SlideShare une entreprise Scribd logo
1  sur  12
Gender & Violence
                Aileen Wilson
                 Spring 2009
Depictions of masculinity in violent drawings by
   adolescent boys: a struggle for power and
                    intimacy
Gender & Violence Presentation
Gender & Violence Presentation
Gender & Violence Presentation
Gender & Violence Presentation
Gender & Violence Presentation
Gender & Violence Presentation
Gender & Violence Presentation
Gender & Violence Presentation
Gender & Violence Presentation
Gender & Violence Presentation
Gender & Violence Presentation

Contenu connexe

Tendances

Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2ellsummer
 
Evaluation Question 2 - How does our film represent certain characters?
Evaluation Question 2 - How does our film represent certain characters?Evaluation Question 2 - How does our film represent certain characters?
Evaluation Question 2 - How does our film represent certain characters?ljacksonmedia
 
Behavior application positive negative reinforcement
Behavior application positive negative reinforcementBehavior application positive negative reinforcement
Behavior application positive negative reinforcementbbrownfield
 
Behavior application positive negative reinforcement
Behavior application positive negative reinforcementBehavior application positive negative reinforcement
Behavior application positive negative reinforcementbbrownfield
 
The representation of gender within the horror film
The representation of gender within the horror filmThe representation of gender within the horror film
The representation of gender within the horror filmnykelly
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2ria patel
 
representation of particular social groups
representation of particular social groupsrepresentation of particular social groups
representation of particular social groupsgraveney
 

Tendances (15)

S3280713
S3280713S3280713
S3280713
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2
 
Hegemony in the Action Poster
Hegemony in the Action PosterHegemony in the Action Poster
Hegemony in the Action Poster
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2
 
Question 2
Question 2Question 2
Question 2
 
Evaluation activity 2
Evaluation activity 2Evaluation activity 2
Evaluation activity 2
 
Film proposal 2 - sa
Film proposal 2 - saFilm proposal 2 - sa
Film proposal 2 - sa
 
Evaluation Question 2 - How does our film represent certain characters?
Evaluation Question 2 - How does our film represent certain characters?Evaluation Question 2 - How does our film represent certain characters?
Evaluation Question 2 - How does our film represent certain characters?
 
Behavior application positive negative reinforcement
Behavior application positive negative reinforcementBehavior application positive negative reinforcement
Behavior application positive negative reinforcement
 
Behavior application positive negative reinforcement
Behavior application positive negative reinforcementBehavior application positive negative reinforcement
Behavior application positive negative reinforcement
 
Genre research
Genre researchGenre research
Genre research
 
The representation of gender within the horror film
The representation of gender within the horror filmThe representation of gender within the horror film
The representation of gender within the horror film
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2
 
representation of particular social groups
representation of particular social groupsrepresentation of particular social groups
representation of particular social groups
 

En vedette

L9 Machinic Assemblages
L9 Machinic AssemblagesL9 Machinic Assemblages
L9 Machinic AssemblagesChris Chesher
 
FELIZ VIDA 2009
FELIZ VIDA 2009FELIZ VIDA 2009
FELIZ VIDA 2009Maje
 
Transforming The SME a presentation by Prof. Sanjiva Dubey at the NASSCOM Fri...
Transforming The SME a presentation by Prof. Sanjiva Dubey at the NASSCOM Fri...Transforming The SME a presentation by Prof. Sanjiva Dubey at the NASSCOM Fri...
Transforming The SME a presentation by Prof. Sanjiva Dubey at the NASSCOM Fri...OMcareers Community
 
ESTRE Internship in Estonia, Tartu
ESTRE Internship in Estonia, TartuESTRE Internship in Estonia, Tartu
ESTRE Internship in Estonia, Tartusmileyaika
 
Highlighting Library Collections
Highlighting Library CollectionsHighlighting Library Collections
Highlighting Library Collectionsjohnbickar
 
Goed Opgenomen In Oase
Goed Opgenomen In OaseGoed Opgenomen In Oase
Goed Opgenomen In Oasehansbronkhorst
 
AIESEC EE_MT internship in MarkIT_for Denmark, Sweden, Norway
AIESEC EE_MT internship in MarkIT_for Denmark, Sweden, NorwayAIESEC EE_MT internship in MarkIT_for Denmark, Sweden, Norway
AIESEC EE_MT internship in MarkIT_for Denmark, Sweden, Norwaysmileyaika
 
Como asociar aprendices a una ruta de aprendizaje
Como asociar aprendices a una ruta de aprendizajeComo asociar aprendices a una ruta de aprendizaje
Como asociar aprendices a una ruta de aprendizajeJhonny Díaz
 
Responsive IT and Connected Business
Responsive IT and Connected BusinessResponsive IT and Connected Business
Responsive IT and Connected BusinessChris Haddad
 
Cims
CimsCims
CimsIsaR
 
Funny Pics
Funny PicsFunny Pics
Funny Picsrovuks
 
Group 4 - Digital Trends
Group 4 - Digital TrendsGroup 4 - Digital Trends
Group 4 - Digital TrendsAnthony Roman
 
Workshop Erfgoedhuis Zh
Workshop Erfgoedhuis ZhWorkshop Erfgoedhuis Zh
Workshop Erfgoedhuis ZhPetra1010
 
Campaigning with Social Media Unit 1
Campaigning with Social Media   Unit 1Campaigning with Social Media   Unit 1
Campaigning with Social Media Unit 1John Young
 

En vedette (20)

L9 Machinic Assemblages
L9 Machinic AssemblagesL9 Machinic Assemblages
L9 Machinic Assemblages
 
FELIZ VIDA 2009
FELIZ VIDA 2009FELIZ VIDA 2009
FELIZ VIDA 2009
 
Transforming The SME a presentation by Prof. Sanjiva Dubey at the NASSCOM Fri...
Transforming The SME a presentation by Prof. Sanjiva Dubey at the NASSCOM Fri...Transforming The SME a presentation by Prof. Sanjiva Dubey at the NASSCOM Fri...
Transforming The SME a presentation by Prof. Sanjiva Dubey at the NASSCOM Fri...
 
ESTRE Internship in Estonia, Tartu
ESTRE Internship in Estonia, TartuESTRE Internship in Estonia, Tartu
ESTRE Internship in Estonia, Tartu
 
Highlighting Library Collections
Highlighting Library CollectionsHighlighting Library Collections
Highlighting Library Collections
 
Goed Opgenomen In Oase
Goed Opgenomen In OaseGoed Opgenomen In Oase
Goed Opgenomen In Oase
 
AIESEC EE_MT internship in MarkIT_for Denmark, Sweden, Norway
AIESEC EE_MT internship in MarkIT_for Denmark, Sweden, NorwayAIESEC EE_MT internship in MarkIT_for Denmark, Sweden, Norway
AIESEC EE_MT internship in MarkIT_for Denmark, Sweden, Norway
 
7
77
7
 
Como asociar aprendices a una ruta de aprendizaje
Como asociar aprendices a una ruta de aprendizajeComo asociar aprendices a una ruta de aprendizaje
Como asociar aprendices a una ruta de aprendizaje
 
Miguel
MiguelMiguel
Miguel
 
Configure Switch Nortel 8600
Configure Switch Nortel 8600Configure Switch Nortel 8600
Configure Switch Nortel 8600
 
Responsive IT and Connected Business
Responsive IT and Connected BusinessResponsive IT and Connected Business
Responsive IT and Connected Business
 
Cims
CimsCims
Cims
 
Funny Pics
Funny PicsFunny Pics
Funny Pics
 
Dance Image Review
Dance Image ReviewDance Image Review
Dance Image Review
 
Group 4 - Digital Trends
Group 4 - Digital TrendsGroup 4 - Digital Trends
Group 4 - Digital Trends
 
Google Analytics
Google AnalyticsGoogle Analytics
Google Analytics
 
Workshop Erfgoedhuis Zh
Workshop Erfgoedhuis ZhWorkshop Erfgoedhuis Zh
Workshop Erfgoedhuis Zh
 
UX Proposal
UX ProposalUX Proposal
UX Proposal
 
Campaigning with Social Media Unit 1
Campaigning with Social Media   Unit 1Campaigning with Social Media   Unit 1
Campaigning with Social Media Unit 1
 

Plus de aileenwilson

Presentation judyfeb2012
Presentation judyfeb2012Presentation judyfeb2012
Presentation judyfeb2012aileenwilson
 
NAEA Research2011-Aileen
NAEA Research2011-AileenNAEA Research2011-Aileen
NAEA Research2011-Aileenaileenwilson
 
Cont Art and Education NAEA2011
Cont Art and Education NAEA2011Cont Art and Education NAEA2011
Cont Art and Education NAEA2011aileenwilson
 
Research Presentation Heather
Research Presentation HeatherResearch Presentation Heather
Research Presentation Heatheraileenwilson
 
NAEA Presentation 2010
NAEA Presentation 2010NAEA Presentation 2010
NAEA Presentation 2010aileenwilson
 
Teachingportfolio 2009
Teachingportfolio 2009Teachingportfolio 2009
Teachingportfolio 2009aileenwilson
 
Aileen Wilson- thesis
Aileen Wilson- thesisAileen Wilson- thesis
Aileen Wilson- thesisaileenwilson
 
Visualizing Research Design, NAEA Presentation 2009
Visualizing Research Design, NAEA Presentation 2009Visualizing Research Design, NAEA Presentation 2009
Visualizing Research Design, NAEA Presentation 2009aileenwilson
 
Drawing (violent) acts: Adolescent's search for meaningful expression, NAEA P...
Drawing (violent) acts: Adolescent's search for meaningful expression, NAEA P...Drawing (violent) acts: Adolescent's search for meaningful expression, NAEA P...
Drawing (violent) acts: Adolescent's search for meaningful expression, NAEA P...aileenwilson
 
Youth Cultures Presentation
Youth Cultures PresentationYouth Cultures Presentation
Youth Cultures Presentationaileenwilson
 
Examples Of Student Work from Fall 07
Examples Of Student Work from Fall 07Examples Of Student Work from Fall 07
Examples Of Student Work from Fall 07aileenwilson
 
Saturday Art School
Saturday Art SchoolSaturday Art School
Saturday Art Schoolaileenwilson
 

Plus de aileenwilson (18)

Presentation judyfeb2012
Presentation judyfeb2012Presentation judyfeb2012
Presentation judyfeb2012
 
Kristine NAEA
Kristine NAEAKristine NAEA
Kristine NAEA
 
NAEA Research2011-Aileen
NAEA Research2011-AileenNAEA Research2011-Aileen
NAEA Research2011-Aileen
 
Cont Art and Education NAEA2011
Cont Art and Education NAEA2011Cont Art and Education NAEA2011
Cont Art and Education NAEA2011
 
Courtney NAEA2011
Courtney NAEA2011Courtney NAEA2011
Courtney NAEA2011
 
Research Presentation Heather
Research Presentation HeatherResearch Presentation Heather
Research Presentation Heather
 
NAEA Presentation 2010
NAEA Presentation 2010NAEA Presentation 2010
NAEA Presentation 2010
 
Teachingportfolio 2009
Teachingportfolio 2009Teachingportfolio 2009
Teachingportfolio 2009
 
Openstudioimages
OpenstudioimagesOpenstudioimages
Openstudioimages
 
Aileen Wilson- thesis
Aileen Wilson- thesisAileen Wilson- thesis
Aileen Wilson- thesis
 
Youth Cultures
Youth CulturesYouth Cultures
Youth Cultures
 
Visualizing Research Design, NAEA Presentation 2009
Visualizing Research Design, NAEA Presentation 2009Visualizing Research Design, NAEA Presentation 2009
Visualizing Research Design, NAEA Presentation 2009
 
Drawing (violent) acts: Adolescent's search for meaningful expression, NAEA P...
Drawing (violent) acts: Adolescent's search for meaningful expression, NAEA P...Drawing (violent) acts: Adolescent's search for meaningful expression, NAEA P...
Drawing (violent) acts: Adolescent's search for meaningful expression, NAEA P...
 
Youth Cultures Presentation
Youth Cultures PresentationYouth Cultures Presentation
Youth Cultures Presentation
 
Examples Of Student Work from Fall 07
Examples Of Student Work from Fall 07Examples Of Student Work from Fall 07
Examples Of Student Work from Fall 07
 
NAEA 3 14 07
NAEA 3 14 07NAEA 3 14 07
NAEA 3 14 07
 
Saturday Art School
Saturday Art SchoolSaturday Art School
Saturday Art School
 
ADE 630 final
ADE 630 finalADE 630 final
ADE 630 final
 

Dernier

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 

Dernier (20)

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 

Gender & Violence Presentation

  • 1. Gender & Violence Aileen Wilson Spring 2009 Depictions of masculinity in violent drawings by adolescent boys: a struggle for power and intimacy