Monday, December 23, 2019
The Theory Of Attachment Proposed By John Bowlby And Mary...
The lectures, discussions in class, and chapter readings highlighted the importance of one of the characteristics of human nature, which is relationships and attachment. The course materials emphasized the critical role of relationship and attachment to the development of the children. The internship site also provided an opportunity for me to visualize different attachments and relationships between parent and child in action. As the chapter readings from the textbook explore different perspectives of relationship and attachment proposed by various theorists, the class discussions and lectures furthered my understanding and knowledge of parent-child relationships. In chapter 3, the theory of attachment proposed by John Bowlby and Mary Ainsworth is explored. First, Bowlbyââ¬â¢s theory of attachment was influenced by the ethological theorist, Darwin, Lorenz, and Tinbergen, who were previously mentioned in the chapter. Bowlby emphasized that behaviors found in animals, such as seeking close proximity from mothers to reduce the chance of becoming a prey, can also be found in toddlers. For example, Bowlby defined that actions such as following, crying out, and clinging found in children are displayed in order to keep close distance to parents is called attachment behaviors. Bowlby incorporates imprinting and instincts, which are ethological terms, to explain different phases of attachment. As the child develops through time, the attachment of child and parent deepens theirShow MoreRelatedThe Theory Of Love By Robert J. Sternberg1458 Words à |à 6 PagesIt can be applied to early development studies of attachment theory, such as those by Joh n Bowlby and Mary Ainsworth, and carried over to our studies of romance and love through the works of Robert J. Sternberg. Many of our class lessons have focused on cause and effect: childhood cause and adulthood effect. Thus it is not strange to note, Sternbergââ¬â¢s research, the triangular theory of love, is impacted by Bowlby and Ainsworthââ¬â¢s attachment theory. As we notice within each stage and style of relationshipRead MoreChildren and Young Peopleââ¬â¢s Development.1105 Words à |à 5 PagesJohn Bowlbyââ¬â¢s attachment theory has had a huge influence on practice. ââ¬Å"His work on maternal separation, attachment, and loss...has profoundly influenced practiceâ⬠, Pedder, (2010:p130). Bowlbyââ¬â¢s attachment theory talks about how important it is for a child to have a primary caregiver and how a child needââ¬â¢s to have a strong bond with their main carer. From Bowlbyââ¬â¢s research and theory there has been a great influence on policies and practi ce as, has been stressed how important it is to provide childrenRead MoreAttachment Theory On The Relationships Between Parents And Children And Primary Caregivers2037 Words à |à 9 PagesAttachment theory concentrates on the relationships between parents and children or parents and primary caregivers. According John Bowlby, the author of attachment theory, attachment is inborn and is as essential for survival as food, water, and air; it is an emotional, object specific relationship that develops towards a primary caregiver (Bowlby, 1969). Through series of experiments Bowlby explained the nature and the role of physical proximity of a child to a caregiver as a secure base for explorationRead MoreSecure Attachment Relationship Between Young Children And Their Families898 Words à |à 4 PagesSecure Attachment Relationship The mother is usually the first and primary object of attachment for an infant, but in many cultures, babies become just as attached to their fathers, siblings, and grandparents. When infants are attached to their caregivers, they gain a secure base from which babies can explore their environment and a haven of safety to return to when they are afraid. Attachment begins with physical touching and cuddling between infant and parent. Some babies become secure or insecureRead MoreEssay on Foundations and Characteristics of Attachment Theory1105 Words à |à 5 PagesAttachment Theory Attachment theory comes out of the work of John Bowlby. However, it finds its genesis in Freudââ¬â¢s Psychoanalysis. Bowlby himself was trained in psychoanalysis and became a qualified practitioner in the approach. In his early 20s, however, before he enrolled in medical school or in the Institute of Psychoanalysis, he worked with children with behavior problems. These two forces, these experiences, perhaps formed the foundation and later development of his Attachment Theory. SpurredRead MoreTheories And Research Studies Into Attachment1227 Words à |à 5 PagesBiological, development or social approaches to psychology WIZ204 Evaluate theories and research studies into Attachment. Bowlbyââ¬â¢s theory of attachment The theory of attachment was first proposed by a British psychoanalyst John Bowlby (1907-1990) who described it as a ââ¬Ëlasting psychological connectedness between human beingsââ¬â¢ (1988). According to psychologist Mary Anisworth attachment ââ¬Å"may be defined as an affectional tie that one person or animal forms between himself and another specific one-aRead MoreBowlby s Theory Of Attachment1431 Words à |à 6 PagesPerhaps the most influential explanation of attachment was presented by John Bowlby who began developing his ideas in the 1940s. Bowlby was commissioned by the World Health Organisation to investigate whether young children were likely to be harmed if they are separated from their mothers in the early years. (Hayes, 1996). Bowlby (1951) reported that infants possesses an innate need to attach to one main attachment figure (this was usually the mother). According to Hayes (1996), this is a specialRead MoreThe Development of Attachment Essay793 Words à |à 4 PagesThe Development of Attachment Psychological research can inform us about the development of attachments to a certain extent. Mary Ainsworth actually covered a definition explaining, how we know when an attachment has developed. This is; the infant tries to get close to and maintain that proximity with the caregiver, using a number of strategies to do so. E.g. clinging and signalling behaviours such as smiling, crying and calling. The fact she has outlined this definitionRead MoreSocial And Emotional Development : John Bowlby1402 Words à |à 6 Pagesbond of attachment to another person is regarded as a foundation for successful social and emotional development. ââ¬Å"It has been observed that children with secure attachments are more socially competent than those with insecure attachmentâ⬠(Neaum. S. 2010). By the child having formed secured relationships it enables them to engage with the world with a sense of confidence and self-esteem. children who have secure attachments are also known to show more co-operative behaviour. John Bowlby was bornRead MorePsychology is not just common sense1300 Words à |à 6 Pagesto disprove misconceptions and theories conceived out of said common sense. The majority of laymen believe that if an infant is not securely attached to its caregiver, it must have no sense of attachment at all. Moreover, they assume blindly that there will be no in-betweens. However, psychology shows that there is much more to it when it comes to attachment styles. There are in fact, three main types of attachment styles that make up the crux of the Attachment Theory, which will be explored in further
Sunday, December 15, 2019
The Lackawanna Cutoff Free Essays
The Lackawanna Cutoff is an architectural work of art. It started a new era of Railroading and brought many new ideas to the table. The Cutoff was used for many things and was traveled by thousands of people throughout the years. We will write a custom essay sample on The Lackawanna Cutoff or any similar topic only for you Order Now The Lackawanna Cutoff was a 28-mile long; double-track mainline constructed by the Delaware, Lackawanna, and Western Railroad companies between the years of 1908-1911. The rail line ran from Port Morris, New Jersey to Slateford, Pennsylvania.According to Fred Stratton, from Fredââ¬â¢s interactive Erie Railroad website, The Cutoff founded the use of reinforced concrete on an enormous scale, as well as the use of massive cutting and filling. These methods would all later become standard procedures in railroad construction. Starting about 1905, more than a ten potential routes between Port Morris, New Jersey and Slateford, Pennsylvania were surveyed. The Lackawanna Cutoff was not one of the early possibilities surveyed. The Lackawanna Cutoff plan would run directly from Slateford, Pennsylvania, to Port Morris, New Jersey.Robert Savino, of the website GSMRRClub said, it was exactly 28. 45 miles in length. He said that the Cutoff plan reduced the maximum grade of 60. 2 feet per mile, which was the lowest of all the other surveyed routes, to 29. 04 feet per mile. The Cutoff required exceptionally heavy cuts and fills totaling over 15 million cubic yards, according to Fred Stratton. The Lackawanna Railroad company had to purchase over 760 acres of farmland for ââ¬Å"borrow pits. â⬠They had to scoop out the earth and gravel to a depth of twenty feet and hauled it up to the top of the embankments. This left large lakes where there were formerly level grounds. Concrete was used as the main material for the construction of signal towers, stations, and the highway crossings. There was not a single at-grade crossing on the Cutoff. According to Robert Savino, ââ¬Å"at one time, ten steam shovels were at work on one fill alone, resembling work on the Panama Canal. â⬠Five million pounds of dynamite were used in to break apart the hills to create the cuts. The Lackawanna Cutoff opened to service on the Christmas Eve of 1911. The Cutoff was built for speed. Not one curve on the whole track had a speed limit of less than 70 miles per hour. With curves having superelevation, the speed limit was later raised to 80 miles per hour. According to Fred Stratton, ââ¬Å"No official record exists of over speed operations on the Cutoff, but ââ¬Å"making up timeâ⬠on the schedule when trains were late during the is reported to have occurred, with speeds in excess of 100 miles per hour having been attained on occasion. â⬠By 1979, the Cutoff had been placed out of service. This meant that all maintenance on the line was stopped.Ironically, a company, Conrail, had just changed many of the crossties on the Cutoff in 1976, so the line was in the best shape it had been in nearly 15 years. The Lackawanna Cutoff was the first of its kind. It showed architects that anything was possible no matter how big the project. Sadly it is no longer in use, but you can still visit the historic sites it has left behind.Works Cited Stratton, Fred. ââ¬Å"LACKAWANNA CUTOFF. â⬠FREDââ¬â¢S INTERACTIVE ERIE RAILROAD PAGE. 19 Oct. 2006. Web. 8 Nov. 2010. Savino, Robert J. ââ¬Å"The Lackawanna Cutoff ââ¬â Then Now. â⬠GSMRRClub. 12 Nov. 2009. Web. 8 Nov. 2010. How to cite The Lackawanna Cutoff, Papers
Saturday, December 7, 2019
Cryptography Essay Example For Students
Cryptography Essay Cryptography is the science of encoding a message into a form that is unreadable and making sure only the proper people are capable of decoding the message back into its original form. This is usually done by using an encryption algorithm and a decryption algorithm (these two are often the same) and very often a secret key. Some of the early cryptographic systems did not use a key but instead kept the algorithm itself secret. The message sender uses the encryption algorithm and the key to encode the message, and then sends it to the receiver. The receiver then uses the decryption algorithm and the key to turn back the encrypted message into its original form and read it. If the message is intercepted on the way by a third party, they will only have unreadable data and will have gained nothing, unless they can figure out the decryption algorithm and obtain the key. This is why the key is never to be sent with the message, and has to be kept secret at all cost. If the key is compromise d, the sender and the encrypted data is no longer safe. The sender and the receiver then usually agree on a new key to prevent any further damage. In ancient Greece, around 550 Bc, messages were sent encoded to generals and could only be decoded using special staff keys. The key actually consisted of a physical object, which was applied on the message to get the decrypted version of it. In 50 Bc., one of the most simple cryptographic algorithms ever used was the one called the Caesar cipher, that was used by Julius Caesar to send messages to his generals. It consisted simply of switching each letter with the letter that was 3 letters further down the alphabet. For example Stephen would become Vwhskhq. To decrypt the message, the receivers would simply subtract 3 letters from each letter. This algorithm was later improved and called ROT13, where the letters could be shifted to any number between 1 and 25, and the number of letters shifted was the secret key. This very simple algorith m has been used on Usenet successfully to prevent people from inadvertently reading materials they might find offensive. Monoalphabetic substitution is another simple step away from the ROT13 algorithm. In this algorithm, each letter correspond to another letter but in no particular order. For example a = d, d = x, f = e, etc for all 26 letters. This made it much harder to break but also made fairly big keys that couldnt be memorized, since they consisted of 26 pairs of letters. In France during 1585, members of the kings court liked to send romantic or gossip messages to each other and encrypt them for safety, which becomes almost a necessity. Blaise de Vigenere came up with a poly-alphabetic substitution known as the Vigenere cipher. Basically, the algorithm would encrypt messages several letters at a time instead of letter by letter. For example ab = fh, th = sq. To simplify the huge keys it would require, the key was broken into a table and a key, the table was fairly big but the key was small enough to be memorized, and the table was useless without the key. This cipher wasnt totally safe but no t otally sure method to break it was developed before early in the 20th century. During World War I, American troops used native Indians to send messages over the radio, which could only be understood by other native Indians, and absolutely nobody in Germany could understand it. Also in World War I (most cryptographic algorithms are developed for wars), the Playfair algorithm is developed by the Allies, the key, like in the Vigenere cipher, is based on a little table and a short keyword, which were both changed periodically. The rules used with the table were much more complex and made it fairly safe. In World War II, however, the Germans gave up on abstract algorithms and came up with a physical encrypting/decrypting machine called the Enigma. It had different wheels of different sizes which were to be tuned differently depending on the date, the different turnings were listed in a little booklet that came with the machine. It wasnt broken before the Allies finally managed to capture enough pieces of the machine and collect enough data from operating errors by the Germans. Whitfield Diffie and Martin Helbman (1976) come up with the notion of Public Key Cryptography. In 1977, RSA (Ronald L. Rivest, Adi Shamir and Leonard M. Adleman) develops a Public Key algorithm based on large prime numbers that is theoretically impossible to break in a reasonable amount of time. Digital signatures were also made possible. 1991, PGP (Pretty Good Privacy) reuses an algorithm very similar to RSAs and gets posted on the web. Phil Zimmerman gets sued for both exporting cryptographic data and violating copyright laws. A new version of PGP is quickly developed which is different enough from RSAââ¬â¢s to be marketed. Because of its broadcasting on the web and the fact that it is freeware, PGP becomes one of the most widespread crypto systems. Now, we will quickly go over the concepts of public key cryptography and the global idea of how the RSA algorithm works (or PGP, they are al most the same), as well as digital signatures and ââ¬Å"digicashâ⬠. I will also explain the general methods used to break most ciphers. I cannot however explain in detail because I cannot broadcast that kind of information without breaking the law which I will explain later. Public Key Cryptography The main problem with most cryptographic algorithms is that they are vulnerable to having the key exposed, and the key has to be agreed on by the sender and the receiver ahead of time. This means that when the sender and receiver exchange keys the first time, there is an opportunity for a third party to capture the key (or whenever keys are changed, in many cases keys were changed periodically for additional safety). This is exactly what public key cryptography avoids. The receiver of the message sends his public key to the sender. It is a public key, so it doesnt matter if the whole world knows the key or not. The key can only be used to encrypt data, not decrypt it. Then the sende r will encrypt the message with the public key and send it to the receiver. Once the receiver received the data, he takes his private key and uses it to decipher the data. Note that the private key was never transmitted by the receiver to anyone, so it is almost invulnerable to exposure. Also note that the public and private keys work in pairs. There is only one private key associated with each public key and vice versa, and ideally it is impossible to find one key from the other one. If someone intercepts the message he gets only an unreadable encrypted version of it, and using the public key or any other incorrect key used with the decryption algorithm will simply generate another series of numbers. If the receiver wants to reply to the sender, the sender has to have his own set of private and public key as well, and then the whole story goes on again the other way around. Ideally, there is even a phonebook of all public keys so that anybody could send an encrypted message safely to anybody else by simply looking up that persons public key. The RSA Algorithm The RSA algorithm is based on large prime numbers. One very interesting property of large prime numbers is that it is very hard to find out wether a very large number is a prime, and if it is not, finding out what numbers it is a product of can be very hard too. So if we take two (very) large primes and multiply them together, we get a number that is almost prime, and it will be very hard to find what two numbers were originally multiplied to obtain it. These numbers are used as the public and private keys, since it is very hard to find them. Theoretically, if the keys are chosen large enough, breaking the RSA algorithm would take several hundred years using all the biggest computers on the planet put together. RSA has offered a large amount of money to whoever comes up with a reliable and fast algorithm that can break their code. They still have all their money. Digital Signatures There remains one prob lem with passing all these messages: messages can be passed from sender to receiver safely, but the receiver has no means of determining who the message was actually from. For example, Bob could take Joes public key and send the following message to Joe: Youre a wuss. signed: Jack. Now, when Joe receives this message, he has absolutely no way of telling that Bob sent the message, and not Jack. This is where digital signatures come in handy. They allow a person to sign a message in a way that certifies that the message was actually sent by them. This is done by using one other interesting property of the private and public keys in RSA: they can be reversed in the algorithm and it will still work. For example, if you encode something using the private key, it can be decoded with and only with the public key. So when Jack sends something to Bob, he takes signed Jack and encrypts it with his private key (note that this in no way reveals what his private key is) and adds that at the end of his message as a signature. When Bob receives the message from Jack and decrypts it, he will obtain a small encrypted piece of data at the end of the message, which is the encrypted signature Jack put there. Bob can decrypt it with Jacks public key, and if a real message comes out of it, (i.e: not a series of apparently random numbers) then he knows that Jack was indeed the person that sent him the message. Usually, people add the exact time and date inside their signature to make sure each signature can be used only once. That is, once Bob has Jackââ¬â¢s signature at the end of the message, he cant send a message to Tom that says: Youre a BIG wuss, signed Jack and then paste the signature he just got from Jack at the end, because Tom will be able to see that there is a time difference in the signatures data and will therefore know that the message isnt really coming from Jack. Digital Money Digital Money is a form of money that can be used online (or anywhere else for what th at matters), with both safety and anonymity. Most digital money systems out there are closer to prototypes than actual widely used systems. Different digital money schemes probably exist, but this one works and is simple and safe. It is a simple application of digital signatures. The costumer sends a digital signature to whoever he wants to send money to by encrypting the data using his private key. (See the section above for details on digital signatures). In the signature, he/she includes the amount, the time, who the money goes to, a transaction number and whatever data is convenient to include. Very much like a check, really. When the person being paid receives the data, he/she can check it by decrypting it with the payers public key. He/she cannot modify it since it is encrypted, he/she cannot duplicate it since there is a transaction number, and finally the payment cannot be intercepted by a third party because it contains the public key of who the money goes to, which means i t will be worthless to anyone else. To guarantee confidentiality the digital signature is encrypted again before being sent with the receiverââ¬â¢s public key so that no third party can even find out who is being paid how much for what. There are even a little more complicated schemes that will allow total confidentiality. That is, even the person receiving the money will not know who is paying him because the transaction is handled directly through the ââ¬Å"digicashâ⬠servers instead of between the buyer and the seller, although usually he will have to know in order to send the purchased product or information to his customer. Once the receiver has received the payment and checked it, he/she forwards the digital signature (encrypted with the ââ¬Å"digicashâ⬠servers public key to guarantee confidentiality) to the ââ¬Å"digicashâ⬠server, which checks it and transfers the corresponding amount between the two ââ¬Å"digicashâ⬠accounts. The payment has been successfully made without ever revealing anyones private key or identity. Breaking Encoded Data Breaking encoded data is not easy, especially when dealing with complex encryption schemes. Here are some of the ways that are used to do it: 1. Stealing the key! (and dont let them know you have it). This is the simplest and most radical way of breaking into someones secret transmissions. 2. Guessing the key. Some people do tend to use their dogs name as a key and things like that, but this method is still much more efficient in movies than in real life. Usually this is more widely used by having the brute force methods test for common words first and then uncommon words. 3. Figuring out what algorithm is used. Knowing this will help a lot to break the cipher. 4. Brute force. This method is basically to try out all the possible keys until a correct result appears. It can be time consuming but even a slow computer can break all of the simpler ciphers instantly. There are smarter versions of this which search first through more likely values, or manage to cut out large chunks of the search space by elimination before actually trying everything. 5. Letter frequency analysis. Some letters appear more often than others in a normal text conversation. (e is the most frequent). So knowing this, if the cipher is a mono-alphabetic substitution, the letters can be found by matching their frequencies. For poly-alphabetic substitution, there are also letter frequency charts for short multiple letter strings. Look for human errors in the encoded transmissions. Often over a long series of messages, the user will make a mistake at least once, and the messed up data usually says a lot about what the key might be (especially people who tend to forget to encrypt a message when sending it, and then correct their error by encrypting it and sending it again, this gives the listening third party an encrypted and a decrypted version of the same text, which is usually very useful for find ing the key.) Note that RSA is very resistant to all of these methods since the keys are always safe and brute force will take several hundred years to work. The only human error that could actually endanger the cipher would be to broadcast the private key by mistake. Being able to encrypt our messages so that no one else can read them is great, but is this something we really need? Most of us do not need to have our transmissions encrypted, for the very simple reason that simply nobody is interested in intercepting and reading our electronic mail. Privacy of this type would be nice, but it definitely would not be worth going through the trouble of setting up everything that needs to be set up unless you have an important secret to keep. However if it came all set up with most operating systems then it would be convenient enough to use on a regular basis. Remember that because of the way the Internet is built, anyone connected to the Ethernet cable can read every single transmission made on the net. Thats not exactly private. Affirmative Action - History EssayBut there are people out there that need to keep important secrets and arent terrorists or criminals or the army. Most businesses will not be able to use the Internet as a means of communication as long as all their online communications are vulnerable to industrial spying. For businesses, the only safe way to communicate through a medium where each single bit they send can be listened to is to encrypt all of their communications with a cipher strong enough to resist breaking attempts from the other businesses. Another use of cryptography applied to business is the one used by the french television channel Canal+, which is broadcasted, but only the customers paying every month for the new keycode that corresponds to their decoder box will be able to decode the broadcasted programs. Without the use of encryption, the whole scheme of having a premium channel broadcasted through airwaves would be totally impossible. Finally, one of the most useful use s of cryptography that we might all find use for is ââ¬Å"Digicashâ⬠. Without cryptography it is very close to impossible to implement a successful and convenient scheme for online money. And online money is something most online businesses and shoppers would love to have. Cryptography has its origins in wars and is therefore considered very much like a weapon because of the advantage it can give to one side or the other. Legally, any information about any kind of strong encryption is considered munitions (remember Michael Grubbs T shirt?). What this means is basically that it is illegal to export it to another country in any way. The FBI takes this matter extremely seriously. There are more or less equivalent laws in most other countries in the world as well. Illegal immigrants in France tattooed cryptographic data on their forearms so that it would be illegal to send them back to their country. Since the Internet is worldwide, posting any strong encryption information on the web is the same as exporting it, and is therefore illegal. Which means that right now encrypted Internet communications are more or less illegal as well. Also, the government is now trying to impose the Clipper chip as a standard on all computers, and banning all other forms of cryptography, in order to have a unique crypto system which it has the ability to break. The problem is, is that it is already too late to prevent these crypto systems from being exported. Most foreign countries already have knowledge of them, and there are many foreign business companies which use strong cryptography (including the RSA algorithm). So prohibiting exportation of these materials is purely and si mply useless. Furthermore, prohibiting US companies from being able to export strong cryptography results in loss of marketing opportunities for them. It also means that they wont be able to conduct safe, private conversations when dealing with foreign companies because they cannot use encrypted communications.
Saturday, November 30, 2019
Winning vs. Fair Play Are they incompatible Essay Example Essay Example
Winning vs. Fair Play: Are they incompatible? Essay Example Paper Winning vs. Fair Play: Are they incompatible Essay Introduction The personality traits of the ââ¬Å"winnerâ⬠are embedded within each and every American. It is a nation that survived and thrived against heavy odds. That legacy shapes many of the attitudes we have today about winning and losing. The importance of winning has permeated our culture from the business world to professional sports to local youth soccer leagues. The drive to win is necessary both for our survival and for our continued pursuit of excellence. Excellence, in turn, benefits society as a whole. This is why the drive to win has an important role in our society. A worthy goal for society is to create an atmosphere where the drive to win not only co-exists with fair play and sportsmanship but also works in tandem with them. The reality is that one does not negate the other. Winning and fair play/sportsmanship can actually enhance each other. In that sort of environment we all win. Winning Winning vs. Fair Play: Are they incompatible? Essay Body Paragraphs According to Peck ââ¬Å"It is wrong to regard any other human being as, a priori, as an object or an itâ⬠(1993). The early European colonists who came to America recognized this. Eventually, the concept of individual rights was codified into the Constitution. Even though each individual settler was driven to get their ââ¬Å"piece of the pieâ⬠, they understood that cooperation would also always be necessary. At the same time there is a reality that each individual must face. Engh writes that ââ¬Å"Winning is what we all must do throughout life to succeed.â⬠(2002). Fair play and consideration for others canââ¬â¢t always be accommodated in the reality of everyday life. Sports are a metaphor for life. The importance placed on winning is just a reflection of society as a whole. Those who win consistently in sports, career and life reap the lionââ¬â¢s share of societyââ¬â¢s rewards. Since these rewards are not infinite in supply; there will always be stiff comp etition over them. That is the way society is designed. As a nation that design has served us well. Even though most people, if asked, would see sportsmanship, fair play and ethics as good qualities; our society sends mixed messages. Individualistic, selfish behavior is often rewarded. Athletes and businessmen who cut corners to make it to the top are often portrayed as heroes. Sometimes sportsmanship can actually endanger all those involved. If an athlete in the heat of competition is distracted by thoughts of sportsmanship, injuries can result. As one young athlete put it ââ¬Å"The football field is no place to think about ethicsâ⬠(Canadian Centres Teaching Peace, 2008). Ethics come in the rule making process for the game. The game is meant to be won or lost. Vince Lombardi, the successful Green Bay Packers coach of the 1960s once said that ââ¬Å"Winning isnââ¬â¢t every thing. Itââ¬â¢s the only thingâ⬠. His phrase not only motivated the Packers to excellence; it also inspired the American culture. The statement tapped into a feeling that lay deep in the American psyche. Fair Play and Sportsmanship Winning is not a bad thing. Too often, it has been portrayed this way. It does not have to be synonymous with greed or the wiliness to indulge in unethical behavior to win. Winning has an important role in continuing a societal pursuit of excellence. Without this pursuit the culture would become stagnant and ultimately die. It is true that that the preset rules of the game, whatever it may be, do much to govern the activity and encourage fair play. There is a higher value to winning than just the superficial, though. Engh writes that ââ¬Å"The very values we can learn through organized sports ââ¬â things such as ethics, fair play and sportsmanship ââ¬â are the lessons that will guide us to be the best we can in lifeâ⬠(2002). Winning unethically or without respect for the opponent in sports can lead to a downward process for the win ner. The harm to the ââ¬Å"losersâ⬠in this scenario is obvious. The harm to the ââ¬Å"winnerâ⬠may be just as great in the long run. Delany states that: When someone decides to justify certain behavior in an attempt to gain an edge over an opponent, they are likely to engage in other deviant action. (2003) Fair play and sportsmanship have important societal roles to play. These traits are just as ingrained in human beings as the drive to win. An example of this can be seen in a recent well-publicized incident at a womenââ¬â¢s college softball game. Having hit what appeared to be a game-winning home run; a player was injured and unable to make her way around the bases. If her teammates helped her in any way the run would be disallowed. Instead two players from the opposing team carried her around the bases, allowing her to touch each as they went by. The public reaction to this incident of pure sportsmanship is telling. The young women were honored repeatedly and appe ared on national talk shows. Could it be that sportsmanship and fair play are themselves forms of winning? A Meeting of the Minds Winning without honor can only bring a shallow happiness. It also invites others to treat the ââ¬Å"winnerâ⬠in the same way. Many of the human rewards that come along with winning are lost when the winning is done by cheating. The winner may obtain the rewards of winning but without the true fulfillment winning a fair and sportsmanlike competition brings. Sports can be a good arena for nurturing qualities of future success in children. At the same time, it can be taken too far. Winning is important because it is both a process of self motivation and of cooperation. Sports teach a structure that we all need to know in order to succeed in later life. Learning how to win is a process, as is learning how to lose and how to be sportsmanlike. For kids, the pressure of a win-at-all-costs mentality often does not create the desired result. Focused, success ful individuals are the exception to the rule. Often this pressure is a distraction rather than an encouragement to focus. Parents who see other parents encouraging a ââ¬Å"win at all costs attitudeâ⬠often feel pressured to do the same with their kids. The result is often not what they had hoped for. In fact, ââ¬Å"The likelihood is that the experience will turn a lot of these kids off to organized sports participationâ⬠(Engh, 2002). In sports and in life there is teamwork all along the way. Individual winning never comes without the support and assistance of a host of others including parents, friends, co-workers, teammates and even opponents. All of these individuals learn from each other in some way. When the competition in question is fair and characterized by sportsmanship, the winner actually enhances his chances of winning again. Winning unethically short-cuts the learning process. In that sense the non-sportsmanlike or unethical winner is only hurting himself. These behaviors also expose the winner to similar behavior directed his way. The only difference is that this time society will fully legitimize the behavior because the winner brought it upon himself. The Packers of Vince Lombardi were universally respected winners. They were a team of individuals, each striving to perform his task to the best of his ability. As a team they played fairly and with good sportsmanship ââ¬â and each man reaped the rewards. Finding a balance between ââ¬Å"winning is the only thingâ⬠and fair play and sportsmanship is a worthy goal for society. All of the skills involved in finding this balance are necessary for ultimate success in life. Conclusion In many ways sport is ââ¬Å"a microcosm of societyâ⬠(Delaney, 2003). As such it reveals the problems as well as the promise of society. It reflects the ideals we find important as a culture. Winning is good. There is more than one way to win. Winning is also a continual process, not just any o ne game or event. Yes, our society rewards and glorifies individual achievement, even when the achievement was gained by ethically questionable means. The picture is more complicated. People who win at all costs often pay a heavy price. Most of us will never be in the position of those we see portrayed as winners on television and in the media. Therefore it is easy to ignore the consequences these people face for unethical behavior. They range from criminal involvement to depression to the lack of trusted friends and family. For some, this will be a fair tradeoff for winning in the superficial sense. Most of us need a wider definition of winning. Competition of any kind will never be fully ethical and completely sportsmanlike. It is the effort to be this way that counts. This distinguishes the true winner from the superficial one. Ultimately our society is a large team of many individuals. It is dependent both on the individual pursuit of success and a certain level of teamwork. The practice of sportsmanship does not harm the pursuit of either element. Instead, it enhances both. Shortly before his death the legendary coach Lombardi said ââ¬Å"I wish I had never said damned [winning is the only thing] thing. I meant the effort.having a goal. [not] for people to crush human values and morality (Reinharz Anderson, 2000). Sources Business Week. (2006). ââ¬Å"Yes, Winning is Still the Only Thingâ⬠. Retrieved 5/14/2008 from:http://www.businessweek.com/magazine/content/06_34/b3998403.htm?chan=top+news_top+news . nbsp; Canadian Centres Teaching Peace. (2008). ââ¬Å"Sports: When Winning is the Only Thing can Violence be Far Away?â⬠Retrieved 5/14/2008 from: =http://www.peace.ca/sports.htm data-wpel-link=external rel=nofollow>http://www.peace.ca/sports.htm . nbsp; Delany, Tim. (2003). ââ¬Å"Sports and Deviant Behaviorâ⬠. Philosophy Now. Retrieved 5/14/2008 from: http://www.philosophynow.org/issue41/41delany.htm . nbsp; Engh, Fred. (2002). Why Johnny Hates Sports. Garden City Park, N.Y.: Square One Publishing. nbsp; Peck, M. Scott. (1993). A World Waiting to be Born: Rediscovering Civility. New York: Bantam Books. nbsp; Reinharz, Peter; Anderson, Brian. (2000). ââ¬Å"Bring Back Sportsmanshipâ⬠. City Journal (NY). Spr, pp. 1-6. We will write a custom essay sample on Winning vs. Fair Play: Are they incompatible? Essay Example specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Winning vs. Fair Play: Are they incompatible? Essay Example specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Winning vs. Fair Play: Are they incompatible? Essay Example specifically for you FOR ONLY $16.38 $13.9/page Hire Writer
Monday, November 25, 2019
The Aviators essays
The Aviators essays Summary of story: The Aviators is a historical fiction book about the Vietnam war. The book starts in the Republic of South Vietnam at the Pleiku Air Force base. Lieutenant John S. Oliver Jr. is contacted by the Green Berets, he meets a Captain named Father Lunsford they develop a new plan for extraction. The new plan is to use two Gun ships and two Skids, a Gun ship is a Huey Helicopter with two M-60s, a 40mm grenade launcher and two rocket pods and a Skid is a Huey Helicopter with no weapons and is designed to take many people, the plan calls for the team to choose two fake landing points and one real one. The Gun ships will clear each fake landing point and the Skids will touch-and-go each fake then stop to take the team on at the real one. When Oliver leads the team of helicopters to pick-up Fathers A-team the Viet-Cong manage to shoot down one of the skids, Oliver orders all the Gun ships to unload as much ammo as they can, so they will be light enough to take on the remaining p eople, however Oliver didnt make his helicopter light enough and when he tries to clear the tree line the helicopter tears itself apart, and crashes. Most of Olivers men survive the crash and the remaining members of the A-team meet up with them, Father is too hurt to command the team so he gives command to Oliver. Oliver manages to get the team home safely, but is badly injured he has been shot three times and has never taken any pain-deading drugs because we wants to be fully conscious. Then Oliver is taken to a Hospital in Germany where he is awarded the Silver star and the Purple heart with four oak leaf clusters ( the highest award for injuries suffered in combat ). Then Oliver is flown to the states where he takes a job as General Bellomans Aide-de-camp and he is also promoted to captain. Oliver is trying to h...
Friday, November 22, 2019
15 Tips to become more creative
15 Tips to become more creative Nowadays, if you are not at least a bit creative, soon a automatic robot will be doing all your job. But discovering those imaginative flourishes or inventive solutions isnââ¬â¢t all that simple. Sometimes that muse just wonââ¬â¢t discuss. This is not an inspirational list designed to convince you that youââ¬â¢re a unique and creative snowflake. Somewhat, this is for when youââ¬â¢re trapped in a creative bind and need a little extra oomph to make assembling your project work. So here are 15 tricks to help get those creative juices juicing again. Get those endorphins streaming. Exercise is stress-reliever and a creative trigger, and mindless repetition is the secret to allowing your creative head wander. And remember, no subject how much you loath this job, great deal of thought is still better than stumbling your way through a home treadmill workout wishing you might have a cheeseburger. It helps to get some perspective. Take a Bathtub After all that exercise wanting to force imagination, youââ¬â¢re still sweating desperation. At this time you reek of it. Okay, maybe not, however the shower is a great destination to drown out the world and relax your mind enough to let it wander. And a brain with wanderlust is the fertilizer for new ideas. Sleep on It This is why you always do better on tests when you fell asleep together with the book somewhat than cramming right before the test. Your mind requires rest, and the rest actually helps you organize your thoughts and shakes new things free. It provides you with ways to check out old problems in a fresh way. Be Curious What job are you working on? Could it be for a client, or around a certain subject? Do some research. Allow yourself to get lost in your issue and find something thatââ¬â¢s interesting for you, even whether itââ¬â¢s abstract. Be curious about it. A lot more intimately you connect with your subject, the more creative you will be when trying to work with it. Listen to Music Listening to music-just listening to music-helps your brain relax. Itââ¬â¢s also evocative of images and feelings. You know, those things you are trying to speak to to make assembling your project more creative? Those. Ideas result from a complex mixture of problems, thoughts, and experiences. Allow music move over you, and pick it. Yeah, man. Groovy. Pick a Shade or Theme Sometimes creative imagination gets bogged down in the facts and the specifics. Donââ¬â¢t slip-up the forest for the trees, here. Online backup, take a breath, and ask yourself, ââ¬Å"Self, what is the overall theme, concept or tone?â⬠Insurance agencies a major picture to show up back on, you may find Youââ¬â¢ve exposed new creative strategies. Go through the Pretty Colors Sometimes just selecting colors that would work together can give you a whole new point of view on your creative task. Maybe you hadnââ¬â¢t seen things in this light before. Who recognizes. Try different color mixtures or play around with the Adobe Kuler to see if you spark any new ideas. You can even check out some art or even just browse the web for things such as Deviant Art. Try informing a story about an interesting picture Youââ¬â¢ve seen. Have no idea the storyplot? Make it up. Thatââ¬â¢s one half the fun. Clean Something Mindless tasks are great for idea era, and firm is often comforting. Besides, you do not want to clean while youââ¬â¢re in the throes of an creative epiphany, can you? Best get it done now. Go for a Drive. Traveling around and listening to music (or listening to silence) is a superb way to clear the mind. Itââ¬â¢s also a little hypnotic, and this hypnosis helps you wiggle creative problems around in your mind just like a loose tooth you are wiggling with your tongue. Eventually somethingââ¬â¢s heading to break. Just donââ¬â¢t discuss on the telephone while driving a vehicle. Itââ¬â¢s distracting. To other motorists. Get Mad. You know all those things you really want to inform that awful client? You know those times when you want to say ââ¬Å"really fellas, this is the truth that you donââ¬â¢t want to listen toâ⬠, or write a searing email to your boss? Write them down. Let it out. Most of us have created mental blocks to saying just what we mean because, well, we donââ¬â¢t want people to think weââ¬â¢re psychopaths. Period of time those obstacles and say precisely what you suggest. Itââ¬â¢ll feel great, and often youââ¬â¢ll discover (someplace) a new way to approach your problem. Simply by being honest. Spend Some Time Alone Whether youââ¬â¢re walking in the woods or standing on the roof of any skyscraper, only time is creativityââ¬â¢s favorite place to develop. Iââ¬â¢m sure which mental or neurological reason for this, but I donââ¬â¢t know what it is. I just know that other folks and electronic gizmos arenââ¬â¢t only distracting, they actually cause anxiety. Turn your cellphone off. Kill the news headlines channel. Mentally move away from it all. Itââ¬â¢s actually pretty well accepted that individuals who spend more time by themselves thinking tend to be creative (and, actually, more emotionally fit). Show Someone What youââ¬â¢re Doing I donââ¬â¢t indicate step-by-step, however the process of articulating your creative problem to some other person is incredibly helpful when searching for new methods to an old problem. This is particularly helpful if you are trying to clarify things to a kid (or a dumb good friend), because you have to come up with a much more accessible way to articulate your idea. Pull or Build Something Actually, doing anything repeated that requires extreme concentration would work. The trick here is to let your brain go numb. Itââ¬â¢s actually related in some ways to self-hypnosis. It allows your mind wander. Plus the theme of the post is to let your mind wander. Doing something repeated or mindless is often nice since it allows you to start out speaking with yourself with your ââ¬Å"mind toneâ⬠. Just donââ¬â¢t answer the tone out loud, and youââ¬â¢re good.
Wednesday, November 20, 2019
Collapse of the Traditional Family Essay Example | Topics and Well Written Essays - 1750 words
Collapse of the Traditional Family - Essay Example The first thing that immediately occurs to mind, the number one culprit, is of course the exploding divroce rates, in the Western societies as well as in many developing nations. Divorce rates have been on the rise for decades now, but they seem to be shoooting up to epidemic proportions with each passing day. The very institution of marriage which lies at the root of family and home is under assault. Out-of-wedlock births too are drastically rising. Unmarried cohabitation is becoming an increasingly common phenomenon in contemoporary society. The sporadic spread of same-gender marriages are another aspect of the problem. So, one way or other, it is the fact that more and more people are losing their faith in the sanctity of marriage between man and woman which is ultimately threatening the very viability of our society. In a more immediate sense, though, this is adversely affecting the lives of millions of innocent children, causing grave irreparable damage to their delicate sensibi lities at a very tender age. No wonder then that so many of our national leaders are seriously concerned about the need for fortifying the edifice of family, in their bid to build a more coherent and sensible society. A resurgence of early and almost universal marriage, as it happened in the postwar periods of 1950s and 1960s, is bound to revitalize our society. But what is so different between our own times and just a couple of decades ago Why cannot such a thing cannot happen today One most conspicuous difference is the tremendously greater proportion of full-time working women in today's world as compared to the 50's. This is of coure a very positive change. But could not the absence of the mother from the household for the better part of the day be taking its toll on the upbringing and well-being of the children Not necessarily, since it has its own advantages. A confident and independent mother can serve as a better role model for children of both sexes, and not just the girls. Obviously, with both dad and mom working, there would be two incomes instead of one, and this translates to better financial security for children. Also, in a way, with relatively less time available to spend with children, the parents would tend to treasure this time even more than if time weren't such a constraint. It is a universal truth in any relationship, whether between lovers or between parents and children, that distance brings people closer, making them grow fonder of each other. But only to a certain extent though, a little more distance and it can alienate people, to which point we will come shortly. Now though there may be several practical advantages to argue in favor of working women, in relation to their families, the cohesive presence of a full-time mother acting as the central force in holding together the home, with her love and mystique - is simply irreplaceable. It is becoming an increasingly rare sight these days, and evokes a kind of idyllic nostalgia in many of us. But still, if certain things have to be gained, certain other things have to be
Tuesday, November 19, 2019
Strategic Reward Key Models and Practices Essay
Strategic Reward Key Models and Practices - Essay Example For example, it is possible to create a plan for performance related pay using different strategies such as the following: (1) merit-based pay plan; (2) job- or skill-based pay plan; (3) competency-based plan; and/or (3) job-evaluation-based pay (Heneman and Werner, 2005, p. 45; Baldwin, 2003, p. 45, 70). After examining the potential impact of introducing a performance related pay in a German public service, Shmidt, Trittel and Muller (2011) found out that the use of different types of performance related pay schemes can lead to different effects in terms of public sector employeesââ¬â¢ work motivation and performance and that a highly selective performance related pay will never work in government offices. It simply means that depending on the type of performance-based appraisal used by each government office, there will always be the risk wherein the public sector employees would perceive the type of assessment and evaluation process used within the government office to be inef fective, inconsistent, and unfair to some government employees (Shmidt, Trittel and Muller, 2011; Rayson, 2013). Another possible reason behind the reluctance of the public sector employees in integrating performance related pay is the fact that most of the non-performing government employees would fear that their superiors would be closely monitoring their overall work performance. Because of the on-going tight government budget, Weiner (2013) reported that the public sector employees may no longer have the opportunity to enjoy so much of work-related flexibility options. Since there is a need for the government to cut down their unnecessary fixed operating costs, some of the underperforming public sector employees may think that they can be one of the candidates in case... It is the duty and responsibility of the public HR managers to design and implement the performance related pay effectively within the UK government offices. As a common knowledge, the public sector employees will be affected by the new pay and reward scheme. Therefore, the reservations made by the public sector employees should be considered legitimate. The use of performance related pay is a good form of pay and reward strategy particularly in terms of increasing the quality service provided by the public sector employees. For this reason, the public HR managers should exert more effort to effectively address all reservations made by the public sector employees. It is also necessary to create a S.M.A.R.T performance-based criteria that could guide the public sector employees on what they are expected to do. In the process of removing the reservations of each public sector employee, the HR professionals can easily win the support of all affected individuals.
Saturday, November 16, 2019
Emission Reduction Essay Example for Free
Emission Reduction Essay In every economic activity, both positive and negative implications compound such activities. The positive implications include employment increase, supply of goods and market, supply of public goods, environmental control above others. However, every economic activity is as well a compound of negative implications. These are called negative externalities. They include pollution, environmental degrading, increase in crime, and social evils above others. Emission reduction like any other negative externality calls for a very dynamic tools of control. Generally, the basic control of negative externalities by corporations in the economy is through the government taxation imposition. The government would impose a corporate tax levy which is substantially equivalent to the cost of the emission to the environment. Through such levy, the government uses passive methods of compensation to the community over such impacts of the emission. Through the tax levy, the cost of operation to the plant is increased. (Prencipe, Davies, Hoboday, 2003) Economically, taxation provides two cost related variables with which the plant should choose from. Firstly, through higher cost of production which may perhaps outweigh its level of market profits, the plant may be forced out in the market. This is because high tax levy is synonymous to an increase in the cost of production. With high cost of production the plant is at a competitive disadvantage in the highly competitive market. It may then opt to choose an alternative method of investment. (Prencipe, Davies, Hoboday, 2003) Elsewhere, such tax is a disincentive in the choice of production method. From the broad alternative of energy production e. g. use of electric turbines to generate power. Use of environmental friendly method would then call up such tax levied formerly. The basic purpose of higher taxes by the government towards negative externalities is to provide a disincentive in specific lines and methods of operation which are harmful to the environment. It is a tool for choosing alternative methods of production.
Thursday, November 14, 2019
The Role of John Proctor in Arthur Millers The Crucible Essay
The Role of John Proctor in Arthur Miller's The Crucible Arthur Miller wrote the play 'The Crucible' to show the historical parallel between the Salem witch trials of 1692 and the McCarthy 'witch' hunt of the late 1940' and 50's. The character John Proctor seems to represent and show the viewpoint of a real man, unaffected by hysteria; a difficult thing to portray during the 1950's in the USA, due to the fear and hate of Communism and the 'witch' hunt for communists. John Proctor is the central character of the play. He a realistic character, the audience can relate to him and sympathize with him. He is a somewhat strong character and is described by Miller as "powerful of body, even-tempered and not easily led", the last comment perhaps being the most important. His character earns respect throughout the play as the audience sees the moral arguments he has and internal conflicts he has to deal with. John Proctor is a man with a guilty conscience, which makes him indecisive until it is too late, audiences can relate this to their own, maybe far less dramatic lives. John Proctor has made a mistake; he has slept with his former servant girl, teenage Abigail Williams. It is also shown in Act 1 that he still lusts after her - when she asks if he looked up at her window for her, he replies "I may have looked up", this shows his characters weakness, but he remains strong willed. He does not give into what he obviously thinks of as great temptation, again. This shows the audience that he has recognized his mistake and is not repeating it. John Proctor is an honest man, but has undermined himself with his one act of dishonesty. ... ... parallel, as he knew himself what height the communist hysteria had reached. Like the witch hysteria in Salem, he knew that he would be persecuted for writing about fear and conscience if he were to set the play in contemporary America. Miller uses John Proctor to almost play himself and to show what he would do if put in the position of being on trial. He later proved his point by not accusing any other people of being in communist parties when he really was put on trial, to get himself off the hook, like so many other people did. John Proctor plays the crucial role in 'The Crucible' of being the man that is on the brink of giving in but stands strong, even though he knew that one individual would not bring down the hysteria. Works Cited: Miller, Arthur. The Crucible: A Screenplay. New York: Penguin Books, 1996.
Monday, November 11, 2019
A Case Study of Obsessive Impulsive Disorder
A Case Study of Obsessive-Compulsive Disorder: Some Diagnostic Considerations INTRODà UCTION Prior to 1984,à obsessive-compulsive disorder (OCD)à wasà consideredà aà rare disorder andà one difficultà to treat (Ià )à . In 1984 theà Epidemiologic Catchmentà Area (ECA) initial survey resultsà became available for the first time, andà OCà Dà prevalence figuresà showed thatà 2. 5à %à ofà theà population mà età diagnosticà criteriaà for OCD (2,3)à . Finalà survey results publishedà in 1988à (4) confirmed theseà earlier reports. Inà addition, a 6-monthà point prevalence ofà 1. 6%à was observed,à andà aà lifeà timeà prevalenceà of 3. 0% wasà found.OCD isà an illness of secrecy, andà frequently theà patientsà presentà to physicians inà specialties other than psychiatry. Anà other factor contributing to under diagnosis ofà this disorderà is thatà psychiatrists mà a y fail to ask screening questionsà that would identifyà OCD. Theà following case study isà an exampleà ofà a patientà with moderately severe OCDà whoà presentedà toà aà residentà psychiatryà clinicà ten years prior to being diagnosedà with OCD. The patientà wasà compliant withà out patient treatment for theà entire timeà periodà and was treatedà forà majorà depressiveà disorderà and border line personality disorder with medication s andà supportiveà psychotherapy.The patient never discussedà her OCD symptomsà with her doctorsà but in retrospect had offered many cluesà that might have allowedà aà swifterà diagnosis and treatment. CASEà HISTORY Simran Ahuja was a 29 yearà old,à divorced,à indian female who workedà as a file clerk. Sheà was followed as anà out patientà at theà sameà residentà clinic sinceà 1971. Ià first saw her 2012. PAST PSYCHIATRIC HISTORY Simran had beenà seen in theà residentà out pati entà clinic since July of 1984. Priorà toà this sheà had not beà enà in psychiatric treatment. Sheà had never been hospitalizedà .Her initialà complaints were depression and anxietyà and she had been placed onà an phenelzineà and responded well. Herà depressionà wasà initially thoughtà to beà secondary to amphetamine withdrawal, since sheà had been usingà dietà pillsà for 10à years. She statedà that at firstà sheà took them to lose weight,à butà continued forà soà long because people at work had noted that sheà concentratedà betterà and that her job performance had improved. In addition,à her past doctors hadà allà commented on her limità edibility toà changeà and her neediness, insecurity,à lowà self-esteem,à and poor boundaries. In addition,à her past doctors had notedà her promiscuity.All notedà her poor attention span and limited capacityà for insight. Neurologicalà testing during her ini tialà evaluation had shown theà possibility of non-dominant parietalà lobeà deficits. Testingà was repeatedà in 1989 andà showed â⬠à problems in attention ,à recent visual and verbal memoryà (withà a greater deficità in visual memory),à abstract thoughtà , cognitive flexibility, useà of mathematical operations, and visual analysis. A possibility of right temporal dysfunction isà suggested. â⬠à IQ testing showed aà coà m bine d score of 77 on the Adult Weschlerà IQ test ,à whichà indicated borderlineà mentalà retardationà .Over the yearsà the patient had been maintainedà on variousà antidepressantsà and antianxiety agents. Theseà includedà phenelzine,à trazadone, desipramine, alprazolam, clonazapam,à and hydroxyzine. Currentlyà sheà was on fluoxetineà 20à mgà daily and clonazaparn 0. 5 mgà twiceà a day and 1. 0 mg at bedtime . The antidepressantsà had been effective over the years in treating her depression. Sheà hasà never usedà mà ore clonazapam than prescribed and there was no history ofà abuseà of alcohol or street drugs. Also, there was no historyà of discreetà manic episodes andà sheà wasà never treated with neurolepics.PAST MEDI CAL HISTORY She suffered fromà gasà troesophageal reflux andà was maintainedà symptom free on a combinationà ofà ranitidineà andà omeprazole. PSYCHOSOCIALà HISTORY Simran à wasà bornà andà raise d inà aà large city. She had a brother who wasà 3 years younger. Sheà describedà her fatherà as morose , withdrawn,à and recalledà that he has said, â⬠à I don'tà likeà myà children. Herà father wasà physically andà verbally abusive throughout herà childà hood. Sheà hadà always longedà for a good relationshipà with himà . Sheà describedà her mother asà theà family martyr and theà glue thatà heldà theà family together.She stated thatà sh eà wasà veryà closeà to herà mother;à her mother always listenedà to her and wasà alwaysà available to talk with her. Sheà was a poor student,à had difficulty all through school , and described herselfà as â⬠à always disruptingà theà class by talking or runningà around. â⬠à Sheà hadà aà best friend through grade school whomà sheà stated â⬠à desertedâ⬠herà in highà school. Sheà had maintainedà few closeà friends sinceà then . She à graduated high school with much difficulty andà effort. Sheà dated onà group datesà but never alone. Her husbandà left herà whileà she wasà pregnant with herà son.The husbandà was aà bus driverà and had not hadà aà role in theirà livesà since theà divorce. Aftà e r theà divorce,à she movedà backà to her parentà s'à homeà with her sonà andà remained there until getting herà own apartmentà 3 years ago. FAMILY HISTORY Simr anââ¬â¢sà motherà had twoà seriousà suicide attempts atà age 72 and wasà diagnosed with majorà depressiveà disorder with psychotic featuresà and OCD. She also had non-insulin dependentà diabetesà mellitus and irritableà bowelà syndrome. Herà brother was treatedà for OCDà as an outpatientà for theà pastà 20 years and also has Hodgkin's Disà ease, currently in remission.The brother's diagnosis ofà OCD was kept secret fromà herà and did not becomeà availableà to her until her mother died. Her fatherà isà alive and well. MENTAL STATUS EXAM Sheà was aà thinà ,à bleachedà blond womanà who appeared herà statedà age. Sheà was dressed inà skinà tightà ,à provocativeà clothing,à costume jewelry earringsà that eclipsed her earsà and hung to herà shoulders, heavyà make-up andà elaboratelyà styled hair. Sheà had difficultyà sittingà stillà and fidgetedà constantlyà inà herà chair. H er body language through outà the interviewà wasà sexually provocative. Her speech wasà rapid,à mildly pressured,à andà sheà rarely finishedà a sentence.Sheà describedà herà moodà as ââ¬Å"anxious. â⬠Her affect appeared anxious. Herà thoughtà processes showed mildà circumstantiality and tangentiality. More significantà was her inability to finish aà thoughtà as exhibited by her inà completeà sentences. COURSEà OF TREATMENT Initialà sessions with theà patient wereà spentà gathering historyà and forming a workingà alliance. Althoughà sheà showed aà goodà responseà byà slowingà down enough to finishà sentences and focus onà conversationsà ,à sheà could not tolerateà the sideà effects andà refusedà toà continue taking the medicationà . Theà winterà ofà 1993-94à wasà particularlyà harsh.Theà patientà missedà many sessions because ofà bad weather. A patternà beganà to à emergeà ofà aà consistentà increaseà in the numberà of phoneà calls thatà sheà madeà to the office voiceà mail toà cancelà a session. Whenà she was questioned about her phoneà messages she stated,à â⬠à I always repeatà calls to make sure myà messageà is received. â⬠Sinceà theà most recent cancellation generatedà no less than six phone calls ,à sheà was asked why aà second call wouldn'tà beà enough ââ¬Å"to beà sure . â⬠Sheà laughedà nervously andà said,à â⬠à Ià always repeatà things. â⬠With careful questioningà the followingà behaviorsà were uncovered.The patient checkedà all locksà and windows repeatedlyà beforeà retiring. Sheà checked theà iron a dozen timesà before leaving the house . Sheà checkedà her doorà lockà â⬠à aà hundredà timesâ⬠beforeà sheà was able toà get in herà car. The patientà washed her hands frequently. Sh e carried disposableà washcloths inà her purse â⬠à so Ià can wash asà oftenà as I need tooà . â⬠à Sheà said peopleà at work laughà at herà for washingà soà much. But sheà statedà ,à ââ¬Å"Ià can' t help it. I've been this wayà sinceà I wasà aà little girl. â⬠Whenà questionedà about telling formerà doctorsà about this,à theà patientà stated that sheà had neverà talkedà about it with her doctors.Sheà statedà thatà everyone that knewà herà simply knewà thatà thisà wasà theà wayà sheà was:à â⬠à It'sà justà me . â⬠à Inà fact , sheà stated, â⬠à I didn'tà think my doctorsà wouldà careâ⬠¦ .à I've alwaysà been thisà wayà soà ità ââ¬Ësà not somethingà you canà change . â⬠Over the nextà few sessions, it becameà clearà that her argumentsà with her boyfriend centeredà onà his annoyance with her needà toà const antly repeatà things. This wasà what sheà always referred toà as â⬠à talking too muchà . â⬠à Inà sessions ità wasà observed thatà herà anxiety,à neediness and poor boundariesà aà rose over issues of misplacing things in her purse and insurance forms that were incorrectlyà filledà out.Inà fact,à when Ià attempted to correct theà insurance forms for her, I had difficulty because of her need to repeat theà instructions to meà over and over. The Introduction Obsessive compulsive disorder (OCD) is an anxiety disorder characterised by persistent obsessional thoughts and/or compulsive acts. Obsessions are recurrent ideas, images or impulses, which enter the individual's mind in a stereotyped manner and against his will. Often such thoughts are absurd, obscene or violent in nature, or else senseless. Though the patient recognises them as his own, he feels powerless over them.Similarly,compulsive acts or rituals are stereotyped behaviou rs, performed repetitively without the completion of any inherently useful task. The commonest obsession involved is fear of contamination by dirt, germs or grease, leading to compulsive cleaning rituals. Other themes of obsessions include aggression, orderliness, illness, sex, symmetry and religion. Other compulsive behaviors include checking and counting, often in a ritualistic manner, and over a ââ¬Å"magicalâ⬠number of times. About 70% of OCD patients suffer from both bsessions and compulsions; obsessions alone occur in 25%, whilst compulsions alone are rare. 1nà she spentà ten minutes checking and recheckingà theà formà against the receipts. Sheà became convinced that she'dà done it wrong, her anxiety would increase, andà sheà wouldà getà the forms outà and checkà them again. Herà need to includeà me in thisà checkingà wasà so greatà that sheà was almost physically onà topà ofà myà chair. In theà followingà weeks,à se ssion sà focusedà onà educating theà patient aboutà OCD. Herà dose of fluoxetineà was increasedà to 40 mgà aà day but discontinued becauseà of severe restlessness and insomnia.She continued toà take 20à mg ofà fluoxetine a day. Startingà another medication inà addition to fluoxetineà was difficult because of the patientà ââ¬Ësà obsessiveà thoughtsà aboutà weight gain, theà numberà ofà pillsà sheà wasà taking, and theà possible side effects . Finally,à theà patient agreed to try addingà clomipramine to her medications. Theà results wereà dramatic. Sheà feltà â⬠à more relaxed â⬠and had less anxiety. Sheà began to talk, forà theà firstà time, about herà abusiveà father. She said,à â⬠à His behavior was always supposedà to be the familyà secret. I feltà so afraidà andà anxious I didn'tà dare tellà anyone.But nowà Ià feel better. I don't care whoà knows. Ità à ¢â¬Ësà cost myà motherà tooà muchà toà stayà silent. â⬠à à à à à à à Atà this timeà theà plan is to begin behavioral therapy withà theà patientà inà addition to medication sà andà supportive therapy toà deal wità h herà difficulties with relationships. DISCUSSION This isà a complicatedà caseà with multiple diagnoses: borderlineà mentalà retardation,à attention deficit disorder,à borderlineà personalityà disorder,à aà historyà ofà major depressive disorder andà obsessive compulsive disorder. Given theà levelà ofà complexity ofà thisà case and theà patient ââ¬Ësà own silenceà about herà symptoms,à ità isà not urprisingà that thisà patient's OCD remainedà undiagnosedà forà soà long. However,à inà reviewingà the literatureà and the case,à it is instructive toà lookà aà t theà evidence thatà mightà haveà ledà to an earlier diagnosis. Fir st ofà all,à thereà was theà findingà of soft neurological deficits. The patientà ââ¬Ës Neuropsychological testing suggestedà problemsà withà visuospacialà functioningà n visual memory,à as well asà attentional difficultiesà andà aà low IQ. In theà past,à her doctors were so impressedà with her history ofà cognitive difficultiesà thatà neuropsychological testing wasà orderedà on two separate occasions.Fourà studies in theà recent literature haveà shown consistent findings ofà right hemispheric dysfunction,à specificallyà difficultiesà in visuospatialà tasks, associatedà with OCDà (6,7,8,9). The patient also had a historyà of chronic dieting,à andà althoughà extremelyà thin, she continue d to beà obsessed with notà gainingà a single pound. This wasà aà patient who took dietà pills for 10à years and whoà see earliest memoriesà involvedà her father's disapproval ofà her bodà yà ha bitus. Eatingà disorders aà reviewed byà someà cliniciansà asà a formà ofà O C D. Oà C D.Swedo and Rapoport (II)à also noteà an increased incidenceà ofà eating disorders in childrenà andà adolescentsà withà OCD. Whileà this wasà no doubt true,à the underlyingà obsessionalà content pointed directlyà to OCD and should haveà generated a list of screening questionsà for OCD. This underscoresà theà need to beà vigilant for diagnostic clues and to perform one'sà own diagnostic assessment whenà assuming the treatmentà of anyà patient. While theà literatureà makesà it clear that OCDà runs in families,à theà patient was unaware of theà illnessà in her familyà until afterà her diagnosisà was madà e.Ità would have beà enà helpful to know this informationà from theà beginningà as it shouldà immediatelyà raise a suspicion of OCD in a patientà presentingà with complaintsà ofà depression and anxiety. Finally,à her diagnosis of borderlineà personalityà disorderà madeà ità easier to passà off her observableà behaviorà in the office asà furtherà evidenceà ofà herà character structure. The diagnosis of borderlineà personalityà disorder wasà clear. Sheà used theà defense of splittingà as evidence d by her descriptionsà of her fightsà with her boyfriend . Hà e was eitherà ââ¬Å"wonderfulâ⬠or aà ââ¬Å"complete bastard. â⬠Herà relationships wereà chaoticà and unstable.She had no close friends outsideà of her family. Sheà exhibitedà affective instability, markedà disturbance of bodyà imageà and impulsive behaviors. However, it was difficult to discern whether herà symptoms were trulyà character logicalà orà dueà insteadà to her underlyingà OCD and relatedà anxiety. For instance,à theà inà stabilityà in her relationships was,à inà part,à the resultà ofà her OCD , sinceà once sheà began to obsessà onà something,à sheà repeatedà herself so muchà thatà sheà frequentlyà drove others intoà aà rage. Aà study by Ricciardi,à investigatedà DSM-III-R Axis II diagnoses following treatment for OCD.Overà halfà ofà theà patients in the studyà no longer met DSM-III-Rà criteria for personality disorders afterà behavioralà andà /à or pharmacological treatmentà ofà theirà OCD. Theà authorsà conclude thatà thisà raises questionsà aboutà tà he validityà of an Axisà II diagnosisà in theà faceà ofà OCD. One might also beginà to wonder how manyà patientsà with personalityà disordersà have undiagnosedà Oà CD? Rasmussenà and Eisenà found a very high comorbidity ofà other Axis I diagnoses in patientsà with OCD. Thirty-onà eà percent of patients studiedà wereà also diagnosed with majorà depression, andà anxiety disorders accounted for twenty-four per cent.Other coexisting disordersà included eating disorders, alcoholà abuseà and dependence, and Tourette's syndrome. Baer,à investigatedà the comorbidityà of Axisà II disordersà in patientsà with OCDà and found that 52à percentà metà the criteria forà at least oneà personalityà disorderà with mixed,à dependentà and histrionic beingà theà most common disorders diagnosedà . Givenà theà frequency of comorbidity in patientà sà with OCD,à it wouldà be wise to includeà screening questionsà inà everyà psychiatricà evaluation. Theseà needà notà be elaborate. Questions aboutà checking,à washing,à and ntrusive,à unwanted thoughts can beà simpleà and direct. Inà eliciting aà family history,à specificà questions aboutà family membersà who checkà repeatedlyà orà washà frequentlyà shouldà be included. Simply asà king ifà anyà family memberà hasà OCDà mà ayà notà elicità theà informationà , sinceà family members mayà also be undiagnosed. Inà summary, thisà caseà represents a complicatedà diagnosticà puzzle. Herà past physiciansà did not have theà informationà we dà oà todayà to unravelà theà tangled skeinsà of symptoms. Ità isà important to beà alertà forà theà possibilityà that thisà patient ââ¬Ës story is not anà uncommon one.BIBLIOGRAPHY * Psychology book (NCERT) * Identical * Suicidal notes * A psychopath test: journey through the world of madness * Disorder of impulse control by Hucker INDEX * Introduction * Case study * Course of treatment * Discussion * Bibliography ACKNOWLEDGEMENT I would like to express my special thanks and gratitude to my teacher Mrs. Girija Singh who gave me the golden opportunity to do this wonderful project on the topic ââ¬Ëobsessive-compulsive disorderââ¬â¢, which also helped me in doing a lot of research and I came to know about so many new things.Secon dly I would also like to thank my family and my friends who helped me a lot in finishing this project. CERTIFICATE This is to certify that Jailaxmi Rathore of class 12 has successfully completed the project on psychology titled ââ¬Ëobsessive-compulsive disorderââ¬â¢ under the guidance of Mrs. Girija Singh. Also this project project is as per cbse guidelines 2012-2013. Teacherââ¬â¢s signature (Mrs. Girija Singh) (Head of psychology department) 2012-2013 PSYCHOLOGY PROJECT NAME OF THE CANDIDATE: JAILAXMI RATHORE CLASS: XII ARTS B SCHOOL: MGD GIRLSââ¬â¢ SCHOOL
Saturday, November 9, 2019
What do you think the significance of the witches is in Macbeth?
The witches within Shakespeareââ¬â¢s ââ¬ËMacbethââ¬â¢ can be interpreted as providing a number of roles within the play which add not only to the plot but also to the atmosphere and fear evoked within the audience. Within the Jacobean period in which ââ¬ËMacbethââ¬â¢ was first performed, witches were the subject of much public hysteria and superstition, with the Kingââ¬â¢s own beliefs being based on a long history of Christian paranoia about witchcraft. As a result, the witches can be seen as a supernatural influence within the play, linking them to the devil and other dark forces and playing on the real and current fears of what may have been a dominantly Christian audience. In this respect, a modern Gothic reading can be applied to the novel. The supernatural power of the witches is one of the first elements highlighted within the play, as in Scene 3 Banquo states they can ââ¬Ëlook into the seeds of time/And say which grain will grow and which will not. Therefore, from the outset the witches are highlighted as the fortune-tellers within the story, who hold an otherworldly power to see into the future. This gives them a greater level of power than the surrounding humans, and such power in the wrong hands may have created a sense of unease and unpredictability within the audience. Additionally, it is this power to tell the fortune which creates the catalyst for the play and leads to Macbethââ¬â¢s moral deterioration: ââ¬ËAl l hail, Macbeth! That shalt be King hereafter! ââ¬â¢ Thus, the witches can be seen to play the role of the typical villains through their manipulation of Macbeth, turning him from a ââ¬Ëworthy gentlemanââ¬â¢ into a brutal murderer. However, there is also contradictory argument that in reality, the witches do not hold any true superiority of power and that it is instead the planting of the idea in Macbethââ¬â¢s mind which leads him to commit murder through the growth of his own ââ¬Ëdark desires. This is exemplified further as Banquo suggests ââ¬Ëoftentimes, to win us to our harm, The instruments of darkness tell us truths, Win us with honest trifles, to betrayââ¬â¢s in deepest consequence. ââ¬â¢ Following this interpretations, the witches may be interpreted as having less power as they merely suggest an idea, and it is the desire and drive of the human mind which instead leads to Macbethââ¬â¢s downfall. This interpretation may also be considered particularly frightening both to a Jacobean and a modern audience as it follows the modern Gothic stereotype of playing on the realistic fears of humans, such as the power of our deep and potentially repressed desires. Furthermore, the witches can also be seen to play a part in destabilising the typical gender roles of men and women within Jacobean society. Banquo states: ââ¬ËYou should be women, And yet your beards forbid me to interpret that you are so. The ââ¬Ëbeardsââ¬â¢ of the witches bring about confusion as to whether the witches are female or male, and deconstruct the opposition between both genders. This ambiguity leads to the witches failing to fall into either category, which further highlights the unnatural nature to them as they do not fit within the realms of human and social convention. Not only does this ambiguity create further unpredictability, but it also reflects the later attempts of Lady Macbeth to be rid of her femininity: ââ¬ËCome, you spirits, That end on mortal thoughts, unsex me here. The parallels between the witches and the actions of Lady Macbeth work to similarly convey her as increasingly monstrous, perhaps suggesting a criticism of the lack of social role and responsibility which leads to her own deterioration. Thus, our ability to categorize ourselves and others into gender roles and abide by the social expectations linked to these is seen as a distinctly human attribute and one which Shakespeare may have deemed important for the successful function of a patriarchal society. Lastly, the witches may also be considered significant in adding a grotesque nature to the play which further exemplifies their sinister nature: ââ¬ËEye of newt and toe of frog, Wool of bat and tongue of dog. ââ¬â¢ The repeated references to mutilated body parts of animals within the witches chants further depicts their unnatural nature as they are interfering with the natural state of animals. Additionally, further reference to ââ¬ËLiver of blaspheming Jewâ⬠¦Nose of Turk, and Tartarââ¬â¢s lipsââ¬â¢ highlights a taboo element as it plays on racial stereotypes and victimizes groups which contextually may be considered the ââ¬Ëotherââ¬â¢. Perhaps most significantly, however, is the additional parallels which run between the witches and Lady Macbeth, as they incorporate ââ¬Ëfinger of birth-strangled babeââ¬â¢ into their spell. This line instantly incites the previous recognition of Lady Macbethââ¬â¢s own statement that she would have, whilst breast-feeding, removed a baby and ââ¬Ëdashed the brains out. ââ¬â¢ A similar taboo element is highlighted through the suggestion of infanticide, as well as the idea of going against nature as breast-feeding is considered a tender and natural human act. Such clear similarity between the witches and Lady Macbeth can thus be seen to suggest an argument which underlies the whole plot of the play ââ¬â who are really the ââ¬Ëmonstrousââ¬â¢ characters within the play; the witches or the humans? Such ambiguity and deconstruction of the opposition between supposed evil and good as an overarching theme of the novel is one which incites great fear into the plot and the audience, as it implies that, under specific circumstances, even the most moral of us can deteriorate into evil and sin.
Thursday, November 7, 2019
Yasar Kemal A Master of Words
Yasar Kemal A Master of Words Yasar Kemal was actually telling the story of Turkeyââ¬â¢s ordinary people living in over 40,000 villages who experienced the impact of reforms and economic and social development in rural areas. Using archetypal characters, Kemal created a story of epic reach with common human moral and symbolic imagery. Hashtag: #Ya?arKemal Memed, My Hawk A novel, by definition, is fiction, a form of a sequential story describing intimate experiences of imaginary characters. Fiction is an art and many great writers like Edgar Allan Poe, Mark Twain, and Joyce Carol Oates were fiction writers. Turkish writer #Ya?arKemal, who recently passed away, was a prominent fiction writer and best remembered for his first novel ââ¬Å"Memed, My Hawkâ⬠, which was published in 1955. BOOK REPORT This Varlik Prize winner is a story of a young peasant boy (Slim Memed) who tried to save his sweetheart (Hatch) from a forced marriage with the Agha (owner of the land and village chief). Hatch was captured as they attempt to escape but Meme, who wounds the Agha escaped into the mountains and later becomes a bandit. The novel to some critics is exciting and dramatic as it successfully portrayed the severity of peasant life in the Taurus highland of Anatolia during the 1930s. It tells the story of Memed, who in his youth rebel against the cruelty of the village chief and saved his people from tyranny. Indirectly, Yasar Kemal was actually telling the story of Turkeyââ¬â¢s ordinary people living in over 40,000 villages who experienced the impact of reforms and economic and social development in rural areas. Using archetypal characters, Kemal created a story of epic reach with common human moral and symbolic imagery. For instance, the burning of the thistles ( a group of flowering plants) the choked the village land symbolizes Memedââ¬â¢s personal revenge and a quest for social justice. Published in 2007, the novel ââ¬Å"They Burn the Thistlesâ⬠is a sequel to ââ¬Å"Memed, My Hawkâ⬠. It has descriptive passages that clearly tell the story of the bitter war between the greedy and brutal property owner and poor Turkish peasants. The Reality of Kurdish and Turkish Peasants Life In reality, Kurdish and Turkish peasants living in Anatolian villages in the early 1900s were suffering from the powerful Aghas. For instance, since they need to return three kilos for a very kilo of seed they borrowed from an Agha, they were always impoverished and in debt to that particular Agha. Those who cannot pay were intimidated, harmed, and sometimes sent to jail. Moreover, since many Kurdish Aghas maintained a good relationship with the central government, agricultural policies continue to favour commercial classes and landowners in Anatolian region. For instance, the rise in cultivation and land prices often benefit landowners and family-owned business alone. LITERARY TECHNIQUE THAT WORKS WONDERS The ââ¬Å"Agha Systemâ⬠, which is mostly in the East and Southeast region, is actually a ââ¬Å"Master and Servantâ⬠relation. For instance, according to the book The Literary Garland, the peasants were observed to be graceful and dignified when paying their taxes, procure seeds, and even give presents to their landlord and village chief. The harshness of peasantsââ¬â¢ life and the need for land reform and better treatment made #Ya?arKemal the greatest writer in Turkey. His novels created ââ¬Å"Slim Memedâ⬠, a fictitious character like a Turkish Robin Hood who fights against the Aghas who exploit the peasants.
Monday, November 4, 2019
Describe how and explain why colonialism deployed and legitimized Essay
Describe how and explain why colonialism deployed and legitimized violence against women in colonial India - Essay Example poverty has been seen to be increasing as the population increases. In india, the act of infanticide of girls is high, which is an act whereby the girl child is killed after realization that it is a female. There is also high number of abortion cases of girl foetuses. India is currently marred by high number of cases relating to abuse of women. This can be evidenced by the recent case whereby a female student was gang raped. Other cases which are common are forced marriages, wife battering and other women related violence. The cases mentioned above are common in India and they happen frequently because few of them are reported to the authorities. The treatment of the Indian people by the colonialist is what has contributed highly to the current situation where women are abused in the society. The colonisers made Indians work in bad situations. The treatment they got from the coloniser made them hate themselves. This hatred they got from the abuse from the colonialism is what is curre ntly prevailing in the society. The colony violated women for some reasons, one of the main reason for violation was that women are part of recreation in the society, that is they give birth. The colonizers allowed the massacre of the native women and children so that they stop the continuation of Indian people through child birth. Additionally, the colonizers pointed out that control of the growing population will only be done by killing of native women and children in large numbers. Furthermore the massacre of the native women was a way of destroying the local tribes. The coloniser further encouraged abuse against women as a way of controlling the sexuality to destruct the continuation of giving birth. Control of woman's ability to reproduce continued even after the country became independent. Women have been subjected to various controls of their reproduction so as to control the ability to give birth and control the growing population (Anagol 2005). Colonialists took over India and massacred a lot of people, most of the people died as a result of hunger because they were subjected to hard tasks with limited food. Before the arrival of the colonialist to India, Indians had their own system of governances, this where they could solve their domestic issues by use of court. Due to the British expansion to the whole country after the takeover which was characterized by high number of deaths, they changed the system of governance by introduction of their own and destruction of Indian governance. For example, the common courts which the Indians use to solve their issues such as caste Panchayats were abolished. This act by the British made the Indian women vulnerable. This is because the traditional system use by the Indian courts had full knowledge of the Indian women. Because of the abolition of the Indian traditional courts, the colonialist defined new ways of crime. This saw the emergence of various ways of female crimes. Infanticide is of the crime activities identified by the colonialism, infanticide as explained above is killing of the female child after birth. Other criminal activities according to the colonialist are window marriages, husband poisoning and wife beating. Those activities were common before the colonialist governance took over. Colonialists identified criminal activities based of the tribal groups. This affected certain group of women which the colonialist had classified them as the criminal tribes.
Saturday, November 2, 2019
Why don't we prove results in social research Essay
Why don't we prove results in social research - Essay Example However, it is different from scientific research. In order to prove the results of research there are certain elements that must exist. In science, the basic research elements are observation, description, prediction, control, falsification, and causal explanation. Descriptions should be reliable and repeatable. In social research, however, if the same study were conducted by another researcher in another place, the descriptions would not be the same. This is also true of falsification. Falsification is the ability to rule out all other possibilities, rather than merely accepting the results. Since humans are unique in nature, the chances of disproving the results of many social research cases by conducting another study using different subjects would be strong. Instead of looking to rule out possibilities, a social researcher looks to find all the possibilities that explain a certain behavior. In addition, as societies grow and change, the results of social research will also continue to change. The social sciences are not concrete like the natural sciences. They are evolving. They rely on interpretations and ideas, rather than hard facts. For these reasons, social research is not something that can be proved. It is very important that social research methods take measures to maintain a level of trust between the research
Thursday, October 31, 2019
Post-traumatic stress disorder Research Paper Example | Topics and Well Written Essays - 500 words
Post-traumatic stress disorder - Research Paper Example Threats of natural disasters like flood, storm, earthquake, fire etc and manmade disasters like terrorism, prison stay etc can cause PTSD. For example, after the 9/11 World Trade center attack, many of the Americans experienced PTSD because of the threats from Al-Qaida. This paper analyses the cause, symptoms and treatment options of PTSD. ââ¬Å"PTSD starts at different times for different people. Signs of PTSD may start soon after a frightening event and then continue. Other people develop new or more severe signs months or even years later. PTSD can happen to anyoneâ⬠(Medline Plus, 2011). The real cause of PTSD is still unknown to medical science. However, it is believed that various genetic, environmental and social factors are contributing to PTSD. The entire stress management mechanisms of the body are changed as a result of PTSD. ââ¬Å"It affects the stress hormones and chemicals that carry information between the nerves (neurotransmitters). Having been exposed to trauma in the past may increase the risk of PTSDâ⬠(Post-traumatic stress disorder, 2011).Normal people and people with PTSD respond to abnormal behaviors differently. Normal people gradually forget about the abnormal event whereas for the PTSD patients, the memories of the trauma keep on agitate them in their future life.
Tuesday, October 29, 2019
Analysing the measure likelihood of success on the merits Assignment
Analysing the measure likelihood of success on the merits - Assignment Example In addition, the applicantââ¬â¢s attorney should prove to the court that effort has been made to stop to notify the adverse party and should give the reasons to maintain the claim that no court notice is required or the adverse party. The case of Ben Njoroge Muchunu & 2 others v Phares Muchunu & 2 others [2013] eKLR. In case, the applicants sought an order of temporary restraint to prohibit the plaintiff and the defendant against issuing the share of $52,000 as the proceeds from the sale of an estate to the late Benjamin Njoroge Wamanja. The applicants claimed that the money way held in the banks account in the names of the defendantsââ¬â¢ and the plaintiffsââ¬â¢ affidavit. The basis of success was the fact that the applicants did not face any objection in their claim since there was no affidavit to deny the applicants claim. Therefore, in cases of denial of the issuance of a court injunction the applicants were entitled to suffer permanent damages that neither the defendant nor the plaintiff would compensate the applicant (Henry 47). The other alternative available is for the plaintiff and the defendant to establish to the court how they would compensate the applicants. In NEW YORK TIMES V. SULLIVAN, 376 U.S. 254, 84 S. Ct. 710, 11 L. Ed. 2d 686 [1964]. The New York times made a detailed advertisement titled ââ¬Å"Heed their rising Voicesâ⬠in a bid to raise funds to protect martin Luther King Jr against an Albama denunciation of false swearing. The Alabama court denied the application of temporary restraining order of defamation of Montogery Safety commissioner, L.B. Sullivan who was the police supervisor. The court claimed that the advertisement made by the New York Times did not mention Sullivan hence the commissioner had no base to sue the press for defamation. Also, these facts are evident in American Chicle Co. v. Topps Chewing Gum, Inc., 208 F.2d 560, 563 (2d Cir. 1953) (L. Hand, J.). The failure of the plaintiff was as a result of lack o f evidence of defamation hence the press could not be restrained from exercising their freedom of speech. In the case of Data General Corp. v. Digital Computer Controls, Inc 1971. The data general corporation exposed design information through its Nova 1200 minicomputer informing the owners of its secrecy of the design drawings in a contract agreement. Digital computer controls designed its minicomputer that resembled that of digital General Corporation that had sued in court to restrain digital computer controls against the use of heir technology illegally. The court help that a digital computer controls had breached the secrecy rights of the digital general corporation (Patterson 334). The bases for success of the digital general corporation case against digital computer controls were the fact that digital general corporation had applied sufficient security for their drawings hence digital computer controls breached the contractual terms by using confidential information for perso nal gain. In Carlill v. Carbolic Smoke Ball Co. [1893] Q.B. 256 (C.A.). the carbolic smoke ball company placed a newspaper advertisement promising 100 pounds to any person who consumed smoke balls three times in a day as directed by the company. Carlill consumed the smoke balls as directed and contracted influenza. She claimed the reward from the company, but the company denounced any contractual obligation with Carlill. The court applied temporary
Sunday, October 27, 2019
Comparison of UK Building Contracts
Comparison of UK Building Contracts Assessment: Terms of Contract; Critical Evaluation; Question standard practise Samuel Perkins Introduction This assignment aims to compare and contrast the various aspects of both the SBC/Q 2011 Standard Building Contract against the NEC 3 Engineering and Construction Contract: priced with Bill of Quantities 2013. Throughout the assignment I will abbreviate these to SBC/Q 2011 and NEC3. I aim to evaluate the documents involved in the making of the contracts (10%/350 words), the roles of those involved in the performance of the contract (20% / 700 words) , the Contractors responsibility towards the design (20% / 700 words) and finally concentrating on the payment aspect of each contract (50%/1750 words). The contracts will be assessed regarding revisions made in September 2011 to the Housing Grants, Construction and Regeneration Act 1996. My word count will be including the above mentioned areas not exceeding the 3500 words as required. Documents Making up the Contracts In the SBC/Q 2011 contract under provisions, the contract documents are defined in clause 1.1. The issue with this is that the contract sum analysis and any schedule of rates are dependent on the respective party and can therefore not be deemed as contract documents under this condition. For the employer this would mean that the main, responsibility for the correct descriptions and quantities would be placed upon them mitigating risks for the contractor. Regarding any discrepancies within the contract documents it is the responsibility of the Contractor to inform the Architect of any differences, however it should be noted that they are under no obligation to freely search for any discrepancies. Yet under condition 2.15 it states that if the contractor becomes aware of any such departure, error, omission or inadequacy as referred to in clause 2.14 that he shall immediately give notice with appropriate details to the Architect/Contract Administrator, who shall issue instructions in th at regard. The discrepancies are related to items found in condition 2.15(1,2,3,4,5) which cover the contract drawings, contract bills, instructions issued by the architect of contract administrator and finally the CDP documents. From the above we can see that SBC/Q 2011 shows a reasonable understanding to identifying contract documents. The main difference between the NEC3 and SBC/Q 2011 is that the NEC3 document doesnt define the term Contract, therefore there is no defining contract documents unlike SBC/Q 2011. It combats this within the guidance notes providing samples concerning a standard form of tender and form of agreement substituting themselves for actual contract documents. In the Core Clauses 12.4 it states that the contract is the entire agreement between the parties therefore combining the previously mentioned procedures involving the project management and contractual duties, liabilities and obligations. As discussed by Eggleston (2006) the term entire agreement has no legally definable definition however the term entire contract which is also known as a sole agreement clause does. Therefore the contract can only be completed to the written terms and conditions, this excluding any implied terms of common law remedies this relating to any legislation created by parliament as noted in (Galbraith, 2014). Like SC/Q 2011, NEC3 makes provisions regarding any discrepancies and contradictions between contract documents in Core Clause 17.1 however is much less distinct and clear cut in its definitions and clarity. The Clause states that The Project Manager or the Contractor notifies the other as soon as either becomes aware of an ambiguity or inconsistency in or between the documents which are part of this contract. The Project Manager gives an instruction resolving the ambiguity or inconsistency. However this does conflict with Core Clauses namely 12.3 and 18.1 which would then suggest that the responsibility to report inconsistencies lies solely with the Project Manager. Roles involved in the performance of the contract The JCT contracts require the Architect to act as the Contract Administrator in regards to performance of the contract on behalf of the employer. Under SBC/Q2011 the role of the architects expressed duties is covered in conditions 2.8 (1.2.3.4), 2.9, 2.11 and 2.12. These range from ensuring documents are supplied to the Contractor in accordance to the release schedule and initial contract documents to discharging the contract. As these are obligations of the architect they are therefore legally accountable for the area of contract administration. Given the Architects professional position and experience it is there duty to ensure the contract is carried out under the implied terms of common law and to the terms and conditions of the contract, it is crucial that the Architect stays unbiased when making decisions. SBC/Q2011 states under condition 2.4 that it is the duty of the Contractor to continue with the work on a regular basis and attentively and have the works finished by the agreed completion date. The work should progress steadily and in accordance to the contract in regards to time as noted in (Chappell 2012). If the Contractor is to make a breach of duty in respect of non-performance (not partial performance) of the contract would result in complete disregard to the contract terms and conditions which would cause total non-performance. Provisions are made to non-performance regarding the employers in conditions 8.4, 8.5 and 8.7 which guarantees the Contractors continual advancement of works in the event of unpredictable circumstances delaying works and the rectification of defect works. Unlike SBC/Q 2011, NEC3 does not mention the Architect under any of its clauses which removes any context of the Architects involvement. Under Core clause 10.1 it stipulates that the legal transitions and agreements and between the Employer and Contractor and subsequently the Project Manager and Supervisor. The provision of NEC3 states that the association of the Employer is to be related regarding their participation within the roles of the contract administration and are therefore a legal entity. The Project Manager exclusively has authority to change the work information, including issues and discharging any works instruction all of which is stated under Core clauses 14.3 and 27.3. Therefore the Project Manager is acting as the Employers Agent , allowing them to have a greater influence in decisions, which contrasts SBCQ/2011 whereby the Architect of Contract Administrator is more independent and acts in sovereignty. It is vital that the appointed Project Manager under NEC3 be it a single person or firm is competent and professional in order to achieve successful completion of the works and the contract due to the wide-ranging duties and obligations they are assigned. The Project manager and Supervisor can delegate works to other staff members in order to carry out their duties. This is noted under Core clause 14.2 however, before this can be done the Contractor must be notified of what actions each member of staff has been assigned. NEC3 also differs variably from SBC/Q2011 in its lack of expressed terms stating the Contractors obligation to continue with the works regularly. Consequently it relies on the provisions of Core clause 20.1 which state the Contractor is to Provide the works as defined in clause 11.2(3) along with disciplinary procedure that corner any delays to key dates, damages and or the payments scheme. It is important to note that NEC3 has no provisions in any of its Clauses that concerns any expressed terms that state the Project Manager should be neutral and equal, as mentioned above they are effectively acting as the Employers Agent. Therefore any concerns regarding the issues of impartial and unbiased contract administration is an implied duty and should therefore be overseen by the implied terms of common law remedies as displayed in Constain Ltd and Others [Corber] v Bechtel Ltd Anor [2005]. The Contractors Responsibility for Design Regarding the responsibility of the design aspect the Contractor should have no involvement, except if it has clearly been requested and defined within the contract documents under the parameter of the Contractors design responsibility Chappell (2012). It is also worth mentioning that the term design should be used broadly and should also encompass not just drawings but also any written documents relating to the Contractors design proportion for example specifications and schedules of work. Lupton and Cornes (2013) The SBC/Q 2011 has previously required an additional supplement which is provided through the Contractors designed proportion part of the contract. With the Contractors design proportion the employer will then prepare their requirements known as the Employers Requirements, which is created from the performance specification that consequently then allows the Contractor to formulate and submit their proposals known as the Contractors Proposals. These are required when creating the contract documents and subsequently the contract sum. Under clause 2.13.2 it states that the Contractor shall not be responsible for the contents of the Employers requirements or for verifying the adequacy of any design contained within them. Furthermore under clause 2.2 titled Contractors Design Proportion, it states what the Contractor should do where the works contain a Contractors Design Proportion. From these clauses it should be made clear the difference between the Contractors Design Proportion and the remainder of the job is to reduce any conflicts or confusion throughout the project. The Contractors liability is noted in clauses 2.1 and 2.19.1 and ensures that they do not exceed the level of works required, due to the Contractors liability being near equal to the Architects the liability is restricted to the Contractors skill and attention to details in their works. The NEC3 differs from SBC/Q 2011 and does not give the Contractor as much flexibility of which the Contractors design can operate. Clause 60.3 of NEC3 states that any inconsistencies with site information are the responsibility of the Employer. It is noted in Eggleston (2006) that due to the fact the Employer should have taken into account the best site conditions as per 60(12) yet logically the Contractor should have allowances and precautionary measures in place, which is contradictive. The Contractors basic obligation is covered in core clauses 20.1 and the obligation for Contractors designed work in clause 21.1 which states what work and designs are required from the Contractor and that the Employer should state the works information, the criteria to which he requires designs to conform. NEC3 is written to take account of common law remedies unlike SBC/Q2011 which uses expressed terms of provisions when discussing the Contractors liability regarding the works being fit for purpose. NEC3 optional clause X15.(1.2) limits the Contractors liability to reasonable skill and care much like SBC/Q2011 clause 2.1. This clause could be interpreted differently regarding fitness for purpose as the Contractor could complete the works with reasonable skill and care however could not be meeting their contractual obligations. Clause 21.2 states that the Contractor is responsible for the design standards, materials and products unless it is stated otherwise in the works information. As common law remedies implied on any warranties unless they are excluded. Payment SBC/Q 2011s provisions states that the parties involved should agree to suitable staged payments or Milestones as they are more commonly known, however if staged payments cannot be agreed upon the contract provisions will default to interim payments as per condition 4.9 (1.2) where a monthly valuation is submitted. It is therefore crucial that all valuations submitted for interim certificates are reasonably accurate and do not need to be perfectly correct, this will allow for any errors from miscalculations created from the difficulty of the matter as revealed in Secretary of State for Transport v Birse-Farr Joint Venture [1993] 62 BLR 36. Interim amounts account for the completed work at Bill of Quantity rates along with a percentage of lump sums, the final amount is due when the whole work has been re-measured in accordance with the Bill of Quantities. Eggleston (2006) Interim valuations should be calculated via gross valuation, which include for the deduction of retention and any previously arranged payments certified as due. Provisions regarding this are found under 4.16 (1.2.3) discussing work executed, site materials and listed items. Yet staged payments should be agreed before the work is commenced and should correlate to relevant milestones and work sections. However this procedure should require periodic re-evaluations due to the administrative nature. Regarding in the event of insolvency as previously mentioned, the site materials in particular any stored off-site can be a difficult to identify whom they belong to, however noted in the provisions of SBC/Q 2011 under Terms of Conditions 4.17 (1-5) these materials become property of the Employer provided they are accounted for in an interim certificate. The Contractor must also provide proof to ensure all offsite materials are insured. Therefore any implied terms of common law remedies regard ing SGA 1979 are in excluded of their respective powers. To act upon the above the retention of title clause must be completed in order to identify the route the transfer of title takes, this is usually done methodically working through the supply chain from the Contractor, Subcontractor and Manufacturer, again checked against interim payments of that Contractor. The principles of payments should be governed by terms of the contract provisions and also by any implied terms of common law remedies like SGA 1979 and SOGSA 1982 as noted in Hughes, Mills, and OBrien (2008). In SOGSA 1982 it establishes that a payment should be made to any provider of work including the provision of any good or services supplied. However if it is expressed in the terms of the contracts provision a right to set off can be put in place to exclude any implied terms of common law remedies as seen in the case of Acsim (Southern) Ltd v Danish Contracting and Development Co Ltd [1992] 47 BLR 59 and Gilbert-Ash Northern v Modern Engineering Bristol) Ltd [1974] AC 689. Any interim certificates under the provisions of the SBC/Q 2011 are to adhere to the dates specified under the contract particulars throughout the contract and its conditions. Condition 4.10 (1.2) under contract provisions the contractor should receive a written notice stating the amount to be paid and the methodology used to calculate the sum, this should be received no less than 5 days after the submission of the interim certificate from the Contractor. It is therefore common practice for a reference to the interim certificate and copy of the valuation to be prepared by the Contract Administer or Quantity Surveyor. It should be noted that in comparison to either the Contract Administrator or Architect they would be held accountable to the parties involved due to the concern of skill and care. Regarding the final payment a few conditions must be mentioned firstly condition 4.12 (1-7) which covers details interim payments final date and amount most importantly that the final date for interim payment shall be no later than 14 days from the original issuing of the interim certificate. It also provides instructions on how to proceed with any pay less notices. Secondly the under the provisions of condition 4.15 (1-9) under title Final certificate and final payment instructs that the final payment will match the final certificate. The final payment should amount to the total of the contract price while taking into account all additional works and omissions, less the staged payments that have been paid throughout the projects work. As discussed by Ramsey (2000)the case of Lubenham V South Pembrokeshire DC [1986] 33 BLR 39 showing how the Contract Administrator should abide to the provisions of expressed terms of the contract while performing their contractual procedure, in which the contractor will have no motive or reason to challenge the certificates issued. NEC3 differs from SBC/Q 2011 in the methods used relating to payment schemes. Firstly it is the Project Managers responsibility to assess the amount of the payments due at the assessment date and consequently they are accountable to ensure the submission of application to confirm payment. The Project Manager is also responsible for determining the first assessment date. This is found under Core Clause 50.1 under title assessing the amount due. Clause 51.1 stating that the latest dates that the Project Manager can certify the payment are fixed throughout the contract relating to each assessment date, this is usually a period of 1 week from the date. NECs secondary option Clause X16 (1.2) is similar to condition 4.20 (1.2.3) of SBCQ/2011 in its replication which defaults the retention percentage to either 3% unless otherwise stipulated under the contract particulars. Regarding the Core clauses that relate to retention there are no expressed terms found in the contract provisions. Core Clause 50.3 is designed to be a powerful motivation to the Contractor and can incur a 25% deduction until the Project Manager confirms a programme submitted by the Contractor, however no provisions are made that make any reference to the final certificate, which consequently means that certificates have no order of precedence and controversially no contractual status. As we are aware it is the Project Managers responsibility under Core Clause 50.1 to access and certify each payment amount at the given assessment dates, along with this under Clause 50.4, it states that the Project Manager should take into account any submissions by the Contractor that however the responsibility remains on the Project Manager the amount due regardless if he has not received a submission from the Contractor. Any assessment that is issued after the defect certificate will be considered as is common practise as the final assessment which will lead to the final certificate, therefore from clause 50.4 it is understood that without the Contractors submission of a final account before the last assessment they will lose any influence they have regarding payment. However this clause may cause disputes between the Contractor and Project Manager regarding the information supplied from the contractors original submitted programme, as this considered to meet the requirements of the contracts agreement. Clause 50.3 is biased in its favouring to the Project Manager, therefore the Contractor may wish to seek adjudication if they believe they have any conflicts throughout the project as the clause provides the opportunity to invoke a penalty clause. NEC Core clause 50.5 is designed to provide motivation to the Contractor to submit a programme which contains information required for the contract, within this clause it is understood that if the amount has been inaccurately assessed is difficult to comprehend. It is implied that the Contractor will not be entitled to any correction of the next payment certificate. Usually it is common practice for inaccurate assessments to be corrected on the later payment certificates without the Project Managers admission. However, if the Project Manager does not correct the assessment in question again the Contractor can seek adjudication by an Adjudicator. If the Project Manager does admit to a mistake following a tribunal or adjudication, under the provisions of core clause 51.3 it is liable to attract interest calculated from the date when the increased amount would have been certified if there had been no dispute. Core Clauses 11.2(21), 11.2(22) and 11.2.(28) relate to Payment in Main Option B Priced Contract with BOQ. The Term bill of quantities is defined in clause 11.2(21) which define its meaning and therefore the how the BOQ relates to other clauses. Clause 11.2(21) is very similar to Core Clause 11.2(20) of the main Option A priced contract with activity schedule. Finally Core Clauses 11.2(28) and 11.2(31) define the completed work ensuring it cannot be misinterpreted regarding payment terms. References Chappell, D. (2012) Understanding JCT standard building contracts. 9th edn. London, United Kingdom: Taylor Francis. Eggleston, B.Ce. (2006) The NEC 3 engineering and construction contract: A commentary. 2nd edn. Oxford, UK: Wiley, John Sons. Galbraith, A., Stockdale, M., Wilson, S., Mitchell, R., Hewitson, R., Spurgeon, S. and Woodley, M. (2014) Galbraiths building and land management law for students. 6th edn. Oxon: Routledge. Hughes, S., Mills, R. and OBrien, P. (2008) Payment in construction: A practical guide. Coventry: RICS Books. Lupton, S. and Cornes, D.L. (2013) Cornes and Luptons design liability in the construction industry. 5th edn. London, United Kingdom: Wiley-Blackwell (an imprint of John Wiley Sons Ltd). Ramsey, Vivian. Construction Law Handbook. 1st ed. London: Thomas Telford, 2000. Print. Cases Acsim (Southern) Ltd v Danish Contracting and Development Co Ltd [1992] 47 BLR 59 and Gilbert-Ash Northern v Modern Engineering Bristol) Ltd [1974] AC 689. Constain Ltd and Others [Corber] v Bechtel Ltd Anor [2005]. Lubenham V South Pembrokeshire DC [1986] 33 BLR 39 Secretary of State for Transport v Birse-Farr Joint Venture [1993] 62 BLR 36.
Subscribe to:
Posts (Atom)