Puerto Rico. NCANDS data are used for the Child Maltreatment Report, which is available on the Children’s Bureau web site or by contacting the Child Welfare Information Gateway. Sex offender notification laws are another form of intervention. By 2000, all states had adopted laws requiring notification to individuals and organizations. Many communities believe that sex offender notification laws afford them the opportunity to protect themselves from sex offenders. If child abuse is suspected, appropriate interviewing is critical. Skilled interviewers know how to avoid charges that they primed or suggested “correct” answers to the child. In some cases, the courts can remove children from their families, so the interview and rules of evidence are extremely important.
Readings and Resources
At Solution Essays, we are determined to deliver high-quality papers to our clients at a fair price. To ensure this happens effectively, we have developed 5 beneficial guarantees. This guarantees will ensure you enjoy using our website which is secure and easy to use.
Most companies do not offer a money-back guarantee but with Solution Essays, it’s either a quality paper or your money back. Our customers are assured of high-quality papers and thus there are very rare cases of refund requests due to quality concern.Read more
All our papers are written from scratch and according to your specific paper instructions. This minimizes any chance of plagiarism. The papers are also passed through a plagiarism-detecting software thus ruling out any chance of plagiarism.Read more
We offer free revisions in all orders delivered as long as there is no alteration in the initial order instruction. We will revise your paper until you are fully satisfied with the order delivered to you.Read more
All data on our website is stored as per international data protection rules. This ensures that any personal data you share with us is stored safely. We never share your personal data with third parties without your consent.Read more