¤@¡B½Òµ{°ò¥»¸ê®Æ Course Information | ||||||||||||||||||||||||||||
¬ì¥Ø¦WºÙ Course Title¡G (¤¤¤å)©Ê¼É¤O¬ã¨s (^¤å)STUDIES IN SEXUAL ASSAULT |
¶}½Ò¾Ç´Á Semester¡G110¾Ç¦~«×²Ä1¾Ç´Á ¶}½Ò¯Z¯Å Class¡GªÀ¤uºÓ¤@ |
|||||||||||||||||||||||||||
±Â½Ò±Ð®v Instructor¡G¹ù¬ü½¬ LIU, MEI-LIN MIRIAM | ||||||||||||||||||||||||||||
¬ì¥Ø¥N½X Course Code¡GMSW66901 | ³æ¥þ¾Ç´Á Semester/Year¡G³æ | ¤À²Õ²Õ§O Section¡G | ||||||||||||||||||||||||||
¤H¼Æ¨î Class Size¡G | ¥²¿ïקO Required/Elective¡G¿ï | ¾Ç¤À¼Æ Credit(s)¡G3 | ||||||||||||||||||||||||||
¬P´Á¸`¦¸ Day/Session¡G ¤@567¡@ | «e¦¸²§°Ê®É¶¡ Time Last Edited¡G110¦~09¤ë21¤é10®É11¤À | |||||||||||||||||||||||||||
ªÀ·|¤u§@¾Ç¨t(ºÓ¤h¯Z)°ò¥»¯à¤O«ü¼Ð Basic Ability Index | ||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||
¤G¡B«ü©w±Ð¬ì®Ñ¤Î°Ñ¦Ò¸ê®Æ Textbooks and Reference (½Ð×½Ò¦P¾Ç¿í¦u´¼¼z°]²£Åv¡A¤£±o«Dªk¼v¦L) |
||||||||||||||||||||||||||||
¡´«ü©w±Ð¬ì®Ñ Required Texts 1.Powell, A. & Henry, N. (2017). Sexual Violence in a Digital Age. London: Palgrave Macmillan. 2.Jeglic, E. L. & Calkins, C. (2016). Sexual Violence: Evidence Based Policy and Prevention. Switzerland: Springer. 3.Kelly, L. (1988). Surviving Sexual Violence. Cambridge: Polity. 4.Russell, D. (1986). The Secret Trauma: Incest in the Lives of Girls. Beverly Hills: Sage. 5.Scully, D. (1994). Understanding Sexual Violence: A Study of Convicted Rapists. London: Routledge. 6.Navarro, J., S. Clevenger, S. & C. Marcum (Eds). The intersection between intimate partner abuse, technology, and cybercrime. Canada: Carolina Academic Press. 7.Pearce, J. (Ed.) Child sexual exploitation: Why theory matters. Bristol, UK: Policy Press. ¡´°Ñ¦Ò®Ñ¸ê®Æº[ºô¸ô¸ê·½ Reference Books and Online Resources Reading List: 1.Susan McLeanµÛ¡B±iªé²EĶ¡]2020¡^¡C¡mºô¸ô¥¢±±¡X±¡¦â°Ç¯Á¡Bºô¸ôÅQâ¡B¹CÀ¸¦¨Å}µL©Ò¤£¦b!«Ä¤lªº¦w¥þ½Ö¨ÓÅU¡n¡C»O¥_¡G¦nÀu¡C 2.¼ï²Qº¡¡BªLªFÀs¡BªL¶®®e¡B³¯§ö®e¡]2017¡^¡C¡m105¦~«×¥xÆW°ü¤k¾D¨ü¿Ë±KÃö«Y¼É¤O²Îp¸ê®Æ½Õ¬d¡n¡C½Ã¥ÍºÖ§Q³¡«OÅ@ªA°È¥q©e°U¬ã¨s³ø§i¡C 3.¹ù¬ü½¬¡]2020¡^¡C¡qºô¸ô©Ê»¤©ä¡X¨à¤Ö¼v¹³©Êé«d¹ê°È¬D¾Ô ¡r¡C¡m·í¥NªÀ·|¤u§@¾Ç¥Z¡n¡A11¡A1-31¡C¨ú¦Û¡Ghttps://reurl.cc/kd8EpG 4.¹ù¬ü½¬¡]2019¡^¡C¡q¨«¶i¼h¼h±K«Ç¡Ð¿Ë±KÃö«Y©Ê¼É¤Oªº©w¸qºA¼Ë¡B²±¦æ²v»P¤u§@¬D¾Ô¤§¤åÄm¦^ÅU¡r¡C¡mªF§dªÀ·|¤u§@¾Ç³ø¡n¡A37¡A81-118. 5.¤ý¯\¬Â¡B¨H¼yÂE¡B³·R±ö(2021). ¿Ë±KÃö«Y¼É¤O¨¾ªv:²z½×¡B¬Fµ¦»P¹ê°È¡C»O¥_:¥¨¬y¡C 6.Sheley, E. (2018). A Broken windows theory of sexual assault enforcement. The Journal of Criminal Law and Criminology (1973-), 108(3) , 455-510.(57) 7.Vincent, N. (2017). Victims of cybercrime: definitions and challenges. In E. Martellozo & E. Jane (Eds), Cybercrime and its victims (pp.1-25). Oxon: Routledge. (21)(Ch1) 8.Martellozo, E. (2017). Online grooming: children as victims of online abuse. In E. Martellozo & E. Jane (Eds), Cybercrime and its victims (pp.108-128). Oxon: Routledge. (25)(Ch6) 9.Henry, N. & Powell, A. (2018). Technology-facilitated sexual violence: A literature review of empirical research. Trauma, Violence, and Abuse, 19(2), 195-208. 10.Megan K. Maas, M. K., Bray, B. C. & Noll, J.G. (2019). Online sexual experiences predict subsequent sexual health and victimization outcomes among female adolescents: A latent class analysis. Journal of Youth and Adolescence, 48:837-849. 11.Leary, G. M. (2016). The Language of Child Sexual Abuse and Exploitation. In C.B. Hessick (Ed), Refining Child Pornography Law: Crime, Language, and Social Consequence (pp.109-146). Michigan, USA: University of Michigan Press. (47)(Ch4) 12.Maddocks, S. (2018). From non-consensual pornography to image-based sexual Abuse: charting the course of a problem with many names. Australian Feminist Studies, 33(97), 345¡V361. 13.van Gijn-Grosvenor, E. L. & Lamb, M. E. (2016). Behavioural differences between online sexual groomers approaching boys and girls. Journal of Child Sexual Abuse, 25(5), 577-598. (21) 14.Scully, D. (1994). Nothing is Rape: justifying sexual violence. In D. Scully(Ed), Understanding Sexual Violence: A study of convicted rapists (pp.97-117).Oxon: Routledge. (20)(Ch4) 15.Russell, D. (1986). What actually happened? The characteristics of incestuous abuse. In D. Russell(Ed), The Secret Trauma: Incest in lives of girls and women (pp.92-101). Sage: Beverly Hills. (10)(Ch7) 16.Kellera, J., Mendesb, K. & Jessica Ringrosec (2018). Speaking ¡¥unspeakable things¡¦: documenting digital feminist responses to rape culture. Journal of Gender Studies, 27(1), 22-36. 17.Lamphere, R. & Pikciumas, K. (2016) Sexting, sextortion, and other internet sexual offenses. In J. Navarro, S. Clevenger & C. Marcum (Eds), The intersection between intimate partner abuse, technology, and cybercrime (pp.141-156). Canada: Carolina Academic Press. (16)(Ch7) 18.Powell, A. & Henry, N. (2017). Sexual violence: A feminist criminological analysis. In A. Powell & N. Henry (Eds), Sexual Violence in a Digital Age (pp.23-47). London: Palgrave. (25)(CH2) 19.Mathews, B. & Delphine Collin-Vezine, D. (2016). Child sexual abuse: Raising awareness and empathy is essential to promote new public health responses. Journal of Public Health Policy, 37(3), 304-314. 20.Smallbone, S. (2016) Situational prevention approaches. In E. Jeglic, & C. Calkins (Eds), Sexual Violence: Evidence Based Policy and Prevention (pp.145-160). Switzerland: Springer. (16) (Ch10) | ||||||||||||||||||||||||||||
¤T¡B±Ð¾Ç¥Ø¼Ð Objectives | ||||||||||||||||||||||||||||
¥»½Òµ{±N¥Ñ¤ß²z¡BªÀ·|¡B¤å¤Æ¼h±¡A±a»â¾Ç¥Í¥Ñ©Ê§O¡B©Ê¨ú¦V¡B±Ú¸s¡B¶¥¯Åµ¥¦V«×¡A±´°Q¼É¤O§Î¦¨ªº¦]¯À¡A¨Ã³z¹L¤k©Ê¥D¸qªÀ·|¾ÇÆ[ÂI¡A±´°Q©Ê§O¼É¤O¬ÛÃöijÃD¡A§Æ±æ¹F¨ì¤U¦C½Òµ{¥Ø¼Ð¡G 1.ÂǥѤåÄm¾\Ū¡B«ä¿ì»P°Q½×¤åÄm¡AÀ°§U¦P¾ÇÁA¸Ñ©Ê¼É¤O°ÝÃD¤§¬ÛÃö²z½×¤Î½×z¡C 2.±q²{¥N¤HªºÆ[©À¬Ý©Ê¼É¤O¡A±Òµo¦P¾Ç±q©Ê§Oµø¨¤À˵ø¦Û¨ªº³B¹Ò¡AÀ˵ø¨â©ÊªºÅv¤Oµ²ºc»P¤å¤Æ¦A²{¡C 3.'©Ê¼É¤O³Q®`¤H'¥DÅé¦a¦ìªº½T»{»P¬Ù«ä¡AªÀ·|¤u§@±M·~¹ï'Òij'ªººA«×»P¥i¯àªº¦ì¸m¡C |
||||||||||||||||||||||||||||
This course is designed to investigate the factors of sexual assault in terms of gender, sexual orientation, ethnic, class and other dimensions through psychological, social, and cultural aspects. By discussing issues related to gender-based violence adopting feminism sociological perspectives, the objectives of this course are as follows: 1) To facilitate students¡¦ understanding of sexual violence theories and its discourse; 2) to inspire students to examine their own situation from a gender perspective, as well as gender power structures and cultural reproduction; 3) to encourage students¡¦ ongoing reflection with the dominant position of sexual violence victims and to aware that advocacy is at the foundation of social work GVB practice. ¡@ |
||||||||||||||||||||||||||||
¥|¡B½Òµ{¤º®e Course Description | ||||||||||||||||||||||||||||
¡´¾ãÅé±Ôz Overall Description **׽Ҿǥͪ`·N¨Æ¶µ¡G 1.¥»½Òµ{©ó²Ä¤@¶g¿ï¥X2¦W¦P¾Ç¾á¥ô½Òµ{¤§¸q°È½Ò¥Nªí¡At³d¼v¦L»P¤À°t¾\Ū¤Î§ë¼v³]³Æ¤§²ÎÄw¦w±Æ¡C 2.Ãö©ó±MÃD¡]¤fÀY¡^³ø§i¡G×½Ò¦P¾Ç½Ð©ó²Ä9~11¶g«e¿ï©w¥DÃD¨Ã´£¥XÀ˯Áªº¤åÄm»P±Â½Ò¦Ñ®v°Q½×¥DÃDªº¦X²z©Ê¡Ct³dµoªíªº¦P¾Ç¥²¶··Ç³ÆPPT»P´£¨ÑÅ¥²³³ø§i¯È¥»¤jºõ¡C 3.¨C¶g¤À°t¤åÄm¾ÉŪ¡A¾ÉŪ¦P¾Ç¶·©ó«e¤@¶g¥ý¤W¶ÇºKn¡AºKn¤º®eªº§¹¾ã«×¥ç§@¬°µû¤Àªº¨Ì¾Ú¤§¤@¡Ct³d¾ÉŪªº¦P¾Ç¶··Ç³ÆPPT¡A»P¦³Ãö¾ÉŪ¤å³¹ªº©µ¦ù/«Øij¾\Ū¡A¾ÉŪ³Ì«á¡A´£¥X1-2Ó»P¥»½g¬ÛÃöªºÄ³ÃD¤Þ¾É¤j®a°Q½×¨Ã§@¬°µ²»y¡C 4.×½Ò¦P¾Ç¨C¶g¤W½Ò«e½Ð¥ý¾\Ū·í¶g¤W½Òªº¤åÄm¡A¨Ã±q¤åÄm§ä¥X1-2ÓijÃD°Q½×¡]½Ð¤Å´£»P½Ķ¬ÛÃöªº°ÝÃD©Î¬O²µª¦¡ªº´£°Ý³á¡I¡I¡^¡A©Î´£¥X¹ï¤å³¹ªº²z¸Ñ¡BÅGÃҩεûªR¡A¤S©Î¬O³sµ²¹ê°È®×¨Òªº¸gÅç¬ÒÅwªï¡C 5.¥»½Ò°ó¥Ñ©ó¥²¶·Ãöª`¦P¾ÇªºÁô¨p¡A¦b¥¼¸g¦P·N¤U¤£¯à¿ýµ¡C |
¡´¤À¶g±Ôz Weekly Schedule
|
¤¡B¦Òµû¤Î¦¨ÁZ®Öºâ¤è¦¡ Grading | ||||||||||||||||||||||||
| ||||||||||||||||||||||||
¤»¡B±Â½Ò±Ð®v½Ò·~»²¾É®É¶¡©MÁpµ¸¤è¦¡ Office Hours And Contact Info | ||||||||||||||||||||||||
¡´½Ò·~»²¾É®É¶¡ Office Hour 1.¶g¤T¤U¤È¬°»²¾É®É¶¡¡A«Ø½Ð¬ã¨s¥Í¥ý¥HEMAIL/²°T(0988337164)¹w¬ù¡C 2.½Òµ{¤¤¦p¦³¥ô¦óijÃD·Q¹ï¸Ü©Î¸ß°Ý, ¥çÅwªï³z¹Lemail°Q½×¡C |
||||||||||||||||||||||||
¡´Ápµ¸¤è¦¡ Contact Info
|
¤C¡B±Ð¾Ç§U²zÁpµ¸¤è¦¡ TA¡¦s Contact Info | |||||||||
| |||||||||
¤K¡B«Øij¥ý×½Òµ{ Suggested Prerequisite Course | |||||||||
´¿×²ß»P¤k©Ê¥D¸q©Î©Ê«I®`¥DÃD¬ÛÃö½Òµ{ªº¦P¾Ç©Î¦³¬ÛÃö¹ê°È¸gÅçªÌ¸û®e©ö»P¥»½Òµ{¹ï¸Ü¡C(¦ý¨Ã«D¥²n) | |||||||||
¤E¡B½Òµ{¨ä¥Ln¨D Other Requirements | |||||||||
1.¤£±Æ¥¸©Àì¤å¸ê®Æ¡C 2.Åwªï¹ï©Ê¼É¤O¥DÃD·P¿³½ìªº¦P¾Ç¥[¤J¿ïסC²Ä¤@¦¸¤W½Ò®É½Ð½Í½Í§AÓ¤H׳oªù½Òªº°Ê¾÷»P´Á«Ý¡A¦p¥»½Òµ{»P¦P¾ÇÓ§O´Á«Ý/·Q¹³¤£²Å®É¡A½Ð¦P¾Ç¦Û¦æ§PÂ_¬O§_¯à±µ¨ü³oªù½Òµ{ªº¥ß³õ¡C 3.¼¶¼g¬ã¨s³ø§iªº®æ¦¡¶·ª`·N¡G±ÄAPA®æ¦¡¡B¹q¸£¥´¦r¡A»²¥H«Ê±¡]µù©ú½Òµ{¦WºÙ¡B§@·~ÃD¥Ø¡B¦W¦r¡B¾Ç¸¹¡B¤é´Áµ¥¡^¡A¨Ã·Ç®Éú¥æ¡A«Y¬°²Å¦X¥»½Òµ{«~½èn¨Dªº§@·~À³³Æªº±ø¥ó¡C¦¹¥~¡AºëÅP¦a¤Þ¸g¾Ú¨å¡A¥[¤WÓ¤H¨£¸Ñ¡A¬O¼¶¼g¾Ç³N³ø§i¤§°ò¥»¯µ³Z¡C 3.¥Ñ©ó½Ò°ó¤¤ªº¤À¨É¥i¯à·|¯A¤ÎÓ¤H/©Î³æ¦ìªºÁô¨p¡A¦]¦¹ì«h¤W¤£§Æ±æ¥¼¸g¦P·N¦Ó¾Õ¦Û¿ýµ¡CY¦³¥²¶·¿ýµªºì¦]¡A¥²¶·¥ý¸g¹L¦Ñ®v»P¦P¾Ç¦P·N¡C | |||||||||
¤Q¡B¾Ç®Õ±Ð§÷¤Wºô¤Î±Ð®vÓ¤Hºô§} University¡¦s Web Portal And Teacher's Website | |||||||||
¾Ç®Õ±Ð§÷¤Wºôºô§} University¡¦s Teaching Material Portal¡G ªF§d¤j¾ÇMoodle¼Æ¦ì¥¥x¡Ghttp://isee.scu.edu.tw ªF§d¤j¾ÇTronclass¦æ°Ê¼Æ¦ì¥¥x¡Ghttps://tronclass.scu.edu.tw |
|||||||||
±Ð®vÓ¤Hºô§} Teacher's Website¡G | |||||||||
¨ä¥L Others¡G | |||||||||
¤Q¤@¡Bpµeªí¤½¥¬«á²§°Ê»¡©ú Changes Made After Posting Syllabus | |||||||||