Preview

Unit 5 Assignment 2 Ccld

Good Essays
Open Document
Open Document
1920 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 5 Assignment 2 Ccld
Models of Abuse
For the purpose of this assignment, the intention is to describe the four theoretical models of child abuse. The 4 models that I will be looking at are; the medical model of abuse, sociological model of abuse, psychological model of abuse and the feminist model of abuse. I will also be looking at the aspects of the theories that are similar or different. To conclude I also intend to evaluate the four theoretical models of abuse by identifying the advantages and disadvantages.
The Medical Model of abuse sees the abuse as an illness or a disease needing a cure. Kempe and Kempe were the inspiration for this theory when they described it as battered child syndrome. The battered child syndrome is a disease in which children are physically abused. The theory of Kempe and Kempe was correlated by Bowlby’s findings about the attachment theory. “Bowlby believed that the earliest bonds formed by children with their caregivers have a tremendous impact that continues throughout life.” (www.psychology.about.com, 01.03.2011). This quote tells us that Bowlby believed that children, who failed to form a bond with their mother in the first three years of their life, would have problems in later life bonding with people and trusting people. Therefore this tells us that it is very important that you comfort and reassure the child when they feel frightened or threatened. This will therefore prevent the child from abusing other children and young people. Babies communicate through crying which could indicate hunger, pain, tiredness and for attention. It is very important that you respond to these needs as this will help your child to get attached to you.
The advantage of the medical model is that parents who have abused their children can get treatment to help with bonding with their child. This is very important as Bowlby believed that attachment is necessary in the first three years of life. If the child is attached to their caregiver they are less likely to



Bibliography: (Havelin, K. (2000) Child Abuse “Why do my parents hit me?” Pg15). 01.03.2011 (Sgaglio, R. (2005). Forensic investigation handbook. Charles C Thomas Publisher. Pg146). 01.03.2011 http://childabusevictims.co.uk/childabusecases16.aspx, 01.03.2011 http://www.google.co.uk/url?q=http://en.wikipedia.org/wiki/Family_dysfunction&sa=X&ei=mdByTZzFMuF5AbP4J3LDQ&ved=0CAQQpAMoAA&usg=AFQjCNFTkUkAC_1kpdEDDkheSfA7jw5Lsw, 01.03.2011 http://psychology.about.com/od/loveandattraction/a/attachment01.htm, 01.03.2011

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 5 Assignment 2

    • 1305 Words
    • 4 Pages

    1. Which of the following types of LANs was a competitor of Ethernet LANs from the earliest days of wired LANs in the 1980s and into the 1990s? c. Token Ring…

    • 1305 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 5 assignment1

    • 309 Words
    • 2 Pages

    What type of install is the cable going into? Is everything in a fixed position? If you have an install where items are moved around without being disconnected, using highly flexible cable is necessary. Cables in these scenarios need to be flexible to meet those demands of mobility, and also for the life of the wire so that it does not crack, break, fray or short. We had a job at a university where we moved flat panels on a track system to create different screen sizes, and for that we had to make sure the cable would meet the demand.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 235 Words
    • 1 Page

    A common problem that happens is assuming as soon as DHCP options are changed that all PCs will automatically implement them.…

    • 235 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Unit 2 Assignment 2

    • 676 Words
    • 3 Pages

    1. Microsoft is aware that research was published at a security conference proving a successful attack against X.509 digital certificates signed using the MD5 hashing algorithm. This attack method could allow an attacker to generate additional digital certificates with different content that have the same digital signature as an original certificate. The MD5 algorithm had previously shown a vulnerability, but a practical attack had not yet been demonstrated.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 603 Words
    • 3 Pages

    In a 1-page paper, compare the different service provide types: RBOCS, ILEC, CLEC, MSO and ISP.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    C204 Unit 2 Assignment

    • 448 Words
    • 2 Pages

    In this paper I am going to be describing the Information Technology dress attire. I will be discussing what made the individual professional. I will also be talking about the career that I am going into and the attire that I have to wear while in that career field. I am going to be discussing what makes me a professional and what I learned from week 1.…

    • 448 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 299 Words
    • 1 Page

    The evolution of the Ethernet standards will have a large effect on data storage requirements. As the speeds of these connections continue to increase, users and businesses will be able to transfer larger files faster and will required larger data storage to accommodate the increased demand of resources. Thirty years ago, when the standard was only 10MB, there was nowhere near the need for the data storage capacity as there is today, with the current standard being 100 Gbit, with 1 Tbit on the way. Data storage wasn’t as high in demand before because it would take an extremely long amount of time to transfer large files, but as the speed increases, so will the demand.…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Unit 2 Assignment 1

    • 1912 Words
    • 8 Pages

    A heat sink is an electronic device that has been designed specifically to draw heat away from the CPU and prevent it from overheating. However, the heat sink itself can become too hot sometimes. So therefore, a fan is often used to keep cool both of the CPU and the heat sink.…

    • 1912 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Unit 2 Assignment 2

    • 340 Words
    • 2 Pages

    2401593 CVE-2010-3213: Vulnerability in outlook Web access could allow elevation of privilege. Microsoft Server Exchange 2003 and 2007…

    • 340 Words
    • 2 Pages
    Powerful Essays
  • Better Essays

    UNIT 2 ASSIGNMENT 1

    • 1061 Words
    • 5 Pages

    4. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two home telephones in the United States? (Choose two answers.)…

    • 1061 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Equity is money that belongs to the owner or owners and investors after all debts in relation…

    • 659 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 253 Words
    • 2 Pages

    3) Why would this affect child labor-Why is the labor force utilizing children-shouldn’t they be in school…

    • 253 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 2 assignment 2

    • 506 Words
    • 3 Pages

    Active Directory integrated zones must be hosted by Domain Controllers (DCs), and all Active Directory integrated zones are primary zones. Given this, we’re really talking about where to place Domain Controllers servicing the additional role of DNS server.…

    • 506 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 5 Assignment 2

    • 343 Words
    • 1 Page

    Today I read LET’S STOP SCARING OURSELVES by Michael Crichton. It is about a man who is taking a look back at his life and the different views that have captivated the country, and even the world, over his lifetime. He talks about the different scares like how power lines caused radiation that would cause cancer, how we would run out of natural resources like oil and gold by 1993, and how the population would be at 14 billion by 2030 which would cause starvation and famine before that. Each of these claims turned out to be nothing soon after they were publicized. Most people feared these things and would take drastic measures to avoid them, only to find out that they didn’t even exist in the first place.…

    • 343 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 352 Words
    • 2 Pages

    My name is Destiny Knott, my family and I have recently moved into a house overlooking the park in the neighborhood of Park Hall. I would like to draw your attention to some of the lewd and lascivious acts that take place daily in Park Hall. On many separate occasions up to several times a day, I have noticed from my window or front porch a crowd of undesirable individuals sitting on the benches. Numerous times these individuals have been seen drinking alcohol and carrying on very loudly, using the foulest kind of language. On another occasion my family and I have witnessed a violent fight occur right in front of the park where all of our children play. It is an outrage that our young innocent children should have to listen to and witness such inappropriate displays of behavior.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays