This 10th blog in this series of 10 on how to prevent being raped discusses what is still needed on the path toward a comprehensive rape prevention program. We begin by running through the varied goals of rape prevention programs and take a look at why they need to be...
This 9th blog in the series of 10 discusses effectively arming women. This blog begins by reiterating that women are under no obligation to carry weapons in case they are attacked by an assailant! With that out the way, we consider the effectiveness of both armed and...
This 8th blog in the series of 10 on how to prevent being raped discusses efficient strategies to prevent rape. We will begin by differentiating efficient versus inefficient strategies to prevent rape. Then we will take a look at some benefits of self-defence training...
This 7th blog in the series of 10 on how to prevent being raped discusses fighting back to avoid completed rape. We begin by looking at why fighting back against a rapist is so important, and critically consider the arguments as to why telling women to fight back...
This 6th blog in the series of 10 discusses male prevention programs for rape. This week’s article is particularly research-based as we take a critical look at the studies ‘demonstrating’ that rape prevention programs for men are a success. We examine the...
We use cookies to optimize our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.