1. BREAKING WALLS, BUILDING CONNECTIONS: Relational security in small-scale community-embedded youth justice facilities
- Author
-
Souverein, Fleur Anne and Souverein, Fleur Anne
- Abstract
Our (youth) justice systems are not laws of nature. What is considered ‘criminal behavior’ and appropriate responses to this behavior varies over time and place. Justice systems are grounded in societal norms and values, and are subject to socio-political, economic and scientific drivers of change. This dissertation reflects on reforms initiated in 2015 within the Dutch youth justice system. In light of these reforms three pilot facilities were set up to develop an alternative model for youth facilities: small-scale, community-embedded facilities, with an emphasis on relational security. This dissertation is based on a comprehensive three-year evaluation (from the end of 2016 to 2019) of these facilities. The overall objectives of this dissertation were to (1) examine the feasibility and potential efficacy of the small-scale community-embedded model on the spectrum of youth justice interventions, and (2) to explore how relational security, as the core of the security framework, can promote a safe and therapeutic environment. Chapter 2 provides an overview of the small-scale community-embedded facilities by outlining the key operational elements and conditions for implementation. Chapter 3 provides an insight into the factors related to successful placements in these facilities; and the factors related to premature termination of placement and transfer to a youth justice facility with higher levels of physical and procedural security. This is based on the perspectives of professionals involved in the screening process, young people placed in the facility and their parents. Chapter 4 explores how relational security is conceptualized in the facilities and how it contributes to safety. To do so, the perspective and experiences of unit staff and management, and young people and their parents are considered. Chapter 5 examines the conditions that are conducive to effective relational security. It is investigated how relational security, as the core of the security framew
- Published
- 2023
- Full Text
- View/download PDF