Monday, September 30, 2019

Modernization in Filipino Women Essay

For centuries, Filipino women have thought themselves of being dominated by men. From the Spanish era to the American colonization, they were brought up to believe that men are leaders in society and that they are subordinate to them [men]. This therefore affects their views on femininity. It has been said in Johanna Francisco’s Essence of a Filipino Woman that women in the Philippines are luckier among women of other countries in Asia. This has been so because men in Philippine society appreciate and honor them. In fact, it is being shown on how they [women] are permitted to educate themselves, work, and possess belongings which are prohibited [or not normal] in other Asian countries. But above all, it is primarily because of their character or â€Å"role† as a [loving] mother. How would one know what a Filipina is? Well, a Filipino woman is described as shy, reserved, prim, and discreet. She is cautious, bashful, charming, and meek. She could either be â€Å"Mestiza†, â€Å"Chinita†, or â€Å"Morena†. She is a lover, and, at times of trouble, a fighter. She, by nature, possesses a strong faith. She may not admit her being religious, but deep inside, she trusts in God’s loving power. It is being seen on how she always puts herself in the care of the Lord and prays for everybody she loves. She thinks of other people first before herself. She plays different roles in the society. According to Francisco, â€Å"she is a considerate daughter, a loyal friend, and a supportive and loving wife?. She is the driving force in the family, in a marriage, or in a relationship?. But for the most part, she is dignified†. Francisco also describes her as being humorous. She laughs a lot, making it one of her best asset. She is also an optimistic person who always finds â€Å"positive† things in â€Å"dire situations†. This paper talks about how Filipino women morality has been changed or influenced by modernization, therefore losing the real Filipina within. It tackles and touches on issues that are degrading to Filipino women. It has five major parts. The first would be the definition of morality and modernization, with an explanation of the connection between the two. Next is the evolution of Filipino women which starts from the very beginning of Philippine history. This would include mainly Filipino women of yesterday, and Filipino women of today. The third would be the beginning of modernization in the Philippines. This part discusses how modernization entered our country. The fourth would be Filipino women’s response to the fast growing modernization, and the last talks on the effects it [modernization] has given to Filipino women, specifically, their morality. The last pages of this paper would include a researched survey on what young adults of Silliman University of Dumaguete City, specifically from the College of Business Administration, thinks about modern Filipina morals as influenced by fast westernization of the Philippines. Modernization in the Philippines The Philippines has not been considered different from other countries. Like the countries in Africa and Asia (particularly southeast Asia), it has gone through experiences that deeply influenced Filipino customs and beliefs. It all began from the Spanish colonization to the American era to the commonwealth years and to the decades of independence that the Philippines has slowly changed its people due to factors of modernity such education, mass media, technological advancement, and the like. These changes are seen most commonly in the urban areas such as the cities and larger towns. It is in these areas where westernization is concentrated brought about by television, radio, and news papers. The impact of modernization in the Philippines has been â€Å"persuasive† since the first ever colonizer stepped into its lands. The Philippines’ attempt to compete in the highly modernized world can greatly affect the attitude of women today. However, according to a Filipino psychologist, the Filipinos have this â€Å"split-level personality. † This personality explains that some values of a Filipino remain the same even though some of his or her outlooks and aspects have been modernized. But this greatly depends on how well a person weigh things over. If he/she prefers modernization more than tradition, the â€Å"split-level personality† thing dissolves. This has been evidenced by Filipino women’s responses to modernization.

Sunday, September 29, 2019

Diffusion of Buddhism and Hinduism

The changes in the diffusion of Buddhism and Hinduism through 600 CE greatly impacted these religions such as the popularity of the religions in India and where the religions was being diffused; however, a few continuities existed such as they both originated in India. Since Hinduism reinforces the caste system and Buddhism believe in equal treatment of all people which opposes the caste system, Buddhism started to spread into other areas other than India to offer an alternative to Hinduism for those in a lower caste.As Buddhism started to diffuse into other regions, the popularity of Buddhism in India started to decline because Hinduism gradually displaced them and became the more popular religion in India. Hinduism beliefs still continue to influence Indian society today. This changed more likely occurred because Buddhism would not have been as compatible with Indian culture in India as Hinduism has a more stronger tie to Indian culture like the reinforced caste system.The spread o f Buddhism through 600 CE was diffused among other countries. Buddhism started out in India and rapidly grew throughout the world eventually traveling along the Silk Road and spreading to areas like China, Korea, and Japan. While Buddhism was spreading in other countries, Hinduism tended to stay mostly in India. Read also  Arya Samaj at  https://essaysamurai.co.uk/arya-samaj/Because Hinduism was more complex, it made Buddhism more easier to comprehend and understand because they accepted everyone equally while Hinduism weren't accepting of people not born into the caste system. This change more likely occurred because Buddhism and Hinduism have slightly different views on the equality of people which benefited Buddhism to diffuse their religion in other areas besides India.

Saturday, September 28, 2019

Motor therapy for children with cerebral palsy (Neurodevelopmental Research Paper

Motor therapy for children with cerebral palsy (Neurodevelopmental Therapy, Hippotheray , Aquatic Therapy) - Research Paper Example There is enormous evidence about the benefits of motor therapy in the management of children with cerebral palsy (Batshaw, 2007). In this research article, the role of motor therapy in cerebral palsy will be discussed through review of suitable literature. Physical therapy plays a main role in managing cerebral palsy and the focus of physical therapy is movement, function and optimal use of the potential of the child. Physical therapies which have found to be effective in cerebral palsy are neurodevelopmental therapy, conductive education, strength training, postural control, constrained-induced movement therapy, hydrotherapy, passive stretching, orthotic devices and hippotherapy. Through these treatments, promotion, maintenance and restoration of the psychological, physical and social-well being of the child is achieved. Which form of motor treatment is effective is difficult to ascertain owing to lack of high-quality research. The goal of management in individuals with cerebral pal sy is not to achieve normalcy or not to cure but to increase the functionality of the patient, improve the capabilities of the patient and sustain health of the child in terms of cognitive development, locomotion, social interaction and independence. Early intensive management yields best results. The most common treatment strategy is neurodevelopmental treatment or NBT like the Bobath method (Batshaw, 2007). In this treatment, specific handling techniques are employed to control muscle tone, abnormal patterns of movement, control of posture, perception, sensation and memory. However, there is not much evidence to ascertain the role of NBT in changing abnormal motoric responses, prevention of contractures and facilitation of functional motor activities. In the Bobath method, after precise determination of the motor tasks of the child and after establishing the goals of NDT by the therapist, a structured program will be set for the child. The program consists of stretching of the leg s, followed by techniques to decrease spasticity inorder to facilitate normal patterns of movements. Functional motor activities involved in the program are sitting, walking and standing up from sitting. The motor functions are practiced in a random order in several environments through augmented feedback that matches various stages of the learner (Bar-Haim et al, 2010). The goals of NDT are to normalize the tone and improve the control of movement during various functional activities. Recently, another method of therapy, known as the constraint-induced therapy has been introduced which involves the more functional arm or hand to force use of the less functional upper extremity. (Batshaw et al, 2007). In the study by Antilla et al (2008), the researchers assessed the effectiveness of various forms of physical therapy interventions on various aspects of functioning in children with cerebral palsy. The study was a systematic review which reviewed 22 trials of which four were high meth odological quality studies. Based on these studies, the authors opined that there was moderate evidence to ascertain effectiveness in upper extremity training. Retarekar et al (2009) evaluated the benefits of aquatic aerobic exercise for cerebral palsy. the intervention was administered 3 times a week

Friday, September 27, 2019

Evaluation Of Personality Type Assignment Example | Topics and Well Written Essays - 750 words

Evaluation Of Personality Type - Assignment Example With regards to my Type A/B personality assessment, my score of 132 makes me a type A+ personality type, which makes me highly ambitious, sensitive, status-conscious, organized, impatient, proactive, anxious, and time conscious. This can be deduced from my scores that show that I am never late, very competitive, fast, tend to sit on my feelings, and have few interests away from my task. On my procrastination assessment, my score of 25 shows that I am an occasional procrastinator as some situations at one point or the other trigger procrastination. Some of the reasons for occasional procrastination include occasional emotional preoccupation that may make me lose my drive and not want to take on any more physical or mental load. However, this procrastination does not last long and disappears as soon as the triggering events dissipate. Considering my Enneagram scores, I am a type 7, which makes me spontaneous, scattered, acquisitive, and versatile. This gives me the tendency to occupy m yself with exciting options and possibilities that give me anticipation and distract me from my fears. Finally, I am an afternoon person, which means that I prefer to be out and about when other people are, and I do not function optimally during late nights or early mornings.Working with OthersWhen working in a group, my Type A+ personality type makes me want my teammates to get to the point quickly, while I would also be very concerned with time management and expect my teammates to be as high-achieving as possible.

Thursday, September 26, 2019

Does society still marginalize women to the point that they are seen Essay

Does society still marginalize women to the point that they are seen as mere housewives - Essay Example As seen in the research conducted by Brady, it is arguable that the society has continually demeaned the woman in various ways (1-2). In the work, Brady explains how men are chauvinistic and prejudiced in their approach to women. This results from the man’s efforts to make sure that the woman is made a wife by giving her all the responsibilities within the home, as well as fulfill the needs of the man. It is astonishing how the woman is expected to work, and send her husband to school and still take care of the children while the husband is in school (Brady 1-2). In this case one can easily tell that the life of the woman revolves around caring for the man and all his needs as opposed to her own needs. The men aim at to improving their education statuses which will ultimately see to their economic empowerment as the women stay at home. This aspect is indeed discriminatory and continues to contain the woman within the household acting as a housewife. Similarly, the same sentiments are shared by the film, Damsel in Distress part 1, that gives the impression that women are extremely passive and cannot do anything on their own. The film continues to explain how women always wait for their male counterparts to rescue them in different contexts (Damsel in Distress part 1). Does this mean that the women cannot outdo their male counterparts? Is the notion of the woman being passive valid? These thoughts add to Brady’s thoughts that the society is continually working towards making the women mere housewives. Correspondingly, the work of Kathleen Deveny validates the thesis that the society continually treats women as mere housewives. In her work, Deveny explains how the women are expected to behave in the society using a real example of the soccer game (24). The game has been described as one that should not be linked with women in any way. Women who are

Wednesday, September 25, 2019

Nursing informatics Applying standardized Terminologies in Practice Essay

Nursing informatics Applying standardized Terminologies in Practice - Essay Example First, standardized terminologies allow for improved communication amongst nurses and other healthcare professionals (McGonigle and Mastroianni, 2014). Second, there is more transparency of nursing intercessions when using standardized terminologies. Third, patient care gets better with standardized terminologies, and data gathering methods improve to assess nursing care results. Fifth, nurses stick more to caregiving standards while fostering the evaluation of nursing proficiency. Lastly, standardized terminologies promote the nursing study itinerary by producing information concerning patient care on a regular basis (Cashin, 2010). Applying standardized terminologies in psychiatric nursing helps in distinguishing nurse’s inputs in patient care from those made by medicine practitioners. As the advancement of EHR systems and the NHIN (Nationwide Health Information Network) grow increasingly fast, the challenge of distinguishing Geriatric, Correctional and Psychiatric nursing from pediatrics and psychology become even more crucial (Cashin, 2010). A second challenge that standardized terminologies can help overcome is integrating definitions of nursing practice into the health archive in a way that is proportionate to its significance to patients’ wellbeing. I am currently partaking in a Family Nurse Practitioner program, which makes it my role to know nurses’ contributions to patient treatment and recovery. This knowledge is as pivotal as finding a method to integrate aspects of nursing practice to EHR systems (McGonigle and Mastroianni, 2014). The acknowledged standardized terminologies applied in Geriatric and Psychiatric nursing entail seven interface and three multidisciplinary terms. First, CCC (Clinical Care Classification) is a study-oriented, experientially built term that entails nursing analyses, intercessions, and findings (Cashin, 2010). Second, Omaha System is a framework that offers a compute-attuned

Tuesday, September 24, 2019

U3 Case Study Coursework Example | Topics and Well Written Essays - 250 words - 1

U3 Case Study - Coursework Example The connection is established if the certificate is valid; otherwise, the connection shuts down. The client then sends HTTPS request to the server. In the next step, the client sends SSTP control packets that are within the HTTPS session. The process establishes SSTP state machine for control purposes on both sides, which then initiate PPP layer communication (Minasi, 2010). At both the ends, PPP negotiation takes place by use of SSTP over HTTPS. The client then needs to authenticate the server. The session then binds to IP interface, which is both sides and assigned for a traffic routing. Breakaway Brothers can reach remote users by using two options. First, they can use a high-speed broadband connection by the use of either DSL or a cable modem. Alternatively, they can use an analog phone line and then connect it to an ISDN or a modem. Either way, the system will enable Breakaway Brothers to have a direct secure connection to the internet, and they can reach remote

Monday, September 23, 2019

Human Resource Management Essay Example | Topics and Well Written Essays - 2750 words - 10

Human Resource Management - Essay Example In this respect, the company has contracted Valmax consultancy to conduct training needs assessment and subsequent training for the employees of Coca-Cola Company. In addition, the Coca-Cola Company offers training and development courses for its associates through the Coca-Cola University (CCU) that engages the associates in e-learning and classroom learning. Although the Coca-Cola Company has done well in training its employees, it needs to focus on the personal component of the training program and offer equal training opportunities for its staff across the globe. The Coca-Cola Company is the global leader in beverage production, distribution, and sale, with presence in virtually all countries in the world. Presently, the company produces over 500 brands of soft drinks and other beverages with the main ones being Diet Coke, Fanta, Coca-Cola Zero, Sprite, and Dasani. The company boasts as the leader in the production and distribution of sparkling beverages, juice drinks, and ready-to-drink coffees. Owing to the popularity and huge market share of the Coca-Cola Company, it has a distribution system that covers more than 200 countries. In addition, The Company employs hundreds of thousands of employees at various levels. Since the Coca-Cola Company does close to 2 billion servings of beverages on a daily basis, it requires well-trained and motivated employees who will deliver good results even when the market experiences a slump. With over 700,000 employees worldwide, the Coca-Cola Company commands a huge workforce that requires prudent human re source management through constant training and development of employees (Kurtz & Boone 2011, pp. 281). In order to enhance the performance of the company and make it retain the competitive edge that it has, the Human Resource Department at the Coca-Cola Company extends education to all its associates at various levels. The development and educational programs that the company offers ensures the realization of full

Sunday, September 22, 2019

Alternative Forms of work Arragements Essay Example | Topics and Well Written Essays - 250 words

Alternative Forms of work Arragements - Essay Example This type of job is home based so I basically I will be working from home. Working from home or having an office at home has a lot of advantages. First, I do not have to beat the morning traffic in going to the office. That would save me a lot of time, effort, gasoline money and stress. I also do not have to dress up just to work. The energy and time I saved from commuting to work can instead be channeled to a productive job making my job output better. Also, I do not have to dress up before I could work again saving me time, money and energy. Above all, I can work right at the comfort of my own home where I am at my optimum best because I am very comfortable with my surrounding. There are few disadvantages to it however. First is technical support. As a Digital Specialist, there might be issues that I would encounter from customers that I am not aware of that they need answers from me. I will not have an immediate support from peers or superior because I am away from the office. Of course I can always ask for help through online facility but the response time may take a while. Also, working from home may jack up my electric bills because I will be paying for the electricity that I will be using while

Saturday, September 21, 2019

Video game speech Essay Example for Free

Video game speech Essay Murder, assault, theft and even rape. This is the type of degenerate criminal influences shown to YOUR children on a regular daily basis. Series of dangerous, virtual and physical violence our preserved society has tolerated for far too long, but I say NO MORE. NO MORE influenced violence being shown upon our youths. NO MORE increased crime rates in our society and most definitely NO MORE children being denied their protected safety rights because as parents and guardians we OWE them at least this. I am not here today to tell you what you should and should not be showing to your child. I know that I have no right in telling you this. However I am here today to remind you of what YOU have already acknowledged, what YOU have been too afraid to admit to. Something YOU have been hiding from your children for a far more devastating way than you think†¦ a progressing life of freedom that is not bound to immoral games that are far below the approved age limit. I know, personally, that raising a child in a society maintained by constant evolving technology is hard and it can be beyond tempting to engage your child in the latest video games and games consoles. Nevertheless, I want to tell what the impact of you succumbing to your temptations have done to your children and potentially the generations after. Did you know that 70% of young children aged between 6 – 10 years old that regularly play any type of video game are mentally and physically inflicted by video games which can create a chain reaction to an aggressive and violent behavior? It is within these aggravating behaviors that your child is becoming more and more dangerous in this reality as well as in the virtual world. They are given the impressions that their life is relatable to the video games they are playing and that they must react to their life issues with violence the way the characters within the video games would react. An example of what I am initially trying to explain is the Norway massacre of 2012. One man. One man, who had become so mentally inflicted by playing violent video games and brutal games consoles since the young age of 9, had brutally massacred 77 people on the isolated island of Utoya, Norway. He became so mentally inflicted and attached to violent video games that he stated â€Å"I had trained and prepared by playing ‘call of duty’ for an average of 6 hours and 50 minutes every day to get ready for this day†. Imagine is this was your child doing these disgusting, ruthless and vicious actions. Many of you may not see the outstanding effect and impact of video games on your child right at this moment, but you WILL see the impact on your child in the nearby future and I can guarantee you will not like it. I know it is a terrible thought to think of your child acting as that man once did, but it is a potential circumstance. Video games are one of the key links between anger and violence most definitively with young children. Violent images and audio, brutal story backgrounds, realistic assassin characters are the main problems as they are most effective. The only thing stopping our society from becoming a brutal, vicious town run by mentally afflicted and aggressive people are YOU. You can change not only our future, not only our town but the entire world and even the generations to come. Not only is your child becoming mentally inflicted by video games by also physically inflicted. The whole body internally and externally are becoming more and more damaged through the constant use of video game consoles. With the lack of social interaction your child’s mind is being affected as it will slowly deteriorate and will become illiterately desensitized. This will impact them in their daily routines such as brushing their teeth, memory loss and even with their school performance. The amount of sleep will also become majorly affected for your child due to the constant use of video games resulting in the lack of sleep. The internal organs can also become majorly affected as the lack of outside oxygen, lack of essential foods and drinks, lack of daily exercise and even lack of basic body movements can deprive the body of the necessary requirements needed to obtain it. The internal organs can become numb and slowly wither away. This will make your child weaker and less protected internally leaving them open to all kinds of viruses and diseases that can potentially kill them. Alongside the internal organs becoming damaged, the external body can become immensely damaged as well. This can include vital parts of the body such as the eyes – as they are continuously focused upon a bright screen, they will become weaker and damaged. This can cause your child to become visually impaired and potentially blind, which would make life much more difficult for them especially at such as young age. Another body part which would become physically inflicted includes the hands and wrist area. With the hands constantly being used on the console controls, the thumbs and fingers would regularly cramp giving your child the increasing chance of arthritis. This includes the wrists cramping up also. This physically inflicted impairment can also create an unusual shape for your child’s hand and can cause disfigurement that can make it harder for them to write and use them for other regular duties such as picking up and holding items. A final and most important body part that is physically inflicted includes the entire lower body. With the lack of movement, your child’s body will slowly start to stiffen and cramp up again much like the hands and wrists and can lead to lower body arthritis which is known to be much worse. To conclude, I would like to make sure you have all acknowledged the major effects of children constantly playing violent video games and games consoles. I want you all to remember these effects and think of your child’s needs and benefits first before succumbing to your temptations. Think of the life your child would have to endure if they were sucked into the world of brutal and violent video games, but instead they could be living in a much healthier and less violent world of their own. Remember to live in a world with NO MORE influenced violence being shown upon our youths. NO MORE increased crime rates in our society and most definitely NO MORE children being denied their protected safety rights because as parents and guardians we OWE them at least this.

Friday, September 20, 2019

Pro And Cons Of Security Measure Information Technology Essay

Pro And Cons Of Security Measure Information Technology Essay This work requires the student execute a limited research based assignment in Network security. This work should be a conference style paper. Suggested Topics are given below. However, the work should reflect real thought and effort. The grade will be based on the following factors: novelty, depth, correctness, clarity of presentation, and effort. Students can select any other topics relevant to network security other than listed below with the approval of the module leader. In this paper student should explain the Security issues relevant to their topics and should analyze any two of the security tools/measures widely used to overcome those issues. More emphasize is given to the analysis of pros and cons of the security measures followed where a thorough knowledge/understanding of the problem and its countermeasures are gained. Introduction Voice over Internet Protocol also known as Voice over IP, IP Telephony or VoIP and it started by a small company called Vocaltec, Inc in February 1995 from Israel. [Joe Hallock, A Brief History of VoIP] By that time, it will be the first internet phone software. Vocaltec aims are to provide user to makes phone call from one computer to another computer using sound card, microphone and speaker. This VoIP software created by Vocaltec only works when both caller and the receiver have the same setup software installed. VoIP is design for deliver the voice communication and multimedia session over the Internet Protocol and it is also categorized as one of the internet technology, communication protocol and transmission technology. In simpler terms, VoIP converts the voice signal from your telephone into a digital signal that travels over the Internet. There are three types of VoIP tools that are commonly used; IP Phones, Software VoIP and Mobile and Integrated VoIP. The IP Phones are the most institutionally established but still the least obvious of the VoIP tools. Of all the software VoIP tools that exist, Skype is probably the most easily identifiable. The use of software VoIP has increased during the global recession as many persons, looking for ways to cut costs have turned to these tools for free or inexpensive calling or video conferencing applications. Software VoIP can be further broken down into three classes or subcategories; Web Calling, Voice and Video Instant Messaging and Web Conferencing. Mobile and Integrated VoIP is just another example of the adaptability of VoIP. VoIP is available on many smartphones and internet devices so even the users of portable devices that are not phones can still make calls or send SMS text messages over 3G or WIFI.[2] One of the most significant advantages of VoIP (over a traditional public switched telephone network (PSTN also known as a legacy networks) is that one can make a long distance phone call and bypass the toll charge. This integrated voice/data solution allows large organizations (with the funding to make the transfer from a legacy network to a VoIP network) to carry voice applications over their existing data networks. VoIP telephone systems are susceptible to attacks as are any internet-connected devices. This means that hackers who know about these vulnerabilities (such as insecure passwords) can institute denial-of-service attacks, harvest customer data, record conversations and break into voice mailboxes.[26] Another challenge is routing VoIP traffic through firewalls and network address translators. Private Session Border Controllers are used along with firewalls to enable VoIP calls to and from protected networks. For example, Skype uses a proprietary protocol to route calls through other Skype peers on the network, allowing it to traverse symmetric NATs and firewalls. Other methods to traverse NATs involve using protocols such as STUN or ICE. Many consumer VoIP solutions do not support encryption, although having a secure phone is much easier to implement with VoIP than traditional phone lines. As a result, it is relatively easy to eavesdrop on VoIP calls and even change their content.[27] An attacker with a packet sniffer could intercept your VoIP calls if you are not on a secure VLAN. However, physical security of the switches within an enterprise and the facility security provided by ISPs make packet capture less of a problem than originally foreseen. Further research has shown that tapping into a fiber optic network without detection is difficult if not impossible. This means that once a voice packet is within the internet backbone it is relatively safe from interception. There are open source solutions, such as Wireshark, that facilitate sniffing of VoIP conversations. A modicum of security is afforded by patented audio codecs in proprietary implementations that are not easily available for open source applications[citation needed]; however, such security through obscurity has not proven effective in other fields.[citation needed] Some vendors also use compression, which may make eavesdropping more difficult.[citation needed] However, real security requires encryption and cryptographic authentication which are not widely supported at a consumer level. The existing security standard Secure Real-time Transport Protocol (SRTP) and the new ZRTP protocol are available on Analog Telephone Adapters (ATAs) as well as various softphones. It is possible to use IPsec to secure P2P VoIP by using opportunistic encryption. Skype does not use SRTP, but uses encryption which is transparent to the Skype provider[citation needed]. In 2005, Skype invited a researcher, Dr Tom Berson, to assess the security of the Skype software, and his conclusions are available in a published report.[28] The Voice VPN solution provides secure voice for enterprise VoIP networks by applying IPSec encryption to the digitized voice stream. The IAX2 protocol also supports end-to-end AES-256 encryption natively. Traditional enterprise telecommunications networks used to be viewed as relatively secure because you practically needed to be within physical reach to gain access to them. Sure, things like toll fraud and war dialing were problematic, but those were easily remedied by longer or more complicated passwords and other access controls. The age of converged networks has changed that with voice now traveling over IP networks (VoIP). These converged networks inherit all the security weaknesses of the IP protocol (spoofing, sniffing, denial of service, integrity attacks, and so on). In addition, voice quality and confidentiality are potentially affected by common data network problems such as worms and viruses. Converged networks also offer an array of new vectors for traditional exploits and malware, as each IP endpoint becomes a potential point of network entry. Internet telephony refers to communications services-voice, fax, SMS, and/or voice-messaging applications-that are transported via the Internet, rather than the public switched telephone network (PSTN). The steps involved in originating a VoIP telephone call are signaling and media channel setup, digitization of the analog voice signal, encoding, packetization, and transmission as Internet Protocol (IP) packets over a packet-switched network. On the receiving side, similar steps (usually in the reverse order) such as reception of the IP packets, decoding of the packets and digital-to-analog conversion reproduce the original voice stream.[1] VoIP systems employ session control protocols to control the set-up and tear-down of calls as well as audio codecs which encode speech allowing transmission over an IP network as digital audio via an audio stream. The codec used is varied between different implementations of VoIP (and often a range of codecs are used); some implementations rely on narrowband and compressed speech, while others support high fidelity stereo codecs. Technical review In term of security issues, VoIP encounter numerous of issues reported and some of it can lead into big loss to a company. Below are some of the security issues that discuss in this research. Service Theft The most basic thing a hacker can do with your VoIP service is to steal it. In doing so, the perpetrator can make free calls and possibly start off a new VoIP telephony business of his/her own at amazingly cheap ratesjust like the first criminal who was charged with hacking VoIP 1. Service theft is relatively easy with VoIP because the Session Initiation Protocol (SIP) that is used for authentication in VoIP calls does not use encryption by default. Identity Theft Close on the heels of service theft is the risk of identity theft. If someone can steal a service, they have everything else they need to steal the identity of the person(s) using the service. Accounts as basic as utilities and as critical as financial loans are often tied to a specific phone number. If all else fails, the hacker can, at a minimum, gather sig-nificant information about the target individual(s) to be able to take the next step towards stealing the persons identity. Eavesdropping One might remember when tapping a phone required some serious instruments that needed to be installed at the right places while at the same time the person bugging the phone would have to make sure that nobody watches him/her in action. This procedure is a lot easier with VoIP. The instrument might still look like a phone and work like a phone, but tapping this phone is not at all difficult for someone with the right knowhow and tools and the wrong intentions. Hackers today can take control over several VoIP features such as voicemail, call forwarding, caller ID, call forward-ing, calling plan selection, and billing details. Stealing the VoIP service to enable free calls is actually much less prof-itable and desirable for hackers. Instead, with businesses increasingly using VoIP, sensitive corporate information is now the target. VoIP packets flow over networks like packets of data that can be sniffed just like regular data pack-ets. These packets can then be merged together to play the voice conversation in a normal media player software. Mix VoIP hacking with corporate espionage and you end up with a very lucky and enabled hacker. Vishing Vishing is the criminal practice of using social engineering over the telephone system, most often using features facilitated by Voice over IP (VoIP), to gain access to private personal and financial information from the public for the purpose of financial reward. What if you were to receive a call from your bank or your credit card company that had an automated voice at the other end asking you to enter your debit/credit card number, PIN, and other details? Chances are you might comply with the request. Better still, if you were the person making the call to your phone banking number then these chances are actually quite high considering the fact that you were the person making the call. In both these cases, a Vishing attack could have been launched using VoIP that could lead you to believe that youre calling an entity that you trust. Specifically in the second case, redirecting your call to a Visher would actually be much easier if you use a VoIP based phone. Denial of Service One VoIP hacking method that can cause significant frustration and losses to businesses is the Denial of Service. As the name suggests, the main aim of the hacker is to ensure that your organization is denied the usage of your VoIP telephony service. Voice calls made by an organization can be manipulated, tampered, and even dropped. Hackers can even flood the target VoIP infrastructure with several call-signaling SIP messages. Many times, these DoS attacks are actually a smokescreen for hackers to plant malware or even take control of systems in the background. Spyware and Malware VoIP infrastructure rests on the same architecture as a normal computer system. Essentially, the issues that a normal computer system can face are quite applicable to VoIP infrastructures as well. Top of the list is spyware and malware. Consider the example of a software application that is used to enable VoIP telephony. A user would have to run this software over a computer, a PDA, an iPhone, or such. This introduces the vulnerabil-ity of falling prey to viruses, spyware, malware, worms, and just about all forms of malicious code. SPAM Spam exists with VoIP, although it is known as SPIT or Spam over Internet Telephony. While more typically just an annoyance, SPIT does at times carry viruses and malware, just like spam. While the occurrence of SPIT is not very common today, trends definitely dictate that SPIT is heading in the direction of SPAM. VoIP telephone systems are susceptible to attacks as are any internet-connected devices. This means that hackers who know about these vulnerabilities (such as insecure passwords) can institute denial-of-service attacks, harvest customer data, record conversations and break into voice mailboxes.[26] Another challenge is routing VoIP traffic through firewalls and network address translators. Private Session Border Controllers are used along with firewalls to enable VoIP calls to and from protected networks. For example, Skype uses a proprietary protocol to route calls through other Skype peers on the network, allowing it to traverse symmetric NATs and firewalls. Other methods to traverse NATs involve using protocols such as STUN or ICE. Many consumer VoIP solutions do not support encryption, although having a secure phone is much easier to implement with VoIP than traditional phone lines. As a result, it is relatively easy to eavesdrop on VoIP calls and even change their content.[27] An attacker with a packet sniffer could intercept your VoIP calls if you are not on a secure VLAN. However, physical security of the switches within an enterprise and the facility security provided by ISPs make packet capture less of a problem than originally foreseen. Further research has shown that tapping into a fiber optic network without detection is difficult if not impossible. This means that once a voice packet is within the internet backbone it is relatively safe from interception. There are open source solutions, such as Wireshark, that facilitate sniffing of VoIP conversations. A modicum of security is afforded by patented audio codecs in proprietary implementations that are not easily available for open source applications[citation needed]; however, such security through obscurity has not proven effective in other fields.[citation needed] Some vendors also use compression, which may make eavesdropping more difficult.[citation needed] However, real security requires encryption and cryptographic authentication which are not widely supported at a consumer level. The existing security standard Secure Real-time Transport Protocol (SRTP) and the new ZRTP protocol are available on Analog Telephone Adapters (ATAs) as well as various softphones. It is possible to use IPsec to secure P2P VoIP by using opportunistic encryption. Skype does not use SRTP, but uses encryption which is transparent to the Skype provider[citation needed]. In 2005, Skype invited a researcher, Dr Tom Berson, to assess the security of the Skype software, and his conclusions are available in a published report.[28] The Voice VPN solution provides secure voice for enterprise VoIP networks by applying IPSec encryption to the digitized voice stream. The IAX2 protocol also supports end-to-end AES-256 encryption natively. Securing VoIP To prevent the above security concerns government and military organizations are using Voice over Secure IP (VoSIP), Secure Voice over IP (SVoIP), and Secure Voice over Secure IP (SVoSIP) to protect confidential and classified VoIP communications.[29] Secure Voice over IP is accomplished by encrypting VoIP with Type 1 encryption. Secure Voice over Secure IP is accomplished by using Type 1 encryption on a classified network, like SIPRNet.[30][31][32][33][34] Public Secure VoIP is also available with free GNU programs.[35] [edit]Caller ID Caller ID support among VoIP providers varies, although the majority of VoIP providers now offer full Caller ID with name on outgoing calls. In a few cases, VoIP providers may allow a caller to spoof the Caller ID information, potentially making calls appear as though they are from a number that does not belong to the caller[36] Business grade VoIP equipment and software often makes it easy to modify caller ID information. Although this can provide many businesses great flexibility, it is also open to abuse. The Truth in Caller ID Act has been in preparation in the US Congress since 2006, but as of January 2009 still has not been enacted. This bill proposes to make it a crime in the United States to knowingly transmit misleading or inaccurate caller identification information with the intent to defraud, cause harm, or wrongfully obtain anything of value [37] [edit]Compatibility with traditional analog telephone sets Some analog telephone adapters do not decode pulse dialing from older phones. They may only work with push-button telephones using the touch-tone system. The VoIP user may use a pulse-to-tone converter, if needed.[38] [edit]Fax handling Support for sending faxes over VoIP implementations is still limited. The existing voice codecs are not designed for fax transmission; they are designed to digitize an analog representation of a human voice efficiently. However, the inefficiency of digitizing an analog representation (modem signal) of a digital representation (a document image) of analog data (an original document) more than negates any bandwidth advantage of VoIP. In other words, the fax sounds simply do not fit in the VoIP channel. An alternative IP-based solution for delivering fax-over-IP called T.38 is available. The T.38 protocol is designed to compensate for the differences between traditional packet-less communications over analog lines and packet based transmissions which are the basis for IP communications. The fax machine could be a traditional fax machine connected to the PSTN, or an ATA box (or similar). It could be a fax machine with an RJ-45 connector plugged straight into an IP network, or it could be a computer pretending to be a fax machine.[39] Originally, T.38 was designed to use UDP and TCP transmission methods across an IP network. TCP is better suited for use between two IP devices. However, older fax machines, connected to an analog system, benefit from UDP near real-time characteristics due to the no recovery rule when a UDP packet is lost or an error occurs during transmission.[40] UDP transmissions are preferred as they do not require testing for dropped packets and as such since each T.38 packet transmission includes a majority of the data sent in the prior packet, a T. 38 termination point has a higher degree of success in re-assembling the fax transmission back into its original form for interpretation by the end device. This in an attempt to overcome the obstacles of simulating real time transmissions using packet based protocol.[41] There have been updated versions of T.30 to resolve the fax over IP issues, which is the core fax protocol. Some newer high end fax machines have T.38 built-in capabilities which allow the user to plug right into the network and transmit/receive faxes in native T.38 like the Ricoh 4410NF Fax Machine.[42] A unique feature of T.38 is that each packet contains a portion of the main data sent in the previous packet. With T.38, two successive lost packets are needed to actually lose any data. The data you lose will only be a small piece, but with the right settings and error correction mode, there is an increased likelihood that you will receive enough of the transmission to satisfy the requirements of the fax machine for output of the sent document. [edit]Support for other telephony devices Another challenge for VoIP implementations is the proper handling of outgoing calls from other telephony devices such as Digital Video RecordersDVR boxes, satellite television receivers, alarm systems, conventional modems and other similar devices that depend on access to a PSTN telephone line for some or all of their functionality. These types of calls sometimes complete without any problems, but in other cases they fail. If VoIP and cellular substitution becomes very popular, some ancillary equipment makers may be forced to redesign equipment, because it would no longer be possible to assume a conventional PSTN telephone line would be available in consumers homes. Improving Your VoIP The key to securing a VoIP infrastructure is to remember that it involves sending voice over the Internet Protocol (IP). So, the way to secure it is quite similar to the way you deal with an IP data network. Here are the key aspects to keep in mind when securing a VoIP infrastructure Encryption VoIP packets, by default, are transmitted in clear-text and so encryption is vital to ensure confidentiality. VoIP in-frastructures based on Secure Real-time Transport Protocol (SRTP) take a step ahead of the unencrypted SIP and en-sure that VoIP traffic privacy and confidentiality is maintained. Alternatively, encryption in the form of Transport Layer Security (TLS) or Internet Protocol Security (IPSec) can also make a great difference. Network Design A basic rule of thumb to remember is to logically separate voice and data networks. The best case scenario would be to let the VoIP infrastructure have its own isolated network with only the minimum necessary interactions with other sub-networks via secure firewalls. Having dedicated VoIP servers with audited and hardened operating systems and all unnecessary services disabled is the next step to fortifying your VoIP infrastructure. Soft Phones Soft phones add to an administrators misery by offering another end point that needs to be secured. The ideal solu-tion is to avoid using Soft phones altogether. If they must be used, ensure that they are fully hardened and patched at all times. While it adds an additional bur-den, it is absolutely paramount to the security of the VoIP infrastructure. Hard Phones Hard phones offer a great alternative to soft phones, especially when coupled with private branch exchange (PBX) systems running on a hardened and, preferably, dedicated server. Periodic checks and updates are essential to ensure that the IP-PBX and IP Phone firmware is fully patched. Physical Security This is an often understated aspect of VoIP security. While an organization can spend countless hours and resources securing the medium of transmission, it is critical to also ensure the physical security of the enabling infrastructure components like the hard phones, the VoIP servers, and any other device that directly or indirectly supports the VoIP infrastructure. Physical security can become the Achilles heel of your VoIP infrastructure if it is not respected. Defaults and Passwords More often than not, default passwords and settings are not secure. These defaults are created with a generic scenario in mind and will most likely not fit the requirements and customization that your organization demands. It is impor-tant to replace all default passwords with strong passwords that are at least eight characters long, and employ a com-bination of uppercase letters, lowercase letters, numbers, and special characters. This should be further bolstered by good password policies and robust identity management. Voice Messaging Systems and Storage One typical area that is easy to miss is the security of calls that are stored on voice messaging systems. Ensure that the voice message boxes of all users require that the password be changed each time the service is used. It might cause a bit of inconvenience, but it will also offer a mile of improved security. It is also important to secure the storage of voice messages by performing periodic checks and audits to look for exploitable holes. Vulnerability Assessments Last, but most important, a periodic vulnerability assessment of the VoIP infrastructure can ensure that no holes have emerged due to the ever-changing nature of business requirements and the networks that support them. Inde-pendent audits can often provide useful insights into the state of the VoIP infrastructure and serve as an additional piece of evidence of due diligence in the regulatory compliance armory. Make VoIP Work For You VoIP has truly been a genuine money saver for businesses all over the world and the world is a smaller place, in part thanks to VoIP technology. The security issues around VoIP are serious and very real. However, taking the right steps and countermeasures can truly help your organization make the most of VoIP. The Internet is like alcohol in some sense. It accentuates what you would do anyway. If you want to be a loner, you can be more alone. If you want to connect, it makes it easier to connect. Research Methodology Secondary resources such as journal, white paper and thesis are being use in this research to analyze and further study in order to produce this research. Evaluation VoIP Sniffing Tools VoIP Scanning and Enumeration Tools VoIP Fuzzing Tools VoIP Sniffing Tools AuthTool Tool that attempts to determine the password of a user by analyzing SIP traffic. Cain Abel Multi-purpose tool with the capability to reconstruct RTP media calls. CommView VoIP Analyzer VoIP analysis module for CommView that is suited for real-time capturing and analyzing Internet telephony (VoIP) events, such as call flow, signaling sessions, registrations, media streams, errors, etc. Etherpeek general purpose VoIP and general ethernet sniffer. ILTY (Im Listening To You) Open-source, multi-channel SKINNY sniffer. NetDude A framework for inspection, analysis and manipulation of tcpdump trace files. Oreka Oreka is a modular and cross-platform system for recording and retrieval of audio streams. PSIPDump psipdump is a tool for dumping SIP sessions (+RTP traffic, if available) from pcap to disk in a fashion similar to tcpdump -w. rtpBreak rtpBreak detects, reconstructs and analyzes any RTP session through heuristics over the UDP network traffic. It works well with SIP, H.323, SCCP and any other signaling protocol. In particular, it doesnt require the presence of RTCP packets. SIPomatic SIP listener thats part of LinPhone SIPv6 Analyzer An Analyzer for SIP and IPv6. UCSniff UCSniff is an assessment tool that allows users to rapidly test for the threat of unauthorized VoIP eavesdropping. UCSniff supports SIP and Skinny signaling, G.711-ulaw and G.722 codecs, and a MITM ARP Poisoning mode. VoiPong VoIPong is a utility which detects all Voice Over IP calls on a pipeline, and for those which are G711 encoded, dumps actual conversation to separate wave files. It supports SIP, H323, Ciscos Skinny Client Protocol, RTP and RTCP. VoIPong ISO Bootable Bootable Live-CD disc version of VoIPong. VOMIT The vomit utility converts a Cisco IP phone conversation into a wave file that can be played with ordinary sound players. Wireshark Formerly Ethereal, the premier multi-platform network traffic analyzer. WIST Web Interface for SIP Trace a PHP Web Interface that permits you to connect on a remote host/port and capture/filter a SIP dialog. VoIP Scanning and Enumeration Tools EnableSecurity VoIPPack for CANVAS VoIPPack is a set of tools that are designed to work with Immunity CANVAS. The tools perform scans, enumeration, and password attacks. enumIAX An IAX2 (Asterisk) login enumerator using REGREQ messages. iaxscan iaxscan is a Python based scanner for detecting live IAX/2 hosts and then enumerating (by bruteforce) users on those hosts. iWar IAX2 protocol Wardialer Nessus The premier free network vulnerability scanner. nmap the premier open source network port scanner. Passive Vulnerability Scanner The Tenable Passive Vulnerability Scanner (PVS) can find out what is happening on your network without actively scanning it. PVS detects the actual protocol, various administrative interfaces, and VoIP scanner(s). Currently includes over 40 VoIP checks. SCTPScan This tool enumerates open SCTP ports without establishing a full SCTP association with the remote host. You can also scan whole networks to find SCTP-speaking machines. SIP Forum Test Framework (SFTF) The SIP Forum Test Framework (SFTF) was created to allow SIP device vendors to test their devices for common errors. SIP-Scan A fast SIP network scanner SIPcrack SIPcrack is a SIP protocol login cracker. It contains 2 programs, SIPdump to sniff SIP logins over the network and SIPcrack to bruteforce the passwords of the sniffed login. Sipflanker Sipflanker will help you find SIP devices with potentially vulnerable Web GUIs in your network. SIPSCAN SIPSCAN is a SIP username enumerator that uses INVITE, REGISTER, and OPTIONS methods. SIPVicious Tool Suite svmap, svwar, svcrack svmap is a sip scanner. It lists SIP devices found on an IP range. svwar identifies active extensions on a PBX. svcrack is an online password cracker for SIP PBX SiVuS A SIP Vulnerability Scanner. SMAP SIP Stack Fingerprinting Scanner VLANping VLANPing is a network pinging utility that can work with a VLAN tag. VoIPAudit VoIP specific scanning and vulnerability scanner. VoIP Fuzzing Tools Asteroid this is a set of malformed SIP methods (INVITE, CANCEL, BYE, etc.) that can be crafted to send to any phone or proxy. Codenomicon VoIP Fuzzers Commercial versions of the free PROTOS toolset Fuzzy Packet Fuzzy packet is a tool to manipulate messages through the injection, capturing, receiving or sending of packets generated over a network. Can fuzz RTP and includes built-in ARP poisoner. Interstate Fuzzer VoIP Fuzzer Mu Dynamics VoIP, IPTV, IMS Fuzzing Platform Fuzzing appliance for SIP, Diameter, H.323 and MGCP protocols. ohrwurm ohrwurm is a small and simple RTP fuzzer. PROTOS H.323 Fuzzer a java tool that sends a set of malformed H.323 messages designed by the University of OULU in Finland. PROTOS SIP Fuzzer a java tool that sends a set of malformed SIP messages designed by the University of OULU in Finland. SIP Forum Test Framework (SFTF) SFTF was created to allow SIP device vendors to test their devices for common errors. And as a result of these tests improve the interoperability of the devices on the market in general. Sip-Proxy Acts as a proxy between a VoIP UserAgent and a VoIP PBX. Exchanged SIP messages pass through the application and can be recorded, manipulated, or fuzzed. Spirent ThreatEx a commercial protocol fuzzer and ribustness tester. VoIPER VoIPER is a security toolkit that aims to allow developers and security researchers to easily, extensively and automatically test VoIP devices for security vulnerabilties. Differences in how security countermeasures are applied Discussion The Advantages and Disadvantages of VoIP VoIP has many advantages over a regular phone service. However, like any emerging technology, there are still a few kinks in the system. However, as standards are developed it becomes more reliab

Thursday, September 19, 2019

The Character of Lennie in John Steinbecks Of Mice and Men :: Steinbeck Of Mice and Men Essays

The Character of Lennie in Of Mice and Men Have you ever read Of Mice and Men by John Steinbeck? If so, you probably remember Lennie, George's companion. Throughout the novel, Lennie and George dream of having their own farm. They work on a ranch to save money for their dream farm. Lennie is a big, strong, man with rounded features. He is at times very forgetful, absent-minded, and one-dimensional. First of all, Lennie is greatly forgetful. In the beginning of the novel, Lennie kept asking George where they were going (Steinbeck 4). One character, Crooks, takes advantage of his forgetfulness. Because Lennie would forget anything Crooks told him, he was relieved he could talk to somebody without worrying about him telling anybody else. He often forgot what George told him not to do, like talk or even look at Curley's wife. Next to being forgetful, Lennie is absent-minded for a good portion of the novel. He is unaware of what he's doing sometimes until he has done it. For example, he enjoyed to pet soft objects. While living in Weed, he was "petting" a woman's dress and the woman started to scream (Steinbeck 11). Lennie didn't know what he was doing wrong. Once Lennie was given a puppy, he accidentally killed it because he was too rough with it. Eventually, he would kill Curley's wife too by breaking her neck when told he could pet her hair. Again, Lennie did not know what he was doing wrong until it was done. Throughout the novel, there is really only one thing on Lennie's mind, tending to the rabbits once he and George had their farm. After Crooks was done telling Lennie his childhood story, Lennie asks a question about rabbits (Steinbeck 70). This is an example of Lennie having only one thing on his mind.

Wednesday, September 18, 2019

Dissocative Identity Disorder Essay -- Diseases, Disorders

We all daydreamed, gotten lost inside a movie, has even had an out of body experiences; don’t worry it’s all common, but it is also a mild form of dissociation. Dissociation is a separation within an individual’s actions, memories, thoughts feelings, or has a sense of being unreal. Among the most incomprehensible or mystifying and controversial is the rare dissociative identity disorder. It’s the most severe and chronic manifestation of the dissociative disorders. This colossal dissociation of identity from a conventional cognizance embodies those with dissociative identity disorder, (DID; previously known as multiple personality disorder) in which two more diverse characteristics are said to interchangeably switch the person’s demeanor. Dissociative identity disorder is thought to stem from severe trauma mostly in the person’s early childhood (usually around the age 9), due to extreme cyclical sexual, physical and/or emotional abuse. The dissociative aspect is assumed to be a managing method, because literally each personality has its own mannerisms, voice, age, sex, and even race; by dissociating their selves from a situation or experience that are too painful violent to assimilate with their conscious self. Typically, the original personality denies any awareness of the other identities. Understanding the development of multiple personalities is difficult, even for highly trained experts; making a diagnosis of DID take time. It’s estimated that individuals with dissociative identity disorder has spent seven years in the mental health system prior to diagnosis. This is because of the similarities of symptoms of many psychiatric diagnosis of treatment that they seek. The DSM-IV provides the following criteria to diagnose dis... ...her than the driver, they truly believe that they have no choice. A person in treatment for a dissociative disorder might benefit from antidepressants or anti-anxiety medication, but is still no "cure" for dissociative identity disorder; it has been proven for effective treatment which includes medications, psychotherapy or talk therapy, hypnotherapy, and adjunctive therapies long-term treatment is very successful, only if the patient stays committed. Bibliography www.dissociativeidentitydisorder.net psychology.about.com www.psychologytoday.com www.sidran.org www.webmd.com www.medicinet.com www.fortea.us/english/psiquatria/dissociative.htm: Analytical Overview, Jacqueline Costello. York College of Pennsylvania The American Psychiatric Association. (APA) (1994): Diagnostic and Statistical manual of mental disorders. (4thed). Washington DC: Author Dissocative Identity Disorder Essay -- Diseases, Disorders We all daydreamed, gotten lost inside a movie, has even had an out of body experiences; don’t worry it’s all common, but it is also a mild form of dissociation. Dissociation is a separation within an individual’s actions, memories, thoughts feelings, or has a sense of being unreal. Among the most incomprehensible or mystifying and controversial is the rare dissociative identity disorder. It’s the most severe and chronic manifestation of the dissociative disorders. This colossal dissociation of identity from a conventional cognizance embodies those with dissociative identity disorder, (DID; previously known as multiple personality disorder) in which two more diverse characteristics are said to interchangeably switch the person’s demeanor. Dissociative identity disorder is thought to stem from severe trauma mostly in the person’s early childhood (usually around the age 9), due to extreme cyclical sexual, physical and/or emotional abuse. The dissociative aspect is assumed to be a managing method, because literally each personality has its own mannerisms, voice, age, sex, and even race; by dissociating their selves from a situation or experience that are too painful violent to assimilate with their conscious self. Typically, the original personality denies any awareness of the other identities. Understanding the development of multiple personalities is difficult, even for highly trained experts; making a diagnosis of DID take time. It’s estimated that individuals with dissociative identity disorder has spent seven years in the mental health system prior to diagnosis. This is because of the similarities of symptoms of many psychiatric diagnosis of treatment that they seek. The DSM-IV provides the following criteria to diagnose dis... ...her than the driver, they truly believe that they have no choice. A person in treatment for a dissociative disorder might benefit from antidepressants or anti-anxiety medication, but is still no "cure" for dissociative identity disorder; it has been proven for effective treatment which includes medications, psychotherapy or talk therapy, hypnotherapy, and adjunctive therapies long-term treatment is very successful, only if the patient stays committed. Bibliography www.dissociativeidentitydisorder.net psychology.about.com www.psychologytoday.com www.sidran.org www.webmd.com www.medicinet.com www.fortea.us/english/psiquatria/dissociative.htm: Analytical Overview, Jacqueline Costello. York College of Pennsylvania The American Psychiatric Association. (APA) (1994): Diagnostic and Statistical manual of mental disorders. (4thed). Washington DC: Author

Tuesday, September 17, 2019

What Makes the Dream American?

| What Makes the Dream American? | A Critical Thought Analysis| | Fairen Harris| University of Louisville| Dr. Chapman Gran Torino: In a nutshell A racist Korean War veteran and recent widower, Walt Kowalski is living in a crime ridden town in Detroit, Michigan. Walt’s once all White neighborhood has become occupied by the Hmong people. The Hmong people represent a part of Southeast Asia, such as Thailand, Laos, and China. The Hmong came to America because during the war they fought on the American side and the Vietnamese waged a war against the Hmong people after the Americans left.Due to this change in neighbors, Walt is now forced to confront his own lingering prejudice when a troubled Hmong teen, Thao Vang Lor, from next door attempts to steal his prized 1972 Gran Torino, (Ford model car) Walt himself helped assemble on the care line. It is decades after the Korean War has ended, and aging veteran Walt Kowalski is still haunted by the horrors he witnessed on the battlefiel d. The viewers notice the power distance created among the gang affiliated persons and the nonaffiliated when the gang has tried to kidnap Thao, Walt’s neighbor, from his home.Walt, in an attempt to get the â€Å"gooks† off his lawn turns his same rifle; he pointed at Thao when he attempted to steal Walt’s Gran Torino, on the gang members and scares them away. The Hmong show their gratitude to Walt, by making Thao pay penance for attempting to steal the Gran Torino. Despite the fact that Kowalski wants nothing to do with the young troublemaker, he realizes that the quickest way out of the situation is to simply cooperate. In an effort to set the teen on the right path in life and â€Å"toughen him up,† Walt turns from being Thao’s grumpy racist neighbor into being a helpful almost father figure.In the process of all of this, Kowalski discovers that the only way to lay his many painful memories to rest is to finally face his own blinding ethnocentri c views about other cultures directly. Thao Vang Lor: A boy or a man? When examining at the undertones of classism, racism, and sexism, one takes note that the character affected most is Thao. The first introduction viewers have of. Thao and the other Hmong people as a collective are celebrating the life of a new baby.The Lor family shaman is presiding over the ceremony giving viewers a glimpse into their traditional cultural values. Thao, living in a home with his grandmother, widowed mother, and sister, is looked down upon by the other Hmong people. They expect Thao to step up and become â€Å"the man of the home,† because of the recent death of his father. An elder woman in the movie even says, â€Å"Look at the way he does dishes he will never become the man of the home. † (cite movie here) When Thao fails to do so, he is ridiculed by elders and outcast by his peers.During the beginning of the movie Thao’s activity consist of what the Hmong, and many people of cultures around the world would refer to as ‘woman’s work. † Sue Lor, Thao sister, explains to Walt how life is for Hmong boys and girls. Sue Lor tells Walt, â€Å"Hmong girls fit in better. Girls go to college and the boys go to jail. † As the films plays out you see that Thao does not in fact fit this schema that the Hmong youth have seem to fall victim to. Despite Thao’s fight not to assimilate into the life of the typical Hmong boy, he finds it difficult to escape his cousin and gang friends.Thao is an average middle class teen, does the work of the household for his family, and is employed at a construction site; but most of all Thao wants to go to college and is willing to work hard to finance his way through school. However, he is still not seenperceived as being good enough as a man in the Asian culture and, even more so, in the American patriarchal society. So who is the better man, working Thao or his gang banging, potential rapist, cous in Spider? Throughout the entirety of the movie, Thao is faced with the notions that he is simply not enough of a man and he receives distinct criticism from his immediate family.Thao’s father, before his death, was always hard on them because, â€Å"he was traditional,† as Sue Lor put it. (cite here) How do we measure manhood? Is it based off the number of people that a man has killed? Is it the number of times he has went to war? Or in fact is the measurement of a man the same as what a human should be willing to do? To help ones family, set goals, and work hard to achieve them, that in fact is the measurement of a man, and that is who Thao Lor embodies. Diversity of the American dreamThe seemingly over arching theme in this movie is based on a culture clash, of non- Western and Western views and the ideas of the American Dream. This leads the audience to question, What does being an American mean? What is the American dream? The idea of the American dream is the not ion that anyone in the United States can succeed through hard work and has the potential to lead a happy, successful life. The issue with this idea is that the American dream often disregards  bias  based on a person's race, religion, gender and national origin, which might inhibit his or her ability to achieve the specific goals.Thao, not only struggling with sexism and racism, is also faced with the ever present struggle of class. Their whole neighborhood is similar to that of a very middle class neighborhood; however it is one that is not a priority of the city. Then is evident when there is a scene in which Walt has Thao clean was a rundown house across the street from Walt’s home, and when the police refuse to stay in the neighborhood long enough to patrol it properly. Thao’s only desire is attempting to lead a normalized life, wanting badly to make money, and wanting to take a Hmong girl that he has been interested in on a date.In his quest to do so he is fac ed with issues of peer pressure and teen anxiety. In search for his version of the American Dream, and in the end of the film he has finally achieved that, as Thao is seen driving the Gran Torino he once tried to steal. Conclusion: A message from the director In the end, Walt Kowalski gives up his life for Thao and the other Hmong people by sacrificing himself to be shot by the gang bangers in order to have hard evidence against them for them to be incarcerated for good.Walt was able to, not completely stop his racist mind set, become a bit more open to the Lor family, he felt he had the responsibility to protect them. After being killed, the film cuts to a scene of Thao and Sue in traditional Hmong clothing in route to Walt’s funeral, the same kind of scene as the beginning of the film. By directing and starring as the main character in the film, Clint Eastwood is making it a point for the viewers of this film to look closely at the issues occurring during this film, all of which having to do ith classism, racism, religion, sexism, and how each of these transpire across race and ethnic groups. Eastwood chooses to address Polish, Asians, Latinos, Blacks, Italians, men, women, young and old, wealthy, middle class, and the poor, attempting to address every traditional and non-traditional, western and non-western dichotomies. The film inevitably leaves the viewer thinking, did he do a good job in trying to get his message across? Was Eastwood attempts to use the film as antidote to the issues that it addresses fulfilled? r was there even a political perspective in which he wanted the viewers to interpret the film? References Eastwood, C. (Director, Prouducer). ( 2008). Gran Torino. [Motion picture]. United States: Warner Home Video Shiraev, E. , ; Levy, D. (2013). Cross-Cultural Psychology: Critical Thinking and Contemporary Applications (5th ed. ). Boston: Pearson (Allyn ; Bacon). Publication Manual of the American Psychological Association (6th ed. ). (2 009). Washington, DC: American Psychological Association.

Monday, September 16, 2019

Epicatechin content in green tea (Camellia sinensis) supplements and their antioxidant activities

Introduction/background Green tea produced from Camellia sinensis is a popular beverage and is consumed worldwide. Green tea produced from Camellia leaves are mainly consumed in East Asian countries including China, Japan and Taiwan; whereas in western parts and south Asian countries, black tea is relatively popular (Chan, et.al. 2011). Green tea produced from Camellia is believed to have several health benefits. The tea from Camellia mainly contains flavanols or catechins, epigallocatechins, epicatechin gallate and epicatechin. The tea is manufactured in such a way that the catechin oxidation by polyphenol oxidase is prevented (Chan, et.al. 2011). Although all of these components in green tea are reported to have several health benefits, in this study only the role of epicatechin in green tea from Camellia has been extensively reviewed. Epicatechin is a strong antioxidant, which has been suggested to have several health benefits (Ravindranath, et.al. 2009).1.1. Project Aims Considering the antioxidant acti vities of epicatechin content in Camellia sinensis, and having reviewed available literature on the subject area, this project therefore aims to; Identify and quantify epicatechin content in herbal supplements by using standard compound. Understand and evaluate the antioxidant property of the standard compound that has been reported to be the antioxidant activity of the supplements. These aims were targeted with the views to providing clearer understanding of the role of antioxidants, present in green tea, as well as the health benefits associated to it.1.2 Standardization of plant extractsHerbal supplements are the complex mixtures containing organic chemicals derived from different plant sources including leaves, stems, flowers, roots and seeds. Although most herbal supplements and their compounds present in them are safe, many have been reported to have biologically active compounds that can alter several physiological processes within the body, as well as may interact with drugs. Thus, it is important to know the presence of active ingredients in the herbal supplement (Bent, 2008). Moreover, plant extracts are found to be rich in free radical and reactive oxygen species that are implicated in the alterations of various metabolic processes, and may lead to human diseases (Cases, et.al. 2010). Information on the biologically active compounds in herbal products will also help consumers in many aspects. Higher therapeutics effects can be seen in standardized extracts compared to the whole herb or non-standardized extracts; this is because, active principal is concentrated to a much higher level in the extracts than in the plant itself. Thus, purchasers of herbal products will get health benefits if extracts are standardized (Cases, et.al. 2010). 1.3 AntioxidantsAntioxidants are the compounds that are commonly derived from enzymes such as superoxide dismutase, catalase, and glutathione peroxidase and glutathione reductase; from minerals such as selenium, manganese, copper and zinc; as well as naturally from A, C and E vitamins (Lobo, et.al. 2010). Natural antioxidants are commonly found in plants consumed in the diet including carotenoids and phenolic compounds. Moreover, plants contain high concentrations of numerous antioxidants that include polyphenols, carotenoids, tocopherols, tocotrienols, glutathione and ascorbic acid (Charles, 2013). Their most important role in the body is to protect cells against the effects of free radicals. Free radicals are the unstable molecular species containing an unpaired electron that are able to exist independently. Most of these species are highly reactive and are potentially damaging to the cells (Lobo, et.al. 2010). Some of the common oxygen- free radicals that are involved in many human diseases include hydroxyl radical, superoxide anion radical, hydrogen peroxide, oxygen singlet, hypochlorite, nitric oxide radical, and peroxynitrite radical. Increased levels of these reactive species in the body cells induce damage of the DNA, proteins, carbohydrates and lipids. Thus, a balance between free radicals and antioxidants is necessary for proper physiological function (Lobo, et.al. 2010). Any dis-balance in this may result the initiation of various diseases including cancer, vascular diseases and degenerative diseases. Hence, the study of antioxidants and their sources have been the focus of intense research.1.4. Brief information on herbal supplements to use in the projectThis project studies the presence of epicatechin content in Camellia sinensis; thus, the project uses herbal capsules from Camellia sinensis as herbal supplements. Camellia sinenis is taken as green tea and contains antioxidants i n it, which is why it is commonly used in herbal medicine. Epicatechin is abundantly found in Camellia sinensis herbal supplement. Cameillia sinensis also contains various active compounds as extracts. Some of the major active compounds found in Camellia sinensis include catechins, caffeine, flavonols and proanthocyanidins (Charles, 2013). The health benefits of green tea (Camellia sinensis) epicatechins are being extensively studied and explained . Endothelial cells are associated to vascular function and homeostasis whose dysfunction may have implication in cardiovascular disease including atherogenesis. (Moore, et.al. 2009). Moreover, some studies suggest their anticancer role by enchaining apoptosis (Ravindranath, et.al. 2009). With findings emerging from several new studies regarding the health benefits of the green tea from Camellia sinensis, it is being increasingly popular among the people. Methods Simple and reliable techniques will be chosen in this project to investigate epicatechin content in Camellia sinenis. Experiments will be carried out using reflux extraction to determine the biologically active compounds present in the test supplement (herbal capsules from Camellia sinensis). This will be confirmed by NMR analysis. NMR analysis will be done to confirm that determination of correct biological compound including antioxidants from Camellia sinensis. Crude extract will be made from the material extracted from herbal capsules using a suitable solvent under reflux, which will then be run on thin layer chromatography (TLC) to see if a corresponding band for the standard also appears in the extract. This will tell whether or not the compound is present in the extract, as the study of organic compounds present in the supplement of Camellia sinensis can be made using this technique. To cut of the evaporation time, rotary evaporation method will be employed while evaporating th e solvent. Reverse phase analytical high performance liquid chromatography (HPLC) will be used to identify the standard compound in the extract and then to quantify the amount of compound in it. Finally, the antioxidant assay will be carried out to determine the antioxidant activity of the extracted compound; as a control, plant Flavonoid quercetin, which has antioxidant activity, will be used. REFERENCES Charles, J.D. (2013). Antioxidant Properties of Spices, Herbs and Other Sources. Natural Antioxidants. 39-64. Chan, E.W.C, Eu, Y.S, Tie, P.P, Law, Y.P. (2011). Pharmacognosy Research. Antioxidant and antibacterial properties of green, black, and herbal teas of Camellia sinensis. 3(4), 266-272. Irshad, M and Chaudhuri, P.S. (2002). Indian journal of experimental biology. Oxidant-antioxidant system: role and significance in human body.. 40(11), 1233-1239. Lobo, V, Patil, A, Phatak, A, Chandra, N. (2010). Pharmacogn Rev. Free radicals, antioxidants and functional foods: Impact on human health. 4(8), 118-126. Moore, R.J, Jackson, K.G, Minihane, A.M. (2010). The British journal of nutrition. Green tea (Camellia sinensis) catechins and vascular function. 96(4), 597-605. Ravindranath, M.H, et.al.,. (2006). Evid Based Complement Alternat Med.. Epicatechins Purified from Green Tea (Camellia sinensis) Differentially Suppress Growth of Gender-Dependent Human Cancer Cell Lines. 3(2), 237-247. Ravindranath, et.al., (2009). Evidence-based complementary and alternative medicine. Differential Growth Suppression of Human Melanoma Cells by Tea (Camellia sinensis) Epicatechins (ECG, EGC and EGCG). 6(4), 523-530. Roman, M, (2001) Natural Products Insider, http://www.naturalproductsinsider.com/articles/2001/04/the-benefits-and-pitfalls-of-standardizing-botanic.aspx, 11/12/2013. Uzunalic, A.P, et.al.. (2006). Food Chemistry. Extraction of active ingredients from green tea (Camellia sinensis): Extraction efficiency of major catechins and caffeine. 96(4), 597-605. Yang, Z, Xu, Y, Jie, G, He, P and Tu, Y. (2007). Asia Pac J Clin Nutr. Study on the antioxidant activity of tea flowers (Camellia sinensis) . 16(1), 148-152.

Sunday, September 15, 2019

21st Century Racism in Canada Essay

Racism in Canada is one of the least publicised problems modern Canadian society has faced in the Twenty First Century. With the majority of the Canadian and world public holding the census that Canada through its lax immigration policies and political reform, is far from a racist state. This belief is a falsehood that has either been achieved through white lies from history textbooks or a lack of endeavor to uncover the real racial issues that permeate through out Canada. Canada has been and is a racist nation that continues to not face the fact that racism is alive and well in Twenty First Century Canada. Racism towards slaves coming to Canada in search of solace from the racist United States was not an uncommon occurrence in the mid 1800’s before the American civil war. Halifax was the last stop on the Underground Railroad, although what African Americans were coming to was a whole different story. The popular depiction is of slaves that were granted freedom and loved and welcomed into society, as evidenced by this television advertisement. (YouTube) The truth was a lot harsher. In Halifax the majority of freed black slaves resided in â€Å"Africville†, the atrocities of which are not widely known but are still keenly documented. In order to turn â€Å"Africville† from poor black slum to profitable industrial land, the city of Halifax erected a hospital for diseased WWII veterans nearby along with leaving massive mounds of toxic garbage to be incinerated in the same vicinity. (Taylin) â€Å"Africville† is not mentioned in Canadian history books nor do most people across Canada know of its existence. It was nothing short of genocide of people that Halifax felt did not deserve the rights any other Canadian citizen would take for granted. Racism towards black immigrants and natural-born Canadians was not and is not limited to â€Å"Africville† or even Nova Scotia for that matter. Don Oliver a Canadian senator pointed out how most Canadians do not know about great black Canadians. Portia White was a classical musician that was known the world over, and Elijah McCoy’s  invention of modern lubrication for industrial purposes were so famous that it is thought the catch phrase â€Å"The real McCoy† could have been named after him. (Oliver) History books as well as the public because of overt racism tend not to celebrate the successes of black Canadians. Although there are very notable exceptions especially in music such as popular rapper Drake and R&B singer The Weeknd, by and large only in sports and music are the successes of black Canadians prevalent in mainstream media. There have been numerous studies done to show the effect having colored skin has on every day life in Canada. Carlos Teixeira found that black Portuguese Immigrants faced significant disadvantages in housing in comparison to people who were not of color. The Study showed that in the rental market of Toronto, people of color could expect to pay on average 30% higher rental rates versus white counterparts of similar Portuguese descent. He further concluded that people of Asian descent also were subjected to the same treatment. (Teixeira) A further study where over 6,000 mock resumes were sent out showed that applicants that had Chinese, Pakistani or Indian sounding names got 40% less call backs than those with English sounding names. Although it should be seen that this study was conducted in Toronto and a different result perhaps not as favorable towards English sounding names could have been found in Quebec or other parts of Canada. The key point is if racism exists in Canada’s most multicultural city, how widespread and to what severity is racism in the rest of Canada. (Oreopolous, Dechief) The Canadian armed forces are noted world wide as one of the top armed forces, and are known to pay the second highest salary behind only the Australian army. However the racism that Mr. Fowler and Mr. Coward experienced while serving was clearly targeted towards their color. (CBC NEWS) It is impossible to fathom the l ow level of respect garnered for these men who put their lives on the line every day to defend a country that does not give them the respect they deserve simply because of their color. It should be noted that their case is still in the process of being investigated so any judgment as to whether they were subjected to racism cannot be confirmed. A study into Canada’s judicial system showed alarming results that independent juries are more likely to find black defendants guilty approximately 40% of the time more frequently than defendants of other races. This is worrying as it could have significant ramifications for Canadians of African descent residing in  Canada. (Pfeifer, J. E. , Ogloff, J. R. P.) This combined with recent findings in 2011 that black prison populations have risen by 52% since 2000, means that this issue has gone unresolved. Points should further be raised that the majority of the black prisoners are young and are spending their formative years in prison. This could have a knock on effect where they find it hard to integrate properly into society and influence more friends and such and could land themselves back behind bars. This could lead to many defendants getting â€Å"caught in a cycle of criminality†. (Crawford) The facts show that with the current education, welfare and societal norms in place, more and more black youth are behind bars than before and it is thought they will only end up back behind bars. The racism of minorities is probably most controversial when analyzed in the context of the abo riginal peoples of Canada. This is because they were originally not a minority but rather a majority as Canada is technically their land. The aboriginal people have been subjected to racism since the very beginning and the facts show it. â€Å"Aboriginal life expectancy is lower; they have fewer high school graduates, higher unemployment, almost twice as many infant deaths and spend more time in jail. They have lower incomes, enjoy fewer promotions in the workplace and remain, as a group, the poorest in Canada.† (Hutchings) The Indian Act was used to create â€Å"Indian Agents† which acted as sort of police for the aboriginal peoples but in truth denied them basic rights, such as the right to sit on juries, vote or permission was needed to do mundane tasks such as wearing traditional garments off the reserves. It was policies like these that truly segregated the aboriginal people from the mainstream consciousness and must have caused a chasm of sorts to exist between aboriginals and non-aboriginals. To combat this chasm between aboriginals and non-aboriginals Duncan Campbell Scott and the department of Indian affairs came up with the policy of enfranchisement. At first voluntary but later forced enfranchisement was used to basically strip Aboriginals of their Indian status. Getting university degrees, becoming doctors or ministers meant enfranchisement. In short it was trying to send the message that once Aboriginals became civilized and held positions of power and respect within the community they should no longer be looked at as Indian. Furthermore in a sexist as well as  a racist policy any Indian woman who married a non-Indian man would lose her status as an Indian as would her children. Duncan Campbell Scott went on later to state: â€Å"Our object is to continue until there is not a single Indian in Canada that has not been absorbed into the body politic, and there is no Indian question and no Indian Department.† (Hutchings) It was clear from that quote alone that the Canadian governments views on Aboriginals at that time was that they should not exist and should be absorbed into the community. Canada would later give up the goal of enfranchising Aboriginal peoples after the â€Å"Lovelace† case that was brought before the International Court of Human Rights led to the United Nations condemning Canada for its discriminatory policies. It would be 1985 when Canada would pass bill C-31 to remove the discriminatory parts of the Indian Act. The Indian Act also gave the Canadian government the power to erect residential schools. Schools where pupils were malnourished, had to work to make up for inadequate funding and were taught â€Å"dumbed-down† subject material so that â€Å"To this end the curriculum in residential schools has been simplified and the practical instruction given is such as may be immediately of use to the pupil when he returns to the reserve after leaving school.† (Hutchings) This led to segregation of Indians and non-Indians from a very young age. The worst part about residential schools however was the physical and sexual abuse that went underway up until the 1970’s when schools started closing. Children’s tongues would be nailed down for speaking native languages, as well as having semi regular checks of genitalia. The abuse was so widespread and gruesome that the Canadian government pledged over three hundred and fifty million dollars to help the Aboriginal peoples that attended the residential schools. The Canadian government continues to however maintain the Indian Act, which by sheer existence is a blatant act of racism. The act itself means that Aboriginal peoples are treated in a different way than other Canadian citizens, there is no other first world country in the world that has policies that differentiate people based solely on the race. Canada is often seen as very welcoming towards the Asian peoples with a  recent study by the Canadian Immigration showing that by 2031 it is predicted that white people will be in the minority in cities of Toronto and Vancouver. (Young) This however was not always the case with the infamous â€Å"Chinese head tax† that was invoked on Chinese immigrants. The tax rose from fifty dollars to five hundred dollars during the period of 1900 to 1903. This is inexcusable and blatantly targeted those not just of Chinese descent but rather â€Å"Orientals† in general. (Greengrass) The racism towards the Chinese reached a high on July 1, 1923 when the Chinese Immigration Act was invoked. It is more commonly known to Chinese Canadians as â€Å"Humiliation Day†. The act meant that only selected classes of Chinese immigrants would be granted entry into Canada, namely Diplomats, students, children of Canadians and Investors. Canada was now openly using racist policies to pick and choose which class of a certain race of people they wanted to enter their country. Only in May of 1939, was the Chinese Immigration Act receded. In general South East Asian’s were subjected to not being granted entry in Canada simply because of their race. Between 1914 and 1920, only a single Indian was admitted into Canada because of the racist immigration policies in place. The discrimination against Indians came to a head when The â€Å"Komagatu-Maru† passenger vessel was denied entry into Vancouver even though there were three hundred and seventy six Indians on board having sailed all the way from China. (Greengrass) It is quite possible that the worst treatment towards â€Å"Orientals† was in fact towards the Japanese that called Canada home or were otherwise refugees. During the period of the second world war, in 1942 Japanese Canadians were forced to live in camps, the living conditions were only slightly better than the camps that the Nazi’s had built. (Greengrass) The Japanese people were subjected to a comparable fate as Jews would have felt in Nazi Germany, however there was no extermination or genocide on the scale of Nazi Germany. All in all, the biggest conclusion should come through a key exclusion. There is no racial prejudice that has been recorded towards that of â€Å"White Aryan† Canadians. Canada is a racist country and has clearly been one for some time. Although the Canadian government has apologized and tried to make amends the clear sentiment still permeates through the people. It is something I personally felt while residing in Ottawa. Whether Canada likes it or not, by the year 2031, whites will no longer be of the majority in the two biggest cities in  Canada. This brings a certain comfort as change is coming and there seems to be no way to halt it. Those who remain and insist on fielding racist views will be forced to change or may face racism on themselves. Although no two wrongs make a right, it is probably of no comfort to racist Canadians that history does repeat itself. I personally am of the belief that should Canada grow to appreciate what makes different cultures unique and create a â€Å"fusion culture† whereby different customs are integrated into Canadian customs, Canada as a whole will benefit. Works Cited Crawford, Alison. â€Å"Prison Watchdog Probes Spike in Number of Black Inmates.† CBCnews. CBC/Radio Canada, 15 Dec. 2011. Web. 21 Apr. 2014. . Greengrass, John. â€Å"A HISTORY OF RACISM IN CANADA’S IMMIGRATION POLICY.† Peoples Commission. Peoples Commission, 13 May 2010. Web. 21 Apr. 2014. . Hutchings, Claire. â€Å"Canada’s First Nations: The Legacy of Institutional Racism.† Canada’s First Nations: The Legacy of Institutional Racism. Tolerence, 04 Feb. 2012. Web. 29 Apr. 2014. . News, CBC. â€Å"‘Systemic’ Racism in Canadian Forces Needs Inquiry, Veterans Say – Nova Scotia – CBC News.† CBCnews. CBC/Radio Canada, 13 Mar. 2014. Web. 21 Apr. 2014. . Oliver, Don. â€Å"What It Means to Be Black in Canada.† The Mark News. The Mark News, 14 July 2011. Web. 21 Apr. 2014. . Oreopoulos, Philip, and Diane Dechief. â€Å"Why Do Some Employers Prefer to Interview Matthew, but Not Samir? New Evidence from Toron to, Montreal, and Vancouver.† Metropolis British Columbia Centre of Excellence for Research OnWorking Paper Series N/A 11-13.N/A (2011): 1-68. Http://mbc.metropolis.net/assets/uploads/files/wp/2011/WP11-13.pdf. Web. 21 Apr. 2014. â€Å"A Part Of Our Heritage – Underground Railroad.† YouTube. YouTube, 09 May 2007. Web. 21 Apr. 2014. . Pfeifer, Jeffrey E., and James R. P. Ogloff. â€Å"Ambiguity and Guilt Determinations: A Modern Racism Perspective1.† Journal of Applied Social Psychology 21.21 (1991): 1713-725. Print. Tavlin, Noah. â€Å"Africville: Canada’s Secret Racist History | VICE Canada.† VICE. VICE, 04 Feb. 2013. Web. 21 Apr. 2014. . Teixeira, Carlos. â€Å"Journal of Housing and the Built Environment, Volume 23, Issue 4 – Springer.† Journal of Housing and the Built Environment, Volume 23, Issue 4 – Springer. Springer Science + Business Media B.V., 12 Sept. 2008. Web. 21 Apr. 2014. . Young, Ian. â€Å"Chinese Numbe rs in Vancouver, Toronto to Double by 2031.† South China Morning Post. South China Morning Post, 06 Apr. 2013. Web. 29 Apr. 2014. .

Submit and Syllabus

Facts:-During fall 2012, Simpson submitted a Syllabus Acknowledgement. -Course syllabus contains information about course requirements, grading procedures, and late or missing assignments. -Course syllabus informed students that Assignment 10 was due no later than 12pm, November 2, 2012. -Simpson turned in assignment at 12:31pm on November 2, 2012 -Professor Skinner reduced Simpson’s grade from 100 to 85. -Simpson had not asked for additional time to complete the assignment.Professor Skinner admitted he would have given an extension had Simpson asked for one. Issue: Does Professor Skinner have the discretion to deduct an arbitrary number of points from a late assignment? Holding: Yes, Professor Skinner does have the discretion to deduct an arbitrary number of points from a late assignment. Reasoning: The court cited that the fact that Simpson neither read nor understood the Syllabus Acknowledgement is irrelevant. Simpson signed and submitted the Acknowledgement. Therefore Simp son agreed to follow the course requirements.He the violated those terms by knowingly submitting his assignment late. He is subject to a penalty for submitting his assignment late. Simpson should have been aware of his rights and duties as a student. Since he knowingly submitted his assignment late and/or failed to request additional time, Professor Skinner had the authority and discretion to impose the 15 point penalty. The course syllabus states that â€Å"assignments are due on time. Late points may be applied at the instructor’s discretion. † (Syllabus, p.2)â€Å"Students may submit requests for extra time. If granted, the instructor cannot deduct late point. † The Syllabus Acknowledgement states, in plain English, that by signing and submitting the Acknowledgement the student avows that he had â€Å"read the syllabus and agrees to all the course requirements. † (S. A. p. 11) Simpson admitted that he submitted a Syllabus Acknowledgement without readin g it. The syllabus does not limit the instructor’s discretion in any way, therefore it is the decision of the court that the grade of 85 is upheld.

Saturday, September 14, 2019

The Influence of Ferlinghetti

Lawrence Ferlinghetti's father died before he was born, and his mother was placed in an insane asylum. He was left to be cared for by relatives, and eventually foster parents. Lawrence was ten years old when the stock market crashed October of 1929, which led to the Great Depression. He was twenty when World War II began in September of 1939. Serving as a Lieutenant Commander of the Navy during the war eventually exposed him to the traumatic effects of the atomic bomb that was dropped on Nagasaki. He explained how anyone who was able to witness the aftermath â€Å"would suddenly realize that they'd been kept in the dark by the United States government as to what atomic bombs can do. † (nndb. com) This event changed Ferlinghetti. He became one of the key people of the Beat movement. The Beat poets â€Å"rebelled against what they saw as their country’s social conformity, political repression, and prevailing materialism† (868, Ann Charters). His City Lights bookshop â€Å"was an early gathering place of the Beats, and the publishing arm of City Lights was the first to print the Beats' books of poetry† (biography. om). Although he was not always recognized as a core member of the young group of poets, his poems often contained remarks that had the potential to transform other peoples’ views. Through three of his poems, he influenced change by protesting the repression in society, the violence in war, and the injustices of the United States Gover nment. Ferlinghetti finds popular culture unsettling, and expresses his view of society in his poem, â€Å"The World is a Beautiful Place†. He hopes that people will recognize what they have become, and long for individuality and change. Our Name Brand society / is prey to / [its] men of distinction† refers to how our society is constantly trying to keep up with the latest trends and what is popular at the moment. And the men of distinction are the ring-leaders in a sense; they are the advertisers, the market researchers, and often the trend setters. They quickly learn what to market, how to market, and who to market to. Most people are afraid to step out of the box in fear that they would not be accepted by the majority, and be left on the outskirts of mainstream society. Thus, the â€Å"Name Brand† society can be viewed as being a slave to the â€Å"Men of distinction†, and unable to break away. He goes on to show his disapproval of pop culture in another poem titled â€Å"I Am Waiting†. He writes, â€Å"I am waiting / to see God on television / piped onto church altars / if only they can find / the right channel / to tune in on. † Society today is heavily influenced by mass media and advertisements. Ferlinghetti realizes that America no longer contains the core Christian values that the country was built upon, because all their energy has been absorbed by advertisers, trends, and constant consumerism. The mention of how people would not even be able to find the right channel if God were on television means that he believes society is too deeply absorbed into popular culture that it would be almost impossible to break away at this point. He challenges society to change their ways. The capitalization of the word â€Å"God† is used in syntax. â€Å"Lowercasing God† in certain cases can be seen as â€Å"An attempt to obscure the reference to God† (ncsu. edu). Ferlinghetti chooses to capitalize God because of the context in which he uses the word. He tries to allude to the Christian faith, because of the fact that this country was established as one nation under God. If he had not capitalized the word, the meaning may have been lost. Additionally, war is something that Ferlinghetti speaks out against often in his poems, especially after witnessing its devastating power first-hand. In â€Å"I am waiting†, Ferlinghetti is â€Å"Waiting / for the Age of Anxiety / to drop dead†. The words â€Å"Age† and â€Å"Anxiety† are capitalized because he makes a reference to another poem. The Age of Anxiety is an eclogue by Wystan Hugh Auden that captures the imagination of the cultural moment during World War II, and is about a man’s quest to find his identity in the middle of it all (press. princeton. edu). Ferlinghetti refers to that man’s concern of not being able to find his identity. He realizes that in a war-torn world, full of violence and injustice, it is difficult to find self-identity because people are expected to focus on their country, rather than themselves; Ferlinghetti feels there is no use in trying to find something that he strongly believes no longer exists. Thus he is waiting for it to drop dead. â€Å"The world is a beautiful place/ to be born into/ if you don’t mind some people dying/ all the time† is a stanza from â€Å"The World is a Beautiful Place†. Being a Commander during World War II, he witnessed the destruction the war caused. He saw people get killed, and injured constantly. Ferlinghetti gained the courage to speak out against war, which influenced change; he set an example to others by being the change. In the preceding excerpt from â€Å"The World is a Beautiful Place†, Ferlinghetti not only juxtaposes beauty with death, but also birth with death. This creates a more powerful contrast to the word death, which is a direct result of the war he refers to in the stanza. Irony is a central theme in the poem. The title â€Å"The World is a Beautiful Place† is ironic because the majority of the poem portrays the world as a place full of negative experiences and tragedies. Also, Ferlinghetti separates the words â€Å"All the time† on its own line, allowing readers to easily understand that the poet is trying to stress that people are constantly surrounded by death when in war, which is another reason he calls for an end to it. In â€Å"A Tentative Description of a Dinner to Promote the Impeachment of President Eisenhower†, Ferlinghetti shows his disapproval for not only President Eisenhower, but for all US Presidents that came after Franklin D. Roosevelt. Harry S. Truman, who took Roosevelt’s place after his death in 1945, was known for corruption. He ignored scientists’ warnings of how the radiation from the atomic bombs in Japan would cause severe health and environmental issues for generations. Also, republicans claimed that he â€Å"condoned and covertly supported corruption among members of the White House staff and within government departments† throughout his presidency (presidentprofiles. com). President Eisenhower was in office when the United States became more seriously involved with the Vietnam War, which is often remembered as one of the most controversial wars in US history. At the end of the poem, Ferlinghetti writes â€Å"After every soul was seated / and waited for the symbolic mushroom cloud soup to be served / and keynote speeches to begin / the president himself came in / and said / we resign†. The mushroom cloud is a direct reference to the mushroom cloud that resulted from the atomic bombing of Nagasaki, which Ferlinghetti saw the aftermath of. By placing the fictional storyline in this order, he proposes an alternative sequence of events; Instead of announcing that the bombs were going to be dropped, President Truman should have stepped back from the plan and figured out a better solution, especially since official surveys soon after World War II ended proved â€Å"the atomic bombs were unnecessary† (nytimes. com). Ferlinghetti wanted more Americans to notice what is regularly overlooked by most. By calling out these Presidents in his poem, he caused change by making people take more note of the Government’s wrongdoing. In the same poem, Ferlinghetti writes about how â€Å"No invitations had to be sent out / for the great testimonial dinner / except to politicians / whose respected names wouldn’t lend weight / to the projects / but who did not come anyway. † He refers to how politicians in general often avoid answering questions, or fail to give clear responses to questions that the public may have. Even when given the opportunity to justify their actions or claims, politicians have a tendency to avoid doing so, in fear of causing any sort of conflict. The poem â€Å"A Tentative Description of a Dinner to Promote the Impeachment of President Eisenhower† has literary elements that play an important part in the meaning of the text. The title is tentative because the story is not true, but the message can be easily interpreted offensive or vulgar. The poem was written in 1958, while President Eisenhower was still in office. He may have been hesitant to put out a poem that mentioned impeaching the current President. The syntax that Ferlinghetti chose to use for certain parts of the poem allows the reader to imagine the setting more clearly. The imagery of the poem makes the reader feel as though he or she is in the room, sitting at the table, and waiting for their meal, which makes the story that much more believable. Ferlinghetti also uses repetition of the phrase â€Å"except peace†. He uses those words to promote peace, and to show how peace could have been a more sensible choice as opposed to turning to the bombs to end the war. Its repetition shows that Ferlinghetti sees peace as the answer to most issues. The word â€Å"except† could also be interpreted as â€Å"accept†. Because he is a pacifist, he encourages people to accept the idea of peace, rather than to turn the the fastest solution, as President Truman did when he ordered the bombs to be dropped. Evidently, Lawrence Ferlinghetti was born into an era where change was needed. The aftermath of World War II had greatly influenced him as a writer, and encouraged him speak out against what he saw in mainstream society, war, and the Government through his writing. He clearly had a lasting social impact. His poem â€Å"A Tentative Description of a Dinner to Promote the Impeachment of President Eisenhower† was so influential, it â€Å"Inspired Lorenzo Milan [An American writer and activist] to begin building community radio stations† (youtube. com), which allows people to speak their minds as Ferlinghetti so often did. Ferlinghetti is now 92, and amazingly â€Å"still writes and works in his City Lights bookstore, which is still at the same location, and still publishes affordable paperbacks by struggling authors† (nndb. com).