“My Voice Counts, Too”: Voting Participation Among Individuals With Intellectual Disability

2016 ◽  
Vol 54 (4) ◽  
pp. 285-294 ◽  
Author(s):  
Martin Agran ◽  
William E. MacLean ◽  
Katherine Anne Kitchen Andren

Abstract Despite a strong societal commitment to ensuring that individuals with intellectual disability (ID) fully participate in their communities, few people with ID vote. Little is known about voting experiences from the perspective of people with ID. In-person, semistructured interviews were conducted with 28 adults with ID (Mage = 37 years) to obtain their input on voting. Constant comparison and content analysis methods were used to characterize themes. Results indicated that people with ID are interested in voting and desire to be included in the voting process yet receive little education on political issues or on how to make voting-related decisions. Support from family or service providers and self-advocacy facilitated their ability to vote. Implications of these findings and recommendations for future research are discussed.

2020 ◽  
Vol 37 (4) ◽  
pp. 233-243
Author(s):  
Amy J. Walker ◽  
Frances M. Lewis ◽  
Abby R. Rosenberg

Background: Despite an awareness that parents experience distress and heightened uncertainty at the end of their adolescent’s treatment for cancer, little is known about the specific challenges and concerns parents hold for their adolescent survivors or how they manage these challenges. This study described challenges parents experience in the first year after their adolescent’s cancer treatment and what parents did to manage those challenges. Method: Single occasion semistructured interviews were conducted with parents and were transcribed verbatim. Data were coded using inductive content analysis methods adapted from grounded theory. Results: Participants were 30 parents of adolescent survivors (13-18 years) who were in the first year following treatment completion. The core construct, “Walking on Eggshells,” explained the processes and experiences parents faced once treatment was complete. Two additional domains captured how parents managed posttreatment challenges (“Doing What We Can”) and the ways parents helped their adolescents adjust (“Balancing”). Conclusion: Study results suggest that services and materials are needed to help parents know common struggles that arise after treatment and ways to mitigate the severity of distress parents experience.


2017 ◽  
Vol 22 (1) ◽  
pp. 83-100 ◽  
Author(s):  
Mary Margaret Kerr ◽  
Rebecca H. Price ◽  
Constance Demore Savine ◽  
Kari Ifft ◽  
Mary Anne McMullen

Thousands of children visit memorials and other dark heritage sites each year, yet researchers have rarely studied their experiences. Faced with limited prior research, interpreters at terrorism-related sites grapple with especially serious and unanswered questions about how best to engage young visitors. To address these concerns, the staff of the Flight 93 National Memorial, erected at the crash site of an airline hijacked on September 11, 2001, partnered with an interdisciplinary team of researchers. The team studied children's post-visit comments at the Memorial, adapting the content analysis methods of prior researchers who studied visitor comments, logs, and books. Children exhibited patriotism, grateful remembrance, emotional realizations, and a sense of place as they struggled to make meaning of the events. These findings led to relevant and understandable interpretive activities, which now comprise the Junior Ranger program for young visitors. The paper suggests implications for future research on interpreting terrorism-related events.


2018 ◽  
Vol 33 (3) ◽  
pp. 93-115 ◽  
Author(s):  
Lei Gao ◽  
Alisa G. Brink

ABSTRACT Cloud computing is increasingly popular across all sectors and offers users unparalleled scalability, elasticity, and flexibility. However, the rapid transition toward cloud computing has raised privacy and confidentiality concerns. Cloud service providers can access users' data, and private information may be accidentally or deliberately disclosed or used for unauthorized purposes. Privacy policies are intended to provide users with information about privacy practices and their privacy options. This study performs content analysis of the privacy policies of 47 cloud service providers who offer services to business users. This analysis identifies what information is collected and why, to whom the information is disclosed, and what measures are in place for data security, data retention, and data complaints. Additionally, we investigate the readability, uncertainty language, and linguistic tone of cloud service privacy policies. Our results offer implications for cloud service users, providers, and policymakers, and provide directions for future research. Data Availability: Data are available upon request.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ramji Nagariya ◽  
Divesh Kumar ◽  
Ishwar Kumar

PurposeThe purpose of this study is to carry out the systematic literature review, bibliometric analysis and content analysis of extant literature of service supply chain (SSC).Design/methodology/approachSystematic literature review (SLR) technique was used for identifying the research papers. In the first step after reading titles, abstracts and keywords and, full-length articles wherever required, papers not related to SSC were removed. In second steps papers were read more critically and papers not related to SSC were removed. Finally on 502 papers bibliometric and content analysis was further carried out. Content analysis was based on the clusters formed by bibliographic coupling. Further, content analysis of the recent articles revealed the current research trends and research gaps.FindingsThis paper identified the six existing research diversifications in SSC as (1) logistics SSC, (2) model, framework and conceptual papers, (3) third-party logistics service providers, (4) articles from various perspective, (5) measurement of quality and performance on services and (6) impact of adoption of technology, cooperation and branding on logistics service providers. Further, six future research directions are also provided.Practical implicationsThis research provides a clear view of the progression of publication, research diversification, research themes of six identified clusters, sub-themes of clusters and content analysis of each cluster. Content analysis of recent articles reveals the current research trend and future research directions.Originality/valueThis is a first of its kind of study which presents the diversification of research areas within SSC, bibliometric analysis, content analysis and provides actionable future research direction.


2018 ◽  
Vol 33 (6) ◽  
pp. 983-1011 ◽  
Author(s):  
Sarah Taylor ◽  
Yan Xia

With recent technological advances, cyber partner abuse has become increasingly problematic. The purpose of this study was to systematically review the existing literature on cyber partner abuse. This systematic review examines the characteristics and conceptualizations in the cyber partner abuse literature as well as the major topics the research has explored. Literature searches used keywords related to cyber partner abuse. In total, 37 articles were included in this review. Inductive qualitative content analysis methods were used to generate codes and themes from the identified articles. Results detail the study characteristics and conceptualizations in the cyber partner abuse research. Additionally, common thematic patterns reported by researchers in the literature are discussed. Specific recommendations for future research and practice stem from this review and are provided.


Author(s):  
Marlene Kunst

Abstract. Comments sections under news articles have become popular spaces for audience members to oppose the mainstream media’s perspective on political issues by expressing alternative views. This kind of challenge to mainstream discourses is a necessary element of proper deliberation. However, due to heuristic information processing and the public concern about disinformation online, readers of comments sections may be inherently skeptical about user comments that counter the views of mainstream media. Consequently, commenters with alternative views may participate in discussions from a position of disadvantage because their contributions are scrutinized particularly critically. Nevertheless, this effect has hitherto not been empirically established. To address this gap, a multifactorial, between-subjects experimental study ( N = 166) was conducted that investigated how participants assess the credibility and argument quality of media-dissonant user comments relative to media-congruent user comments. The findings revealed that media-dissonant user comments are, indeed, disadvantaged in online discussions, as they are assessed as less credible and more poorly argued than media-congruent user comments. Moreover, the findings showed that the higher the participants’ level of media trust, the worse the assessment of media-dissonant user comments relative to media-congruent user comments. Normative implications and avenues for future research are discussed.


2018 ◽  
Vol 19 (2) ◽  
pp. 48-64
Author(s):  
Umi Baroroh

Abstract: This research was conducted to find out how reward and punishment according to Irawati certainly does not conflict with the value of Islamic education. This is a library research the data of which were taken from several works of Irawati Istadi and direct interviews with her. The researcher also took some data from several researchers who discussed Irawati Istadi's thoughts and from Islamic education figures whose thoughts had relevance to the research theme. Content analysis methods is applied to draw conclusions. From this research, it can be concluded that the concept of reward and punishment according to Irawati Istadi turns out to be compatible with the Islamic education. However, in Irawati's thought, there are also some differences shows the development of thoughts from previous figures of Islamic education and certainly did not conflict with the values of Islamic education. Keywords: reward, punishment, Islamic education, Irawati Istadi, educator.


Author(s):  
Rogers Matama ◽  
Kezia H. Mkwizu

The purpose of this study was to explore the antecedents of family conflict in Uganda. A qualitative approach was used in this study. A sample size of 139 participants provided data which was subjected to content analysis. Results revealed that the core themes associated with family conflict are finances and priority of resources. Further findings show that differences in tastes and interests, selfishness and lack of communication played a key role as causes of family conflicts. The implication of this study is that finances and priority of resources are antecedents of family conflict in the context of Uganda. Therefore, the antecedents of family conflict that emerged from this study can be understood, defined and analyzed through the lens of social identity theory. Future research may include conducting quantitative studies with a particular demographic using the themes that have emerged from this study.


2020 ◽  
Vol 1 (2) ◽  
pp. 162
Author(s):  
Muhammad Iqbal

<strong>Abstrak: </strong>Studi ini membahas perspektif Syiah Imamiyah tentang dimensi tauhid. Dengan pendekatan tafsir al-Qur’an, tulisan ini mengungkapkan temuan bahwa Al-Qur’an sebagai pedoman bagi umat manusia memuat ayat-ayat tauhid yang merupakan asas dan dasar kajian Islam. Ayat-ayat ini diklasifikasi oleh ulama Syiah ke dalam dua kelompok. Kelompok pertama, ayat-ayat yang memuat tentang tauhid teoretis; pemikiran konsep serta pemahaman yang mentauhidkan Allah swt. baik dalam hal zat, sifat maupun perbuatan-Nya. Kelompok kedua adalah ayat-ayat yang mengulas tentang tauhid praktis atau yang disebut dengan tindakan atau amal yang berlandaskan tauhid teoretis. Pada gilirannya baik tauhid teoretis maupun tauhid praktis memiliki cabang dan variannya masing-masing.<br /><br /><strong>Kata Kunci</strong><strong>:</strong><strong> </strong>Syiah Imamiyah, tauhid, al-Qur’an<br /> <br /><strong>Abstract: Shia Imamiyah Perspective on Theology</strong>. This study examines the Shiite Imamiyah school of thought on the dimension of monotheism in the Qur’an. This study is a literature study where the works of Shiite scholars are analyzed by content analysis methods. This study is hoped to become as sufficient information about monotheism according to the Shiah school as explained by scholars of Shi’ism. This study proposes that there are two dimensions of monotheism in the Shia school, namely theoretical monotheism and practical dimensions. The theoretical dimension of monotheism constitutes three categories which include first, substance monotheism, second monotheism of character, and third, monotheism of action. In addition, the practical dimension in monotheism is divided into three namely monotheism in worship (<em>taw<span style="text-decoration: underline;">h</span>îd</em> ‘<em>ibâdah</em>), monotheism in obedience and observance, and monotheism in acquiring comfort and assistance.<br /> <br /><strong>Keywords:</strong> Shia Imamiyah, theology, Qur’an<strong></strong>


Sign in / Sign up

Export Citation Format

Share Document