SlideShare a Scribd company logo
The Effect of Environment on Personality
Causes of Juvenile       		Delinquency
Delinquents grew up with violence
They feel they aren’t important
They Continuously Fail at School
No Quality Time With Family
Guardians Have  Strict Rules
Delinquents have too much freedom
Causes of White Fang’s Viciousness
White Fang Never Received Love
He was beat quite often
He Grew Up With Fighting
He Was Not Allowed Freedom
What can Change a Juvenile Offender
Show  They  Have A Caring Family
They Need to Have Attention
They Could Get A Counselor
They Need Rules and Consequences
What Changed White Fang
He Got Attention
He Didn’t  Get Beat  Anymore
He Didn’t Fight Other Dogs

More Related Content

What's hot

Eldery abuse 2014
Eldery abuse 2014Eldery abuse 2014
Eldery abuse 2014Mdunnam
 
National Teen Dating Violence Awareness Month
National Teen Dating Violence Awareness MonthNational Teen Dating Violence Awareness Month
National Teen Dating Violence Awareness Month
Violence Free Coalition of Warren County
 
Teen Abusive Relationships
Teen Abusive RelationshipsTeen Abusive Relationships
Teen Abusive Relationshipskellyrockwood
 
Elder Abuse Webinar
Elder Abuse WebinarElder Abuse Webinar
Dating violence
Dating violenceDating violence
Dating violence
Hansala Indrachapa
 
Elder abuse & neglect
Elder abuse & neglectElder abuse & neglect
Elder abuse & neglect
Stacey Troup
 
Womens Health 6
Womens Health 6Womens Health 6
Womens Health 6amoeba1945
 
Elder abuse prevention
Elder abuse preventionElder abuse prevention
Elder abuse prevention
Michael Friganiotis
 
Domestic violence Fear at home
Domestic violence Fear at homeDomestic violence Fear at home
Domestic violence Fear at homeNeha Borkar
 
Teen Dating Violence 101
Teen Dating Violence 101Teen Dating Violence 101
Abuse and neglect
Abuse and neglectAbuse and neglect
Abuse and neglectbholmes
 
Taking College Relationships Seriously
Taking College Relationships SeriouslyTaking College Relationships Seriously
Taking College Relationships Seriously
Chelsea Hernandez
 
Dating Violence Presentation
Dating Violence PresentationDating Violence Presentation
Dating Violence Presentationamieberlinski
 
Teen Dating Violence
Teen Dating ViolenceTeen Dating Violence
Teen Dating Violence
csmthprnll
 
Teen and Domestic Violence
Teen and Domestic ViolenceTeen and Domestic Violence
Teen and Domestic Violencemiguelpim
 
Teen Dating Violence Prevention
Teen Dating Violence PreventionTeen Dating Violence Prevention
Teen Dating Violence Prevention
mdalgarn
 
Red flags for Dating Abuse
Red flags for Dating AbuseRed flags for Dating Abuse
Red flags for Dating Abuse
Violence Free Coalition of Warren County
 
Bystander Awareness
Bystander AwarenessBystander Awareness
Bystander Awareness
mikewilhelm
 
Tdv 5 minute overview[1]
Tdv 5 minute overview[1]Tdv 5 minute overview[1]
Tdv 5 minute overview[1]abbymcginty
 
Psych powerpoint bpd
Psych powerpoint bpdPsych powerpoint bpd
Psych powerpoint bpdE Milanese
 

What's hot (20)

Eldery abuse 2014
Eldery abuse 2014Eldery abuse 2014
Eldery abuse 2014
 
National Teen Dating Violence Awareness Month
National Teen Dating Violence Awareness MonthNational Teen Dating Violence Awareness Month
National Teen Dating Violence Awareness Month
 
Teen Abusive Relationships
Teen Abusive RelationshipsTeen Abusive Relationships
Teen Abusive Relationships
 
Elder Abuse Webinar
Elder Abuse WebinarElder Abuse Webinar
Elder Abuse Webinar
 
Dating violence
Dating violenceDating violence
Dating violence
 
Elder abuse & neglect
Elder abuse & neglectElder abuse & neglect
Elder abuse & neglect
 
Womens Health 6
Womens Health 6Womens Health 6
Womens Health 6
 
Elder abuse prevention
Elder abuse preventionElder abuse prevention
Elder abuse prevention
 
Domestic violence Fear at home
Domestic violence Fear at homeDomestic violence Fear at home
Domestic violence Fear at home
 
Teen Dating Violence 101
Teen Dating Violence 101Teen Dating Violence 101
Teen Dating Violence 101
 
Abuse and neglect
Abuse and neglectAbuse and neglect
Abuse and neglect
 
Taking College Relationships Seriously
Taking College Relationships SeriouslyTaking College Relationships Seriously
Taking College Relationships Seriously
 
Dating Violence Presentation
Dating Violence PresentationDating Violence Presentation
Dating Violence Presentation
 
Teen Dating Violence
Teen Dating ViolenceTeen Dating Violence
Teen Dating Violence
 
Teen and Domestic Violence
Teen and Domestic ViolenceTeen and Domestic Violence
Teen and Domestic Violence
 
Teen Dating Violence Prevention
Teen Dating Violence PreventionTeen Dating Violence Prevention
Teen Dating Violence Prevention
 
Red flags for Dating Abuse
Red flags for Dating AbuseRed flags for Dating Abuse
Red flags for Dating Abuse
 
Bystander Awareness
Bystander AwarenessBystander Awareness
Bystander Awareness
 
Tdv 5 minute overview[1]
Tdv 5 minute overview[1]Tdv 5 minute overview[1]
Tdv 5 minute overview[1]
 
Psych powerpoint bpd
Psych powerpoint bpdPsych powerpoint bpd
Psych powerpoint bpd
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Environment Effect