Premium Essay

Juvenile Detention Center By Cynthia Analysis

Submitted By
Words 457
Pages 2
In reality, money is a driven factor towards wealth and criminals want to earn money rapidly in order to take care of their families. Those individuals didn’t have the tools and skills that society want from employees, so this situation makes it even harder for them to change their lives. Cynthia also stated that based on her experience, she noticed that a lot of criminals were illiterate. Criminals feel frustrated and coming from a poor social class that has fewer opportunities and resources to achieve the American dream. One most important points to address is that those criminals know that they have a short satisfying lifestyle by doing crimes in order to ensure their family status which may be the financial relief that they have always wanted and to ensure that their children don’t follow their footsteps and to have those resources available for them so they can live a lifestyle that those criminals don’t have achieved …show more content…
Besides, average imamates typically had or has a parent in jail or been living with a single parent in a community that suffers from poverty. Also, some of those criminals have been self-raised and limited resources and skills which one essential component is a lack of knowledge of reading. This correlates with third generation jail experience that those individuals have been witnessing throughout their lives. During Cynthia’s time in the Juvenile detention center and interacting with the criminals, she found out that distrust and creating assumptions towards her ethnicity is a huge component. A lot of criminals didn’t want to talk to her because she was merely white which they thought that she didn’t go through any hardships or struggles growing which she felt upset and disappointed about because those individuals don’t know what Cynthia went through while growing

Similar Documents

Premium Essay

Art of Deception

...THE ART OF DECEPTION Controlling the Human Element of Security KEVIN D. MITNICK & William L. Simon Foreword by Steve Wozniak Scanned by kineticstomp, revised and enlarged by swift For Reba Vartanian, Shelly Jaffe, Chickie Leventhal, and Mitchell Mitnick, and for the late Alan Mitnick, Adam Mitnick, and Jack Biello For Arynne, Victoria, and David, Sheldon,Vincent, and Elena. Social Engineering Social Engineering uses influence and persuasion to deceive people by convincing them that the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology. Contents Foreword Preface Introduction Part 1 Behind the Scenes Chapter 1 Security's Weakest Link Part 2 The Art of the Attacker Chapter 2 When Innocuous Information Isn't Chapter 3 The Direct Attack: Just Asking for it Chapter 4 Building Trust Chapter 5 "Let Me Help You" Chapter 6 "Can You Help Me?" Chapter 7 Phony Sites and Dangerous Attachments Chapter 8 Using Sympathy, Guilt and Intimidation Chapter 9 The Reverse Sting Part 3 Intruder Alert Chapter 10 Entering the Premises Chapter 11 Combining Technology and Social Engineering Chapter 12 Attacks on the Entry-Level Employee Chapter 13 Clever Cons Chapter 14 Industrial Espionage Part 4 Raising the Bar Chapter 15 Information Security Awareness and Training Chapter 16 Recommended Corporate Information Security Policies Security at a Glance Sources...

Words: 125733 - Pages: 503

Premium Essay

Business

...C h a p t e r 1 Prewriting GETTING STARTED (OR SOUP-CAN LABELS CAN BE FASCINATING) For many writers, getting started is the hardest part. You may have noticed that when it is time to begin a writing assignment, you suddenly develop an enormous desire to straighten your books, water your plants, or sharpen your pencils for the fifth time. If this situation sounds familiar, you may find it reassuring to know that many professionals undergo these same strange compulsions before they begin writing. Jean Kerr, author of Please Don’t Eat the Daisies, admits that she often finds herself in the kitchen reading soup-can labels—or anything—in order to prolong the moments before taking pen in hand. John C. Calhoun, vice president under Andrew Jackson, insisted he had to plow his fields before he could write, and Joseph Conrad, author of Lord Jim and other novels, is said to have cried on occasion from the sheer dread of sitting down to compose his stories. To spare you as much hand-wringing as possible, this chapter presents some practical suggestions on how to begin writing your short essay. Although all writers must find the methods that work best for them, you may find some of the following ideas helpful. But no matter how you actually begin putting words on paper, it is absolutely essential to maintain two basic ideas concerning your writing task. Before you write a single sentence, you should always remind yourself that 1. You have some valuable ideas to tell your reader,...

Words: 234754 - Pages: 940

Premium Essay

Ethics

...ETHICS IN INFORMATION TECHNOLOGY Third Edition This page intentionally left blank ETHICS IN INFORMATION TECHNOLOGY Third Edition George W. Reynolds Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Ethics in Information Technology, Third Edition by George W. Reynolds VP/Editorial Director: Jack Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick Jr. Senior Product Manager: Kate Hennessy Mason Development Editor: Mary Pat Shaffer Editorial Assistant: Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission...

Words: 204343 - Pages: 818

Free Essay

Test2

...62118 0/nm 1/n1 2/nm 3/nm 4/nm 5/nm 6/nm 7/nm 8/nm 9/nm 1990s 0th/pt 1st/p 1th/tc 2nd/p 2th/tc 3rd/p 3th/tc 4th/pt 5th/pt 6th/pt 7th/pt 8th/pt 9th/pt 0s/pt a A AA AAA Aachen/M aardvark/SM Aaren/M Aarhus/M Aarika/M Aaron/M AB aback abacus/SM abaft Abagael/M Abagail/M abalone/SM abandoner/M abandon/LGDRS abandonment/SM abase/LGDSR abasement/S abaser/M abashed/UY abashment/MS abash/SDLG abate/DSRLG abated/U abatement/MS abater/M abattoir/SM Abba/M Abbe/M abbé/S abbess/SM Abbey/M abbey/MS Abbie/M Abbi/M Abbot/M abbot/MS Abbott/M abbr abbrev abbreviated/UA abbreviates/A abbreviate/XDSNG abbreviating/A abbreviation/M Abbye/M Abby/M ABC/M Abdel/M abdicate/NGDSX abdication/M abdomen/SM abdominal/YS abduct/DGS abduction/SM abductor/SM Abdul/M ab/DY abeam Abelard/M Abel/M Abelson/M Abe/M Aberdeen/M Abernathy/M aberrant/YS aberrational aberration/SM abet/S abetted abetting abettor/SM Abeu/M abeyance/MS abeyant Abey/M abhorred abhorrence/MS abhorrent/Y abhorrer/M abhorring abhor/S abidance/MS abide/JGSR abider/M abiding/Y Abidjan/M Abie/M Abigael/M Abigail/M Abigale/M Abilene/M ability/IMES abjection/MS abjectness/SM abject/SGPDY abjuration/SM abjuratory abjurer/M abjure/ZGSRD ablate/VGNSDX ablation/M ablative/SY ablaze abler/E ables/E ablest able/U abloom ablution/MS Ab/M ABM/S abnegate/NGSDX abnegation/M Abner/M abnormality/SM abnormal/SY aboard ...

Words: 113589 - Pages: 455