Preview

Applying Neefs Theory Of Protection Essay

Good Essays
Open Document
Open Document
550 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Applying Neefs Theory Of Protection Essay
Protection
The word protection is self-explanatory, as it refers to a safe environment where violence and discriminations is not present. As a boy, Moses grew up during the apartheid era. A time of oppression and discrimination, therefore we can speculate, as many other “black” individuals, Moses was shaped by discrimination and oppression. He was socialised into believing that he was inferior to others, less of a human and less of a man. Apartheid was about dehumanising black individuals and breaking them down to a point where they felt weak, lifeless and useless and at that point the “superior” race would exploit them. Furthermore, growing up around this environment Moses saw what it was like to be a powerless man by the individuals who surrounded him. His mother
…show more content…
Through his criminal acts, his need to control victims and have power over them was very present. If we speculate this could derive from the oppression and lack of protection he felt and saw in the environment growing up. We are well aware that violence was very predominate at this period in time (apartheid), violence was used as a way to control individuals and to exert power. The fear that accompanied violence, took away any chance Moses had in meeting his need to protection. By applying Neefs theory of development, we can conclude that the lack of protection provided to Moses as a boy shaped how he perceived what a man of power should be like. In addition, the lack of protection he received by his mother, when running to her could have triggered his anger towards women, as she did not protect him as a mother or parent should. Furthermore, Moses being sentenced to jail because of rapping Buyiswo Doris Swakamisa, fuelled his hatred even more, as he could have perceived her actions as a betrayal, lack of protection and wrong doing onto him. We can then speculate that by her reporting the rape, did an injustice to Moses, as he could have perceived it as she did not protect him just as his

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Develop and Implement policies and procedures to support the safeguarding of children and young people…

    • 1203 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It would take 3 (hop) messages to send a message from node D to node A. One additional link would be required to add a new node E between node C and node B. The added node E will increase the number of actual messages required to be sent form one node to another.…

    • 503 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Annie’s mother asks if it is safe to give Annie children’s aspirin because she has some at home. Her husband takes it as a “blood thinner.”…

    • 741 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Exodus Movie Analysis

    • 455 Words
    • 2 Pages

    In the Exodus passage, Moses was a timid man and when God first asked him to go to Israel, he denied and said he wasn’t worthy. He believed God should choose someone else in place of him. Moses had to become courageous and confident to do what God had asked of him. The movie, on the other hand, has Moses as a…

    • 455 Words
    • 2 Pages
    Good Essays
  • Good Essays

    SafePak will enter the market through the segment of young professionals. Young professionals are from the ages 22-35. They are a highly technologically inclined, intelligent, and informed subset of the millennial generation whom are emerging into high level positions, giving them an increase in expendable income. Young professionals are constantly on the go and live on the web, commonly shopping online to avoid the time of having to go into the store. As package theft continues to increase with the growth in ecommerce, SafePak believes Young Professionals will see the need for package security systems and actively seek them out. SafePak believes these factors create a perfect entry point into the market for early innovators…

    • 867 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Effective partnerships between agencies and professionals will promote continuity to ensure the safeguarding and wellbeing of children.…

    • 2031 Words
    • 9 Pages
    Good Essays
  • Good Essays

    • Write a brief description in your own words of the following laws, including where and when each law originated:…

    • 504 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Airport Security Essay 9

    • 850 Words
    • 4 Pages

    America on September 11, 2001 required that we reform our nation 's aviation security system in fundamental ways. Three years after the Sept. 11 tragedies, how far has airport and airlines come? It depends on the source. While it is important for airports to heighten security after the attacks of 9/11, the policies of profiling passengers are inadequate and a necessitate revision.…

    • 850 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    We’ve been told that Australia fought many wars (two World Wars, Vietnam, Afghanistan, Iraq & Syria) against oppression, tyranny and to help restore world peace & order. We’ve also been told that our government and low enforcement agencies will do whatever it takes to protect our way of live our freedom, democracy and security, and in recent years many lows have been granted to help keep Australia, its people and interest safe and secure, but yet stand totally disabled to do anything towards the crimes of South Sudanese thugs. So if we know what we cannot do to these criminal thugs maybe that will help us know how to deal with them!! The following lows are already in practice to protect Australian:-…

    • 655 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Write a brief description in your own words of the following laws, including where and when each law originated:…

    • 582 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The public defense system is a way for poor people accused of a crime who cannot afford an attorney that can actually put their full focus on defending them. The problem with this system is that the people who need to be defended are not treated with priority and are often forced to take a plea deal to save time, or are just not accurately represented during trial. This is not fair to the person accused of committing the crime, but not the fault of the public defender also. These defenders have no choice in the amount of cases they get and in the end, they cannot focus on one because they have a quote they each have to meet. In reasearch found by the US Department of Justice “about 73% of county public defender offices exceeded the maximum…

    • 420 Words
    • 2 Pages
    Good Essays
  • Better Essays

    In Connecticut's "Megan's Law" requires individuals charged and convicted of sexual offenses to register with the Department of Public Safety once they were release back into the community, and Department of Public Safety to place sex offender information including the offenders descriptions, photographs, names, and addresses on the World Wide Web.…

    • 1464 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Computers benefit from having all-in-one computer security systems installed for several reasons. The first is it makes the computer run at optimum performance. This means the computer will run faster and more efficiently. If a computer crashes and it has this software installed, the software has a system backup that will protect the information on the computer. The software will also tune up the computer to provide better performance. This software is effective because it keeps the computer safe. This software provides the computer owner with piece of mind. Without the software, anytime a computer is turned on with an internet connection, the computer is vulnerable to viruses, hackers, and other intrusive means of damaging the computer, or obtaining personal information. The all-in-one computer security systems include antivirus, antispyware and antiphishing software. This will block any viruses or outside intrusions into the computer. The software also includes a firewall, online identity protection, and website authentication. The online identity protection will protect a user’s confidential information from being accessed from their computer. Website authentication lets the user know if the website is one that can be trusted. Automated backup and restore will protect the computer from losing any of its information and will restore the system automatically. All-in-one computer security systems can also include antispam software, which will protect a users email being bombarded by spam. Basically, all of these features included in the all-in-one computer security systems will make it so the user can feel safe when turning on their computer. Users have so much personal information saved to their computer such as passwords, financial information, and other personal information that these all-in-one computer security systems are necessary to protect all of this information from hackers. If this information were to be obtained by one of these…

    • 413 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Explain the terms 'Threat Assessment' and 'Asset Assessment' and give two hypothetical examples of each.…

    • 5022 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.…

    • 508 Words
    • 2 Pages
    Satisfactory Essays