Monday, December 23, 2019

The Theory Of Attachment Proposed By John Bowlby And Mary...

The lectures, discussions in class, and chapter readings highlighted the importance of one of the characteristics of human nature, which is relationships and attachment. The course materials emphasized the critical role of relationship and attachment to the development of the children. The internship site also provided an opportunity for me to visualize different attachments and relationships between parent and child in action. As the chapter readings from the textbook explore different perspectives of relationship and attachment proposed by various theorists, the class discussions and lectures furthered my understanding and knowledge of parent-child relationships. In chapter 3, the theory of attachment proposed by John Bowlby and Mary Ainsworth is explored. First, Bowlby’s theory of attachment was influenced by the ethological theorist, Darwin, Lorenz, and Tinbergen, who were previously mentioned in the chapter. Bowlby emphasized that behaviors found in animals, such as seeking close proximity from mothers to reduce the chance of becoming a prey, can also be found in toddlers. For example, Bowlby defined that actions such as following, crying out, and clinging found in children are displayed in order to keep close distance to parents is called attachment behaviors. Bowlby incorporates imprinting and instincts, which are ethological terms, to explain different phases of attachment. As the child develops through time, the attachment of child and parent deepens theirShow MoreRelatedThe Theory Of Love By Robert J. Sternberg1458 Words   |  6 PagesIt can be applied to early development studies of attachment theory, such as those by Joh n Bowlby and Mary Ainsworth, and carried over to our studies of romance and love through the works of Robert J. Sternberg. Many of our class lessons have focused on cause and effect: childhood cause and adulthood effect. Thus it is not strange to note, Sternberg’s research, the triangular theory of love, is impacted by Bowlby and Ainsworth’s attachment theory. As we notice within each stage and style of relationshipRead MoreChildren and Young People’s Development.1105 Words   |  5 PagesJohn Bowlby’s attachment theory has had a huge influence on practice. â€Å"His work on maternal separation, attachment, and loss...has profoundly influenced practice†, Pedder, (2010:p130). Bowlby’s attachment theory talks about how important it is for a child to have a primary caregiver and how a child need’s to have a strong bond with their main carer. From Bowlby’s research and theory there has been a great influence on policies and practi ce as, has been stressed how important it is to provide childrenRead MoreAttachment Theory On The Relationships Between Parents And Children And Primary Caregivers2037 Words   |  9 PagesAttachment theory concentrates on the relationships between parents and children or parents and primary caregivers. According John Bowlby, the author of attachment theory, attachment is inborn and is as essential for survival as food, water, and air; it is an emotional, object specific relationship that develops towards a primary caregiver (Bowlby, 1969). Through series of experiments Bowlby explained the nature and the role of physical proximity of a child to a caregiver as a secure base for explorationRead MoreSecure Attachment Relationship Between Young Children And Their Families898 Words   |  4 PagesSecure Attachment Relationship The mother is usually the first and primary object of attachment for an infant, but in many cultures, babies become just as attached to their fathers, siblings, and grandparents. When infants are attached to their caregivers, they gain a secure base from which babies can explore their environment and a haven of safety to return to when they are afraid. Attachment begins with physical touching and cuddling between infant and parent. Some babies become secure or insecureRead MoreEssay on Foundations and Characteristics of Attachment Theory1105 Words   |  5 PagesAttachment Theory Attachment theory comes out of the work of John Bowlby. However, it finds its genesis in Freud’s Psychoanalysis. Bowlby himself was trained in psychoanalysis and became a qualified practitioner in the approach. In his early 20s, however, before he enrolled in medical school or in the Institute of Psychoanalysis, he worked with children with behavior problems. These two forces, these experiences, perhaps formed the foundation and later development of his Attachment Theory. SpurredRead MoreTheories And Research Studies Into Attachment1227 Words   |  5 PagesBiological, development or social approaches to psychology WIZ204 Evaluate theories and research studies into Attachment. Bowlby’s theory of attachment The theory of attachment was first proposed by a British psychoanalyst John Bowlby (1907-1990) who described it as a ‘lasting psychological connectedness between human beings’ (1988). According to psychologist Mary Anisworth attachment â€Å"may be defined as an affectional tie that one person or animal forms between himself and another specific one-aRead MoreBowlby s Theory Of Attachment1431 Words   |  6 PagesPerhaps the most influential explanation of attachment was presented by John Bowlby who began developing his ideas in the 1940s. Bowlby was commissioned by the World Health Organisation to investigate whether young children were likely to be harmed if they are separated from their mothers in the early years. (Hayes, 1996). Bowlby (1951) reported that infants possesses an innate need to attach to one main attachment figure (this was usually the mother). According to Hayes (1996), this is a specialRead MoreThe Development of Attachment Essay793 Words   |  4 PagesThe Development of Attachment Psychological research can inform us about the development of attachments to a certain extent. Mary Ainsworth actually covered a definition explaining, how we know when an attachment has developed. This is; the infant tries to get close to and maintain that proximity with the caregiver, using a number of strategies to do so. E.g. clinging and signalling behaviours such as smiling, crying and calling. The fact she has outlined this definitionRead MoreSocial And Emotional Development : John Bowlby1402 Words   |  6 Pagesbond of attachment to another person is regarded as a foundation for successful social and emotional development. â€Å"It has been observed that children with secure attachments are more socially competent than those with insecure attachment† (Neaum. S. 2010). By the child having formed secured relationships it enables them to engage with the world with a sense of confidence and self-esteem. children who have secure attachments are also known to show more co-operative behaviour. John Bowlby was bornRead MorePsychology is not just common sense1300 Words   |  6 Pagesto disprove misconceptions and theories conceived out of said common sense. The majority of laymen believe that if an infant is not securely attached to its caregiver, it must have no sense of attachment at all. Moreover, they assume blindly that there will be no in-betweens. However, psychology shows that there is much more to it when it comes to attachment styles. There are in fact, three main types of attachment styles that make up the crux of the Attachment Theory, which will be explored in further

Sunday, December 15, 2019

The Lackawanna Cutoff Free Essays

The Lackawanna Cutoff is an architectural work of art. It started a new era of Railroading and brought many new ideas to the table. The Cutoff was used for many things and was traveled by thousands of people throughout the years. We will write a custom essay sample on The Lackawanna Cutoff or any similar topic only for you Order Now The Lackawanna Cutoff was a 28-mile long; double-track mainline constructed by the Delaware, Lackawanna, and Western Railroad companies between the years of 1908-1911. The rail line ran from Port Morris, New Jersey to Slateford, Pennsylvania.According to Fred Stratton, from Fred’s interactive Erie Railroad website, The Cutoff founded the use of reinforced concrete on an enormous scale, as well as the use of massive cutting and filling. These methods would all later become standard procedures in railroad construction. Starting about 1905, more than a ten potential routes between Port Morris, New Jersey and Slateford, Pennsylvania were surveyed. The Lackawanna Cutoff was not one of the early possibilities surveyed. The Lackawanna Cutoff plan would run directly from Slateford, Pennsylvania, to Port Morris, New Jersey.Robert Savino, of the website GSMRRClub said, it was exactly 28. 45 miles in length. He said that the Cutoff plan reduced the maximum grade of 60. 2 feet per mile, which was the lowest of all the other surveyed routes, to 29. 04 feet per mile. The Cutoff required exceptionally heavy cuts and fills totaling over 15 million cubic yards, according to Fred Stratton. The Lackawanna Railroad company had to purchase over 760 acres of farmland for â€Å"borrow pits. † They had to scoop out the earth and gravel to a depth of twenty feet and hauled it up to the top of the embankments. This left large lakes where there were formerly level grounds. Concrete was used as the main material for the construction of signal towers, stations, and the highway crossings. There was not a single at-grade crossing on the Cutoff. According to Robert Savino, â€Å"at one time, ten steam shovels were at work on one fill alone, resembling work on the Panama Canal. † Five million pounds of dynamite were used in to break apart the hills to create the cuts. The Lackawanna Cutoff opened to service on the Christmas Eve of 1911. The Cutoff was built for speed. Not one curve on the whole track had a speed limit of less than 70 miles per hour. With curves having superelevation, the speed limit was later raised to 80 miles per hour. According to Fred Stratton, â€Å"No official record exists of over speed operations on the Cutoff, but â€Å"making up time† on the schedule when trains were late during the is reported to have occurred, with speeds in excess of 100 miles per hour having been attained on occasion. † By 1979, the Cutoff had been placed out of service. This meant that all maintenance on the line was stopped.Ironically, a company, Conrail, had just changed many of the crossties on the Cutoff in 1976, so the line was in the best shape it had been in nearly 15 years. The Lackawanna Cutoff was the first of its kind. It showed architects that anything was possible no matter how big the project. Sadly it is no longer in use, but you can still visit the historic sites it has left behind.Works Cited Stratton, Fred. â€Å"LACKAWANNA CUTOFF. † FRED’S INTERACTIVE ERIE RAILROAD PAGE. 19 Oct. 2006. Web. 8 Nov. 2010. Savino, Robert J. â€Å"The Lackawanna Cutoff – Then Now. † GSMRRClub. 12 Nov. 2009. Web. 8 Nov. 2010. How to cite The Lackawanna Cutoff, Papers

Saturday, December 7, 2019

Cryptography Essay Example For Students

Cryptography Essay Cryptography is the science of encoding a message into a form that is unreadable and making sure only the proper people are capable of decoding the message back into its original form. This is usually done by using an encryption algorithm and a decryption algorithm (these two are often the same) and very often a secret key. Some of the early cryptographic systems did not use a key but instead kept the algorithm itself secret. The message sender uses the encryption algorithm and the key to encode the message, and then sends it to the receiver. The receiver then uses the decryption algorithm and the key to turn back the encrypted message into its original form and read it. If the message is intercepted on the way by a third party, they will only have unreadable data and will have gained nothing, unless they can figure out the decryption algorithm and obtain the key. This is why the key is never to be sent with the message, and has to be kept secret at all cost. If the key is compromise d, the sender and the encrypted data is no longer safe. The sender and the receiver then usually agree on a new key to prevent any further damage. In ancient Greece, around 550 Bc, messages were sent encoded to generals and could only be decoded using special staff keys. The key actually consisted of a physical object, which was applied on the message to get the decrypted version of it. In 50 Bc., one of the most simple cryptographic algorithms ever used was the one called the Caesar cipher, that was used by Julius Caesar to send messages to his generals. It consisted simply of switching each letter with the letter that was 3 letters further down the alphabet. For example Stephen would become Vwhskhq. To decrypt the message, the receivers would simply subtract 3 letters from each letter. This algorithm was later improved and called ROT13, where the letters could be shifted to any number between 1 and 25, and the number of letters shifted was the secret key. This very simple algorith m has been used on Usenet successfully to prevent people from inadvertently reading materials they might find offensive. Monoalphabetic substitution is another simple step away from the ROT13 algorithm. In this algorithm, each letter correspond to another letter but in no particular order. For example a = d, d = x, f = e, etc for all 26 letters. This made it much harder to break but also made fairly big keys that couldnt be memorized, since they consisted of 26 pairs of letters. In France during 1585, members of the kings court liked to send romantic or gossip messages to each other and encrypt them for safety, which becomes almost a necessity. Blaise de Vigenere came up with a poly-alphabetic substitution known as the Vigenere cipher. Basically, the algorithm would encrypt messages several letters at a time instead of letter by letter. For example ab = fh, th = sq. To simplify the huge keys it would require, the key was broken into a table and a key, the table was fairly big but the key was small enough to be memorized, and the table was useless without the key. This cipher wasnt totally safe but no t otally sure method to break it was developed before early in the 20th century. During World War I, American troops used native Indians to send messages over the radio, which could only be understood by other native Indians, and absolutely nobody in Germany could understand it. Also in World War I (most cryptographic algorithms are developed for wars), the Playfair algorithm is developed by the Allies, the key, like in the Vigenere cipher, is based on a little table and a short keyword, which were both changed periodically. The rules used with the table were much more complex and made it fairly safe. In World War II, however, the Germans gave up on abstract algorithms and came up with a physical encrypting/decrypting machine called the Enigma. It had different wheels of different sizes which were to be tuned differently depending on the date, the different turnings were listed in a little booklet that came with the machine. It wasnt broken before the Allies finally managed to capture enough pieces of the machine and collect enough data from operating errors by the Germans. Whitfield Diffie and Martin Helbman (1976) come up with the notion of Public Key Cryptography. In 1977, RSA (Ronald L. Rivest, Adi Shamir and Leonard M. Adleman) develops a Public Key algorithm based on large prime numbers that is theoretically impossible to break in a reasonable amount of time. Digital signatures were also made possible. 1991, PGP (Pretty Good Privacy) reuses an algorithm very similar to RSAs and gets posted on the web. Phil Zimmerman gets sued for both exporting cryptographic data and violating copyright laws. A new version of PGP is quickly developed which is different enough from RSA’s to be marketed. Because of its broadcasting on the web and the fact that it is freeware, PGP becomes one of the most widespread crypto systems. Now, we will quickly go over the concepts of public key cryptography and the global idea of how the RSA algorithm works (or PGP, they are al most the same), as well as digital signatures and â€Å"digicash†. I will also explain the general methods used to break most ciphers. I cannot however explain in detail because I cannot broadcast that kind of information without breaking the law which I will explain later. Public Key Cryptography The main problem with most cryptographic algorithms is that they are vulnerable to having the key exposed, and the key has to be agreed on by the sender and the receiver ahead of time. This means that when the sender and receiver exchange keys the first time, there is an opportunity for a third party to capture the key (or whenever keys are changed, in many cases keys were changed periodically for additional safety). This is exactly what public key cryptography avoids. The receiver of the message sends his public key to the sender. It is a public key, so it doesnt matter if the whole world knows the key or not. The key can only be used to encrypt data, not decrypt it. Then the sende r will encrypt the message with the public key and send it to the receiver. Once the receiver received the data, he takes his private key and uses it to decipher the data. Note that the private key was never transmitted by the receiver to anyone, so it is almost invulnerable to exposure. Also note that the public and private keys work in pairs. There is only one private key associated with each public key and vice versa, and ideally it is impossible to find one key from the other one. If someone intercepts the message he gets only an unreadable encrypted version of it, and using the public key or any other incorrect key used with the decryption algorithm will simply generate another series of numbers. If the receiver wants to reply to the sender, the sender has to have his own set of private and public key as well, and then the whole story goes on again the other way around. Ideally, there is even a phonebook of all public keys so that anybody could send an encrypted message safely to anybody else by simply looking up that persons public key. The RSA Algorithm The RSA algorithm is based on large prime numbers. One very interesting property of large prime numbers is that it is very hard to find out wether a very large number is a prime, and if it is not, finding out what numbers it is a product of can be very hard too. So if we take two (very) large primes and multiply them together, we get a number that is almost prime, and it will be very hard to find what two numbers were originally multiplied to obtain it. These numbers are used as the public and private keys, since it is very hard to find them. Theoretically, if the keys are chosen large enough, breaking the RSA algorithm would take several hundred years using all the biggest computers on the planet put together. RSA has offered a large amount of money to whoever comes up with a reliable and fast algorithm that can break their code. They still have all their money. Digital Signatures There remains one prob lem with passing all these messages: messages can be passed from sender to receiver safely, but the receiver has no means of determining who the message was actually from. For example, Bob could take Joes public key and send the following message to Joe: Youre a wuss. signed: Jack. Now, when Joe receives this message, he has absolutely no way of telling that Bob sent the message, and not Jack. This is where digital signatures come in handy. They allow a person to sign a message in a way that certifies that the message was actually sent by them. This is done by using one other interesting property of the private and public keys in RSA: they can be reversed in the algorithm and it will still work. For example, if you encode something using the private key, it can be decoded with and only with the public key. So when Jack sends something to Bob, he takes signed Jack and encrypts it with his private key (note that this in no way reveals what his private key is) and adds that at the end of his message as a signature. When Bob receives the message from Jack and decrypts it, he will obtain a small encrypted piece of data at the end of the message, which is the encrypted signature Jack put there. Bob can decrypt it with Jacks public key, and if a real message comes out of it, (i.e: not a series of apparently random numbers) then he knows that Jack was indeed the person that sent him the message. Usually, people add the exact time and date inside their signature to make sure each signature can be used only once. That is, once Bob has Jack’s signature at the end of the message, he cant send a message to Tom that says: Youre a BIG wuss, signed Jack and then paste the signature he just got from Jack at the end, because Tom will be able to see that there is a time difference in the signatures data and will therefore know that the message isnt really coming from Jack. Digital Money Digital Money is a form of money that can be used online (or anywhere else for what th at matters), with both safety and anonymity. Most digital money systems out there are closer to prototypes than actual widely used systems. Different digital money schemes probably exist, but this one works and is simple and safe. It is a simple application of digital signatures. The costumer sends a digital signature to whoever he wants to send money to by encrypting the data using his private key. (See the section above for details on digital signatures). In the signature, he/she includes the amount, the time, who the money goes to, a transaction number and whatever data is convenient to include. Very much like a check, really. When the person being paid receives the data, he/she can check it by decrypting it with the payers public key. He/she cannot modify it since it is encrypted, he/she cannot duplicate it since there is a transaction number, and finally the payment cannot be intercepted by a third party because it contains the public key of who the money goes to, which means i t will be worthless to anyone else. To guarantee confidentiality the digital signature is encrypted again before being sent with the receiver’s public key so that no third party can even find out who is being paid how much for what. There are even a little more complicated schemes that will allow total confidentiality. That is, even the person receiving the money will not know who is paying him because the transaction is handled directly through the â€Å"digicash† servers instead of between the buyer and the seller, although usually he will have to know in order to send the purchased product or information to his customer. Once the receiver has received the payment and checked it, he/she forwards the digital signature (encrypted with the â€Å"digicash† servers public key to guarantee confidentiality) to the â€Å"digicash† server, which checks it and transfers the corresponding amount between the two â€Å"digicash† accounts. The payment has been successfully made without ever revealing anyones private key or identity. Breaking Encoded Data Breaking encoded data is not easy, especially when dealing with complex encryption schemes. Here are some of the ways that are used to do it: 1. Stealing the key! (and dont let them know you have it). This is the simplest and most radical way of breaking into someones secret transmissions. 2. Guessing the key. Some people do tend to use their dogs name as a key and things like that, but this method is still much more efficient in movies than in real life. Usually this is more widely used by having the brute force methods test for common words first and then uncommon words. 3. Figuring out what algorithm is used. Knowing this will help a lot to break the cipher. 4. Brute force. This method is basically to try out all the possible keys until a correct result appears. It can be time consuming but even a slow computer can break all of the simpler ciphers instantly. There are smarter versions of this which search first through more likely values, or manage to cut out large chunks of the search space by elimination before actually trying everything. 5. Letter frequency analysis. Some letters appear more often than others in a normal text conversation. (e is the most frequent). So knowing this, if the cipher is a mono-alphabetic substitution, the letters can be found by matching their frequencies. For poly-alphabetic substitution, there are also letter frequency charts for short multiple letter strings. Look for human errors in the encoded transmissions. Often over a long series of messages, the user will make a mistake at least once, and the messed up data usually says a lot about what the key might be (especially people who tend to forget to encrypt a message when sending it, and then correct their error by encrypting it and sending it again, this gives the listening third party an encrypted and a decrypted version of the same text, which is usually very useful for find ing the key.) Note that RSA is very resistant to all of these methods since the keys are always safe and brute force will take several hundred years to work. The only human error that could actually endanger the cipher would be to broadcast the private key by mistake. Being able to encrypt our messages so that no one else can read them is great, but is this something we really need? Most of us do not need to have our transmissions encrypted, for the very simple reason that simply nobody is interested in intercepting and reading our electronic mail. Privacy of this type would be nice, but it definitely would not be worth going through the trouble of setting up everything that needs to be set up unless you have an important secret to keep. However if it came all set up with most operating systems then it would be convenient enough to use on a regular basis. Remember that because of the way the Internet is built, anyone connected to the Ethernet cable can read every single transmission made on the net. Thats not exactly private. Affirmative Action - History EssayBut there are people out there that need to keep important secrets and arent terrorists or criminals or the army. Most businesses will not be able to use the Internet as a means of communication as long as all their online communications are vulnerable to industrial spying. For businesses, the only safe way to communicate through a medium where each single bit they send can be listened to is to encrypt all of their communications with a cipher strong enough to resist breaking attempts from the other businesses. Another use of cryptography applied to business is the one used by the french television channel Canal+, which is broadcasted, but only the customers paying every month for the new keycode that corresponds to their decoder box will be able to decode the broadcasted programs. Without the use of encryption, the whole scheme of having a premium channel broadcasted through airwaves would be totally impossible. Finally, one of the most useful use s of cryptography that we might all find use for is â€Å"Digicash†. Without cryptography it is very close to impossible to implement a successful and convenient scheme for online money. And online money is something most online businesses and shoppers would love to have. Cryptography has its origins in wars and is therefore considered very much like a weapon because of the advantage it can give to one side or the other. Legally, any information about any kind of strong encryption is considered munitions (remember Michael Grubbs T shirt?). What this means is basically that it is illegal to export it to another country in any way. The FBI takes this matter extremely seriously. There are more or less equivalent laws in most other countries in the world as well. Illegal immigrants in France tattooed cryptographic data on their forearms so that it would be illegal to send them back to their country. Since the Internet is worldwide, posting any strong encryption information on the web is the same as exporting it, and is therefore illegal. Which means that right now encrypted Internet communications are more or less illegal as well. Also, the government is now trying to impose the Clipper chip as a standard on all computers, and banning all other forms of cryptography, in order to have a unique crypto system which it has the ability to break. The problem is, is that it is already too late to prevent these crypto systems from being exported. Most foreign countries already have knowledge of them, and there are many foreign business companies which use strong cryptography (including the RSA algorithm). So prohibiting exportation of these materials is purely and si mply useless. Furthermore, prohibiting US companies from being able to export strong cryptography results in loss of marketing opportunities for them. It also means that they wont be able to conduct safe, private conversations when dealing with foreign companies because they cannot use encrypted communications.

Saturday, November 30, 2019

Winning vs. Fair Play Are they incompatible Essay Example Essay Example

Winning vs. Fair Play: Are they incompatible? Essay Example Paper Winning vs. Fair Play: Are they incompatible Essay Introduction The personality traits of the â€Å"winner† are embedded within each and every American. It is a nation that survived and thrived against heavy odds. That legacy shapes many of the attitudes we have today about winning and losing. The importance of winning has permeated our culture from the business world to professional sports to local youth soccer leagues. The drive to win is necessary both for our survival and for our continued pursuit of excellence. Excellence, in turn, benefits society as a whole. This is why the drive to win has an important role in our society. A worthy goal for society is to create an atmosphere where the drive to win not only co-exists with fair play and sportsmanship but also works in tandem with them. The reality is that one does not negate the other. Winning and fair play/sportsmanship can actually enhance each other. In that sort of environment we all win. Winning Winning vs. Fair Play: Are they incompatible? Essay Body Paragraphs According to Peck â€Å"It is wrong to regard any other human being as, a priori, as an object or an it† (1993). The early European colonists who came to America recognized this. Eventually, the concept of individual rights was codified into the Constitution. Even though each individual settler was driven to get their â€Å"piece of the pie†, they understood that cooperation would also always be necessary. At the same time there is a reality that each individual must face. Engh writes that â€Å"Winning is what we all must do throughout life to succeed.† (2002). Fair play and consideration for others can’t always be accommodated in the reality of everyday life. Sports are a metaphor for life. The importance placed on winning is just a reflection of society as a whole. Those who win consistently in sports, career and life reap the lion’s share of society’s rewards. Since these rewards are not infinite in supply; there will always be stiff comp etition over them. That is the way society is designed. As a nation that design has served us well. Even though most people, if asked, would see sportsmanship, fair play and ethics as good qualities; our society sends mixed messages. Individualistic, selfish behavior is often rewarded. Athletes and businessmen who cut corners to make it to the top are often portrayed as heroes. Sometimes sportsmanship can actually endanger all those involved. If an athlete in the heat of competition is distracted by thoughts of sportsmanship, injuries can result. As one young athlete put it â€Å"The football field is no place to think about ethics† (Canadian Centres Teaching Peace, 2008). Ethics come in the rule making process for the game. The game is meant to be won or lost. Vince Lombardi, the successful Green Bay Packers coach of the 1960s once said that â€Å"Winning isn’t every thing. It’s the only thing†. His phrase not only motivated the Packers to excellence; it also inspired the American culture. The statement tapped into a feeling that lay deep in the American psyche. Fair Play and Sportsmanship Winning is not a bad thing. Too often, it has been portrayed this way. It does not have to be synonymous with greed or the wiliness to indulge in unethical behavior to win. Winning has an important role in continuing a societal pursuit of excellence. Without this pursuit the culture would become stagnant and ultimately die. It is true that that the preset rules of the game, whatever it may be, do much to govern the activity and encourage fair play. There is a higher value to winning than just the superficial, though. Engh writes that â€Å"The very values we can learn through organized sports – things such as ethics, fair play and sportsmanship – are the lessons that will guide us to be the best we can in life† (2002). Winning unethically or without respect for the opponent in sports can lead to a downward process for the win ner. The harm to the â€Å"losers† in this scenario is obvious. The harm to the â€Å"winner† may be just as great in the long run. Delany states that: When someone decides to justify certain behavior in an attempt to gain an edge over an opponent, they are likely to engage in other deviant action. (2003) Fair play and sportsmanship have important societal roles to play. These traits are just as ingrained in human beings as the drive to win. An example of this can be seen in a recent well-publicized incident at a women’s college softball game. Having hit what appeared to be a game-winning home run; a player was injured and unable to make her way around the bases. If her teammates helped her in any way the run would be disallowed. Instead two players from the opposing team carried her around the bases, allowing her to touch each as they went by. The public reaction to this incident of pure sportsmanship is telling. The young women were honored repeatedly and appe ared on national talk shows. Could it be that sportsmanship and fair play are themselves forms of winning? A Meeting of the Minds Winning without honor can only bring a shallow happiness. It also invites others to treat the â€Å"winner† in the same way. Many of the human rewards that come along with winning are lost when the winning is done by cheating. The winner may obtain the rewards of winning but without the true fulfillment winning a fair and sportsmanlike competition brings. Sports can be a good arena for nurturing qualities of future success in children. At the same time, it can be taken too far. Winning is important because it is both a process of self motivation and of cooperation. Sports teach a structure that we all need to know in order to succeed in later life. Learning how to win is a process, as is learning how to lose and how to be sportsmanlike. For kids, the pressure of a win-at-all-costs mentality often does not create the desired result. Focused, success ful individuals are the exception to the rule. Often this pressure is a distraction rather than an encouragement to focus. Parents who see other parents encouraging a â€Å"win at all costs attitude† often feel pressured to do the same with their kids. The result is often not what they had hoped for. In fact, â€Å"The likelihood is that the experience will turn a lot of these kids off to organized sports participation† (Engh, 2002). In sports and in life there is teamwork all along the way. Individual winning never comes without the support and assistance of a host of others including parents, friends, co-workers, teammates and even opponents. All of these individuals learn from each other in some way. When the competition in question is fair and characterized by sportsmanship, the winner actually enhances his chances of winning again. Winning unethically short-cuts the learning process. In that sense the non-sportsmanlike or unethical winner is only hurting himself. These behaviors also expose the winner to similar behavior directed his way. The only difference is that this time society will fully legitimize the behavior because the winner brought it upon himself. The Packers of Vince Lombardi were universally respected winners. They were a team of individuals, each striving to perform his task to the best of his ability. As a team they played fairly and with good sportsmanship – and each man reaped the rewards. Finding a balance between â€Å"winning is the only thing† and fair play and sportsmanship is a worthy goal for society. All of the skills involved in finding this balance are necessary for ultimate success in life. Conclusion In many ways sport is â€Å"a microcosm of society† (Delaney, 2003). As such it reveals the problems as well as the promise of society. It reflects the ideals we find important as a culture. Winning is good. There is more than one way to win. Winning is also a continual process, not just any o ne game or event. Yes, our society rewards and glorifies individual achievement, even when the achievement was gained by ethically questionable means. The picture is more complicated. People who win at all costs often pay a heavy price. Most of us will never be in the position of those we see portrayed as winners on television and in the media. Therefore it is easy to ignore the consequences these people face for unethical behavior. They range from criminal involvement to depression to the lack of trusted friends and family. For some, this will be a fair tradeoff for winning in the superficial sense. Most of us need a wider definition of winning. Competition of any kind will never be fully ethical and completely sportsmanlike. It is the effort to be this way that counts. This distinguishes the true winner from the superficial one. Ultimately our society is a large team of many individuals. It is dependent both on the individual pursuit of success and a certain level of teamwork. The practice of sportsmanship does not harm the pursuit of either element. Instead, it enhances both. Shortly before his death the legendary coach Lombardi said â€Å"I wish I had never said damned [winning is the only thing] thing. I meant the effort.having a goal. [not] for people to crush human values and morality (Reinharz Anderson, 2000). Sources Business Week. (2006). â€Å"Yes, Winning is Still the Only Thing†. Retrieved 5/14/2008 from:http://www.businessweek.com/magazine/content/06_34/b3998403.htm?chan=top+news_top+news . nbsp; Canadian Centres Teaching Peace. (2008). â€Å"Sports: When Winning is the Only Thing can Violence be Far Away?† Retrieved 5/14/2008 from: =http://www.peace.ca/sports.htm data-wpel-link=external rel=nofollow>http://www.peace.ca/sports.htm . nbsp; Delany, Tim. (2003). â€Å"Sports and Deviant Behavior†. Philosophy Now. Retrieved 5/14/2008 from: http://www.philosophynow.org/issue41/41delany.htm . nbsp; Engh, Fred. (2002). Why Johnny Hates Sports. Garden City Park, N.Y.: Square One Publishing. nbsp; Peck, M. Scott. (1993). A World Waiting to be Born: Rediscovering Civility. New York: Bantam Books. nbsp; Reinharz, Peter; Anderson, Brian. (2000). â€Å"Bring Back Sportsmanship†. City Journal (NY). Spr, pp. 1-6. We will write a custom essay sample on Winning vs. Fair Play: Are they incompatible? Essay Example specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Winning vs. Fair Play: Are they incompatible? Essay Example specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Winning vs. Fair Play: Are they incompatible? Essay Example specifically for you FOR ONLY $16.38 $13.9/page Hire Writer

Monday, November 25, 2019

The Aviators essays

The Aviators essays Summary of story: The Aviators is a historical fiction book about the Vietnam war. The book starts in the Republic of South Vietnam at the Pleiku Air Force base. Lieutenant John S. Oliver Jr. is contacted by the Green Berets, he meets a Captain named Father Lunsford they develop a new plan for extraction. The new plan is to use two Gun ships and two Skids, a Gun ship is a Huey Helicopter with two M-60s, a 40mm grenade launcher and two rocket pods and a Skid is a Huey Helicopter with no weapons and is designed to take many people, the plan calls for the team to choose two fake landing points and one real one. The Gun ships will clear each fake landing point and the Skids will touch-and-go each fake then stop to take the team on at the real one. When Oliver leads the team of helicopters to pick-up Fathers A-team the Viet-Cong manage to shoot down one of the skids, Oliver orders all the Gun ships to unload as much ammo as they can, so they will be light enough to take on the remaining p eople, however Oliver didnt make his helicopter light enough and when he tries to clear the tree line the helicopter tears itself apart, and crashes. Most of Olivers men survive the crash and the remaining members of the A-team meet up with them, Father is too hurt to command the team so he gives command to Oliver. Oliver manages to get the team home safely, but is badly injured he has been shot three times and has never taken any pain-deading drugs because we wants to be fully conscious. Then Oliver is taken to a Hospital in Germany where he is awarded the Silver star and the Purple heart with four oak leaf clusters ( the highest award for injuries suffered in combat ). Then Oliver is flown to the states where he takes a job as General Bellomans Aide-de-camp and he is also promoted to captain. Oliver is trying to h...

Friday, November 22, 2019

15 Tips to become more creative

15 Tips to become more creative Nowadays, if you are not at least a bit creative, soon a automatic robot will be doing all your job. But discovering those imaginative flourishes or inventive solutions isn’t all that simple. Sometimes that muse just won’t discuss. This is not an inspirational list designed to convince you that you’re a unique and creative snowflake. Somewhat, this is for when you’re trapped in a creative bind and need a little extra oomph to make assembling your project work. So here are 15 tricks to help get those creative juices juicing again. Get those endorphins streaming. Exercise is stress-reliever and a creative trigger, and mindless repetition is the secret to allowing your creative head wander. And remember, no subject how much you loath this job, great deal of thought is still better than stumbling your way through a home treadmill workout wishing you might have a cheeseburger. It helps to get some perspective. Take a Bathtub After all that exercise wanting to force imagination, you’re still sweating desperation. At this time you reek of it. Okay, maybe not, however the shower is a great destination to drown out the world and relax your mind enough to let it wander. And a brain with wanderlust is the fertilizer for new ideas. Sleep on It This is why you always do better on tests when you fell asleep together with the book somewhat than cramming right before the test. Your mind requires rest, and the rest actually helps you organize your thoughts and shakes new things free. It provides you with ways to check out old problems in a fresh way. Be Curious What job are you working on? Could it be for a client, or around a certain subject? Do some research. Allow yourself to get lost in your issue and find something that’s interesting for you, even whether it’s abstract. Be curious about it. A lot more intimately you connect with your subject, the more creative you will be when trying to work with it. Listen to Music Listening to music-just listening to music-helps your brain relax. It’s also evocative of images and feelings. You know, those things you are trying to speak to to make assembling your project more creative? Those. Ideas result from a complex mixture of problems, thoughts, and experiences. Allow music move over you, and pick it. Yeah, man. Groovy. Pick a Shade or Theme Sometimes creative imagination gets bogged down in the facts and the specifics. Don’t slip-up the forest for the trees, here. Online backup, take a breath, and ask yourself, â€Å"Self, what is the overall theme, concept or tone?† Insurance agencies a major picture to show up back on, you may find You’ve exposed new creative strategies. Go through the Pretty Colors Sometimes just selecting colors that would work together can give you a whole new point of view on your creative task. Maybe you hadn’t seen things in this light before. Who recognizes. Try different color mixtures or play around with the Adobe Kuler to see if you spark any new ideas. You can even check out some art or even just browse the web for things such as Deviant Art. Try informing a story about an interesting picture You’ve seen. Have no idea the storyplot? Make it up. That’s one half the fun. Clean Something Mindless tasks are great for idea era, and firm is often comforting. Besides, you do not want to clean while you’re in the throes of an creative epiphany, can you? Best get it done now. Go for a Drive. Traveling around and listening to music (or listening to silence) is a superb way to clear the mind. It’s also a little hypnotic, and this hypnosis helps you wiggle creative problems around in your mind just like a loose tooth you are wiggling with your tongue. Eventually something’s heading to break. Just don’t discuss on the telephone while driving a vehicle. It’s distracting. To other motorists. Get Mad. You know all those things you really want to inform that awful client? You know those times when you want to say â€Å"really fellas, this is the truth that you don’t want to listen to†, or write a searing email to your boss? Write them down. Let it out. Most of us have created mental blocks to saying just what we mean because, well, we don’t want people to think we’re psychopaths. Period of time those obstacles and say precisely what you suggest. It’ll feel great, and often you’ll discover (someplace) a new way to approach your problem. Simply by being honest. Spend Some Time Alone Whether you’re walking in the woods or standing on the roof of any skyscraper, only time is creativity’s favorite place to develop. I’m sure which mental or neurological reason for this, but I don’t know what it is. I just know that other folks and electronic gizmos aren’t only distracting, they actually cause anxiety. Turn your cellphone off. Kill the news headlines channel. Mentally move away from it all. It’s actually pretty well accepted that individuals who spend more time by themselves thinking tend to be creative (and, actually, more emotionally fit). Show Someone What you’re Doing I don’t indicate step-by-step, however the process of articulating your creative problem to some other person is incredibly helpful when searching for new methods to an old problem. This is particularly helpful if you are trying to clarify things to a kid (or a dumb good friend), because you have to come up with a much more accessible way to articulate your idea. Pull or Build Something Actually, doing anything repeated that requires extreme concentration would work. The trick here is to let your brain go numb. It’s actually related in some ways to self-hypnosis. It allows your mind wander. Plus the theme of the post is to let your mind wander. Doing something repeated or mindless is often nice since it allows you to start out speaking with yourself with your â€Å"mind tone†. Just don’t answer the tone out loud, and you’re good.

Wednesday, November 20, 2019

Collapse of the Traditional Family Essay Example | Topics and Well Written Essays - 1750 words

Collapse of the Traditional Family - Essay Example The first thing that immediately occurs to mind, the number one culprit, is of course the exploding divroce rates, in the Western societies as well as in many developing nations. Divorce rates have been on the rise for decades now, but they seem to be shoooting up to epidemic proportions with each passing day. The very institution of marriage which lies at the root of family and home is under assault. Out-of-wedlock births too are drastically rising. Unmarried cohabitation is becoming an increasingly common phenomenon in contemoporary society. The sporadic spread of same-gender marriages are another aspect of the problem. So, one way or other, it is the fact that more and more people are losing their faith in the sanctity of marriage between man and woman which is ultimately threatening the very viability of our society. In a more immediate sense, though, this is adversely affecting the lives of millions of innocent children, causing grave irreparable damage to their delicate sensibi lities at a very tender age. No wonder then that so many of our national leaders are seriously concerned about the need for fortifying the edifice of family, in their bid to build a more coherent and sensible society. A resurgence of early and almost universal marriage, as it happened in the postwar periods of 1950s and 1960s, is bound to revitalize our society. But what is so different between our own times and just a couple of decades ago Why cannot such a thing cannot happen today One most conspicuous difference is the tremendously greater proportion of full-time working women in today's world as compared to the 50's. This is of coure a very positive change. But could not the absence of the mother from the household for the better part of the day be taking its toll on the upbringing and well-being of the children Not necessarily, since it has its own advantages. A confident and independent mother can serve as a better role model for children of both sexes, and not just the girls. Obviously, with both dad and mom working, there would be two incomes instead of one, and this translates to better financial security for children. Also, in a way, with relatively less time available to spend with children, the parents would tend to treasure this time even more than if time weren't such a constraint. It is a universal truth in any relationship, whether between lovers or between parents and children, that distance brings people closer, making them grow fonder of each other. But only to a certain extent though, a little more distance and it can alienate people, to which point we will come shortly. Now though there may be several practical advantages to argue in favor of working women, in relation to their families, the cohesive presence of a full-time mother acting as the central force in holding together the home, with her love and mystique - is simply irreplaceable. It is becoming an increasingly rare sight these days, and evokes a kind of idyllic nostalgia in many of us. But still, if certain things have to be gained, certain other things have to be

Tuesday, November 19, 2019

Strategic Reward Key Models and Practices Essay

Strategic Reward Key Models and Practices - Essay Example For example, it is possible to create a plan for performance related pay using different strategies such as the following: (1) merit-based pay plan; (2) job- or skill-based pay plan; (3) competency-based plan; and/or (3) job-evaluation-based pay (Heneman and Werner, 2005, p. 45; Baldwin, 2003, p. 45, 70). After examining the potential impact of introducing a performance related pay in a German public service, Shmidt, Trittel and Muller (2011) found out that the use of different types of performance related pay schemes can lead to different effects in terms of public sector employees’ work motivation and performance and that a highly selective performance related pay will never work in government offices. It simply means that depending on the type of performance-based appraisal used by each government office, there will always be the risk wherein the public sector employees would perceive the type of assessment and evaluation process used within the government office to be inef fective, inconsistent, and unfair to some government employees (Shmidt, Trittel and Muller, 2011; Rayson, 2013). Another possible reason behind the reluctance of the public sector employees in integrating performance related pay is the fact that most of the non-performing government employees would fear that their superiors would be closely monitoring their overall work performance. Because of the on-going tight government budget, Weiner (2013) reported that the public sector employees may no longer have the opportunity to enjoy so much of work-related flexibility options. Since there is a need for the government to cut down their unnecessary fixed operating costs, some of the underperforming public sector employees may think that they can be one of the candidates in case... It is the duty and responsibility of the public HR managers to design and implement the performance related pay effectively within the UK government offices. As a common knowledge, the public sector employees will be affected by the new pay and reward scheme. Therefore, the reservations made by the public sector employees should be considered legitimate. The use of performance related pay is a good form of pay and reward strategy particularly in terms of increasing the quality service provided by the public sector employees. For this reason, the public HR managers should exert more effort to effectively address all reservations made by the public sector employees. It is also necessary to create a S.M.A.R.T performance-based criteria that could guide the public sector employees on what they are expected to do. In the process of removing the reservations of each public sector employee, the HR professionals can easily win the support of all affected individuals.

Saturday, November 16, 2019

Emission Reduction Essay Example for Free

Emission Reduction Essay In every economic activity, both positive and negative implications compound such activities. The positive implications include employment increase, supply of goods and market, supply of public goods, environmental control above others. However, every economic activity is as well a compound of negative implications. These are called negative externalities. They include pollution, environmental degrading, increase in crime, and social evils above others. Emission reduction like any other negative externality calls for a very dynamic tools of control. Generally, the basic control of negative externalities by corporations in the economy is through the government taxation imposition. The government would impose a corporate tax levy which is substantially equivalent to the cost of the emission to the environment. Through such levy, the government uses passive methods of compensation to the community over such impacts of the emission. Through the tax levy, the cost of operation to the plant is increased. (Prencipe, Davies, Hoboday, 2003) Economically, taxation provides two cost related variables with which the plant should choose from. Firstly, through higher cost of production which may perhaps outweigh its level of market profits, the plant may be forced out in the market. This is because high tax levy is synonymous to an increase in the cost of production. With high cost of production the plant is at a competitive disadvantage in the highly competitive market. It may then opt to choose an alternative method of investment. (Prencipe, Davies, Hoboday, 2003) Elsewhere, such tax is a disincentive in the choice of production method. From the broad alternative of energy production e. g. use of electric turbines to generate power. Use of environmental friendly method would then call up such tax levied formerly. The basic purpose of higher taxes by the government towards negative externalities is to provide a disincentive in specific lines and methods of operation which are harmful to the environment. It is a tool for choosing alternative methods of production.

Thursday, November 14, 2019

The Role of John Proctor in Arthur Millers The Crucible Essay

The Role of John Proctor in Arthur Miller's The Crucible Arthur Miller wrote the play 'The Crucible' to show the historical parallel between the Salem witch trials of 1692 and the McCarthy 'witch' hunt of the late 1940' and 50's. The character John Proctor seems to represent and show the viewpoint of a real man, unaffected by hysteria; a difficult thing to portray during the 1950's in the USA, due to the fear and hate of Communism and the 'witch' hunt for communists. John Proctor is the central character of the play. He a realistic character, the audience can relate to him and sympathize with him. He is a somewhat strong character and is described by Miller as "powerful of body, even-tempered and not easily led", the last comment perhaps being the most important. His character earns respect throughout the play as the audience sees the moral arguments he has and internal conflicts he has to deal with. John Proctor is a man with a guilty conscience, which makes him indecisive until it is too late, audiences can relate this to their own, maybe far less dramatic lives. John Proctor has made a mistake; he has slept with his former servant girl, teenage Abigail Williams. It is also shown in Act 1 that he still lusts after her - when she asks if he looked up at her window for her, he replies "I may have looked up", this shows his characters weakness, but he remains strong willed. He does not give into what he obviously thinks of as great temptation, again. This shows the audience that he has recognized his mistake and is not repeating it. John Proctor is an honest man, but has undermined himself with his one act of dishonesty. ... ... parallel, as he knew himself what height the communist hysteria had reached. Like the witch hysteria in Salem, he knew that he would be persecuted for writing about fear and conscience if he were to set the play in contemporary America. Miller uses John Proctor to almost play himself and to show what he would do if put in the position of being on trial. He later proved his point by not accusing any other people of being in communist parties when he really was put on trial, to get himself off the hook, like so many other people did. John Proctor plays the crucial role in 'The Crucible' of being the man that is on the brink of giving in but stands strong, even though he knew that one individual would not bring down the hysteria. Works Cited: Miller, Arthur. The Crucible: A Screenplay. New York: Penguin Books, 1996.

Monday, November 11, 2019

A Case Study of Obsessive Impulsive Disorder

A Case Study of Obsessive-Compulsive Disorder: Some Diagnostic Considerations INTROD  UCTION Prior to 1984,  obsessive-compulsive disorder (OCD)  was  considered  a  rare disorder and  one difficult  to treat (I  )  . In 1984 the  Epidemiologic Catchment  Area (ECA) initial survey results  became available for the first time, and  OC  D  prevalence figures  showed that  2. 5  %  of  the  population m  et  diagnostic  criteria  for OCD (2,3)  . Final  survey results published  in 1988  (4) confirmed these  earlier reports. In  addition, a 6-month  point prevalence of  1. 6%  was observed,  and  a  life  time  prevalence  of 3. 0% was  found.OCD is  an illness of secrecy, and  frequently the  patients  present  to physicians in  specialties other than psychiatry. An  other factor contributing to under diagnosis of  this disorder  is that  psychiatrists m  a y fail to ask screening questions  that would identify  OCD. The  following case study is  an example  of  a patient  with moderately severe OCD  who  presented  to  a  resident  psychiatry  clinic  ten years prior to being diagnosed  with OCD. The patient  was  compliant with  out patient treatment for the  entire time  period  and was treated  for  major  depressive  disorder  and border line personality disorder with medication s and  supportive  psychotherapy.The patient never discussed  her OCD symptoms  with her doctors  but in retrospect had offered many clues  that might have allowed  a  swifter  diagnosis and treatment. CASE  HISTORY Simran Ahuja was a 29 year  old,  divorced,  indian female who worked  as a file clerk. She  was followed as an  out patient  at the  same  resident  clinic since  1971. I  first saw her 2012. PAST PSYCHIATRIC HISTORY Simran had been  seen in the  resident  out pati ent  clinic since July of 1984. Prior  to  this she  had not be  en  in psychiatric treatment. She  had never been hospitalized  .Her initial  complaints were depression and anxiety  and she had been placed on  an phenelzine  and responded well. Her  depression  was  initially thought  to be  secondary to amphetamine withdrawal, since she  had been using  diet  pills  for 10  years. She stated  that at first  she  took them to lose weight,  but  continued for  so  long because people at work had noted that she  concentrated  better  and that her job performance had improved. In addition,  her past doctors had  all  commented on her limit  edibility to  change  and her neediness, insecurity,  low  self-esteem,  and poor boundaries. In addition,  her past doctors had noted  her promiscuity.All noted  her poor attention span and limited capacity  for insight. Neurological  testing during her ini tial  evaluation had shown the  possibility of non-dominant parietal  lobe  deficits. Testing  was repeated  in 1989 and  showed †Ã‚  problems in attention ,  recent visual and verbal memory  (with  a greater deficit  in visual memory),  abstract thought  , cognitive flexibility, use  of mathematical operations, and visual analysis. A possibility of right temporal dysfunction is  suggested. †Ã‚  IQ testing showed a  co  m bine d score of 77 on the Adult Weschler  IQ test ,  which  indicated borderline  mental  retardation  .Over the years  the patient had been maintained  on various  antidepressants  and antianxiety agents. These  included  phenelzine,  trazadone, desipramine, alprazolam, clonazapam,  and hydroxyzine. Currently  she  was on fluoxetine  20  mg  daily and clonazaparn 0. 5 mg  twice  a day and 1. 0 mg at bedtime . The antidepressants  had been effective over the years in treating her depression. She  has  never used  m  ore clonazapam than prescribed and there was no history of  abuse  of alcohol or street drugs. Also, there was no history  of discreet  manic episodes and  she  was  never treated with neurolepics.PAST MEDI CAL HISTORY She suffered from  gas  troesophageal reflux and  was maintained  symptom free on a combination  of  ranitidine  and  omeprazole. PSYCHOSOCIAL  HISTORY Simran   was  born  and  raise d in  a  large city. She had a brother who was  3 years younger. She  described  her father  as morose , withdrawn,  and recalled  that he has said, †Ã‚  I don't  like  my  children. Her  father was  physically and  verbally abusive throughout her  child  hood. She  had  always longed  for a good relationship  with him  . She  described  her mother as  the  family martyr and the  glue that  held  the  family together.She stated that  sh e  was  very  close  to her  mother;  her mother always listened  to her and was  always  available to talk with her. She  was a poor student,  had difficulty all through school , and described herself  as †Ã‚  always disrupting  the  class by talking or running  around. †Ã‚  She  had  a  best friend through grade school whom  she  stated †Ã‚  deserted† her  in high  school. She  had maintained  few close  friends since  then . She   graduated high school with much difficulty and  effort. She  dated on  group dates  but never alone. Her husband  left her  while  she was  pregnant with her  son.The husband  was a  bus driver  and had not had  a  role in their  lives  since the  divorce. Aft  e r the  divorce,  she moved  back  to her parent  s'  home  with her son  and  remained there until getting her  own apartment  3 years ago. FAMILY HISTORY Simr an’s  mother  had two  serious  suicide attempts at  age 72 and was  diagnosed with major  depressive  disorder with psychotic features  and OCD. She also had non-insulin dependent  diabetes  mellitus and irritable  bowel  syndrome. Her  brother was treated  for OCD  as an outpatient  for the  past  20 years and also has Hodgkin's Dis  ease, currently in remission.The brother's diagnosis of  OCD was kept secret from  her  and did not become  available  to her until her mother died. Her father  is  alive and well. MENTAL STATUS EXAM She  was a  thin  ,  bleached  blond woman  who appeared her  stated  age. She  was dressed in  skin  tight  ,  provocative  clothing,  costume jewelry earrings  that eclipsed her ears  and hung to her  shoulders, heavy  make-up and  elaborately  styled hair. She  had difficulty  sitting  still  and fidgeted  constantly  in  her  chair. H er body language through out  the interview  was  sexually provocative. Her speech was  rapid,  mildly pressured,  and  she  rarely finished  a sentence.She  described  her  mood  as â€Å"anxious. † Her affect appeared anxious. Her  thought  processes showed mild  circumstantiality and tangentiality. More significant  was her inability to finish a  thought  as exhibited by her in  complete  sentences. COURSE  OF TREATMENT Initial  sessions with the  patient were  spent  gathering history  and forming a working  alliance. Although  she  showed a  good  response  by  slowing  down enough to finish  sentences and focus on  conversations  ,  she  could not tolerate  the side  effects and  refused  to  continue taking the medication  . The  winter  of  1993-94  was  particularly  harsh.The  patient  missed  many sessions because of  bad weather. A pattern  began  to   emerge  of  a  consistent  increase  in the number  of phone  calls that  she  made  to the office voice  mail to  cancel  a session. When  she was questioned about her phone  messages she stated,  Ã¢â‚¬ Ã‚  I always repeat  calls to make sure my  message  is received. † Since  the  most recent cancellation generated  no less than six phone calls ,  she  was asked why a  second call wouldn't  be  enough â€Å"to be  sure . † She  laughed  nervously and  said,  Ã¢â‚¬ Ã‚  I  always repeat  things. † With careful questioning  the following  behaviors  were uncovered.The patient checked  all locks  and windows repeatedly  before  retiring. She  checked the  iron a dozen times  before leaving the house . She  checked  her door  lock  Ã¢â‚¬ Ã‚  a  hundred  times† before  she  was able to  get in her  car. The patient  washed her hands frequently. Sh e carried disposable  washcloths in  her purse †Ã‚  so I  can wash as  often  as I need too  . †Ã‚  She  said people  at work laugh  at her  for washing  so  much. But she  stated  ,  Ã¢â‚¬Å"I  can' t help it. I've been this way  since  I was  a  little girl. † When  questioned  about telling former  doctors  about this,  the  patient  stated that she  had never  talked  about it with her doctors.She  stated  that  everyone that knew  her  simply knew  that  this  was  the  way  she  was:  Ã¢â‚¬ Ã‚  It's  just  me . †Ã‚  In  fact , she  stated, †Ã‚  I didn't  think my doctors  would  care†¦ .  I've always  been this  way  so  it  Ã¢â‚¬Ëœs  not something  you can  change . † Over the next  few sessions, it became  clear  that her arguments  with her boyfriend centered  on  his annoyance with her need  to  const antly repeat  things. This was  what she  always referred to  as †Ã‚  talking too much  . †Ã‚  In  sessions it  was  observed that  her  anxiety,  neediness and poor boundaries  a  rose over issues of misplacing things in her purse and insurance forms that were incorrectly  filled  out.In  fact,  when I  attempted to correct the  insurance forms for her, I had difficulty because of her need to repeat the  instructions to me  over and over. The Introduction Obsessive compulsive disorder (OCD) is an anxiety disorder characterised by persistent obsessional thoughts and/or compulsive acts. Obsessions are recurrent ideas, images or impulses, which enter the individual's mind in a stereotyped manner and against his will. Often such thoughts are absurd, obscene or violent in nature, or else senseless. Though the patient recognises them as his own, he feels powerless over them.Similarly,compulsive acts or rituals are stereotyped behaviou rs, performed repetitively without the completion of any inherently useful task. The commonest obsession involved is fear of contamination by dirt, germs or grease, leading to compulsive cleaning rituals. Other themes of obsessions include aggression, orderliness, illness, sex, symmetry and religion. Other compulsive behaviors include checking and counting, often in a ritualistic manner, and over a â€Å"magical† number of times. About 70% of OCD patients suffer from both bsessions and compulsions; obsessions alone occur in 25%, whilst compulsions alone are rare. 1n  she spent  ten minutes checking and rechecking  the  form  against the receipts. She  became convinced that she'd  done it wrong, her anxiety would increase, and  she  would  get  the forms out  and check  them again. Her  need to include  me in this  checking  was  so great  that she  was almost physically on  top  of  my  chair. In the  following  weeks,  se ssion s  focused  on  educating the  patient about  OCD. Her  dose of fluoxetine  was increased  to 40 mg  a  day but discontinued because  of severe restlessness and insomnia.She continued to  take 20  mg of  fluoxetine a day. Starting  another medication in  addition to fluoxetine  was difficult because of the patient  Ã¢â‚¬Ëœs  obsessive  thoughts  about  weight gain, the  number  of  pills  she  was  taking, and the  possible side effects . Finally,  the  patient agreed to try adding  clomipramine to her medications. The  results were  dramatic. She  felt  Ã¢â‚¬ Ã‚  more relaxed † and had less anxiety. She  began to talk, for  the  first  time, about her  abusive  father. She said,  Ã¢â‚¬ Ã‚  His behavior was always supposed  to be the family  secret. I felt  so afraid  and  anxious I didn't  dare tell  anyone.But now  I  feel better. I don't care who  knows. It  Ã ¢â‚¬Ëœs  cost my  mother  too  much  to  stay  silent. †   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  At  this time  the  plan is to begin behavioral therapy with  the  patient  in  addition to medication s  and  supportive therapy to  deal wit  h her  difficulties with relationships. DISCUSSION This is  a complicated  case  with multiple diagnoses: borderline  mental  retardation,  attention deficit disorder,  borderline  personality  disorder,  a  history  of  major depressive disorder and  obsessive compulsive disorder. Given the  level  of  complexity of  this  case and the  patient ‘s  own silence  about her  symptoms,  it  is  not urprising  that this  patient's OCD remained  undiagnosed  for  so  long. However,  in  reviewing  the literature  and the case,  it is instructive to  look  a  t the  evidence that  might  have  led  to an earlier diagnosis. Fir st of  all,  there  was the  finding  of soft neurological deficits. The patient  Ã¢â‚¬Ëœs Neuropsychological testing suggested  problems  with  visuospacial  functioning  n visual memory,  as well as  attentional difficulties  and  a  low IQ. In the  past,  her doctors were so impressed  with her history of  cognitive difficulties  that  neuropsychological testing was  ordered  on two separate occasions.Four  studies in the  recent literature have  shown consistent findings of  right hemispheric dysfunction,  specifically  difficulties  in visuospatial  tasks, associated  with OCD  (6,7,8,9). The patient also had a history  of chronic dieting,  and  although  extremely  thin, she continue d to be  obsessed with not  gaining  a single pound. This was  a  patient who took diet  pills for 10  years and who  see earliest memories  involved  her father's disapproval of  her bod  y  ha bitus. Eating  disorders a  reviewed by  some  clinicians  as  a form  of  O C D. O  C D.Swedo and Rapoport (II)  also note  an increased incidence  of  eating disorders in children  and  adolescents  with  OCD. While  this was  no doubt true,  the underlying  obsessional  content pointed directly  to OCD and should have  generated a list of screening questions  for OCD. This underscores  the  need to be  vigilant for diagnostic clues and to perform one's  own diagnostic assessment when  assuming the treatment  of any  patient. While the  literature  makes  it clear that OCD  runs in families,  the  patient was unaware of the  illness  in her family  until after  her diagnosis  was mad  e.It  would have be  en  helpful to know this information  from the  beginning  as it should  immediately  raise a suspicion of OCD in a patient  presenting  with complaints  of  depression and anxiety. Finally,  her diagnosis of borderline  personality  disorder  made  it  easier to pass  off her observable  behavior  in the office as  further  evidence  of  her  character structure. The diagnosis of borderline  personality  disorder was  clear. She  used the  defense of splitting  as evidence d by her descriptions  of her fights  with her boyfriend . H  e was either  Ã¢â‚¬Å"wonderful† or a  Ã¢â‚¬Å"complete bastard. † Her  relationships were  chaotic  and unstable.She had no close friends outside  of her family. She  exhibited  affective instability, marked  disturbance of body  image  and impulsive behaviors. However, it was difficult to discern whether her  symptoms were truly  character logical  or  due  instead  to her underlying  OCD and related  anxiety. For instance,  the  in  stability  in her relationships was,  in  part,  the result  of  her OCD , since  once she  began to obsess  on  something,  she  repeated  herself so much  that  she  frequently  drove others into  a  rage. A  study by Ricciardi,  investigated  DSM-III-R Axis II diagnoses following treatment for OCD.Over  half  of  the  patients in the study  no longer met DSM-III-R  criteria for personality disorders after  behavioral  and  /  or pharmacological treatment  of  their  OCD. The  authors  conclude that  this  raises questions  about  t  he validity  of an Axis  II diagnosis  in the  face  of  OCD. One might also begin  to wonder how many  patients  with personality  disorders  have undiagnosed  O  CD? Rasmussen  and Eisen  found a very high comorbidity of  other Axis I diagnoses in patients  with OCD. Thirty-on  e  percent of patients studied  were  also diagnosed with major  depression, and  anxiety disorders accounted for twenty-four per cent.Other coexisting disorders  included eating disorders, alcohol  abuse  and dependence, and Tourette's syndrome. Baer,  investigated  the comorbidity  of Axis  II disorders  in patients  with OCD  and found that 52  percent  met  the criteria for  at least one  personality  disorder  with mixed,  dependent  and histrionic being  the  most common disorders diagnosed  . Given  the  frequency of comorbidity in patient  s  with OCD,  it would  be wise to include  screening questions  in  every  psychiatric  evaluation. These  need  not  be elaborate. Questions about  checking,  washing,  and ntrusive,  unwanted thoughts can be  simple  and direct. In  eliciting a  family history,  specific  questions about  family members  who check  repeatedly  or  wash  frequently  should  be included. Simply as  king if  any  family member  has  OCD  m  ay  not  elicit   the  information  , since  family members may  also be undiagnosed. In  summary, this  case  represents a complicated  diagnostic  puzzle. Her  past physicians  did not have the  information  we d  o  today  to unravel  the  tangled skeins  of symptoms. It  is  important to be  alert  for  the  possibility  that this  patient ‘s story is not an  uncommon one.BIBLIOGRAPHY * Psychology book (NCERT) * Identical * Suicidal notes * A psychopath test: journey through the world of madness * Disorder of impulse control by Hucker INDEX * Introduction * Case study * Course of treatment * Discussion * Bibliography ACKNOWLEDGEMENT I would like to express my special thanks and gratitude to my teacher Mrs. Girija Singh who gave me the golden opportunity to do this wonderful project on the topic ‘obsessive-compulsive disorder’, which also helped me in doing a lot of research and I came to know about so many new things.Secon dly I would also like to thank my family and my friends who helped me a lot in finishing this project. CERTIFICATE This is to certify that Jailaxmi Rathore of class 12 has successfully completed the project on psychology titled ‘obsessive-compulsive disorder’ under the guidance of Mrs. Girija Singh. Also this project project is as per cbse guidelines 2012-2013. Teacher’s signature (Mrs. Girija Singh) (Head of psychology department) 2012-2013 PSYCHOLOGY PROJECT NAME OF THE CANDIDATE: JAILAXMI RATHORE CLASS: XII ARTS B SCHOOL: MGD GIRLS’ SCHOOL

Saturday, November 9, 2019

What do you think the significance of the witches is in Macbeth?

The witches within Shakespeare’s ‘Macbeth’ can be interpreted as providing a number of roles within the play which add not only to the plot but also to the atmosphere and fear evoked within the audience. Within the Jacobean period in which ‘Macbeth’ was first performed, witches were the subject of much public hysteria and superstition, with the King’s own beliefs being based on a long history of Christian paranoia about witchcraft. As a result, the witches can be seen as a supernatural influence within the play, linking them to the devil and other dark forces and playing on the real and current fears of what may have been a dominantly Christian audience. In this respect, a modern Gothic reading can be applied to the novel. The supernatural power of the witches is one of the first elements highlighted within the play, as in Scene 3 Banquo states they can ‘look into the seeds of time/And say which grain will grow and which will not. Therefore, from the outset the witches are highlighted as the fortune-tellers within the story, who hold an otherworldly power to see into the future. This gives them a greater level of power than the surrounding humans, and such power in the wrong hands may have created a sense of unease and unpredictability within the audience. Additionally, it is this power to tell the fortune which creates the catalyst for the play and leads to Macbeth’s moral deterioration: ‘Al l hail, Macbeth! That shalt be King hereafter! ’ Thus, the witches can be seen to play the role of the typical villains through their manipulation of Macbeth, turning him from a ‘worthy gentleman’ into a brutal murderer. However, there is also contradictory argument that in reality, the witches do not hold any true superiority of power and that it is instead the planting of the idea in Macbeth’s mind which leads him to commit murder through the growth of his own ‘dark desires. This is exemplified further as Banquo suggests ‘oftentimes, to win us to our harm, The instruments of darkness tell us truths, Win us with honest trifles, to betray’s in deepest consequence. ’ Following this interpretations, the witches may be interpreted as having less power as they merely suggest an idea, and it is the desire and drive of the human mind which instead leads to Macbeth’s downfall. This interpretation may also be considered particularly frightening both to a Jacobean and a modern audience as it follows the modern Gothic stereotype of playing on the realistic fears of humans, such as the power of our deep and potentially repressed desires. Furthermore, the witches can also be seen to play a part in destabilising the typical gender roles of men and women within Jacobean society. Banquo states: ‘You should be women, And yet your beards forbid me to interpret that you are so. The ‘beards’ of the witches bring about confusion as to whether the witches are female or male, and deconstruct the opposition between both genders. This ambiguity leads to the witches failing to fall into either category, which further highlights the unnatural nature to them as they do not fit within the realms of human and social convention. Not only does this ambiguity create further unpredictability, but it also reflects the later attempts of Lady Macbeth to be rid of her femininity: ‘Come, you spirits, That end on mortal thoughts, unsex me here. The parallels between the witches and the actions of Lady Macbeth work to similarly convey her as increasingly monstrous, perhaps suggesting a criticism of the lack of social role and responsibility which leads to her own deterioration. Thus, our ability to categorize ourselves and others into gender roles and abide by the social expectations linked to these is seen as a distinctly human attribute and one which Shakespeare may have deemed important for the successful function of a patriarchal society. Lastly, the witches may also be considered significant in adding a grotesque nature to the play which further exemplifies their sinister nature: ‘Eye of newt and toe of frog, Wool of bat and tongue of dog. ’ The repeated references to mutilated body parts of animals within the witches chants further depicts their unnatural nature as they are interfering with the natural state of animals. Additionally, further reference to ‘Liver of blaspheming Jew†¦Nose of Turk, and Tartar’s lips’ highlights a taboo element as it plays on racial stereotypes and victimizes groups which contextually may be considered the ‘other’. Perhaps most significantly, however, is the additional parallels which run between the witches and Lady Macbeth, as they incorporate ‘finger of birth-strangled babe’ into their spell. This line instantly incites the previous recognition of Lady Macbeth’s own statement that she would have, whilst breast-feeding, removed a baby and ‘dashed the brains out. ’ A similar taboo element is highlighted through the suggestion of infanticide, as well as the idea of going against nature as breast-feeding is considered a tender and natural human act. Such clear similarity between the witches and Lady Macbeth can thus be seen to suggest an argument which underlies the whole plot of the play – who are really the ‘monstrous’ characters within the play; the witches or the humans? Such ambiguity and deconstruction of the opposition between supposed evil and good as an overarching theme of the novel is one which incites great fear into the plot and the audience, as it implies that, under specific circumstances, even the most moral of us can deteriorate into evil and sin.

Thursday, November 7, 2019

Yasar Kemal A Master of Words

Yasar Kemal A Master of Words Yasar Kemal was actually telling the story of Turkey’s ordinary people living in over 40,000 villages who experienced the impact of reforms and economic and social development in rural areas. Using archetypal characters, Kemal created a story of epic reach with common human moral and symbolic imagery. Hashtag: #Ya?arKemal Memed, My Hawk A novel, by definition, is fiction, a form of a sequential story describing intimate experiences of imaginary characters. Fiction is an art and many great writers like Edgar Allan Poe, Mark Twain, and Joyce Carol Oates were fiction writers. Turkish writer #Ya?arKemal, who recently passed away, was a prominent fiction writer and best remembered for his first novel â€Å"Memed, My Hawk†, which was published in 1955. BOOK REPORT This Varlik Prize winner is a story of a young peasant boy (Slim Memed) who tried to save his sweetheart (Hatch) from a forced marriage with the Agha (owner of the land and village chief). Hatch was captured as they attempt to escape but Meme, who wounds the Agha escaped into the mountains and later becomes a bandit. The novel to some critics is exciting and dramatic as it successfully portrayed the severity of peasant life in the Taurus highland of Anatolia during the 1930s. It tells the story of Memed, who in his youth rebel against the cruelty of the village chief and saved his people from tyranny. Indirectly, Yasar Kemal was actually telling the story of Turkey’s ordinary people living in over 40,000 villages who experienced the impact of reforms and economic and social development in rural areas. Using archetypal characters, Kemal created a story of epic reach with common human moral and symbolic imagery. For instance, the burning of the thistles ( a group of flowering plants) the choked the village land symbolizes Memed’s personal revenge and a quest for social justice. Published in 2007, the novel â€Å"They Burn the Thistles† is a sequel to â€Å"Memed, My Hawk†. It has descriptive passages that clearly tell the story of the bitter war between the greedy and brutal property owner and poor Turkish peasants. The Reality of Kurdish and Turkish Peasants Life In reality, Kurdish and Turkish peasants living in Anatolian villages in the early 1900s were suffering from the powerful Aghas. For instance, since they need to return three kilos for a very kilo of seed they borrowed from an Agha, they were always impoverished and in debt to that particular Agha. Those who cannot pay were intimidated, harmed, and sometimes sent to jail. Moreover, since many Kurdish Aghas maintained a good relationship with the central government, agricultural policies continue to favour commercial classes and landowners in Anatolian region. For instance, the rise in cultivation and land prices often benefit landowners and family-owned business alone. LITERARY TECHNIQUE THAT WORKS WONDERS The â€Å"Agha System†, which is mostly in the East and Southeast region, is actually a â€Å"Master and Servant† relation. For instance, according to the book The Literary Garland, the peasants were observed to be graceful and dignified when paying their taxes, procure seeds, and even give presents to their landlord and village chief. The harshness of peasants’ life and the need for land reform and better treatment made #Ya?arKemal the greatest writer in Turkey. His novels created â€Å"Slim Memed†, a fictitious character like a Turkish Robin Hood who fights against the Aghas who exploit the peasants.

Monday, November 4, 2019

Describe how and explain why colonialism deployed and legitimized Essay

Describe how and explain why colonialism deployed and legitimized violence against women in colonial India - Essay Example poverty has been seen to be increasing as the population increases. In india, the act of infanticide of girls is high, which is an act whereby the girl child is killed after realization that it is a female. There is also high number of abortion cases of girl foetuses. India is currently marred by high number of cases relating to abuse of women. This can be evidenced by the recent case whereby a female student was gang raped. Other cases which are common are forced marriages, wife battering and other women related violence. The cases mentioned above are common in India and they happen frequently because few of them are reported to the authorities. The treatment of the Indian people by the colonialist is what has contributed highly to the current situation where women are abused in the society. The colonisers made Indians work in bad situations. The treatment they got from the coloniser made them hate themselves. This hatred they got from the abuse from the colonialism is what is curre ntly prevailing in the society. The colony violated women for some reasons, one of the main reason for violation was that women are part of recreation in the society, that is they give birth. The colonizers allowed the massacre of the native women and children so that they stop the continuation of Indian people through child birth. Additionally, the colonizers pointed out that control of the growing population will only be done by killing of native women and children in large numbers. Furthermore the massacre of the native women was a way of destroying the local tribes. The coloniser further encouraged abuse against women as a way of controlling the sexuality to destruct the continuation of giving birth. Control of woman's ability to reproduce continued even after the country became independent. Women have been subjected to various controls of their reproduction so as to control the ability to give birth and control the growing population (Anagol 2005). Colonialists took over India and massacred a lot of people, most of the people died as a result of hunger because they were subjected to hard tasks with limited food. Before the arrival of the colonialist to India, Indians had their own system of governances, this where they could solve their domestic issues by use of court. Due to the British expansion to the whole country after the takeover which was characterized by high number of deaths, they changed the system of governance by introduction of their own and destruction of Indian governance. For example, the common courts which the Indians use to solve their issues such as caste Panchayats were abolished. This act by the British made the Indian women vulnerable. This is because the traditional system use by the Indian courts had full knowledge of the Indian women. Because of the abolition of the Indian traditional courts, the colonialist defined new ways of crime. This saw the emergence of various ways of female crimes. Infanticide is of the crime activities identified by the colonialism, infanticide as explained above is killing of the female child after birth. Other criminal activities according to the colonialist are window marriages, husband poisoning and wife beating. Those activities were common before the colonialist governance took over. Colonialists identified criminal activities based of the tribal groups. This affected certain group of women which the colonialist had classified them as the criminal tribes.

Saturday, November 2, 2019

Why don't we prove results in social research Essay

Why don't we prove results in social research - Essay Example However, it is different from scientific research. In order to prove the results of research there are certain elements that must exist. In science, the basic research elements are observation, description, prediction, control, falsification, and causal explanation. Descriptions should be reliable and repeatable. In social research, however, if the same study were conducted by another researcher in another place, the descriptions would not be the same. This is also true of falsification. Falsification is the ability to rule out all other possibilities, rather than merely accepting the results. Since humans are unique in nature, the chances of disproving the results of many social research cases by conducting another study using different subjects would be strong. Instead of looking to rule out possibilities, a social researcher looks to find all the possibilities that explain a certain behavior. In addition, as societies grow and change, the results of social research will also continue to change. The social sciences are not concrete like the natural sciences. They are evolving. They rely on interpretations and ideas, rather than hard facts. For these reasons, social research is not something that can be proved. It is very important that social research methods take measures to maintain a level of trust between the research

Thursday, October 31, 2019

Post-traumatic stress disorder Research Paper Example | Topics and Well Written Essays - 500 words

Post-traumatic stress disorder - Research Paper Example Threats of natural disasters like flood, storm, earthquake, fire etc and manmade disasters like terrorism, prison stay etc can cause PTSD. For example, after the 9/11 World Trade center attack, many of the Americans experienced PTSD because of the threats from Al-Qaida. This paper analyses the cause, symptoms and treatment options of PTSD. â€Å"PTSD starts at different times for different people. Signs of PTSD may start soon after a frightening event and then continue. Other people develop new or more severe signs months or even years later. PTSD can happen to anyone†(Medline Plus, 2011). The real cause of PTSD is still unknown to medical science. However, it is believed that various genetic, environmental and social factors are contributing to PTSD. The entire stress management mechanisms of the body are changed as a result of PTSD. â€Å"It affects the stress hormones and chemicals that carry information between the nerves (neurotransmitters). Having been exposed to trauma in the past may increase the risk of PTSD†(Post-traumatic stress disorder, 2011).Normal people and people with PTSD respond to abnormal behaviors differently. Normal people gradually forget about the abnormal event whereas for the PTSD patients, the memories of the trauma keep on agitate them in their future life.

Tuesday, October 29, 2019

Analysing the measure likelihood of success on the merits Assignment

Analysing the measure likelihood of success on the merits - Assignment Example In addition, the applicant’s attorney should prove to the court that effort has been made to stop to notify the adverse party and should give the reasons to maintain the claim that no court notice is required or the adverse party. The case of Ben Njoroge Muchunu & 2 others v Phares Muchunu & 2 others [2013] eKLR. In case, the applicants sought an order of temporary restraint to prohibit the plaintiff and the defendant against issuing the share of $52,000 as the proceeds from the sale of an estate to the late Benjamin Njoroge Wamanja. The applicants claimed that the money way held in the banks account in the names of the defendants’ and the plaintiffs’ affidavit. The basis of success was the fact that the applicants did not face any objection in their claim since there was no affidavit to deny the applicants claim. Therefore, in cases of denial of the issuance of a court injunction the applicants were entitled to suffer permanent damages that neither the defendant nor the plaintiff would compensate the applicant (Henry 47). The other alternative available is for the plaintiff and the defendant to establish to the court how they would compensate the applicants. In NEW YORK TIMES V. SULLIVAN, 376 U.S. 254, 84 S. Ct. 710, 11 L. Ed. 2d 686 [1964]. The New York times made a detailed advertisement titled â€Å"Heed their rising Voices† in a bid to raise funds to protect martin Luther King Jr against an Albama denunciation of false swearing. The Alabama court denied the application of temporary restraining order of defamation of Montogery Safety commissioner, L.B. Sullivan who was the police supervisor. The court claimed that the advertisement made by the New York Times did not mention Sullivan hence the commissioner had no base to sue the press for defamation. Also, these facts are evident in American Chicle Co. v. Topps Chewing Gum, Inc., 208 F.2d 560, 563 (2d Cir. 1953) (L. Hand, J.). The failure of the plaintiff was as a result of lack o f evidence of defamation hence the press could not be restrained from exercising their freedom of speech. In the case of Data General Corp. v. Digital Computer Controls, Inc 1971. The data general corporation exposed design information through its Nova 1200 minicomputer informing the owners of its secrecy of the design drawings in a contract agreement. Digital computer controls designed its minicomputer that resembled that of digital General Corporation that had sued in court to restrain digital computer controls against the use of heir technology illegally. The court help that a digital computer controls had breached the secrecy rights of the digital general corporation (Patterson 334). The bases for success of the digital general corporation case against digital computer controls were the fact that digital general corporation had applied sufficient security for their drawings hence digital computer controls breached the contractual terms by using confidential information for perso nal gain. In Carlill v. Carbolic Smoke Ball Co. [1893] Q.B. 256 (C.A.). the carbolic smoke ball company placed a newspaper advertisement promising 100 pounds to any person who consumed smoke balls three times in a day as directed by the company. Carlill consumed the smoke balls as directed and contracted influenza. She claimed the reward from the company, but the company denounced any contractual obligation with Carlill. The court applied temporary

Sunday, October 27, 2019

Comparison of UK Building Contracts

Comparison of UK Building Contracts Assessment: Terms of Contract; Critical Evaluation; Question standard practise Samuel Perkins Introduction This assignment aims to compare and contrast the various aspects of both the SBC/Q 2011 Standard Building Contract against the NEC 3 Engineering and Construction Contract: priced with Bill of Quantities 2013. Throughout the assignment I will abbreviate these to SBC/Q 2011 and NEC3. I aim to evaluate the documents involved in the making of the contracts (10%/350 words), the roles of those involved in the performance of the contract (20% / 700 words) , the Contractors responsibility towards the design (20% / 700 words) and finally concentrating on the payment aspect of each contract (50%/1750 words). The contracts will be assessed regarding revisions made in September 2011 to the Housing Grants, Construction and Regeneration Act 1996. My word count will be including the above mentioned areas not exceeding the 3500 words as required. Documents Making up the Contracts In the SBC/Q 2011 contract under provisions, the contract documents are defined in clause 1.1. The issue with this is that the contract sum analysis and any schedule of rates are dependent on the respective party and can therefore not be deemed as contract documents under this condition. For the employer this would mean that the main, responsibility for the correct descriptions and quantities would be placed upon them mitigating risks for the contractor. Regarding any discrepancies within the contract documents it is the responsibility of the Contractor to inform the Architect of any differences, however it should be noted that they are under no obligation to freely search for any discrepancies. Yet under condition 2.15 it states that if the contractor becomes aware of any such departure, error, omission or inadequacy as referred to in clause 2.14 that he shall immediately give notice with appropriate details to the Architect/Contract Administrator, who shall issue instructions in th at regard. The discrepancies are related to items found in condition 2.15(1,2,3,4,5) which cover the contract drawings, contract bills, instructions issued by the architect of contract administrator and finally the CDP documents. From the above we can see that SBC/Q 2011 shows a reasonable understanding to identifying contract documents. The main difference between the NEC3 and SBC/Q 2011 is that the NEC3 document doesnt define the term Contract, therefore there is no defining contract documents unlike SBC/Q 2011. It combats this within the guidance notes providing samples concerning a standard form of tender and form of agreement substituting themselves for actual contract documents. In the Core Clauses 12.4 it states that the contract is the entire agreement between the parties therefore combining the previously mentioned procedures involving the project management and contractual duties, liabilities and obligations. As discussed by Eggleston (2006) the term entire agreement has no legally definable definition however the term entire contract which is also known as a sole agreement clause does. Therefore the contract can only be completed to the written terms and conditions, this excluding any implied terms of common law remedies this relating to any legislation created by parliament as noted in (Galbraith, 2014). Like SC/Q 2011, NEC3 makes provisions regarding any discrepancies and contradictions between contract documents in Core Clause 17.1 however is much less distinct and clear cut in its definitions and clarity. The Clause states that The Project Manager or the Contractor notifies the other as soon as either becomes aware of an ambiguity or inconsistency in or between the documents which are part of this contract. The Project Manager gives an instruction resolving the ambiguity or inconsistency. However this does conflict with Core Clauses namely 12.3 and 18.1 which would then suggest that the responsibility to report inconsistencies lies solely with the Project Manager. Roles involved in the performance of the contract The JCT contracts require the Architect to act as the Contract Administrator in regards to performance of the contract on behalf of the employer. Under SBC/Q2011 the role of the architects expressed duties is covered in conditions 2.8 (1.2.3.4), 2.9, 2.11 and 2.12. These range from ensuring documents are supplied to the Contractor in accordance to the release schedule and initial contract documents to discharging the contract. As these are obligations of the architect they are therefore legally accountable for the area of contract administration. Given the Architects professional position and experience it is there duty to ensure the contract is carried out under the implied terms of common law and to the terms and conditions of the contract, it is crucial that the Architect stays unbiased when making decisions. SBC/Q2011 states under condition 2.4 that it is the duty of the Contractor to continue with the work on a regular basis and attentively and have the works finished by the agreed completion date. The work should progress steadily and in accordance to the contract in regards to time as noted in (Chappell 2012). If the Contractor is to make a breach of duty in respect of non-performance (not partial performance) of the contract would result in complete disregard to the contract terms and conditions which would cause total non-performance. Provisions are made to non-performance regarding the employers in conditions 8.4, 8.5 and 8.7 which guarantees the Contractors continual advancement of works in the event of unpredictable circumstances delaying works and the rectification of defect works. Unlike SBC/Q 2011, NEC3 does not mention the Architect under any of its clauses which removes any context of the Architects involvement. Under Core clause 10.1 it stipulates that the legal transitions and agreements and between the Employer and Contractor and subsequently the Project Manager and Supervisor. The provision of NEC3 states that the association of the Employer is to be related regarding their participation within the roles of the contract administration and are therefore a legal entity. The Project Manager exclusively has authority to change the work information, including issues and discharging any works instruction all of which is stated under Core clauses 14.3 and 27.3. Therefore the Project Manager is acting as the Employers Agent , allowing them to have a greater influence in decisions, which contrasts SBCQ/2011 whereby the Architect of Contract Administrator is more independent and acts in sovereignty. It is vital that the appointed Project Manager under NEC3 be it a single person or firm is competent and professional in order to achieve successful completion of the works and the contract due to the wide-ranging duties and obligations they are assigned. The Project manager and Supervisor can delegate works to other staff members in order to carry out their duties. This is noted under Core clause 14.2 however, before this can be done the Contractor must be notified of what actions each member of staff has been assigned. NEC3 also differs variably from SBC/Q2011 in its lack of expressed terms stating the Contractors obligation to continue with the works regularly. Consequently it relies on the provisions of Core clause 20.1 which state the Contractor is to Provide the works as defined in clause 11.2(3) along with disciplinary procedure that corner any delays to key dates, damages and or the payments scheme. It is important to note that NEC3 has no provisions in any of its Clauses that concerns any expressed terms that state the Project Manager should be neutral and equal, as mentioned above they are effectively acting as the Employers Agent. Therefore any concerns regarding the issues of impartial and unbiased contract administration is an implied duty and should therefore be overseen by the implied terms of common law remedies as displayed in Constain Ltd and Others [Corber] v Bechtel Ltd Anor [2005]. The Contractors Responsibility for Design Regarding the responsibility of the design aspect the Contractor should have no involvement, except if it has clearly been requested and defined within the contract documents under the parameter of the Contractors design responsibility Chappell (2012). It is also worth mentioning that the term design should be used broadly and should also encompass not just drawings but also any written documents relating to the Contractors design proportion for example specifications and schedules of work. Lupton and Cornes (2013) The SBC/Q 2011 has previously required an additional supplement which is provided through the Contractors designed proportion part of the contract. With the Contractors design proportion the employer will then prepare their requirements known as the Employers Requirements, which is created from the performance specification that consequently then allows the Contractor to formulate and submit their proposals known as the Contractors Proposals. These are required when creating the contract documents and subsequently the contract sum. Under clause 2.13.2 it states that the Contractor shall not be responsible for the contents of the Employers requirements or for verifying the adequacy of any design contained within them. Furthermore under clause 2.2 titled Contractors Design Proportion, it states what the Contractor should do where the works contain a Contractors Design Proportion. From these clauses it should be made clear the difference between the Contractors Design Proportion and the remainder of the job is to reduce any conflicts or confusion throughout the project. The Contractors liability is noted in clauses 2.1 and 2.19.1 and ensures that they do not exceed the level of works required, due to the Contractors liability being near equal to the Architects the liability is restricted to the Contractors skill and attention to details in their works. The NEC3 differs from SBC/Q 2011 and does not give the Contractor as much flexibility of which the Contractors design can operate. Clause 60.3 of NEC3 states that any inconsistencies with site information are the responsibility of the Employer. It is noted in Eggleston (2006) that due to the fact the Employer should have taken into account the best site conditions as per 60(12) yet logically the Contractor should have allowances and precautionary measures in place, which is contradictive. The Contractors basic obligation is covered in core clauses 20.1 and the obligation for Contractors designed work in clause 21.1 which states what work and designs are required from the Contractor and that the Employer should state the works information, the criteria to which he requires designs to conform. NEC3 is written to take account of common law remedies unlike SBC/Q2011 which uses expressed terms of provisions when discussing the Contractors liability regarding the works being fit for purpose. NEC3 optional clause X15.(1.2) limits the Contractors liability to reasonable skill and care much like SBC/Q2011 clause 2.1. This clause could be interpreted differently regarding fitness for purpose as the Contractor could complete the works with reasonable skill and care however could not be meeting their contractual obligations. Clause 21.2 states that the Contractor is responsible for the design standards, materials and products unless it is stated otherwise in the works information. As common law remedies implied on any warranties unless they are excluded. Payment SBC/Q 2011s provisions states that the parties involved should agree to suitable staged payments or Milestones as they are more commonly known, however if staged payments cannot be agreed upon the contract provisions will default to interim payments as per condition 4.9 (1.2) where a monthly valuation is submitted. It is therefore crucial that all valuations submitted for interim certificates are reasonably accurate and do not need to be perfectly correct, this will allow for any errors from miscalculations created from the difficulty of the matter as revealed in Secretary of State for Transport v Birse-Farr Joint Venture [1993] 62 BLR 36. Interim amounts account for the completed work at Bill of Quantity rates along with a percentage of lump sums, the final amount is due when the whole work has been re-measured in accordance with the Bill of Quantities. Eggleston (2006) Interim valuations should be calculated via gross valuation, which include for the deduction of retention and any previously arranged payments certified as due. Provisions regarding this are found under 4.16 (1.2.3) discussing work executed, site materials and listed items. Yet staged payments should be agreed before the work is commenced and should correlate to relevant milestones and work sections. However this procedure should require periodic re-evaluations due to the administrative nature. Regarding in the event of insolvency as previously mentioned, the site materials in particular any stored off-site can be a difficult to identify whom they belong to, however noted in the provisions of SBC/Q 2011 under Terms of Conditions 4.17 (1-5) these materials become property of the Employer provided they are accounted for in an interim certificate. The Contractor must also provide proof to ensure all offsite materials are insured. Therefore any implied terms of common law remedies regard ing SGA 1979 are in excluded of their respective powers. To act upon the above the retention of title clause must be completed in order to identify the route the transfer of title takes, this is usually done methodically working through the supply chain from the Contractor, Subcontractor and Manufacturer, again checked against interim payments of that Contractor. The principles of payments should be governed by terms of the contract provisions and also by any implied terms of common law remedies like SGA 1979 and SOGSA 1982 as noted in Hughes, Mills, and OBrien (2008). In SOGSA 1982 it establishes that a payment should be made to any provider of work including the provision of any good or services supplied. However if it is expressed in the terms of the contracts provision a right to set off can be put in place to exclude any implied terms of common law remedies as seen in the case of Acsim (Southern) Ltd v Danish Contracting and Development Co Ltd [1992] 47 BLR 59 and Gilbert-Ash Northern v Modern Engineering Bristol) Ltd [1974] AC 689. Any interim certificates under the provisions of the SBC/Q 2011 are to adhere to the dates specified under the contract particulars throughout the contract and its conditions. Condition 4.10 (1.2) under contract provisions the contractor should receive a written notice stating the amount to be paid and the methodology used to calculate the sum, this should be received no less than 5 days after the submission of the interim certificate from the Contractor. It is therefore common practice for a reference to the interim certificate and copy of the valuation to be prepared by the Contract Administer or Quantity Surveyor. It should be noted that in comparison to either the Contract Administrator or Architect they would be held accountable to the parties involved due to the concern of skill and care. Regarding the final payment a few conditions must be mentioned firstly condition 4.12 (1-7) which covers details interim payments final date and amount most importantly that the final date for interim payment shall be no later than 14 days from the original issuing of the interim certificate. It also provides instructions on how to proceed with any pay less notices. Secondly the under the provisions of condition 4.15 (1-9) under title Final certificate and final payment instructs that the final payment will match the final certificate. The final payment should amount to the total of the contract price while taking into account all additional works and omissions, less the staged payments that have been paid throughout the projects work. As discussed by Ramsey (2000)the case of Lubenham V South Pembrokeshire DC [1986] 33 BLR 39 showing how the Contract Administrator should abide to the provisions of expressed terms of the contract while performing their contractual procedure, in which the contractor will have no motive or reason to challenge the certificates issued. NEC3 differs from SBC/Q 2011 in the methods used relating to payment schemes. Firstly it is the Project Managers responsibility to assess the amount of the payments due at the assessment date and consequently they are accountable to ensure the submission of application to confirm payment. The Project Manager is also responsible for determining the first assessment date. This is found under Core Clause 50.1 under title assessing the amount due. Clause 51.1 stating that the latest dates that the Project Manager can certify the payment are fixed throughout the contract relating to each assessment date, this is usually a period of 1 week from the date. NECs secondary option Clause X16 (1.2) is similar to condition 4.20 (1.2.3) of SBCQ/2011 in its replication which defaults the retention percentage to either 3% unless otherwise stipulated under the contract particulars. Regarding the Core clauses that relate to retention there are no expressed terms found in the contract provisions. Core Clause 50.3 is designed to be a powerful motivation to the Contractor and can incur a 25% deduction until the Project Manager confirms a programme submitted by the Contractor, however no provisions are made that make any reference to the final certificate, which consequently means that certificates have no order of precedence and controversially no contractual status. As we are aware it is the Project Managers responsibility under Core Clause 50.1 to access and certify each payment amount at the given assessment dates, along with this under Clause 50.4, it states that the Project Manager should take into account any submissions by the Contractor that however the responsibility remains on the Project Manager the amount due regardless if he has not received a submission from the Contractor. Any assessment that is issued after the defect certificate will be considered as is common practise as the final assessment which will lead to the final certificate, therefore from clause 50.4 it is understood that without the Contractors submission of a final account before the last assessment they will lose any influence they have regarding payment. However this clause may cause disputes between the Contractor and Project Manager regarding the information supplied from the contractors original submitted programme, as this considered to meet the requirements of the contracts agreement. Clause 50.3 is biased in its favouring to the Project Manager, therefore the Contractor may wish to seek adjudication if they believe they have any conflicts throughout the project as the clause provides the opportunity to invoke a penalty clause. NEC Core clause 50.5 is designed to provide motivation to the Contractor to submit a programme which contains information required for the contract, within this clause it is understood that if the amount has been inaccurately assessed is difficult to comprehend. It is implied that the Contractor will not be entitled to any correction of the next payment certificate. Usually it is common practice for inaccurate assessments to be corrected on the later payment certificates without the Project Managers admission. However, if the Project Manager does not correct the assessment in question again the Contractor can seek adjudication by an Adjudicator. If the Project Manager does admit to a mistake following a tribunal or adjudication, under the provisions of core clause 51.3 it is liable to attract interest calculated from the date when the increased amount would have been certified if there had been no dispute. Core Clauses 11.2(21), 11.2(22) and 11.2.(28) relate to Payment in Main Option B Priced Contract with BOQ. The Term bill of quantities is defined in clause 11.2(21) which define its meaning and therefore the how the BOQ relates to other clauses. Clause 11.2(21) is very similar to Core Clause 11.2(20) of the main Option A priced contract with activity schedule. Finally Core Clauses 11.2(28) and 11.2(31) define the completed work ensuring it cannot be misinterpreted regarding payment terms. References Chappell, D. (2012) Understanding JCT standard building contracts. 9th edn. London, United Kingdom: Taylor Francis. Eggleston, B.Ce. (2006) The NEC 3 engineering and construction contract: A commentary. 2nd edn. Oxford, UK: Wiley, John Sons. Galbraith, A., Stockdale, M., Wilson, S., Mitchell, R., Hewitson, R., Spurgeon, S. and Woodley, M. (2014) Galbraiths building and land management law for students. 6th edn. Oxon: Routledge. Hughes, S., Mills, R. and OBrien, P. (2008) Payment in construction: A practical guide. Coventry: RICS Books. Lupton, S. and Cornes, D.L. (2013) Cornes and Luptons design liability in the construction industry. 5th edn. London, United Kingdom: Wiley-Blackwell (an imprint of John Wiley Sons Ltd). Ramsey, Vivian. Construction Law Handbook. 1st ed. London: Thomas Telford, 2000. Print. Cases Acsim (Southern) Ltd v Danish Contracting and Development Co Ltd [1992] 47 BLR 59 and Gilbert-Ash Northern v Modern Engineering Bristol) Ltd [1974] AC 689. Constain Ltd and Others [Corber] v Bechtel Ltd Anor [2005]. Lubenham V South Pembrokeshire DC [1986] 33 BLR 39 Secretary of State for Transport v Birse-Farr Joint Venture [1993] 62 BLR 36.