Tesis sobre el tema "Police code"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "Police code".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Webber, Jason J. "Indiana Criminal Code 9-30-2-2 who does it protect? /". [Muncie, Ind.] : Ball State University, 2008. http://cardinalscholar.bsu.edu/375.
Texto completoMorrow, Jadi Leigh. "Creating the blue code: Identity, gender and class in a police training environment". Connect to online resource, 2008. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3303888.
Texto completoEde, Andrew y andrew ede@premiers qld gov au. "The Prevention of Police Corruption and Misconduct: A Criminological Analysis of Complaints Against Police". Griffith University. School of Criminology and Criminal Justice, 2000. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20030102.114721.
Texto completoAdams, Carole Helen. "#Balance' in pre-trial criminal justice : suspects' experience in the nick under the revised PACE Code of Practice C". Thesis, London School of Economics and Political Science (University of London), 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.307469.
Texto completoGonzales, Jean-Luc. "Le commissaire de police et l'hospitalisation d'office d'urgence : pour une application unique de l'article L. 343 du code de la santé publique". Clermont-Ferrand 1, 1995. http://www.theses.fr/1995CLF10160.
Texto completoFoltynová, Hana. "Návrh na zefektivnění vztahů mezi policisty a občany". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2011. http://www.nusl.cz/ntk/nusl-222854.
Texto completoIosca, Benjamin. "L'effectivité de la sanction des infractions au Code de la Route". Thesis, Toulon, 2014. http://www.theses.fr/2014TOUL0086.
Texto completoThe year 1992 marks an historic turning point in punishing infractions driving (licences) offences. Today each french citizen have a driving licence with a number of points that increases according to the offences. This autoproclamed pedagogical law, that it is hard contest the repressif and ambitions : eradicate roads deaths ; the target is parially achieved. But with more than 15000 death per 4000 in 30 years will a cost : a greater repression
Gelin, Carl. "Polisens Tystnadskod - Översikt kring yrkeskulturella normer och sanktioner och dess följder inom den svenska polisorganisationen". Thesis, Malmö högskola, Fakulteten för hälsa och samhälle (HS), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-25398.
Texto completoAncel, Baudouin. "Lois de police et ordre public dans le droit des conflits (XIIe siècle-XXe siècle) : genèse et réception de l'article 3, alinéa 1er du Code civil". Thesis, Paris 2, 2019. http://www.theses.fr/2019PA020043.
Texto completoThis research aims at shedding light on the historical background of the avatars of two mechanisms now integrated into the French system of private international law: lois de police (i.e. overriding mandatory rules) and (international) ordre public (i.e. public policy). Both share the common feature of opposing the normal interplay of choice-of-law rules and rely on Art. 3, para. 1 of the 1804 Civil Code. Preventing by pre-emption infringements of utilitas publica vel communis or reacting to them by eviction from the normally applicable law, these two types of norms have emerged from a common history beginning with the antecedents of prohibitive and territorial statutes identified by medieval romano-canonical commentators. Then members of the Dutch and French Schools adapted the two concepts to the prevailing hypothesis at the end of the Ancien Régime, that of conflicts of sovereignties. In 1804, lois de police and ordre public were collected in the French Civil Code. Thanks to the joint work of scholars and case law, on the one hand, and to a reaction to the hybrid notion of lois d’ordre public that emerged over the next century, on the other hand, the distinction between the two concepts was made possible at the turn of the 19th and 20th centuries. As conflict of sovereignties declined, leading to a loss of interest in public law, or even in criminal law, and as a more private-law-driven representation arose, without ignoring, however, growing state interventionism, the distinction has been confirmed between the two concepts: lois de police or d’application immédiate, promoting the utilitas communis, and exception d’ordre public, defending fundamental values
Evans, David Elliot 1971. "Policy-directed code safety". Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86424.
Texto completoMoll, Monica M. "HOW FAR HAVE WE COME? THE STATE OF POLICE ETHICS TRAINING IN POLICE ACADEMIES IN THE U.S". Kent State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=kent1461239418.
Texto completoHashii, Brant. "Policy-based protection against external programs via code transformation /". For electronic version search Digital dissertations database. Restricted to UC campuses. Access is free to UC campus dissertations, 2003. http://uclibs.org/PID/11984.
Texto completoDegree granted in Computer Science. Dissertation completed in 2003; degree granted in 2004. Also available via the World Wide Web. (Restricted to UC campuses)
Rezk, Tamara. "Verification of confidentiality policies for mobile code". Nice, 2009. http://www.theses.fr/2006NICE4099.
Texto completoLes politiques de flux d’information garantissent la confidentialité à travers l’absence de fuites d’information non-désirables pendant l’exécution des programmes. Ce travail propose des techniques statiques de spécification et de vérification pour les politiques de flux d’information. Trois majeurs parties composent ce travail. Dans la première partie, nous proposons des formulations pour la spécification des politiques de flux d’information au sein de programmes déterministes et non-déterministes, et qui peuvent être appliqués afin de caractériser logiquement des politiques de confidentialité dans des logiques temporelles et de programmation. Nous démontrons l’applicabilité de notre approche dans le contexte de plusieurs langages incluant un langage permettant la composition parallèle et un langage possédant des structures de données partagées et mutables. Dans la deuxième partie, nous proposons la spécification de la non-interférence, une politique de flux d’information particulière, pour un langage non-structuré semblable à la machine virtuelle Java (JVM) et qui inclut des objets, des méthodes, des classes avec héritage, et des exceptions. Nous définissons un système de type qui assure que les programmes typables tiennent la propriété spécifiée. Afin de fournir une application de la sécurité des langages dans le contexte de code mobile, nous proposons un système de type pour la non-interférence des programmes semblables aux programmes Java et montrons une connexion entre la typabilité d’un code source et celle d’un code machine de la JVM, en présence d’un compilateur non-optimisant et non-fiable
Sistany, Bahman. "A Certified Core Policy Language". Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/34865.
Texto completoStromberger, Joanne. "The Constitutionality of Dress Code and Uniform Policies". Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4725/.
Texto completoKingshott, Brian Frederick. "Ethics of policing a study of English police codes". Thesis, University of Exeter, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.272996.
Texto completoMwai, Paul Macharia. "Information security policy an investigation into rewriting the policy for Loreto College Msongari /". [Denver, Colo.] : Regis University, 2009. http://adr.coalliance.org/codr/fez/view/codr:148.
Texto completoAllen, Kara Christine. "Breaking the “At Risk” Code: Deconstructing the Myth and the Label". Digital Commons at Loyola Marymount University and Loyola Law School, 2014. https://digitalcommons.lmu.edu/etd/196.
Texto completoCastle, Joseph Roland. "An Organizational Analysis of Publishing the People's Code". Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/97952.
Texto completoDoctor of Philosophy
Publishing software and its associated source code for public use is a new phenomenon for U.S. federal government agencies. In August 2016, the White House issued the Federal Source Code Policy: Achieving Efficiency, Transparency, and Innovation through Reusable and Open Source Software (FSCP). The FSCP mandated executive-level agencies to publish at least 20% of their custom developed code as open source software (OSS). OSS is software that can be shared within a community of developers through accompanying licenses hosted in online code sharing platforms. The federal government has the responsibility to account for public spending, including spending for IT. The publication of OSS is one way the public can know about government spending. OSS additionally benefits the public by providing access to code, thus, making it the "People's Code." From 2016 to 2019, the progress of executive branch agencies in implementing the FSCP was mixed. This study examines whether and how organizational factors – cultural beliefs, public engagement, structural dimensions, and organizational location – affect agency policy implementation. The study uses the publication of OSS as an indicator of effective policy implementation, and it identifies the factors that hinder or aid publishing OSS. To arrive at a general understanding of agency efforts at policy implementation, I collected data from GitHub's application programming interface (API) and created a list of 23 of 24 executive-level agencies that published OSS both before and after the FSCP was issued. From these agencies, 25 participants from 20 agencies agreed to participate in the study. These participants were from software development units that minimally, moderately, or frequently published OSS. The sample consisted of participants from units mostly located outside a Chief Information Officer (CIO) office that focused on software development and data science activities. Grounded theory provided an approach for data collection with interviews and document collection, leading to continuous analysis for generating a theory of policy implementation for OSS publication. Units more frequently published OSS when they expressed views complementary to those of their parent organization and held advantageous cultural beliefs; practiced more and more varied public engagement through two-way communication, events, and electronic tools; had structures with less centralization, more formalization, more differentiation, and more coordination; and were located in the "middle" of an organization with fewer hierarchical layers. Additionally, some units expressed both cautionary and advantageous cultural beliefs suggesting beliefs alone are not enough to allow units to publish OSS. This study contributes to policy, public administration, and organization theory literatures. It enhances scholarship by examining a new phenomenon and aids practitioners by providing implications for consideration when implementing policy.
Soltner, Eugene F. "The factors of a voluntary school uniform policy". Diss., This resource online, 1997. http://scholar.lib.vt.edu/theses/available/etd-10022007-144802/.
Texto completoBurbidge, Anne Leslie. "Breaking the code, the 1995 immigration policy of the Reform Party of Canada". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0010/MQ30204.pdf.
Texto completoAllen, Kara C. "Breaking the "At Risk" Code| Deconstructing the Myth and the Label". Thesis, Loyola Marymount University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3641922.
Texto completoThe term “at risk” is a label that is used to describe students who encompass a host of prominent socially and politically constructed titles that are intended to simplify student understanding and awareness and allow for clear reporting. The purpose of this study was to demythologize the concept of “at risk” by creating the conditions for student voice and critical dialogue to emerge, through the use of narrative inquiry. This research hoped to provide an outlet for young people to find and use their own voices, while finding their own place within their lived histories. The research also aimed to raise awareness of the reality of the contemporary U.S. educational system: we often create policies and programs without considering the perspectives of the young people whom these services are designed to serve. Through critical narrative inquiry, six former student's engaged in unstructured interviews and a focus group. Through analysis of the data set, five themes emerged and include 1) relationships with bicultural adults who understand, 2) instrumentalizing pedagogy, 3) the impact of money-driven policy, 4) the awareness of limitations of opportunities, and 5) the overall theme of the transparency of hegemony. This research hoped to problematize the label in an effort to move toward an emancipatory understanding of how we speak about young people and make sense of the circumstances these young people must navigate through their education and their world.
Vile, Matthew. "Gun Control Policy Preference in Context: A Contextually Sensitive Model of Gun Control Policy Preferences". ScholarWorks@UNO, 2006. http://scholarworks.uno.edu/td/332.
Texto completoMargherita, Michelangelo. "Southern cone economic liberalization policies and the credibility constraint". Thesis, McGill University, 1995. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=23723.
Texto completoNalbant, Serkan. "An Evaluation Of The Reinspection Decision Policies For Software Code Inspections". Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/12605827/index.pdf.
Texto completoNever Reinspect&rsquo
and &lsquo
Always Reinspect&rsquo
do not exhibit the most appropriate outcomes regarding cost, schedule, and quality. Additionally, the study presents suggestions for further improving the cost, schedule, and quality of the software based on the analysis of the experiment factors.
Gaffney, Francis John Paul. "The New Jersey common policy on marriage preparation in light of the 1983 Code". Theological Research Exchange Network (TREN), 1989. http://www.tren.com.
Texto completoLeucht, Brigitte. "Transatlantic policy networks and the formation of core Europe". Thesis, University of Portsmouth, 2008. https://researchportal.port.ac.uk/portal/en/theses/transatlantic-policy-networks-and-the-formation-of-core-europe(c7bc66fb-334c-4bef-99c2-155eb4df6d73).html.
Texto completoKrentz, Caroline D. "A theoretical-integrative model of core curriculum policy-making". Thesis, University of Ottawa (Canada), 1989. http://hdl.handle.net/10393/20769.
Texto completoSerri, Seyed Hamidreza. "The World of the United States Foreign Policy Elite: A Case Study of the U.S. Foreign Policy Think Tanks' Debates in the General Elections of 2004, 2008, and 2012". FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2224.
Texto completoGeorge, William. "Explaining State Crisis Behavior Using the Operational Code". Master's thesis, University of Central Florida, 2014. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/6283.
Texto completoM.A.
Masters
Political Science
Sciences
Political Science; International Studies Track
Aktas, Arzu. "L'acquisition et la perte de la nationalité française : 1804-1927". Phd thesis, Université Paris-Est, 2011. http://tel.archives-ouvertes.fr/tel-00762429.
Texto completoMashiyi, Fidelia Nomakhaya Nobesuthu. "How South African teachers make sense of language-in-education policies in practice". Thesis, University of Pretoria, 2011. http://hdl.handle.net/2263/25180.
Texto completoThesis (PhD)--University of Pretoria, 2011.
Education Management and Policy Studies
unrestricted
Naz, Sajida. "Police and psychological trauma : a cross-cultural, mixed methodological study of how police cope with the psychological consequences of their work". Thesis, University of Huddersfield, 2012. http://eprints.hud.ac.uk/id/eprint/17132/.
Texto completoCalland-Jackson, Paul-Napoléon. "La politique sociale napoléonienne : De la charité chrétienne à une politique sociale d’état : L’organisation du salut public sous le Consulat et l’Empire : 1785 – 1815". Thesis, Versailles-St Quentin en Yvelines, 2015. http://www.theses.fr/2015VERS017S/document.
Texto completoThe revolutionaries of the period spanning 1789 – 1799 abolished the corps intermédiaires between the State and the People. According to the Declaration of the Rights of Man, no organisation or individual must step between the power and the plebeians. Thus, the Le Chapelier laws (among others) abolished the guilds, and successive governments attempted to eradicate the opposing forces of the regions and local « feudalisms ». However, when Napoleon Bonaparte took charge of the ship of State in November 1799, the country was in search of new references. The chief of the new government installed in February 1800 aimed to lay « masses of granite », that is to say stable institutions, on the soil of France.The creation of the Bank of France, of the Prefects, of the Lycées, Baccalaureate and Legion of Honour are well-known examples among many others. But the subject of this thesis is less famous, except perhaps for students and teachers of law. For in the heart of the new Civil Code of the French, there is the « spirit of fraternity » expressed in the Declaration of the Rights of Man and of the Citizen, and in the Constitution of the 5th of Fructidor. The Catholic Church no longer being – since the Concordat – the official State religion, but the religion of the majority of Frenchmen, the State replaced the duty of charity with civil fraternity. The First Consul (who was soon to be Emperor) added a clause to the Civil Code stipulating that parents must provide for their children, even as adults, if the latter are unable to do so (and vice versa).Throughout the era of the Consulate and First Empire, this thesis aims to show the development of structures of social solidarity, particularly via legislation, but also in relation to the institutions and policies of the State during this period. We will study (among others) the Civil Code in its context, the Maisons d’Education de la Légion d’Honneur, legislation on labour (particularly in relation to child labour), mutual aid societies (predecessors of the mutual insurance companies and trades unions of our times) and the welfare administrations. We will also cast an eye, in conclusion, over the unfinished projects developed under later regimes. In order to better situate this era in its context in relation to the 21st Century.The period of the Consulate and Empire was a great period for the creation of retirement pension funds, and the Emperor Napoleon even set down the principles which were to regulate this « right » that he wanted to extend to all trades. Our thesis therefore follows in the trail of the creation of these institutions and of the framework of daily life according to Napoleonic principles, a synthesis of the Old Regime and the ideals of 1789
Limon, Jesus Jr. "Impact of Parental Incarceration on Family Reunification| California Welfare and Institution Code 361.5| A Policy Analysis". Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10262385.
Texto completoThe purpose of this policy analysis was to examine Article 10: Dependent Children-Judgments and Orders, Welfare and Institutions Code (WIC) 361.5, which describes the criteria for offering or denying visitation and reunification services to incarcerated parents or guardians with their children in out-of-home care. This analysis begins with a historical overview of the incarceration explosion in the past decades, and its relation to children in out-of-home care. The policy analysis identifies systemic challenges faced by incarcerated parents as they make efforts to reunify and preserve their child-parent relationships. The analysis is based on Gil’s (1992) original nationally recognized framework and updated by Jimenez, Pasztor, Chambers, and Fujii, (2015). Limitations and alternative policy recommendations that could best meet these objectives are provided.
Dominic, P. A. "Language practices and identities of multilingual students in a Western Cape tertiary institution : implications for teaching and learning". University of the Western Cape, 2012. http://hdl.handle.net/11394/5193.
Texto completoIn South Africa, there has been little research into the language practices of multilingual students in tertiary institutions or into how such students negotiate identities in these globalising contexts where the dominance of English remains an important factor. This research was aimed at exploring the appropriateness of 1997 Language-In-Education policy for schools and the national Language Policy for Higher Education (2002) for equipping students for tertiary teaching and learning. It therefore investigated the relationship between the language practices and construction of identities of a group of multilingual first year students in the Education Faculty at a Western Cape university. In this integrated institution, in spite of the current political and socio-economic transformation that has been at the centre of new policies, the medium of instruction is still predominantly monolingual. The premise of the research was that in a multilingual country such as South Africa with 11 official languages, tertiary institutions ought to more vigorously engage with their current language policies in order to value and extend the language practices of multilingual students for academic learning. Here multilingual repertoires are understood as resources rather than problems. The research draws extensively on Bourdieu's notion of 'linguistic capital' quantifying language itself as a form of capital with a market value. Through thematic analysis of themes drawn from questionnaires, interviews, focus group discussions, and participant observation in both tutorials and lectures, the investigation concluded that a monolingual medium of instruction to non-native speakers should be practised alongside other languages as means to support in their academic attainment. Finally the research emphasised the importance of code switching as a strategy that facilitates learning and promotes understanding of the role language resources play in social and academic interaction.
Marttala, Amanda y Nicolina Ahlstedt. ""Kungens pojkar" : En kvalitativ studie om hur poliser kan legitimera kollegors anmälningsbara gärningar". Thesis, Linnéuniversitetet, Institutionen för samhällsstudier (SS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-61478.
Texto completoTrani, Brett. "Crises, consensus, and conviction : the core executive and the institutionalisation of British efficiency reforms". Thesis, University of Aberdeen, 2014. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225335.
Texto completoHöckerman, Kasper. "Aktörskoalitioner i svensk säkerhetspolitik : En analys av riksdagspartiernas inställning till Natomedlemskap". Thesis, Luleå tekniska universitet, Institutionen för ekonomi, teknik och samhälle, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74503.
Texto completoRay, Donald James. "A Quantified Model of Security Policies, with an Application for Injection-Attack Prevention". Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6133.
Texto completoKeeler, Rebecca L. "Analysis of Proposed Revisions to Ethics Code of American Society for Public Administration". Digital Commons @ East Tennessee State University, 2012. https://dc.etsu.edu/etsu-works/653.
Texto completoLiu, Chun. "China's telecommunications accomplishments, problems and the shape of the future to come /". online access from Digital Dissertation Consortium, 2006. http://libweb.cityu.edu.hk/cgi-bin/er/db/ddcdiss.pl?3248361.
Texto completoHatch, Walter. "Rearguard regionalization : protecting core networks in Japan's political economy /". Thesis, Connect to this title online; UW restricted, 2000. http://hdl.handle.net/1773/10327.
Texto completoFoley, Virginia P. "What Parents Should Know about Common Core". Digital Commons @ East Tennessee State University, 2013. https://dc.etsu.edu/etsu-works/5983.
Texto completoGray, Stacie J. "Achieving compliance with the World Anti-Doping Code : learning from the implementation of three selected international agreements". Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/35464.
Texto completoBonacina, Florence Marguerite. "Conversation analytic approach to practiced language policies : the example of an induction classroom for newly-arrived immigrant children in France". Thesis, University of Edinburgh, 2011. http://hdl.handle.net/1842/5268.
Texto completoBen, Hadj Fredj Abir. "Computations for the multiple access in wireless networks". Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLT030.
Texto completoFuture generations of wireless networks pose many challenges for the research community. In particular, these networks must be able to respond, with a certain quality of service, to the demands of a large number of connected people and objects. This drives us into quite important requirements in terms of capacity. It is within this framework that non-orthogonal multiple access methods (NOMA) have been introduced. In this thesis, we have studied and proposed a multiple access method based on the compute and forward technique and on Lattice codes while considering different lattice constructions. We have also proposed improvements to the algorithm for decoding the Sparse code multiple access (SCMA) method based on Lattice codes. In order to simplify the multi-stage decoders used in here, we have proposed simplified expressions of LLRs as well as approximations. Finally, we studied the construction D of lattices using polar codes. This thesis was in collaboration with the research center of Huawei France
Chaulet, Julia. "Etude de cryptosystèmes à clé publique basés sur les codes MDPC quasi-cycliques". Thesis, Paris 6, 2017. http://www.theses.fr/2017PA066064/document.
Texto completoConsidering the McEliece cryptosystem using quasi-cylcic MDPC (Moderate Density Parity Check matrix) codes allows us to build a post-quantum encryption scheme with nice features. Namely, it has reasonable key sizes and both encryption and decryption are performed using binary operations. Thus, this scheme seems to be a good candidate for embedded and lightweight implementations. In this case, any information obtained through side channels can lead to an attack. In the McEliece cryptosystem, the decryption process essentially consists in decoding. As we consider the use of an iterative and probabilistic algorithm, the number of iterations needed to decode depends on the instance considered and some of it may fail to be decoded. These behaviors are not suitable because they may be used to extract information about the secrets. One countermeasure could be to bound the number of encryptions using the same key. Another solution could be to employ a constant time decoder with a negligible decoding failure probability, that is to say which is about the expected security level of the cryptosystem. The main goal of this thesis is to present new methods to analyse decoder behavior in a cryptographic context.Second, we explain why a McEliece encryption scheme based on polar code does not ensure the expected level of security. To do so, we apply new techniques to resolve the code equivalence problem. This allows us to highlight several common properties shared by Reed-Muller codes and polar codes. We introduce a new family of codes, named decreasing monomial codes, containing both Reed-Muller and polar codes. These results are also of independent interest for coding theory
Welch, Ian Shawn. "Using a loadtime metaobject protocol to enforce access control policies upon user-level compiled code". Thesis, University of Newcastle Upon Tyne, 2005. http://hdl.handle.net/10443/2106.
Texto completoCole, LaQuitta D. "California welfare and institutions code § 369.5 authorization of psychotropic medication to California's dependent children A policy analysis". Thesis, California State University, Long Beach, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1527687.
Texto completoThe purpose of this policy analysis is to critically review the Welfare and Institutions Code§ 369.5, which regulates the authorization of psychotropic medication to treat mental disorders among California's dependent children. While these medications have been proven effective forms of treatment, there is a growing concern about their life threatening side effects.
Research has concluded that children exposed to chronic child abuse and neglect often present with behaviors indicative of trauma. The Diagnostic and Statistical Manual of Mental Disorders 5th Edition has included criteria for Post-Traumatic Stress Disorder (P.T.S.D.) in children. However, the Welfare and Institutions Code§ 369.5 does not mandate psychiatrists and pediatricians to first rule out trauma prior to diagnosing foster children with one or more behavior, mood, or psychotic disorders.
Results support amending child welfare legislation and policies to reflect a shift toward trauma-focused services, thereby reducing the reliance on potentially dangerous pharmaceutical drugs.