Tuesday, December 31, 2019

Know Thyself Essay - 926 Words

Consider the ancient imperative â€Å"know thyself†. How can different ways of knowing help us as individuals and communities to achieve this goal? Shakespeare once said, â€Å"Life is but a stage and men merely players on it.† In order for us to become main characters on this stage, instead of mere extras, we must be able to truly identify who we are as individuals first. After this has been accomplished we can find out how we can benefit our society. When complete self-awareness, self-knowledge, self-confidence, and self-respect are reached, than you can truly â€Å"know thyself.† In all of the Natural Sciences, be it physics, chemistry, or biology, the physical world is dissected and analyzed. Using a language of their own, the Natural Sciences go†¦show more content†¦They are Identity Foreclosure, Identity Diffusion, Moratorium, and Identity Achievement. My sister has passed the Identity Foreclosure state where she accepts everything blindly and does not question her surroundings. She is now in the Identity Diffusion state in which she is still not looking for an identity for herself, yet she is beginning to question her surroundings. In this stage she has a complete lack of self-identity and no commitment to her personal goals. Most teenagers at our age, about 16 or 17, are in a state of Moratorium in which we still do not know who we are, but we are striving to create an identity for ourselves. This is reflected in the clothes we wear, the music we listen to, and the groups we tend to hang out with. The last stage, which many do not even reach, is the Identity Achievement stage, in which the person is happy with their share in life and is committed to their own values and goals. Henry Shaw once said, â€Å"It is not only the most difficult thing to know oneself, but the most inconvenient too.† Many people who lack a clear identity, and therefore feel insecure because of it, may turn to chat rooms or to gangs, where they can portray themselves as anything they want to be. Knowing thyself is extremely important to both the individual and society in general, for it causes the person to become more committed to their goals, and allows them to truly understand others. A society populated by individuals is much moreShow MoreRelatedThe Delphic Interest to Know Thyself613 Words   |  2 PagesSocial therapists and different mortals are entranced by the Delphic interest to Know thyself. Really, it was not the prophet talking, however presumably a pedant sovereign who put these words on the front of the sanctuary of Apollo. He didnt ask that we run quick, get in shape, or win fights. He asked that we know ourselves. Why? What did he mind? Maybe the skeptic sovereign suspected that in the event that we knew ourselves, social order might be fit as a fiddle [which raises the inquiryRead MoreAnalysis Of Know Thyself 1499 Words   |  6 PagesKnow Thyself has always been seen as the fulcrum of the western philosophical tradition. Questions of subjectivity, the self and personal identity continue within the contemporary philosophical discourse to this day. It still remains a key factor connecting western and eastern philosophy and modern with ancient philosophy. When Sartre takes up the question in Transcendence of the Ego, it marks a fundamental shift in the western philosophical tradition. Beginning with Descartes, and continuing upRead MoreSocrates659 Words   |  3 PagesSocrates Socrates was accused of many things in the Athens market. Socrates was accused of being a man who makes the worse argument into the stronger argument. A man who knows about the heavens and earth and therefore any one who believe this must not believe in the gods. Socrates was accused of being an atheist. Most of the people that followed him around his quest were inquisitive. Where as most adults would walk by Socrates with his â€Å"annoying question† the youth stopped to see what heRead MoreThe Unexamined Life Is Not Worth Living Analysis1870 Words   |  8 Pagescareer, or is it all of these things combined? Socrates, often thought of as the father of western philosophy, claimed that knowing one’s self and living virtuously, is what makes life worth living. â€Å"the unexamined life is not worth living† and â€Å"Know Thyself† are both common quotes from Socrates, that help us define his concepts of psyche, and techne, and how these concepts form t ogether to explain virtue and his view of intellectualism or reason over ego. First, let’s look at the word virtue and seeRead MoreEssay about Know Thyself1335 Words   |  6 Pagesâ€Å"Know thyself† – Socrates. Self-awareness is the act of being fully perceptive about one’s innermost self; an essential part to one’s life. However, this self-inquiry is not easily obtained. â€Å"Self-awareness and its accompanying egoism profoundly affect peoples lives, interfering with their success, damaging their relationships with other people, and undermining their happiness.† (Leary) One’s self can become distorted through the influence of society and their beliefs. â€Å"Knowing others is wisdomRead MoreEQ is More Important than IQ1452 Words   |  6 Pagesenabiling- or disabling thought itself. How we do in life is determined by both -It is not just IQ but EI that matters.† (p. 28) Much evidence testifies that people who are emotionally adapt, know and manage their own feelings well are at an advantage in any domain of life. For example people who know how to manage their emotions are people whom we like to be around with because their emotional skills make us feel good. There is growing evidence that fundamental ethical stance in life stem fromRead MoreSocrates : A Classical Greek Philosopher And The Father Of Western Thought752 Words   |  4 PagesIndividual Creative Paper Socrates was a classical Greek Philosopher and the father of Western thought. He was born in Athens Greece, in (c. 470-399 B.C.E.) (Archetypes of Wisdom, 95) Little is known about his life, but what we do know through the writings of his students, especially Plato, is that Socrates had a unique philosophy and charisma. Socrates was born to Sophroniscus a sculptor, and mother Phaenarete, a midwife. Because he was not from a royal family it is assumed that he most likelyRead MorePerseverance772 Words   |  4 Pagesteachings, his word prepares us to face any and everything Satan has planned for our lives. No matter what the devil throws our way our persistence is key to showing the devil our God is an awesome God!! IITimothy 2:15 says 15Study to show thyself approved unto God, a workman that needeth not to be ashamed, rightly dividing the word of truth. When you have perseverance a deep commitment is shown ***Would you all agree that the Christian walk could be compared to a Triathlon, not a quickRead MoreWhy Socrates Were Alive Today?920 Words   |  4 PagesIf Socrates were alive today, how must he feel about the Delphic inscription of â€Å"Know thyself† would still be a relevant question in which our society is still trying to answer in 21st Century living? In today’s fast paced society, the individual can easily get dehumanized by their work, technology, family commitments and the political process. A person is easily swayed by public opinion and not be able to think for themselves in fear of retribution and conflict. Sometimes it is easier to go withRead MoreOedipus Victim Of Fate Essay876 Words   |  4 Pagesstill wevers in fates power. Inscribed on the Temple of Delphi are the words, â€Å"Know thyself.† Can we ever really â€Å"know ourselves†? And if we can, do we want to know what we’ll find? Was Oedipus’ quest for self-knowledge his downfall or his salvation? Explain. We are always pursuing self knowledge about yourself and humane(). Fully knowing ourselves brings the truths of human nature(). You can not truly know thyself due to facts about yourself you disregard and ignore(). His quest for self knowledge

Monday, December 23, 2019

Islamic and Catholic Views on Genetic Engineering

Primary and Secondary sources found that Gene Enhancement had no place in the religions of Catholicism and Islam; both believe it is selfish, unnecessary and unethical. It is an embellishment to human vanity and additionally, insults human integrity when the offspring is affected by the technology. (What is the Catholic view on genetic engineering? - Mary Meets Dolly. 12/ 05/ 2014.) The Catholic Church In 1983, Pope John Paul II mentioned in an address â€Å"genetic enhancement was permissible- indeed, laudable- even from a Catholic point of view, as long as it met certain basic moral rules. Among those rules: that these therapies be available to all. Ensuring equality of care may become inseparable from ensuring equality of opportunity.†Ã¢â‚¬ ¦show more content†¦Ã¢â‚¬Å"2295 Research or experimentation on the human being cannot legitimate acts that are in themselves contrary to the dignity of persons and to the moral law. The subject’s potential consent does not justify such acts. Experimentation on human beings is not morally legitimate if it exposes the subject’s life or physical and psychological integrity of disproportionate or avoidable risks. Experimentation on human beings does not conform to the dignity of the person of it takes place without the informed consent of the subject or those legitimately speak for him.† (CCC; 29/05/14) This paragraph explains that scientific technologies are not permissible if it used for illegitimate or unnecessary means. Ethical frameworks would all agree on rejecting the use of Genetic Enhancement which is used for morally unacceptable purposes to better an individual which already has necessary wellbeing for life. The Catholic Catechism additionally states, â€Å"2292 Scientific, medical, or psychological experiments on human individuals or groups can contribute to healing the sick and the advancement of public health.† The Catechism’s paragraph mentions that experimentation is allowed in the situation that it provides benefit to the greater good. This follows the concepts of Common Good, Social Conscious and interconnectedness. These concepts explain that ethical deliberations, like gene experimentation, are not made in a moral vacuum. GeneShow MoreRelatedTreatments for Infertile Couples Essay1181 Words   |  5 Pagesinfertile couples have children are as follows. Some Roman Catholics believe that God gave us life and no one has the right to give children. The Catholic Church does not allow most treatments the feel as if the sacredness of life is being taken for granted. Catholics do not allow IVF treatment because several eggs are fertilised and some of them are thrown away which is the same as abortion. The Roman Catholic Church condemns all types of surrogacy because it involvesRead MoreCloning Is The Cloning Of Cloning1818 Words   |  8 PagesIntroduction In biology, a clone simply means that an object, cell, or whole organism has the same genetic makeup as the original object, cell, or organism. Cloning means an organism is generated genetically identical from an existing organism through non-sexual means. Cloning simply means to make an identical duplication of genes, fragments of DNA molecules, organs, or cells. There are three different types of artificial cloning. They include gene cloning, reproductive cloning, and therapeuticRead MoreMedical Ethics: an Inclusice History2719 Words   |  11 Pages As long as there has been some form of medical treatment in the world, there has been someone who has voiced their ethical viewpoints on the treatment of patients. It is difficult to trace back the very first ethical thinking in medicine, but Islamic and Muslim traditions have left their footprints in Medi cal and Bioethics since before the medieval and early modern period. The first piece of literature ever dedicated to the field of medical ethics was written in the 9th Century by Ishaq bin AliRead MoreSources of Ethics20199 Words   |  81 PagesETHICS: 6 1- Religion: 6 2- Genetic Inheritance: 8 3- Philosophical Systems: 8 4- Cultural Experience: 8 5- The Legal System: 9 6- Codes of Conduct: 9 2.0- EXPLANATION OF THE SOURCES OF ETHICS: 10 2.1- RELIGION: 10 Teaching business ethics 12 2.11- Impact Of Religiosity: 13 2.12- Ethics Of Islam: 14 Nature of Islamic Ethics 17 The Human-Environment Relationship: 20 The Sustainable Care of Nature: 22 The Practice of Islamic Environmental Ethics: 22 2.14-Read MoreNivea Presentation3606 Words   |  15 PagesInternational Islamic University Chittagong Introduction Country Selection: Germany Objective: This group assignment aims to conduct an international market environment study of Germany trading partners of Bangladesh, mainly export destinations, focusing on the †¢ Foreign trade practices of Bangladesh with those trading partners and †¢ Trade barriers against Bangladesh exports to these countries. Methodology: Specific Product Selection: General Trade area. Discussions Read MoreGp Essay Mainpoints24643 Words   |  99 Pagesproblems i. Power + Responsibility of Media j. Media ethics k. New Media and Democracy 2. Science/Tech a. Science and Ethics b. Government and scientist role in science c. Rely too much on technology? d. Nuclear technology e. Genetic modification f. Right tech for wrong reasons 3. Arts/Culture a. Arts have a future in Singapore? b. Why pursue Arts? c. Arts and technology d. Uniquely Singapore: Culture 4. Environment a. Developed vs. Developing b. ShouldRead MoreHbr When Your Core Business Is Dying74686 Words   |  299 Pages2007 14 Departments 12 COMPANY INDEX 14 FROM THE EDITOR 53 2006 MCKINSEY AWARDS AND 2007 MCKINSEY JUDGES 20 What the Boss Wants from You What should CEOs and their direct reports expect from each other? When Larry Bossidy laid out his views to a group of young executives, they couldn’t take notes fast enough. You don’t have to write down what he said, though, because Larry has done it for you here. And it will be on the exam. 88 STRATEGIC HUMOR 111 TOOL KIT The Process Audit MichaelRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 Pagesrecent phase of the human experience is usually covered only at the end of a multiterm sequence of world history units has meant that it often ends up becoming a rushed add-on of rather random, abbreviated capsule summaries and general overviews. In view of the fact that no phase of history can begin to match the twentieth century in terms of the extent to which it has shaped the contemporary world, this marginalization is particularly pernicious and has been at times literally lethal. The unmatchedRead MoreInternational Management67196 Words   |  269 Pages trade ministers from around the world met in Seattle to launch a new round of global trade talks. In what later became known as the â€Å"Battle in Seattle,† protesters disrupted the meeting, and representatives of developing countries who felt their views were being left out of the discussion succeeded in ending the discussions early and postponing a new round of trade talks. Two years later, in November 2001, the members of the WTO met again and successfully launched a new round of negotiations atRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 PagesKeep It Close? 438 Case Incident 2 The Persuasion Imperative 439 xvi CONTENTS 14 Conflict and Negotiation 445 A Definition of Conflict 446 Transitions in Conflict Thought 447 The Traditional View of Conflict 447 †¢ The Interactionist View of Conflict 447 †¢ Resolution-Focused View of Conflict 449 The Conflict Process 449 Stage I: Potential Opposition or Incompatibility 450 †¢ Stage II: Cognition and Personalization 451 †¢ Stage III: Intentions 452 †¢ Stage IV: Behavior 454 †¢ Stage V: Outcomes

Sunday, December 15, 2019

Adopting Telemedicine in developing countries Free Essays

ICTs are technologies that have spread widely and are cheaper for use by the general public. Even though information and communication technologies could tackle some of the heath care challenges that face the modern society, the utilization of ICTs is faced by numerous challenges for social as well as historical transformations that are associated with other natural rights. The case is not different in the field of telemedicine. We will write a custom essay sample on Adopting Telemedicine in developing countries or any similar topic only for you Order Now Telemedicine is an example of ICT that has been used in the world for over forty years. Modern telemedicine applications employ high quality image and video in addition to audio capacities. These technologies range form excellent resolution still images to complex teleconferencing apparatus. Recent developments in ICT are encouraging and they include the use of internet, wireless ICT diffusion, and the exchange of medical information electronically in addition to remote consultations. Infrastructure factures that have an effect on the outcomes of telemedicine include: the national ICT infrastructure in addition to the governments preparedness, approach, as well as policies towards information and communication technology. Technically sophisticated telemedicine applications are currently employed across a wide range of healthcare settings. This technology allows medical personnel to transmit images through mobile phones and sophisticated wireless devices (Martà ­nez, Villarroel, Seoane, and Pozo 2005, p. 1). 3.1.2 E-Health Policies Various shareholders of the telemedicine sector have numerous opportunities to become deeply involved in the development policies that affect the industry. Shareholders of this sector include vendors of information technology, manufacturers of medical devices, health care professionals, decision makers and the government. E-health policies are set in such a way as to improve network capacity, enhance ability of transcending geo-political, social, economic and cultural obstacles. Policies should be set in such a way as to allow teleconsultation beyond national borders. Patients in addition to medical care professionals should be offered with a chance of seeking evidence based opinion as well as treatment from overseas through teleconsultation (Lee, Mun, Levine and Ro 2000, p. 28). 3.3 Capabilities of health sector institution The modern health care system has undergone numerous modifications in order to meet the ever increasing heath needs of the population. One of the modifications is the implementation of telecommunication in health care. All modifications in the health care sector are carried out with the patient being the center of focus. Telemedicine and telegraphy are some of the most recent telecommunication strategies that have been incorporated in the health care sector. Currently, digital images of a patient can be sent over a wireless device to a medical personnel and medical consultations carried out over the internet (Tanriverdi and Iacon, 1998, p, 40). 3.4 Analysis of Telemedicine case studies in developing countries The emergence to telemedicine is associated with the search for communication-oriented solutions to make it easy for rural populations to access medical services. Telemedicine is considered as one of the most appropriate ways through which contemporary medical services can reach the underserved regions (Lee, Mun, Levine, and Ro 2000, p. 16). Reality has however, gone in a different direction. Extensive studies with telemedicine in developing nations have not yet demonstrated the potential of telemedicine. There are a number of factors that need to be implemented in order that telemedicine services in rural areas become sustainable. A highly robust organizational strategy needs to be implemented, a radio based system should be erected and resources utilized properly; remote maintenance systems should be implemented; a high technological base should be established; and all information and communication should be satisfied through simple and synchronous systems (Kifle, Salmon, Okoli, and Mbarika 2008, p. 5). Despite the numerous benefits associated with telemedicine, the program has been slow to come into routine use in both rural and urban zones. 4. Evaluation of the current situation of Telemedicine in rural and urban zone Telemedicine holds a great hope for health care and medical centers both in rural areas and urban centers. Rural areas in particular have for long been faced by shortage of medical personnel, scarcity of means of transportation in addition to other access issues such as unfavorable weather conditions. Telemedicine allows for teleconsultation that utilize a variety of technological advancements such as voice over internet, digital images, digital video teleconferencing, in addition to other emergency services (Martà ­nez, Villarroel, Seoane, and Pozo 2005, p. 70). However, there are various issues that affect the implementation of telemedicine in rural areas. These include: poor infrastructure, limited bandwidth availability in network systems, and scarcity of internet providers. Telemedicine is not only about the provision of medical care in the rural areas, but it is very beneficial in linking suburban, urban and inner city medical facilities in a network offering intensive medical care services (Richard 2001, p. 3). 4.1 Advantages of using Telemedicine technologies An increased use of telemedicine would bring about a number of benefits ranging from enhanced medical care, better utilization of health professionals, increased patients compliance, to enhanced delivery of medical care services outside clinics and hospital setting and in rural as well as the underserved regions. Telemedicine allows for frequent monitoring of vital sign information rather than using periodic visit by physicians. It also improves care of the elderly, physically incapacitated as well as the home bound patients, because it reduces hospital visits thereby increasing convenience and compliance for incapacitated patients. As a result it improves general health of the community and population because it reduces exposure to various illnesses from other patients. It also empowers patients in relation to their own health. It is a source of innovative and creative employment in the health care system. It is a significant strategy of tackling likely future scarcity of medical personnel.   It brings down the rate of death, injuries and infections as a result of medical errors due to inaccurate patient information. Presence of telemedicine programs in rural areas enhances care by reducing transportation costs; deploying medical professionals and specialists; and through providing medical care delivery regardless of geographical barriers (Hein 2009, p. 9). 4.2 Challenges of adapting Telemedicine There are numerous challenges to generating dependable evidence concerning the effects of the use of telemedicine. Scrutiny is rarely carried out as a fundamental part of implementation, and as a result resources are not absolutely dedicated to evaluation. However, there are times when resources are dedicated to scrutiny after implementation, therefore prospective gathering of baseline data is impossible. Retrospective gathering of medical data is faced by numerous hurdles in terms of appropriate source identification in addition to collection techniques. These issues make difficult the scrutiny of various interventions, even as the actual nature of evaluation of telemedicine presents further difficulties (Brear 2006, p. 24). Besides evaluation, other challenges that face telemedicine, as indicated by Paul, Pearlson and McDaniel (1999, p 281), include: various social, cultural, economic, technical and organizational hurdles that health care systems must deal with before achieving the full benefits of telemedicine. Other factors that derail the implementation of telemedicine in developing countries are: poor telecommunication and electric power infrastructure; domination in addition to high cost of internet services; lack of government involvement; difficulties in sustaining implementation of telemedicine; substandard organizational strategies; and user discontent   with low band-width as well as delayed response. Patients, medical professionals and decision makers lack essential knowledge on telemedicine services as well as their potential for medical care. Lack of proper funding is the other challenge that faces telemedicine. Despite its recommendation by the world health organization telemedicine is yet to be realized as a technical service in many national ministries of health (Kifle, Salmon, Okoli, and Mbarika n.d, p. 3). 5. Conclusions It can therefore be concluded that telemedicine is one of the most significant modern medical strategies that can be employed in tackling the numerous health care challenges that face populations living in both urban and rural areas.   Various benefits of telemedicine include: improvement of patient care, reduction of patient transfers to tertiary health centers and providing physicians a good access to tertiary consultation. Telemedicine improves the general health of the community because it reduces expose to various illnesses from other patients through reduction of hospital visits. There are however, various challenges that are associated with implementation of telemedicine and these include: evaluation challenges, poor telecommunication, misinterpretation of information, and lack of awareness and commitment by the government and decision makers. Telemedicine is faced by various issues including information technology policies, E-Health policies, and data security policies. Even though there are numerous benefits associated with telemedicine, the program has been slow to come into routine practice both in rural and urban zones. Bibliography: Brear, M. 2006, Evaluating telemedicine: lessons and challenges, Health Information Management Journal, Vol 35, no. 2, pp. 24 Hein, M. 2009, Telemedicine: An important force in the transformation of healthcare, Journal of High Speed Networks, Vol 9, no. 15, pp. 9 –30 How to cite Adopting Telemedicine in developing countries, Papers

Friday, December 6, 2019

Information Technology and Security

Question: Develop an effective research plan considering context, research questions, sources, timeline, and larger implications for writing a formal research report; Also to practice working with the Research Proposal as an academic genre and to provide an opportunity for working on stylistics and effective academic discourse. Answer: 1 Introduction The aim of this report is to present a research proposal on the topic of Information Technology and Security. Today we live in a technological era. Every event of our lives are connected to and affected by technologies, especially information technologies. With the technical advancement of digital technologies and communication technologies, now information technology has become more than computers and internets. So the span of security in information technology has also expanded its span. (Andress, 2014) In the next sections of this report, it will discuss different facets of security in the context of information technology. 2 Why to Study Information Technology Security? We need to study information technology security to grow the awareness about the topic among us and making our lives secure from information security attacks, hackers, theft of information, privacy breaches etc. If we focus on the statistics of cybercrime, we can check how those are increasing day by day. Over the online platforms, through the mobile devices and in many information systems we share our personal and professional details every day. There are important details like credit card number, banking details etc. that are shared through internet also. For example sharing of banking details over online banking platforms. But these data are at high risks. There are several examples of hacking and stealing of the information of individuals, defence of country etc. (Bidgoli, 2006) Study on security in information technology will help to understand these issues in details, it will help to take precautions before sharing data over the Internet. However, it wont make our data over the online platforms fully secure but we can understand the risks and that may reduce the risks to some extent. 3 Definitions Information security or InfoSec is a practice that helps to build defense against unauthorized access, disclosure, inspection, modification, capture, disruption, perusal and destruction of information. The form of data may be physical or digital. (Bishop, 2003) IT security is a part of information security that is mostly focused on computer security and network security. When information security is applied to the information technologies then that is termed as IT security. These information technologies are mostly related to computers and networks. Currently, smartphones and other smart gadgets are also considered in this class. There are IT security specialists who secures information from attacks, thefts and other kind of unauthorized access. (Ciampa, 2011) When data is under some attack already, then it is needed to be assured that the information is not lost due to the attack. This is called information assurance process. There may be different kinds of attack on information like natural calamities to hacker attack, physical damage of storage etc. As data is stored in servers and computers in most of the cases. So, this topic also comes under information security. The possible attacks and risks that can harm data are called threats to the data. There are different kind of threats in information security domain. Some of the threat are, Software based attacks by hackers. Theft of data and intellectual property. Theft of identity of some individual or system. Sabotage Extortion of information. Theft of software Under software based attacks, there are different kind of attacks. Those are, worms, virus, Trojans etc. Under the theft of data and intellectual property type of attack there are issues related to ownership on information. Identity theft issue is related to masquerading some other persons identity to get access to data in an unauthorized way. Sabotage is related to intentional destruction of information belonging to others. Extortion is modifying some information by stealing it and then sending the modified one to the receiver. Theft of software is physical theft of software. 3.1 Sources of Information An attacker can target any kind of information. But generally they tends to target defense, government, financial institutional, universities, businesses etc. as these organizations contains tons of information about individuals and in almost all cases information are collected and stored electronically, transmitted over networks and internet. (Symantec Corporation, 2014) Protection of such information are responsibility of the organization that collects and stores the same. For an individual, loss of any personal information or misuse of any, may become fatal. It is a breach of their privacy. Information security deals with these areas, protecting information and right to that information. It secures information technology infrastructure, databases, networks, etc. 4 Principles of information security The three core principles of information security are, confidentiality, integrity and availability of information. These three are collectively called CIA triad. There are other principles like non-repudiation, atomicity etc. but these three are the basic. Any information technology infrastructure will be called secure if and only if it conforms to these three principles. (Bidgoli, 2006) 4.1 Confidentiality Confidentiality ensures that the data will be kept confidential. No person without proper access privilege will be able to access the information. 4.2 Integrity Integrity ensures, data will be stored in correct format and form. There will be no unauthorized modification to the data. In the context of information security, integrity of data refers to the manitance of the data in a way that the consistency and accuracy of the data will be maintained. Data will not be modified by any kind of unauthorized access. (Bishop, 2003) 4.3 Availability Availability ensures data will be available to the right users always. There will be no interrupt in this case. At the same time data will not be available to the unauthorized or unintended users. Usually some information system or computer will process some kind of data and will store the same. The information security controls must be designed in a ways that those will be able to protect data from unauthorized access at the same time, will be able to differentiate authorized accesses and will make data available to the authorized users. (David Solomon, 2010) A system can be unavailable for various reasons. For example, there may be power failure like issues, also there may be security attacks like denial of services etc. 4.4 Non-repudiation It ensures that no communicating party will be able to deny the instance of communication in future. Cryptography based systems are used to ensure non-repudiation. 4.5 Authenticity It ensures the authorization process. When entered in a system, it checks whether the data is from authentic source of not. This is mostly related to ecommerce and ebusiness platforms. Where confirmation of the transactions and sharing of data are needed to be authenticated about their genuineness. There are technologies and methods like digital signatures to ensure authenticity. 5 Defenses Information security defenses can be of the following types. 5.1 Access controls Setting and implementing access controls ensures security from unauthorized access to some degree. A risk assessment should be done before implementing access control on data. The access controls help in implementation of access to protect sensitive information. There are typically three stages in the access control implantation method. Those are, identification, authentication and authorization. (Benantar, 2006) In the first step, identification helps in ascertaining that who the person who want access to the information is. A typical example is asking about the userid during login process. Then, in the second step authentication process helps to verify the claim in the identification step. For example, if someone has provided his identification as John to the system, the system will check whether the person is john or not. For that purpose, it may ask for password that is supposed to be known by John only. There are other authentication mechanisms like biometrics etc. however, no process is beyond risks and attacks. In the final and third step, the system will authenticate whether the information collected from previous two steps are authentic or not and then it will give permission for access to the information. For example, if the person John has only READ access right to a piece of data , and John has asked permission for WRITE access then the system will reject the request even if the userid and password are correctly supplied. There are different kind of access control mechanisms like mandatory, discretionary etc. 5.2 Cryptography Cryptography is a very useful defense mechanism in information security. Cryptography helps in changing the form of information so that the original information is hidden. The scrambled information will be understandable to the intended user only. So if anyone else receive the information who is not intended user, then the information will not be readable to them. The process of changing a piece of information based on some key is called encryption. The reverse is called decryption. The changed form of information is called cipher text. (William, 2008) Cryptography has a wide range of security algorithms. Information systems can implement those algorithms to implement security features like authentication, non-repudiation etc. 5.3 Software like Antivirus, Firewall There are wide range of antivirus software for dealing with virus issues in computers. These also ensures information security by protecting data from potential damages by viruses. There are systems and software like firewall, IDS etc. that helps in detecting unauthorized access from network to a system. (David Solomon, 2010) 5.4 Awareness and Best practices Implementation of security controls is not enough to ensure information security if the users are not aware of the risks and the consequences. So, the first thing is to increase awareness among the users. Then making them aware of the best practices to avoid risks of security attacks to some degree. 6 Future Research IT security and information security is a vast topic. There are number of sub topics to work on in future. There are enough case studies to uncover reasons behind security attacks over time, also there are scopes to implement new protocols or standards for ensuring security. In future, based on literature and case studies, the IT security will be explored in details. Data for the research on IT security will be collected from different case studies, literatures papers, journals, surveys, statistics etc. available from Internet. 7 Conclusion In the research proposal on IT security, it has described the term from the broader perspective of information security. It will help to understand the role and significance of IT security in the span of information security. In the proposal, it has discussed about basic security principles for information security, different kind of attacks, different kind of defenses, future scope of research etc. References Andress, J. (2014). The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Syngress. Beachboard, J., Cole, A., Mellor, M., Hernandez, S., Aytes, K. (2008). Improving Information Security Risk Analysis Practices for Small- and Medium-Sized Enterprises: A Research Agenda. Florida. Benantar, M. (2006). Access Control Systems: Security, Identity Management and Trust Models. Springer. Bidgoli, H. (2006). Handbook of Information Security, Key Concepts, Infrastructure, Standards, and Protocols . John Wiley and Sons. Bishop, M. (2003). Computer Security: Art and Science. Addison-Wesley Professional. Bosworth, S., Kabay, M. E. (2002). Computer Security Handbook. John Wiley Sons. Ciampa, M. (2011). Security+ Guide to Network Security Fundamentals. Cengage Learning.K., Solomon, M. (2010). Fundamentals of Information Systems Security. Jones Bartlett Learning. Symantec Corporation. (2014). Internet Security Threat Report 2014. Symantec Corporation. Vacca, J. R. (2012). Computer and Information Security Handbook. Newnes. Whitman, M., Mattord, H. (2011). Principles of Information Security. Cengage Learning. William, S. (2008). Computer Security: Principles and Practice. Pearson . Xiao, Y., Li, F. H., Chen, H. (2011). Handbook of Security and Networks. World Scientific.

Friday, November 29, 2019

Racial Profiling Essays (1653 words) - Social Inequality

Racial Profiling Racial profiling is the tactic of stopping someone because of the color of his or her skin and a fleeting suspicion that the person is engaging in criminal behavior (Meeks, p. 4-5). This practice can be conducted with routine traffic stops, or can be completely random based on the car that is driven, the number of people in the car and the race of the driver and passengers. The practice of racial profiling may seem more prevalent in todays society, but in reality has been a part of American culture since the days of slavery. According to Tracey Maclin, a professor at the Boston University School of Law, racial profiling is an old concept. The historical roots can be traced to a time in early American society when court officials permitted constables and ordinary citizens the right to take up all black persons seen gadding abroad without their masters permission (Meeks, p. 5). Although slavery is long since gone, the frequency in which racial profiling takes place remains the same. Ho wever, because of our advanced electronic media, this issue has been brought to the American publics attention. Some consider racial profiling a viable tool to reduce crime. The New Century Foundation, a non-profit organization based in the Washington, D.C. suburb of Oakton, VA, published a report on the American Renaissance website, stating that African-Americans commit 90% of the approximately 1,700,000 interracial crimes of violence that occurs every year in the United States. They are more than fifty times more likely to commit violent crimes against whites than vice versa. According to this same report, African-Americans are much more likely to commit violent crimes than whites and when they commit these crimes, target whites slightly more than half the time. The foundation believes that these crime statistics warrant racial profiling as a crime deterrent and believe that it may even reduce crime. A recent article published on the website, Jewish World Review, states that racial profiling is frequently used, not only in law enforcement, but also in everyday existence. The author, Walter Williams, states that, we face a world of costly and incomplete education, and that means we have to do a lot of guessing and playing hunches. Because of this uncertainty, specific indications are required that can provide the public with more information and allow educated decision-making. The article presents examples of the types of racial profiling in existence. For example, simply for their own safety reasons, taxi drivers will avoid driving into a particular area of the city because of the reputation of its propensity to crime. They will also drive past a person of color and stop to pick up a white passenger for that same reason, valid or not. Williams cites his own personal experience with his physician, who uses a typical black mans health statistics collected from years of study to agg ressively monitor his high blood pressure. It is because these medical statistics illustrate that high blood pressure is more prevalent in black men than in any other demographic group. In a n article published in the Wall Street Journal, entitled Racial Profiling Doesnt Prove Cops are Racist, Jackson Toby states that a little perspective is in order here. Being a professor of sociology, he believes that racial profiling is an extremely important idea in modern criminology. He continues that within two years of the policys adoption by the New York City Transit Police, the number of felonies in the subway declined by more than 30%. Basically, he believes that by paying attention to subtle behavior, criminal behavior can be prevented, and certain ethnic and age groups exhibit certain subtle behaviors. He goes on to say that although blacks are only 12% of the American population, they comprised 56% of the arrests for murder, 42% of the arrests for rape, 61% of the arrests for robbery, 39% of the arrests for aggravated assault, 31% of the arrests for burglary, 33% of the arrests for larceny, and 40-% of the arrests for motor vehicle theft. Because of these statistics, police are more prone to look for the type of person more apt to commit these crimes, and in these cases, based on the data, African-Americans are brought to the forefront. Naturally,

Monday, November 25, 2019

The Debra Lafave Case

The Debra Lafave Case Debra Lafave, a 24-year-old married middle school teacher in the Tampa, Florida, area was arrested in June 2004 and accused of having sex numerous times with one of her 14-year-old students. She was charged with four felony counts of lewd and lascivious battery and one count of lewd and lascivious exhibition. Here are the latest developments in the Debra Lefave case: Court Rules in Favor of Lafave Oct. 16, 2014 - The Florida Supreme Court has ruled in favor of former middle school teacher Debra Lafave in her appeal to end her probation early. The court ruled that a circuit judge was in his rights to reduce her original sentence. An appellate court had overturned Judge Wayne Timmermans ruling to end Lafaves probation early calling his decision an abuse of judicial power resulting in gross miscarriage of justice. After a year of being off probation, Lafave was again placed under supervision. The Supreme Court did not address the merits of the judges ruling, the panel wrote, Although we recognize the perceived inequality that the Second District sought to remedy, the district court lacked jurisdiction. Although Lafave is no longer on probation, she is still a registered sex offender who must check in with the sheriffs office twice a year or face felony charges. Previous Developments Court Hears Lafave AppealSept. 16, 2013The Florida Supreme Court has heard oral arguments in the case of a teacher convicted of having sex with a student who now wants her probation to be cut short. Debra Lafave is asking the states highest court to reinstate a 2011 ruling by a judge to end her probation four years early. Judge Reinstates LaFaves ProbationJan. 25, 2013Probation has officially been reinstated by a Florida judge for a former Tampa teacher who was convicted of having sex with one of her students. Debra Lafave must now finish the final four years and two months left on her sentence. Debra Lafave Ordered Back on ProbationAug. 15, 2012A former Florida middle-school teacher whose affair with a 14-year-old student shocked the nation, not to mention her then husband, has been ordered back on probation by a state appeals court. Debra Lafave was released early from probation last year by Judge Wayne S. Timmerman over the objections of the prosecution. Debra Lafave Probation Ends EarlySept. 22, 2011A former Florida middle school teacher who made national headlines by admitting she had sex with a 14-year-old student has been released from probation four years early. Debra Lafave, who is now a mother of twins, requested that Judge Wayne S. Timmerman terminate her probation early. Debra Lafave to Be Released From House ArrestApril 8, 2008Over the objections of prosecutors, a Florida judge has ruled that former teacher Debra Lafave, who confessed to having sex with a 14-year-old student, will spend her final three months of house arrest on probation instead. No Jail Time Ordered for Debra LafaveJan. 10, 2008It took a Florida judge 11 seconds to rule that conversations former teacher Debra Lafave had with co-workers at the restaurant where she worked was not a willful nor substantial violation of her probation. Debra Lafave Arrested for Probation ViolationDec. 4, 2007On the day her attorney was planning to file a motion asking that her home confinement sentence be reduced, Debra Lafave was arrested at the restaurant where she works for talking with a 17-year-old female co-worker. Debra Lafave Off the HookMar. 21, 2006Hours after a Marion County judge rejected a plea deal for Debra Lafave, the Florida middle school teacher accused of having sex with one of her 14-year-old students, state prosecutors dropped all charges against her to protect the victim in the case. Judge Reconsiders Debra Lafave Plea DealMar. 9, 2006Prosecutors joined Debra Lafaves attorneys in asking a Florida judge to reconsider their plea deal that will allow her to avoid jail time for having sex with one of her 14-year-old middle school students. Judge Rejects Debra Lafaves Plea DealDec. 9, 2005A Florida judge has rejected a plea bargain that would have allowed former teacher Debra Lafave to avoid any jail time for charges that she had sex with one of her 14-year-old students. Florida Child Molester Gets ProbationNov. 22, 2005In a blatant example of a double-standard in dealing with child molesters, a Florida judge has sentence former middle school teacher Debra LeFave to probation for having sex repeatedly with a 14-year-old male student. Debra Lafave Turns Down Plea DealJuly 18, 2005The middle-school teacher accused of having sex with a 14-year-old student has decided to turn down a plea bargain deal and opt instead of going to trial when she plans to use an insanity defense, according to her attorney. Teacher Who Had Sex With Teen Says Shes InsaneDec. 2, 2004Debra Lafave, the suspended Florida middle school teacher facing four felony counts of lewd and lascivious behavior for having sex with a 14-year-old student, will plead not guilty by reason of insanity, according to her attorney.

Thursday, November 21, 2019

National Rifle Association NonProfit Organization Research Paper Essay

National Rifle Association NonProfit Organization Research Paper - Essay Example Hence, the need to be responsible with regards this matter is an important issue to consider for everyone. For this particular reason, the NRA stands strong as an organization that believes of responsible gun handling from then until now. NRA primarily started out as an organization that is based on the views of two retired army who simply wanted to make the entire human society more knowledgeable about the wise handling of firearms. Col. William C. Church and Gen. George Wingate started NRA in 1871 to be able to promote a sense of scientific process among all individuals whenever they handle firearms. As the US charter in the State of New York approved the existence of the said organization, the First President of the organization in the personification of former US Senator Gen. Ambrose Burnside took responsibility of the position. The first president tried his best to establish the organization's reputation in the society that they are most involved with. It could be observed that with the aim of making the society more responsible in the manner of handling guns for self-protection reasons. It is indeed from the primary aims of the founders of the organization that NRA actually started out to affect the entire human society. Hence, through the financial support provided by the Long Island and Creed Farm, the organization was able to establish a practice range round that would host to train numerous individuals who have their own guns for the purpose of self defense. The Credmor, NRA's first training grounds had then been established during the year 1872. It was the first venue for the first ever annual shooting matches that happened during those years. IT was the year 1906 when the organization began trying to influence the larger population in the human society and that is the youth. NRA began to campaign for having university-based programs that would allow young individuals to learn the right usage of guns. Through the promotion of shooting sports in America, NRA begins to affect a larger population in the American society. With the pursuance of NRA Secretary Albert Jones, the said program flourished to affect the entire American population during those years. Moreover, the growth of recognition that the society has upon these programs affected many among the populations staying within the area. As of today, the same program still makes a great effect on the process by which American Boy Scouts, American Legron and US Jaycees are being trained at present. Up to this day, the organization aims to educate everyone in the society about the need to be responsible and knowledgeable about the right usage of guns and other firearms as well. In an aim to educate everyone, the launching of the NRA Police Firearms Instructor Certification Program in 1960, the association holds a record of having 50,000 certified instructors who handle different courses of responsible gun handling. From this particular program, 750,000 gun owners are given certification every year and are then given the rightful knowledge that they need to acquire with regards the need to handle their firearms in a manner of responsibility and alertness to what is right and what is wrong in terns of using their gin authority or chance to hold a firearm for any reason there is

Wednesday, November 20, 2019

Resource Management Essay Example | Topics and Well Written Essays - 2000 words

Resource Management - Essay Example In the article "Motivational Management. Developing Leadership Skills" written by D. M. Eade, the author gives some recommendations as for employees motivation and change strategies, which can be successfully in health care practice. The purpose of the article is to single out the most important characteristics of effective leaders and evaluate the importance of leadership in health care. The author examines employees perception and understanding of the notion of a leader and the role of a leader in the process of management. Summarizing the main features of an ideal leader it is possible to say that being a leader is not a position, but a function. It requires getting the job done. In terms of leadership, the aim is to recruit and develop motivated managers who lead proactively. They are expected to be clear, to delegate and to get others to participate. A key aspect of leadership is that of aligning people with the goals and values of the company. In resource management effective leaders identify productive areas of confusion and uncertainty that exist in society, demonstrate that they do not have all the answers but are willing to learn, and is able to act differently, think differently, and seek inspiration from different sources, than leaders of the past. The obligations of leadership include effective training, deep insight into new tools and advancements and their impact on the future, strong corporate nurturing, and repeated practice could yield the best result, a well-rounded, skilled, and insti nctive leader. On the other hand, the author of the article does not include in her discussion such important features of good leaders as the ability to cope with complex technological change in their organizations. The author: "noted that solid strategies are necessary, but not sufficient in and of themselves, for good planning. Detailed action plans based on those strategies are critically important" (Eade , 1996). General leadership skills are not sufficient in enriched environments. It must directly relate to the tools, medium, strategies, and competencies found within this culture. Leader should possess the competencies to use and evaluate new tools, but he/she must also have the insight into the impact these tools will have on the future of organizations. The ability to develop a shared vision for new resources within an organization is an essential part of management, especially in health care. Employees prefer to have a leader who is a self-achiever and motivated to become a role model. Changes in resources often produce a "chaos situation" where change management in the use of instructional technology in teaching and learning becomes increasingly important. The leader must be ready to cope with difficult situations. Effective leaders recognize that what they know is very little in comparison to what they still need to learn. Leading others is not simply a matter of style, or following some how-to guides or recipes. Ineffectiveness of leaders seldom results from a lack of know-how or how-to, nor it is typically due to inadequate managerial skills. Leadership is even not about creating a great vision. It is about creating conditions under which all followers can perform

Monday, November 18, 2019

Personal Financial Planning of a Common Citizen Essay

Personal Financial Planning of a Common Citizen - Essay Example As he would not have any regular inflow of money as with age he would retire from the profession he was into, he needs to save and plan for future, which would take care of his old age. Though at the old age citizens are entitled to state-sponsored pensions still having own money would definitely help them with greater mental assurance to fight the diseases and illnesses which invariably comes with age. Also, the proper financial planning from the right age would also assist a person in fulfilling his other dreams and commitments like those of education of family members and purchasing of house, etc. Jeff, aged 55, works at building trade sites for last 39 years. He started to work at the age of 16 and has earned enough to pay off his mortgages. Jeff is married to Amy, a homemaker. The couple has two children. The first child of Jeff and Amy is Kylie (29) who is married (to Jake) and has two children, of three years and eighteen months old. The other child of Jeff and Amy, named Phil is 26 years old and is still single. Jeff earns a decent sum of  £ 24,000 per annum for last five years. The standard of living of the couple is much simpler and only major indulgence of the aged pair is that they smoke around 20 cigarettes per day. Jeff had been trying his luck by purchasing lottery tickets for last ten years or so but without any fruit. But at last luck supported the man and he has owned a considerable amount of  £ 750,000. The cheque has just reached him and he wants to have proper financial planning for future with the sum he has received as the winner of the lottery. Jeff hopes the amount that he has ownership in the lottery would be able to take care of his needs. The objectives of Jeff includes to receive a decent sum of pension during his period of retirement (approximately around  £ 25,000 per annum and that should also be inflation proof) and to make contributions towards the education of the children of their daughter. Also, the couple wanted to make some contribution towards their children.

Saturday, November 16, 2019

Specific Injury Treatment Ankle Sprain Health And Social Care Essay

Specific Injury Treatment Ankle Sprain Health And Social Care Essay An injury can be defined as a physical damage or harm on an animal or human being. It affects the structure or function of the body and is caused by force either chemically or physically. Injuries are classified according to their cause like traumatic injury, infection, toxin, metabolic; the location like wound, nerve injury, cell damage, brain injury; and the activity like sports injury, occupational injury. They cause deaths and many of those who survive them incur temporary or permanent disabilities. They can be prevented and if they happen, their consequences can be mitigated (Alan Melvin, 2002). Under the class of location, it can be found on an ankle with an example of sprained ankle. Ankle, being a complex supporting structure, if injured, it causes disability and absence from work. The ligaments in tibio-fibular joint in the foot enable to stabilize the forward motion. Basically, if they are damaged, their treatment will depend on how severe the injury is. This means that ankles are very useful in human body and there are many forms of treatment incase of damage but prevention is always the best. Their complications can cause arthritis, loose body formation and instability. In severe cases, that have to undergo surgery, 85% are successful and showed excellent results (Alan Melvin, 2002). Ankle sprain is very common in sports and normal activities like work. It is the damage of the soft tissues around the ankle especially ligaments which can be torn or partially torn. It is also known as rolled ankle, ankle sprain or ankle ligament injury. It happens when there are abnormal motions like sporting activities, stepping on uneven surfaces, from a jump, falling, running, etc. It can include effects such as pain, swelling, and inability to walk. It can be prevented by wearing good shoes, focusing on the way we walk and run and paying attention to both internal and external warnings (Icon Health Publications 2002). Ankle sprain can be classified in three grades depending on the force involved in causing it. In grade 1, it is a slight stretching which causes damage to the fibers and there is minimal swelling, joint stiffness, and mild pain which can be treated through isometric exercises and weight bearing. In grade 2, there is moderate tenderness, minor bruises, difficulty walking and possible instability which can be treated through therapy (physical). In grade 3, there is instability, ligament rapture, severe swelling and pain and can be treated through long physical therapy, surgery, reconstruction (Alan Melvin, 2002). It consists of inversion which occurs when there is too much inversion of the foot. It is rated to be 90% of all the sprains that happen and the most involved ligament is the anterior talofibular. Pain is more concentrated on the outside than inside of the ankle joint. The second type of sprain is eversion where the foot is twisted outwards hence the deltoid ligament is stretched too far. It causes pain inside the ankle. High ankle sprains an injury of ligaments like tibia and fibula. It occurs due to forced and sudden twisting of the foot (Icon Health Publications 2002). Ankle sprains are associated with sports like soccer, football, volleyball and sprint racing. They both do vigorous exercises involving the ankles and sometimes jumping like in volleyball and basketball. In soccer, there is a chance that at least a player must suffer an injury especially, ankle sprain. According to FIFA ratings (2005-2010), the risk rate is 10% in soccer for an ankle sprain. The rate is not verifiable due to victims in different games; sometimes, 3 players suffer in a game while in other games none suffers. Actually, determining the risk rate at which people suffer may be difficult due to intervals, the severity and there causes. Many players have undergone surgery and others have had to take rest due to the sprains. The conservative measure is most used as players get injured, treated in the field and either get substituted or resume their positions (Alan Melvin, 2002). Some of symptoms of this injury are pain caused by sensitivity of the nerves and severe tenderness. There is warmth caused by increased blood flow and little ability or difficulty in moving the injured leg. Severe bruising and swelling can also be experienced and can be diagnosed through physical exam and x-ray. Physical exam shows laxity of the joint while x-ray shows instability. It can be confused for an ankle fracture which is caused by the same mechanisms. Mostly, in children, growth plates are mistaken for sprains. Over time, ligaments that get damaged as a result of injury heal. This can only be possible to the minor injuries hence whenever there are cases of serious injuries; you should consult the doctor for diagnosis. He/she is to tell on the mode of treatment depending on the examination. Use of physical examination may be painful due to different twists in order to know the state of the ankle. A magnetic resonance imaging can be done to determine the severity of ligament injury, bone chip, fracture, joint surface injury or any other problem. It gives a correct diagnosis and can be done immediately at the point of injury or after swelling and bruising resolves (Icon Health Publications 2002). The recovery is through treatment which aims at minimizing swelling, pain and inflammation while enabling recovery. Use of nonsurgical methods or conservative measures is advisable. If the injury was a grade 1, use of PRICE (takes between 48- 72 hours) is applicable which means Protect, Rest, Ice, Compression and Elevation. Protection is from any more danger or further injury. Rest means not involving the injured ankle in strenuous activities hence one can use crutches incase of making any movement. The recommended rest is between 48-72 hours. Ice, although it can damage the skin if applied for long, helps in decreasing the blood flow to the damaged ligament. It is applied immediately or soonest possible after an injury for 20-30 minutes. It should be wrapped in a plastic bag, before pressing it on the skin else it will cause ice-burn and should not be left on while asleep. The time should not be less than 10 minutes because it will have no effect and not more than 30 minutes because it will damage the skin. Compression is with a bandage to limit swelling and should not be too tight to stop flow of blood. It should not be left on during sleep and should be removed as advised to allow free movement of the joint. Elevation is placing the injured leg at a strategic position, e.g. on cushions while lying on a sofa or on pillow while sleeping on bed to limit and reduce swelling and help recovery (Alan Melvin, 2002). It is also advisable to avoid HARM (takes 72 hours), meaning Heat, Alcohol, Running and Massage. Heat speeds blood flow hence should be avoided as long as there is inflammation after which, it can be used for soothing. Alcohol decreases healing and cause increased bleeding. Running can cause more harm to the injury while massage may increase bleeding. Gentle massage after 72 hours is recommended while running is only advisable after full recovery to strengthen the joint (Icon Health Publications 2002). Doctors also advise on constant gentle movement of the joint by doing exercises every day which help it to regain its normal functions and prevent stiffness. Secondly, physiotherapy helps to improve proprioception which is the ability if the brain in connection to movement and position. In our normal activities, the ankle should be supported with a rigid sort with to help in healing of the damaged ankle. Finally, doctors warn against getting involved in vigorous exercises but encourage on allowing movement of ankle to a certain degree. It gives support to the joint (Icon Health Publications 2002). All of the above can be done even without the help of a doctor but it is always advisable to see one incase the pain is so severe that it restricts movement, a ligament ruptured or on suspicion of a bone breakage. Also, if swelling and symptoms do not settle because in most cases, they take short time to ease and if there were severe bruises suffered. With assess of the doctor and use of x-ray, he /she can recommend the nonsurgical methods of treatment or surgical (Hammer, 2007). Mostly, medicine may not be needed if pain can be tolerated but sometimes, nonsteroidal anti- inflammatory drugs may be used to control inflammation and pain. Some of the pain killers include: Paracetamol and codeine, anti- inflammatory painkillers. Paracetamol is used to relieve pain but incase it does not help, codeine is used which is stronger and can cause drowsiness and constipation. Anti-inflammatory include aspirin and ibuprofen which relieve pain and limit inflammation. Others are rub on which are similar to the tablets. Anti-inflammatory are not very advisable because they have severe side effects especially to people with high blood pressure, kidney failure, heart attack and asthma. We need to consult our doctors or pharmacists before taking these medicines (Alan Melvin, 2002). There are arguments that some inflammation necessitates healing. This is the reason why many doctors do not recommend use of anti-inflammatory painkillers within the first 48 hours of injury, they delay healing. It may only be theoretical because no one has proven this point. Only arguments and contradictions arise hence research is needed to prove it. Rehabilitation helps to decrease swelling and pain and ensure that joint problems do not lead to chronic pain. To help pain and swelling, you can use ultrasound and electrical stimulation. It starts with simple exercises then extremity when and other exercises are added when you are pain free. It aims at improved balance thus proprioception training is important and increase in strength and range of motion. The recovery depends on three phases: Phase 1- resting reducing swelling. Phase2 à ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬ restoring strength, flexibility and range of motion. Phase 3- doing the less simple activities followed by vigorous and sudden activities. In time course, 1-4 weeks is based on stabilized walking, 4-8 weeks, immobilization of ankles, 8-12 weeks, embrace of high level activities and 12 weeks onward, performance without external mobilization (Lewin, 2008). Wearing of good costume for the purpose like boots during across country hike or when walking on uneven grounds or when rambling mountains would prevent or reduce ankle sprains. This is because they give support to the ankle as compared to other shoes. By visiting a physiotherapist, he/she can advise on the exercises to do so as to build muscles in order to prevent sprains. If it involved surgery, it should be resistant to nonsurgical. Surgical options include arthroscopy where the surgeon tries to figure whether there is any loose cartilage, ligament caught in the joint. The second option is reconstruction where the surgeon by use of stitches and other ligaments to repair the torn ones (Alan Melvin, 2002). Care should be taken on the way we treat or attend to an ankle sprain. This is because even a minor injury can turn chronic if not well dealt with. Most of the treatments of this injury are just conservative than medicinal. We should always seek doctorà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s diagnosis before taking painkillers. We can suffer injuries anytime any place thus we should always try and prevent it if possible and if it happens, we seek for the right recovery and rehabilitation.

Wednesday, November 13, 2019

Acid Rain :: Free Essay Writer

The Damaging Effects of Acid Rain Modern society is becoming overwhelmed with great amounts of pollution from cars, factories and an overabundance of garbage. The immense amounts of sulphur dioxide emitted into the air causes high levels of acid in the atmosphere. When this sulphuric acid is absorbed into moisture in the air, poignant rainfalls can be damaging to the external environment. Acid rain is destroying the world=s lakes, air and ecosystem. Acid rain is killing lakes and decreasing the number of inhabitants in these fresh water bodies. Acid rain causes an ample deduction in the pH levels in the water. At a neutral level the pH in water should be close to seven, yet in these acidic water bodies the pH levels can be as low as four. These pH levels of four contain more than ten percent acids than that of normal rain and one thousand times more acid than neutral water. Each decade the pH levels of lakes around Ontario have become ten times more acidic. The high acid levels cont ained in lakes also causes a decrease in the number of fish dwelling in these lakes. Also Aacid produces chemical changes in the blood of the fish, and their basic body metabolism is altered@ (Howard & Perley, 1980, p. 24), and can cause deformities in these inhabitants. They have twisted and arched backbones, flattened heads and strangely curved tails. In pH levels of four there is little left in the lakes besides rock bass, pumpkinseed and lake herring. Affected fish are also in danger of becoming sterile, which would put the species at risk of becoming extinct. As with sulphur dioxide in rain, mercury is also discharged into the water. There is a direct connection between the mercury rich lakes as there is with those with high acidic levels. This metal becomes concentrated in the blood and tissues of fish. Acid rain causes traumatic effects in natural lakes and rivers. Acid rain causes air quality to deteriorate. As in water, acid rain causes the pH levels in the air to decrease. The sulphur dioxide, which diffuses into the air, mixes with moisture causing the pH levels to drop from the normal level. Again, the normal level is somewhere around seven, yet in some acidic air masses the levels can be as low as three. These lowered pH levels form a photochemical smog in the atmosphere.

Monday, November 11, 2019

Evaluation of story board “Unrelated incidents” Essay

My video is intended to portray unrelated incidents in a way which my gcse audience would understand it is also designed to increase the dramatic impact of the poem and there for increase the pupils understanding of the poem. i started the video with the image of big Ben at six o’clock, this is the image used to start the BBC news so I felt that it was an appropriate image to start this poem as it is about the news and how its read. The reason I choose a man with a posh Standard English voice to do the narration for this section is that this is stereotypically the kind of voice used to introduce the BBC news. Also the image and the voice create a image of typical English news which would increase the impact of the next section on the audience. The introduction of the Glaswegian man is the most effective and best way of presenting the poem as written to an audience through a video. The image of the man standing in a field with mountains and a lake in the background, rolling a cigarette is a dramatic contrast to the image from the first section of typical ‘Englishness’. The man is meant to represent the average everyday man from Glasgow, as the poem appears to be a look at that person’s perspective on the news, and the English attitude towards him. The sky would be moving with the storm clouds gathering to show the mans anger at the way his treating gathering and increasing. This section is meant to show the mans disgust at the attitude of the ‘scruff’ towards him because of his accent so he would be being sarcastic with these comments. The sky moving would again show the mans anger rising. The image in this section contrast sharply with the next image this should semi-shock the audience increasing the impact. Through out the video I am trying to create a feeling of contrast this is to show how sharply the image of the Glaswegian contrasts with the image of the man with the BBC accent. This scene is showing how the man is different and is rebelling against the constraints of society (a image which members of my teenage audience would agree with there for increasing the impact.) The people in the suits represent the ‘BBC accent’ and the mans clear dislike of them and opposition to them(shown by his violent walk against the flow.) The people in the suits are also meant to be shown as the ‘scruff’ which the man despises. The way the ‘scruff’s’ ignore the man shows how they don’t think he’s important enough to worry about. This leads on to the next scene. This is designed to show how the truth is ignored if its spoken by the Glaswegian despite people knowing its true, the man in the suits attitude is showing again how the Glaswegian is ignored because of the way he looks and speaks. The man in the suit shows how society doesn’t care about the man because he’s not part of the ‘scruff’. The man is narrating with the clip of Trevor Mcdonald talking to demonstrate one of the ‘scruffs’ talking. This image also brings the subject of the video back to the news which is of course the basis of the poem. This scene is then followed by a similar scene, which shows the image of the Glaswegian as one of the ‘scuffs’ talking. This section is shown in the newsroom to show how despite being different what the man says is the truth. This section of the poem is about how the man is one of the ‘scruffs’. The image of the television is used so that the violent action of the TV being smashed is shocking and contrasting. The reason I have put the man from the bench standing with the hammer and speaking with a strong accent is to put across the message that sometimes people are not what you expect them to be. Also this image is a clear ending with camera fading to black. The entire video is designed to portray the anger, bitterness and contempt the Glasswegian man has towards the â€Å"scruffs†. It is supposed to show this in a interesting and different way, I think that the dramatic changes in camera shot and scenery would help to keep the interest of the audience. The reason I have chose to include ‘Rage against the machine’ song â€Å"break stuff† is because the lyrics of this song as well as being well known are also very appropriate for this poem. Lyrics like â€Å"its just the rage built up in side of me, fist in the air in the land of hypocrisy† would help to portray the poems message also the song would help hold the audiences attention. The reason I chose not to include it during the last section is that it would distract slightly from the narrators words also the last section is very important if students are to understand the poems message. I did not feel the need to portray every image in the poem visually as I felt many were self explanatory using just aural techniques. Also I felt that it would increase the audiences interest if they had to actually search for the meaning and reasoning behind some of my scene choices.

Saturday, November 9, 2019

Alcohol and Drinking Age essays

Alcohol and Drinking Age essays In 1920 Prohibition was enacted. Prohibition was the United States eighteenth Amendment, banning the drinking, manufacture, or sale of intoxicating liquors (beverages containing .5% or more alcohol). Alcohol use declined sharply in the 1920s, but many people ignored the ban and produced alcohol illegally in their homes. In 1933, it was argued that the eighteenth Amendment was took away jobs and encouraged crime, thus Prohibition was repealed. Since 1933, alcohol consumption has increased dramatically. In the 1970s many states lowered the drinking age from twenty-one to eighteen. As youth alcohol consumption rose, so did related drunk driving accidents, suicide, and violence. Currently the legal drinking age in all fifty states is twenty-one. Some people argue that a person should have the right to decide for or against drinking and the government should not regulate alcohol consumption. Others think that if teens are allowed to drink, the novelty of beer or wine will wear o ff and there will be less binge drinkers. With 10.6 million teens consuming alcohol within the last year, the legal alcohol drinking age must remain at twenty-one to preserve the health and welfare of Americas youth. Alcohol has a very toxic effect on the human body. Alcohol targets and begins to destroy major organs. In drinkers it is not uncommon to find ulcers in the stomach and inflammation of the pancreas. Cirrhosis, or scar tissue in the liver, may occur after periods of excessive drinking. After an alcoholic stops drinking they may experience Delirium Tremens. This can result in hallucinations, blackouts, or extreme tremors. About 4.6 million Americans under the age of seventeen are problem drinkers. Meaning, they have been arrested, been in an accident, or have had health problems related to drinking. Teens are generally to young to judge safe amounts of alcohol to drink and can overdose on ...

Wednesday, November 6, 2019

The Monster in Eli Roths Hostel

The Monster in Eli Roths Hostel Free Online Research Papers He awoke in a dark, damp room that appeared to be a basement. Josh had not the slightest clue where he was. â€Å"Where the fuck am I?† he kept bellowing. Finally a man removed the burlap sack covering Josh’s face. â€Å"You, oh God, oh Shit!† Josh recognized the man from the train ride to Slovakia. Josh pleaded â€Å"Please, please, I didn’t do anything to you!† The man in the old-style executioner’s outfit was amused by his victim’s mental and emotional anguish. Josh pleaded with this dark figure to let him go. â€Å"I had always wanted to be a surgeon† the man said as he secured a scalpel. He then offered to open the door. Before untying his victim, the man used the scalpel to cut both of Josh’s Achilles’ tendons. The executioner was delighted to see Josh squirm to the door; leaving behind him two distinct trails of blood. What exactly had Josh done to deserve this? What crime had he committed? Josh was an American, and his executioner had the cash to pay for his life. In Eli Roth’s Hostel, a crime syndicate known as â€Å"Elite Hunting† operates out of a post-Soviet nation. The organization sponsors a very twisted form of slavery. Elite members may purchase human beings and kill them in any way they please. They just show up at an abandoned factory, pay for a victim, and have their way with the victim’s life. It’s not that simple though, as certain people cost more than others. For instance, a European victim costs less than say, a Japanese victim. Imports are a bit pricier than domestics. What is truly disturbing is that Americans cost the most. The demand to kill an American is higher than the demand to kill any other kind of person. While you can torture an Asian for $10,000, to do the same to an American costs $25,000. This is a clear symbol for the way in which Americans are viewed by the world. Take for instance a 2005 world survey conducted in 25 nations including the U.S. The survey showed that 75 percent of the respondents disapproved of how our leaders in Washington had dealt with Iraq. The majority of the 26,381 respondents also disapproved of the way five other foreign policy areas had been handled. This included the U.S. government’s dealing with Iran’s nuclear weapons program, global warming, and the military prison in Guantanamo Bay. This survey is a display of the current distaste for the U.S. and its government’s policy. In Jeffrey Jerome Cohen’s Monster Theory, Cohen describes the monster’s body as that of culture: â€Å"The monster is born only at this metaphoric crossroads, as an embodiment of a certain cultural moment-of time, a feeling a place† (Cohen 4). In other words, this monster, this intense dislike for the American people, traces it s origins to feelings of resentment and rage towards the U.S. government’s recent policies, especially that of the war in Iraq. Some may argue that the big-wig killers in Hostel pay more for Americans only because they are imported from overseas, but I contend that that the high price of Americans is due to the world’s view of the American people. In a survey found on people-press.org conducted in nine countries including France, Germany, and Turkey, all of these countries showed increasing belief in two years that the U.S. was over-reacting to terrorism. Another survey found on the same web site showed that most European nations disapprove of the United States using force in Iraq without United Nation’s approval. There is an apparent strong, unfavorable opinion of the United States. The monster in Hostel, then, is a cultural crisis. One must ask if the actions and decisions of the United States’ government have made the Americans appear as monsters to the European people. According to an article by Brian Eno on time.com, most Europeans regard Americans as stupid, arrogant, and ignorant. Eno says of the American people, â€Å"I could fill this page with names of Americans who have influenced, entertained, and educated me. They represent what I admire about America: a vigorous originality of thought, and a confidence that things can be changed for the better. That was the America that I lived in and enjoyed from 1978 to 1983.† Eno continued in his article, â€Å"That America was an act of faith- the faith that (otherness) was not threatening but nourishing, the faith that there could be a country big enough in spirit to welcome and nurture all the diversity the world could throw at it.† Eno believes the U.S. has taken a downhill course since S eptember 11: â€Å"But since Sept. 11, that vision has been eclipsed by a suspicious, introverted America†¦. The gated community†¦. Designed to keep the (others) out, it dissolves the rich web of society into a random clustering of disconnected individuals. It turns paranoia and isolation into a lifestyle.† It is difficult to put aside Eno’s arguments for the way other first-world nations look at us. After establishing itself as a world power after WWII, the U.S. became more and more comfortable with using military force. Vietnam and the Gulf War are two examples of our government using military force willy-nilly. Our current struggle is arguably unjustified and makes our government look foolish. You see the paranoia of our people at airports. How many times have you felt nervous when sitting next to an Arabic person on an airplane? Brian Eno makes vital points in regards to where the distaste for America comes from. However, we must ask if the U.S. and American people deserve being the target of this European loathing. In Hostel, for example, there is a scene when the two American characters are in a club in Amsterdam. They get into a fight with a Swedish man and are escorted out of the club by a bouncer. The mammoth Dane mutters something in the manner of â€Å"fucking Americans† as he throws them to the street. It is far too common for Americans traveling abroad to face such harassment. In many instances, though, it is brought upon by us. Americans, such as the two from the film, often act cocky and arrogant and forget to respect the place where they are at. The monster in Hostel is the intense hatred and disgust the U.S. receives from the rest of the civilized world. In Roth’s film we see this hideous and horrendous monster grow into acts of evil that even the S.S. of Nazi Germany would frown upon. You see this monster in the eyes of the torturers’ faces as they take great care not to kill their over-priced, American, animal bitches too quickly. It clearly costs more for an American because the killers get more satisfaction from it. Hostel’s monster is a cultural one. It was given life via the way in which the U.S. makes decisions and the actions of our government. The reaction by the rest of the world has to be a monstrous one. The United States is a world power and has been since World War II. Because of this and our advances in military technology, Americans are afforded the luxury of being weak and soft. We don’t have to watch the news at night. We don’t have to worry about coming under attack. We were proven wrong on Sept. 11, but our government reacted in the wrong way. Our president even used the attack as an excuse to mobilize forces into Iraq. These actions were all blunders and the world recognizes that. Our false senses of security and superiority have caused us to become rude, arrogant, and ignorant. This has become such a problem that our allies are starting to turn against us. We lacked support from both France and Germany when entering Iraq. The U.S. felt that it didn’t need U.N. approval to liberate Iraq. These actions created Hostel’s monster. In a sense, we are the mothers and fathers of this monster. 18 February 2007. news.bbc.co.uk/2/hi/americas/6286755.htm 19 February 2007. http://people-press.org/reports/display.php3?ReportID=206 Eno, Brian. â€Å"The U.S. Needs to Open Up to the World† 12 Jan. 2003 time.com/time/magazine/article/0,9171,407288,00.html Cohen, Jeffrey Jerome. â€Å"Monster Culture.† Monster Theory. Cohen, Jeffrey Jerome. Minneapolis: University of Minnesota Press, 1996. 3-6. Hostel. Dir. Eli Roth. Perf. Jay Hernandez, Derek Richardson, Rich Hoffman. Lion’s Gate Films, 2006. Research Papers on The Monster in Eli Roth’s HostelCapital PunishmentThe Effects of Illegal Immigration19 Century Society: A Deeply Divided EraArguments for Physician-Assisted Suicide (PAS)Influences of Socio-Economic Status of Married MalesPETSTEL analysis of IndiaThe Relationship Between Delinquency and Drug UseThe Masque of the Red Death Room meaningsHip-Hop is ArtComparison: Letter from Birmingham and Crito

Monday, November 4, 2019

Bringing Home Global Rules Term Paper Example | Topics and Well Written Essays - 1750 words

Bringing Home Global Rules - Term Paper Example As fundamental human rights and freedoms are inherent in all humankind and find expression in constitutions and legal systems throughout the world and in the international human rights instruments (Kirby, 2005), invoking international human rights law in domestic courts, therefore, merits special consideration. As Kirby write, "In most countries whose legal systems are based upon the common law, international conventions are not directly enforceable in national courts unless their provisions have been incorporated by legislation into domestic law. However, there is a growing tendency for national courts to have regard to these international norms for the purpose of deciding cases where the domestic law - whether constitutional, statute or common law - is uncertain or incomplete. While it is desirable for the norms contained in the international human rights instruments to be still more widely recognized and applied by national courts, this process must take fully into account local l aws, traditions, circumstances, and needs." There are many impediments for direct application of international human rights law, factors like state sovereignty, the dualist view on the relationship between international law and municipal law and implementing legislation. However, there has been an interesting development where jurist and human right activists are identifying themselves with a unified international community (Barak-Erez, 2004). This trans-judicial communication is seen not only in the application of international norms but also in the recourse to comparative law, particularly in the area of constitutional law.  When a treaty is ratified, although it becomes binding on Australia in international law, it does not become part of the law of Australia unless it has been given the force of law by statute (Gibbs). Except in the case of a treaty of peace, which obviously can affect the rights of enemy aliens, a treaty not incorporated by statute does not affect the rights or liabilities of Australian citizens. Although the principle has been consistently stated by courts of the highest authority, it is subject to some important qualifications. One of them was introduced by the decision of the High Court in Minister for Immigration and Ethnic Affairs v. Teoh. Ah, Hin Teoh was a Malaysian citizen living in Australia under a temporary entry permit. He was convicted of drug offenses and sentenced to six years imprisonment. His permanent entry permit was refused and it was ordered that he be deported. However, the fact that his children lived in Australia gave the case an interesting twist. The Court (McHugh J dissenting), considering the ratification of the UN Convention on the Rights of the Child, declared it the best interests of the children would be a primary consideration. Teoh's Case has been an example for many Federal Court deportation cases. Incidentally, it is the sole example of the pervasive effects of international law on national law. The A ustralian Constitution neither mentions international law nor the role such norms should play in the interpretive process (Williams and Hovell, 2005). While earlier drafts of the Constitution incorporated greater reference to the relationship between international treaties and the domestic legal system, these were removed from the version that was enacted.  

Saturday, November 2, 2019

Understanding the bible Essay Example | Topics and Well Written Essays - 1000 words

Understanding the bible - Essay Example The books of Kings were originally written by many people from the oral as well as the written traditions. In the written tradition, we should also include the palace annals including the Book of the Acts of Solomon, the Book of the Annals of the Kings of Israel. An extended narrative called the Succession Narrative about David’s reign might have contributed heavily towards the first two chapter of the beginning of the book. The story of Elijah, as well as that of his disciple Elisha, was originally oral. The book must have taken its form mainly during the eighth century BC and late seventh century BC. The book of Kings may be considered to be a part of the Deuteronomical history, including books of Joshua, Judges and Samuel. This is because the style of writing followed in the book is mainly as that of Deuteronomy. The book of kings is narrative, historiographical and didactical in nature. It tells the story, not the complete history and also tries to teach us its version of the Truth. The story gives importance on how and when such and such a monarch ruled, how he failed or succeeded in following the path of Israel [and Judah] as the chosen people of God, how they fought and won or faced defeat . The didacticism lies in reiterating that The Lord God of Israel is the only God and he controlled the weather, the whole of creation and history. The prophets describe the future before God brings it about. It is He and not the kings, or prophets or even the gods that the kings worship who is in control. This is the main theme of the two books of Kings (Coogan, Brettler, Newsom, & Pheme, 2007.). Another repeating theme in the book is that the wrongdoer is always punished. The image of God here is that of a judge and crimes are always punished. Even though the judgment may get held up but in time, without repentance it gradually comes upon the sinner [I kings 21. 25-28.] The books of Kings come right after the books of

Thursday, October 31, 2019

Free to explore topics and thesis of your choice, but paper has to Research

Free to explore topics and thesis of your choice, but has to have very strong thesis - Research Paper Example To aid in this analysis, focus will be drawn on three films that have undertones of criticism of this particular educational system. These series are collectively known as the Yeogo Goedam I,II and III. Whispering Corridors is a series containing five movies that was first released on the 30th of May, in the year 1998. Being horror by genre, it came at a time when horror was not exactly popular and the teen films had dwindled to non-existence. The cast consisted of new actresses and actors save for a single who actor who played the part of a teacher. Whispering Corridors took a different turn from the conventions of serried films. This is because all of the each of the series is independent from the previous ones and the characters are new in all of them. The common thing between them all is that they are all horror and they are all casted in an all-girls boarding school. Despite the fact that it came as a far cry from the popular genres at the time, the audience’s response to it especially the teenage response, was very great. It was not released during the summer vacation as per the norms of teen movies, the reaction then had something to do with the context of the film. It did well in the box office having reached 2.5 million admissions. This success came after the producer, OH Ki-Min, had been turned down by over en production companies who did not see the place of horror in the Korean Film industry. It was finally accepted by Cine 2000 and Cinema Services who went against the odds of the industry and produced what turned out to be a benchmark for subsequent horror films in Korea. Notable though is the film’s lack of extreme emphasis on horror itself much as it is presented as a horror movie. What they do is employ the horror undertones as a channel of conveying various issues that affect the Korean society. This paper will focus on the first three of the series, that is, Whispering Corridors 1 (Yogo Kwedam I), Memento Mori (Yogo Kwedam II) an d Whispering Stairs (Yogo Kwedam II). Whispering Corridors 1, also known as Yeogo Goedam, touches on important social and cultural issues in its storyline, especially issues that border the unique South Korean educational system. The fact that it depicted the educational system in negative light made the film be subjected to rigorous censorship. After the ban on the censorship it was released for public viewing. It of course caused a stir upon its release but at the end of the day the message that was intended had been put across. The plot of the movie focuses on three platonic relationships between the girls who have some affiliation with the school, Jookran High School For Girls. The first friendship ties are between Hur and Jin-Ju. The second bunch of friends is Ji-Oh and Jae-Yi. The other one is between So-Young and Jung-Sook. So-Young and Jung-Sook, however, have such a strained relationship that they are not in speaking terms with each other. The movie opens with a female teac her at the school, Park, is talking on phone with another teacher about a discovery she has made on a former student of the school, Jin-Ju. Mrs Park has been nicknamed Old Fox due to her unkind treatment of the students who attended the school. She says that Jin-Ju, apparently dead, is back. She however gets killed before she gives a full statement of her discovery. Her body is discovered by three students, Jae-Yi, Jung-Sook and Ji-Oh, the following day. The administration

Tuesday, October 29, 2019

Explain the Impact of the Stanford Prison Experiment on Psychology and Behaviour Essay Example for Free

Explain the Impact of the Stanford Prison Experiment on Psychology and Behaviour Essay The Stanford prison experiment ,led by professor Philip Zimbardo, was aimed at seeing the effect on people on becoming prisoners or prison guards. The idea was to see what happens to people when they are put in relatively ‘evil’ places. Do the people themselves become evil or is there no net effect? The results indicated that in fact people adapt to their role exceptionally well. It was observed that the prison guards became overly tyrannical to the level of sadism. In consequence the prisoners were seen to be under severe stress to the extent that they became crazy or depressed. 24 volunteers were selected that had no psychological problems, health issues or any past crime accounts. They were brought to a mock prison set up in the basement of the Stanford university’s psychology building where they were randomly assigned to be prisoners or guards. 3 prisoners each were given rooms that they had to live in for 24 hours of the day and the guards were given 8 hour shifts to work in. The study was observed upon using cameras and microphones. They study was supposed to last for 14 days but had to be halted after 6 days due to extreme unethical practices in the prison. The Stanford prison experiment showed us that human beings alter to the situation they are put in. The guards won total control over the prisoners who blindly followed orders. All of this in just 5 days of experimental conditions. Zimbardo said that the prisoners had internalised their roles and thus continued to participate in the experiment on their own will. One example of this is when they introduced themselves to the priest with their serial number rather than their real name. Another example would be of the prison consultant who took on the role of an autocratic head of the parole board. After the experiment was over he was said to be disgusted at the person he had become. In essence there were two groups created among the volunteers, therefore, according to social identity theory ,people in the in-group would exhibit in-group favouritism and a sense of discrimination of the out-group. This can explain the unanimity between the guards themselves and their certain dislike towards the inmates. To further build on this ,the idea of the prison guards being a group may evoke the feeling of anonymity, which would allow the guards to be more free and aggressive as they could shake off responsibility for their actions. This is called deindividuation theory. It may be a cause of the violence occurred on the prisoners by the guards as there is a diffusion of responsibility. The Self-fulfilling prophecy states that when a person is given a label we often live up to that expectation. In the same way ,as the volunteers were given labels, they tried to live up to that expectation and thus acted in the way they thought they should. Furthermore it can be said that the volunteers had set stereotypes on the idea of a prison guard and prisoner. It can be assumed that these stereotypes illustrated the prison guards to be strong and authoritative. It could also be an illusionary correlation made by them through watching films or through media (which means that they attribute the behaviour of the prison guards to their disposition rather than situation :FAE). The theory of cognitive dissonance can also be used to understand why the prisoners and guards acted this way. They had to alter their mind-set(attitudes) to match with their behaviours so that there was no tension in their self identity. The situation put the prisoners in certain set roles that they tried to live up to and thus they changed their behaviour. This experiment along with Milligram’s shock experiment demonstrates the fundamental attribution error which says that there is a overestimation of dispositional factors and under-estimation of situational factors when we attribute. It changed the way we looked at psychology in a socio-cultural aspect. This experiment has helped us understand how good people do bad things such as the torture of Iraqi prisoners in the Abu Gharib prison, which was a real life example of the same results obtained by Zimabardo. It was also used to investigate matters such as prison riots and abuse of juveniles in many prisons. Young adults are also known to be power hungry. Their lust for power might have changed the way they would have normally behaved. The prisoners were made powerless and thus started to behave in such a way. They became depressed ,helpless and unstable. Thus it can be said that power also affected their behaviour. In relation to gender I believe that there would not have been much difference in the experiment as people, male or female, tend to have similar schematic processing when it comes to social perceptions of a certain group or individuals. If conducted with only females it is more likely that there would have been lesser violence as it has been researched that testosterone, which is much more predominating in males, is a cause of sexual arousal and aggression. Culture would not affect the behaviour as everybody needs some power in their life and if power is stolen from us we tend to become unstable. Lastly, it can be argued that all the volunteers of the experiment were college students. These students are more likely to be aggressive, as they would have higher testosterone levels compared to older guards in regular prisons. The volunteers were mostly white males who were on average ,financially stable, which when compared to regular prisoners would not equate well as people in prisons are usually financially unstable. It goes without saying that this experiment was extremely unethical. It did harmed the volunteers both physically and mentally as they were put under severe stress as well as physical torture. Their consent forms were not complete as it id not involve the details of the experiment. The volunteers did not know what they were getting themselves into , for example strip searched which is a violation itself. They were also ,without prior knowledge ,arrested. Zimbardo himself became the super-intendant and did not abide by his role as a psychologist ,which should have been the case to have an unbiased study. The experiment had no controls and thus is therefore severely criticised. Therefore the validity and ethics of this experiment, relating to its method are questioned. In conclusion, the experiment was a path breaking exercise that opened our eyes to show us the vulnerability of our race in terms of conformity and how we adapt to our situations especially when it comes to the fight for power.