Wednesday, July 31, 2019

Is King Lear Nihilistic or Hopeful?

Is King Lear nihilistic or hopeful? Satisfying, hopeful, and redemptive: some critics would say that these adjectives belong nowhere near a description of King Lear. One critic, Thomas Roche, even states that the play’s ending is â€Å"as bleak and unrewarding as man can reach outside the gates of hell† (164). Certainly, Roche’s pessimistic interpretation has merit; after all, Lear has seen nearly everyone he once cared for die before dying himself. Although this aspect of the play is true, agreeing with this negative view requires a person to believe that Lear learns nothing and that he suffers and dies in vain.Indeed, this is exactly what Roche believes when he states that at the play’s end, â€Å"Lear still cannot tell good from evil . . . or true from false† (164). This nihilistic approach, however, not only disregards many of the play’s moments of philosophical insight, but it also completely misinterprets Shakespeare’s intent. Th at is not to say that Lear is without fault at the end of the play; as Shakespeare surely understood, Lear is still human, and as such, he is subject to human frailty. What is most important about Lear, however, is not that he dies a flawed man but that he dies an improved man.Therefore, although King Lear might first appear â€Å"bleak,† Shakespeare suggests that Lear’s life, and human life in general, is worth all of its misery because it is often through suffering that people gain knowledge about the true nature of their individual selves and about the nature of all humanity (Roche 164). From the very beginning of the play, Shakespeare suggests that King Lear has much to learn. As Maynard Mack explains in his essay â€Å"Action and World in King Lear,† the reader/audience is immediately invited to sense that Lear is â€Å"too deeply . . . omfortable and secure in his ‘robes and furr’d gowns’, in his rituals of authority and deference . . . and in his childish charades† (170). In other words, there is an immediate sense that Lear is not truly aware of the harsh realities of human life. For instance, when Lear says that he has divided his kingdom into thirds for each daughter so that he can retire and â€Å"Unburthened crawl toward death,† he shows that he is completely lacking in common sense by assuming that his plan will go according to his will and that the transition of power will run smoothly (1. . 43). Almost instantly, Lear is proven foolish when Regan and Goneril â€Å"hit together† and agree to â€Å"do something, and in the heat† to strip their father of any power that he has remaining (1. 1. 306, 311). Mack calls this rapid string of events that follow Lear’s hasty abdication â€Å"the waiting coil of consequences [that] leaps into threatening life,† bringing with it the unmistakable message that Lear was terribly wrong in choosing to reward his false-flattering dau ghters with the gift of his kingdom (170).Lear’s gift to Goneril and Regan, whose quick deception shows the falseness of their affections toward their father, proves that Lear is unable to see the love, or lack thereof, that others have for him. Likewise, when he becomes enraged at Cordelia after she refuses to flatter him, Lear reveals that he, like Goneril and Regan, is unable to have altruistic love for another person when he says to Cordelia that it would have been â€Å"Better thou/ Hadst not been born than not t’ have pleased me† (1. . 235-236). In essence, his â€Å". . . power [and his love] to flattery bows† and he is only able to love another person when that person appeals to his sense of vanity, so when those who truly do love Lear, namely Cordelia and Kent, refuse to appease his vain nature, Lear banishes them, â€Å"Without grace . . . love . . . or benison† (1. 1. 149, 266). This inability to accept love and relationships â€Å"as t heir own reward,† Mack states, is Lear’s fatal flaw (170).Mack argues that relationships can lead to happiness but that they lead to heartache and despair equally as often; in order to have any good relationships, then, a person must accept others for who they are, which is something that Lear is unable and unwilling to do (Mack 170). Indeed, Lear would have been very happy living his remaining years without any meaningful knowledge about love or relationships, surrounding himself in a â€Å"childish charade† of false love and false truth; from this point forward, however, Lear will have to learn the consequences of his blindingly ignorant actions (Mack 170).The ignorance about life and human nature that Lear demonstrates in the play’s first scene, then, leads to his largest mistake, the mistake that serves as a turning point from which all other actions are the direct consequence. As Mack explains, because Shakespeare put the turning point at the beginnin g of the play, â€Å"The meaning of action [in Lear] lies rather in effects than in antecedents, and particularly in its capacity, as with Lear in the opening scene, to generate energies that will hurl themselves . . . in reverberations of disorder† (170). That is, because Lear’s fatal flaw resents itself early rather than later on in the play—as is customary for Shakespearean tragedy—the meanings and consequences of his actions, as well as Lear’s own thoughts/awareness, have a longer time to evolve. How the early turning point in Lear helps to emphasize Lear’s learning experience is clarified by comparing the play with another Shakespearean tragedy; the turning point in Othello, for example, occurs in act 3, scene 3 when the seeds of jealousy that Iago has planted throughout the first three acts finally take root inside of Othello’s mind.It is not until this time that Othello’s fatal flaw emerges, when, in a jealous rage, he v ows that his bloody thoughts â€Å"Shall nev’r look back . . . / Till a capable and wide revenge / Swallow them [Desdemona and Cassio] up† (3. 3. 454-457). The play is already half over before Shakespeare reveals Othello’s fatal flaw, and it is not until the final scene that Othello learns how gullible he has been. In essence, Othello learns nothing from his experience; he dies in vain, humiliated and heartbroken.In Lear, on the other hand, the main action throughout the entire play revolves around Lear’s painful suffering and his purgatorial learning experience, all stemming, of course, from his rash, ignorant behavior in the first act. In order for Lear to learn from his selfish and ignorant ways, he must first realize that he has been blind to the truth. Lear is served a cold dish of reality when Goneril and Regan disrespectfully refuse to allow their father the privilege of his noble knights, which of course, are the last symbol of his past authority and his kingly pride: GONERIL. Hear me, my lord.What needs you five and twenty? Ten? Or five? To follow in a house where twice so many   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Have a command to tend you? REGAN. What need one? (2. 4. 259-263) Not only do these lines represent how Lear’s daughters have contemptuously taken away his remaining power, but they also represent the loss of Lear’s dignity by leaving him a shell of his former self, without a single conciliatory knight left to appease his sense of self-importance. Once this happens, Lear is left enraged and desperate, pridefully stating that even â€Å"our basest beggars / Are in the poorest superfluous† and that he needs â€Å". . . ore than nature needs,† else â€Å"Man’s life is cheap as beast’s† (2. 4. 263-266). In other words, Lear feels that his daughters are treating him like an animal by depriving him of his royal train. Clearly, Lear still clings to t he pompous supposition that his needs are above the needs of the â€Å"basest beggar†Ã¢â‚¬â„¢ and he still feels like the innocent victim of his daughters’ cruel behavior (2. 4. 263). Even with all of Lear’s continuing faults, however, the seeds of knowledge are beginning to grab hold; it has been painful, but he finally sees that Goneril and Regan’s false tongues had blinded him from their true, unloving natures.That is, when he calls them â€Å"unnatural hags† and  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å". . . a disease that’s in my flesh,† he finally sees what love is not (2. 4. 277, 221). In this way, Lear has had his idealized vision of the truth—one where he is flattered, pampered, and adored—painfully stripped away from him; even still, it will take a purgatorial storm and subsequent repentance before Lear learns what the true meaning of love is. Fittingly, as Lear storms out of the castle and into the harsh weather, Regan states tha t â€Å"the injuries† that â€Å"willful men† do â€Å"themselves procure / Must be their own schoolmasters† (2. . 301-303). What Regan means by this is that the storm will teach Lear that he must swallow his pride, but the statement also foreshadows how Lear will learn something much more important about human nature while he suffers from the elements. In fact, it is in the rage of the storm, interspersed with his own rage, that Lear has his first unselfish thoughts, as is evident when he asks the Fool â€Å"How dost my boy? Art cold? † and he (Lear) says to him â€Å"Poor Fool and knave, I have one part in my heart / That’s sorry for you yet† (3. 2. 68, 72-73).Lear further portrays the empathy that he has for others when he stands alone on the heath and, in a moment of heartfelt lucidness, laments over the houseless masses:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Poor naked wretches, wheresoe’er you are, That bide the pelting of this pitiless s torm, How shall your houseless heads and unfed sides,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Your looped and windowed raggedness, defend you   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  From seasons such as these? (3. 4. 28-33) Not only does Lear express sincere concern for others during this soliloquy, but he also expresses regret for the way that he has treated his subjects when he says that â€Å"O, I have ta’en / Too little care of this! (3. 4. 33-34). Indeed, this is the first time in the play that Lear admits any kind of wrongdoing, and as such, it is the first time that he looks inside himself at his own soul and sees that it, like his eldest daughters’ souls, is far from spotless. Following Lear’s profound insight on the heath, he moves into the hovel where, after meeting Edgar, who is disguised as the beggar Poor Tom, he begins to question the nature of all humanity.When Lear sees Edgar’s cold, shivering, and â€Å"uncovered body,† he asks the eternal question †Å"Is man no more than this? † (3. 4. 105). When Lear says that â€Å"The unaccomodated man is no more / but such a poor, bare, forked animal,† he is essentially saying that human beings, like their naked bodies, are pitiable creatures (3. 4. 109-110). Likewise, when he proceeds to strip of his garments, he is making the symbolic gesture that he is no better than Poor Tom; that is, he realizes that he, too, is pitiable.Lear’s recognition that his own body is pathetic, the literary critic Paul Jorgensen argues in his book Lear’s Self-Discovery, is Lear’s first insight. Jorgensen argues, â€Å"self-knowledge means understanding the vileness of the flesh†; in order to attain wisdom, he asserts, people must be willing to recognize that they â€Å"are born of the seed of Adam† and as such, are â€Å"impure . . . and abominable before God† (26). Shakespeare, however, does not suggest that Lear is necessarily doomed because he is the So n of Adam.Rather, the episode with Poor Tom in the hovel simply suggests that all of humanity, including its royalty, is flawed; using Lear’s insight as an example, Shakespeare suggests that in order for people to be redeemed by God, they must first realize humankind’s shortcomings and learn to pity one and all. Lear’s compassion toward Edgar’s frailty and his insistence that he have the company of the naked, â€Å"noble philosopher† proves that he has learned more than just empathy and self-awareness; he has also learned to value his relationships with people despite their flaws, regardless of what he might gain from these relationships (3. . 175). Another example of Lear learning altruistic acceptance comes from his relationship with the Fool, who, as A. C. Bradley explains, makes â€Å"incessant and cutting reminders of [Lear’s] folly and wrong†; indeed, Lear gets nothing from the Fool other than insults, such as when the Fool sugg ests that Lear has â€Å"a little tiny wit† (Bradley 24; 3. 2. 74). Yet despite his lack of reward, Bradley argues, â€Å"Lear comes in his affliction to think of others first, and to seek, in tender solicitude for his ‘poor boy,’ the shelter he scorns for his own bare head† (24).In essence, Lear has learned how to accept his relationships as â€Å"their own reward,† which, as surely Mack would agree, is the first step in learning how to love (Mack 170). Clearly, the relationship that Lear has with his Fool is unusual; in fact, the Fool’s role in the play is so unusual that one critic, Jan Kott, argues in his essay â€Å"King Lear, or Endgame† that the Fool’s character represents the theme of the entire play, namely, â€Å"the decay and fall of the world† (152).In an absurd world where no action has any real meaning, Kott states, the Fool is the only character to realize that â€Å"the only true madness is to regard this world as rational† (167). Certainly, what Kott says about the Fool is correct, to a point. The soliloquy he gives while in the hovel in which he prophesizes that â€Å"the realm of Albion† will â€Å"come to great confusion† certainly proves that the Fool does represent an absurdist viewpoint, but Kott misinterprets Shakespeare’s intent when he states that the play is itself absurd (3. 2. 91-92). One must remember that Shakespeare makes the Fool disappear at the end of act 3 for a reason.Surely, life is meaningless during the first half of the play when Lear blindly lives his life without truly learning anything about the nature of humanity, but as Lear suffers in the third act, he also learns how to feel for the weak and houseless poor, to â€Å"discern the falseness of flattery and the brutality of authority,† and to â€Å"pierce through rank and raiment to the common humanity beneath† (Bradley 24). As a result of learning, Shakespeare sug gests, the world—and Lear’s part in it—ceases to be absurd; consequently, the Fool, and his philosophy, quietly disappear.It is by no coincidence that Lear’s suffering and subsequent learning in the third act occur during a miserable storm. In fact, Shakespeare uses the storm as a physical representation of the raging storm of emotions that occurs in Lear’s mind; that is, the â€Å"contentious storm† symbolizes and embellishes what Lear himself calls â€Å"The tempest in my mind† (3. 4. 6,12). Likewise, it is by no coincidence that Goneril, Regan and Cornwall grow worse from their success; they all remain warm, dry, and comfortable during the storm and they have all gained great power, but not one of them learns anything during the course of the play.Indeed, as Bradley explains, â€Å"The warm castle becomes a room in hell and the storm swept heath a sanctuary† (33). The power of comfort to corrupt is apparent several times dur ing the play, but it is perhaps most shocking when Cornwall gouges out Gloucester’s eyes and proceeds to stomp on them, telling the old man that â€Å"Upon these eyes of thine I’ll set my foot† (3. 7. 69). It is in these lines that the reader/audience sees how powerful, and indeed untouchable, people feel when they have all of the comforts of the world to support them (3. . 69). Cornwall, like Lear at the beginning of the play, feels invincible, but unlike Lear, he never learns that he is â€Å"not ague / proof† (4. 6. 105-106). Therefore, by contrasting Cornwall, and the other â€Å"bad† characters, to Lear, Shakespeare not only reinforces the idea that knowledge and redemption come to those who suffer through physical and emotional storms, but he also suggests that people who have power and comfort often feel that they are superhuman and have nothing left to learn (Bradley 33).Of course, the eventual demise of all of the wickedly comfortable prov es otherwise. In addition to the evil characters acting as foils to Lear, Gloucester’s symbolic blindness and subsequent literal blindness also help to emphasize how Lear gains knowledge through suffering. Indeed, Gloucester acts as a foil to Lear throughout the play: both are initially blind to the actions of their wicked children, both disown their loyal children, and, in turn, both learn the truth in very painful ways.Until his blinding, Gloucester believes that Edgar is a â€Å"strange and fastened villain† who has betrayed him and that Edmund is a â€Å"loyal . . . boy,† but the quickness with which Gloucester realizes Edmund’s true intent after Cornwall has blinded him, screaming â€Å"O my follies! Then Edgar was abused† strongly implies that, like Lear, Gloucester had to suffer in order to see the light (2. 1. 79-86; 3. 7. 92-93). In this way, Shakespeare uses irony to reinforce the idea that those who have eyes are often blind to the truth and those who suffer often see more truth than their bodies and minds can handle.Yet another person one might compare Lear to is his loving and loyal daughter, Cordelia, who is so angelic that her tears are like â€Å"holy water† that from â€Å"heavenly eyes† flow (4. 3. 31). In essence, she is the â€Å"goodliest† of human figures and a model to which Lear can aspire to become more like (4. 3. 17). Indeed, Lear shows that he has become more like his blessed daughter after he reconciles with her and tells her that â€Å"When thou dost ask me blessing, I’ll kneel down / And ask of thee forgiveness . . .† (5. 3. 10-11).This humble, indeed shameful statement seems not to have come from the same selfish, egotistical king who banishes his daughter for not proving her love to him, and in fact, it does not. Lear is a changed man. What his purgatory has prepared him for, his reunion with Cordelia, the play’s Christ-figure, has set in stone. Lear h as finally and completely learned how to love, and for that, he is forgiven and completely redeemed. There are some critics, of course, who believe that Lear does not learn how to love, or learn anything else for that matter.In his essay â€Å"‘Nothing Almost Sees Miracles’: Tragic Knowledge in King Lear,† Roche even argues that Shakespeare intended Lear to be a â€Å"total failure, in fact and in vision† (168). Roche continues by stating that at the end of the play, Lear â€Å"sees nothing† because â€Å"every gesture of his love is countered by an equal and opposite gesture of hatred† (164). Indeed, Roche is correct when he states that Lear is still flawed at the end of the play.After all, he still feels like a victim to Goneril and Regan’s cruel behavior and he is still vengeful, as is evident when he proudly states to Cordelia’s corpse that â€Å"I killed the slave that was a-hanging thee† (5. 3. 276). Even in his def ense of Lear’s knowledge, Jorgensen states that â€Å"Lear is still pathetically unwise in worldly matters at the end of the play,† but he continues by stating that none of this matters because Lear â€Å"has learned that which, especially for a dying man, is all-important† (7).That is, Lear has learned about the meaning of love, the pitiable frailty of the human form, and the miseries of the unfortunate. In essence, he has learned what it means to be a human instead of a king. Therefore, it does not matter that Lear still has faults because his suffering has taught him eternal truths—truths that are worthy of his redemption. In the end, King Lear almost ceases to be tragic (Bradley 32). Certainly, Lear’s suffering is severe, but Shakespeare shows that it is Lear’s suffering that leads to his learning and his subsequent redemption.Prior to Lear’s painful banishment, he is a pampered, flattered king living a false life, full of false l ove. It is excruciating for Lear to face that his life has been 80 years of lies, but in order to learn the truth, he must first suffer through the pain, and as Shakespeare clearly shows, it is better to learn through suffering than to remain comfortable and ignorant. Therefore, Lear’s life is worth all of the agonies it incurs; after all, it is only after Lear begins to suffer that he truly begins to live.

Tuesday, July 30, 2019

Law of the Harvest LDS Talk

My dear Brothers and Sisters, It is so good to be with you today. The warmth and love that each of you have is so good to feel and to be part of the fellowship of the saints. Brother XYZ has asked that I talk to the Law of the Harvest. â€Å"Gallations 6:7 â€Å"Whatsoever a man Soweth , that shall he reap† I wish to first share with you a story. Many years ago when I was working in Sacramento I had to make a trip for work to San Los Opisbo. The funeral was to be in the early afternoon so I could make the trip in one day. I got all my items together. I had maps and directions from map-quest.I knew my direction and I was going to make it there. I got there in no problem but noticed that I took me a little longer then I had planned. Once there service was over I got in the van that I was driving and looked over the map and saw that I just needed to drive on the road I was on and then turn near the town of Avenal and that would get me on I-5. I started out and began driving. Aft er a while I noticed that I hadn't taken the right turn that I had planned on doing. I pulled over and saw that if I stayed on this road I could go into the town of Coalinga and then get I-5 again.But it was going to be more driving on this quite road. I said to myself well I will just have to go faster to make up the time. It felt like forever but I know it was not but I came up over a rise and saw the familiar outline of a highway patrol car. I pulled to the right of the road right as I passed him. His lights came on and over to me and came around behind me. He came over to my window where I had my drivers license and insurance waiting for him. He askeme where I was heading. After a long explanation he saw all my maps and told me that I was going to fast and that I needed to slow down.He let me off but said that if he ever caught me again He would â€Å"throw the book at me† – What did I learn from this lesson of my life. I had made a plan I had the directions and th e path laid our for me. I had a road map but I failed to get on the right road. Then in haste of youth I decided that I would try to race to make up time. Which cost me time. This is like life, Laws are eternal truth that we follow and the direct action of those laws. We can choose to follow the commandments but we CAN NOT CHOOSE the result of that choice. we have the map and course laid out for us to follow. Our leaders guide the way for us to follow.We need to listen to there council and wisdom. We can NOT expect to live a life of sin and of misdeeds and still return back to our Father. But I KNOW that the converse is true. That if we live a life of goodness and of obedience then we shall be welcomed home to our father. Then for life there is redemption. The amazing gift that God has give us through his son Jesus Christ. The way to overcome the consequences of our actions. Like the officer in my story They can grant us forgiveness and met out mercy because justice was served those many years ago in Gessmetine groves and on Calvary's hill.D&C 130 20-21 â€Å"There is a law, irrevocably decreed in heaven before the foundations of this world, upon which all blessings are predicated—and when we obtain any blessing from God, it is by obedience to that law upon which it is predicated. † Take time today to reflect upon your life and the things that you have. I know that you will find that it is a direct reflection of the life that you have lived. Before I continue I need to read another scripture as a clarification Alma Chapter 38 ( Alma speaking to his sone Shiblon.He being a rightous man who was great missionary unto the people of Zoramites And now, my son, I trust that I shall have great joy in you, because of your steadiness and your faithfulness unto God; for as you have commenced in your youth to look to the Lord your God, even so I hope that you will continue in keeping his commandments; for blessed is he that endureth to the end. I say unto yo u, my son, that I have had great joy in thee already, because of thy faithfulness and thy diligence, and thy patience and thy long-suffering among the people of the Zoramites.For I know that thou wast in bonds; yea, and I also know that thou wast stoned for the word’s sake; and thou didst bear all these things with patience because the Lord was with thee; and now thou knowest that the Lord did deliver thee. And now my son, Shiblon, I would that ye should remember, that as much as ye shall put your trust in God even so much ye shall be delivered out of your trials, and your troubles, and your afflictions, and ye shall be lifted up at the last day. I share that scripture so that none may think that the trails that they have are a ‘punishment' for sin.Trails act as the refiners fire spoken of in 1 Peter 1:7. Elder Sill said this â€Å"One of the distinguishing characteristics of our world is that it is a place of law and order, and the basic law of creation is God’ s fundamental law of compensation. It says that all work must be paid for, that we can no more do a good thing without sometime, in some way receiving a reward, than we can do an evil thing without suffering a penalty. In everything that we do, including the very thoughts that we think, we are subject to this interesting, undeviating eternal law.It is just as universal in its operation as are the laws of gravity, electricity, light or heat. It is never set aside, it is never suspended or restricted, and it governs in every department of human activity. Nothing is ever denied to well-directed effort and nothing is ever achieved without it. It is a thrilling challenge, that we may have any blessing that we are willing to live for. And the primary law of the universe is this immutable,†¦Ã¢â‚¬ ¦.. irrevocable law of the harvest that says, ‘Whatsoever a man soweth, that shall he also reap. ’ ( Gala. 6:7 ) ( The Law of the Harvest, p. 1. ) Think of it my fellow saints D& C 82: 10 I, the Lord, am bound when ye do what I say; but when ye do not what I say, ye have no promise. You need to make the choice today the kind of person you want to become and then do what is required to become that son or daughter of God. In my calling I work with the young men. I invite them to chart the course they want to take. If you lay out the course and you make your plans the small choices along the way are easier to make. The blessings are real I have seen them in my life and they can happen in your life.Sometimes other people are in your path that make living the gospel hard. I think of a story from my mission days. My mission president would from time to time send me a missionary that needed some guidance. Elder XYZ was one such Elder. He had a sleeping problem. He would sleep until 10, 11 maybe even noon and then get up to work. When I received the assignment. I was told that I needed to help him not by being the school master but by a quite example of love and com passion. Each morning I would rise at the appointed hour and begin my day. I would follow all the mission rules that I could.I tried with all my might to find people for us to teach and the work with. We began to teach these people when Elder Allen would rise we would begin our day. Brothers and Sisters the Lord blessed us with some amazing people to teach and baptize. Elder XYZ knew it I knew it and President XYZ knew that is was obedience to the rules of the mission and to what we needed to do that produced that fruit. The Lord was bound to help these people as a result of simple Elder ABC following the mission rules. Many times we just need to follow the commandments and as a result og our actions people lives are blessed.This most often happens with church leaders or those who are charged with helping people along the path of life. Because of ones faithful discharge then another is blessed Brother CFD was a faithful home teacher he would go out and visit the people that he had o n his route. Most if not all of them never came to church. He had a name on his list of Brother ERD. For four long years he would go to this man's home and talk with him and invite him to come back. He would get the same answer each time. â€Å"Nope not this week† A change started to come over him as he saw this faithful brother.Then one week he came to church. The ward welcomed him back and he became interested in the work that needed to get done. His wife had to be baptized and his grand kids needed names placed on the roles of the church. He came back to the fold of God because one man decided to share his time with another and follow the charge that he had as a priesthood leader. As we serve others two things happen. 1- Lives of the people change and are made easier or they get stuff that are given to them 2- the people giving the service are rewarded for the work they are done.This reward or compensation is both physical and also spiritual. Alpha was the President of his Teachers quorum , I was the advisor, One Sunday about two years ago we heard that brother YTR had a bad accident and would not be able to mow his lawn. In Priesthood we talked about the needs of Brother YTR and the Bishop told Alpha to get the lawn mowed. Alpha a young 15 year old , holder of the Priesthood of God, planned on going to this house. They got rides for the boys that needed them. They got lawn mowers and edgers. Then They called me.Alpha told me that They were going to there on Wednesday and thought I should know. I was surprised that it was planned. I told him that I could be there and would bring a watermelon if they wanted. He said sure and I was there at the home. Alpha and his fellow members of the Aaronic Priesthood provided service and were blessed. I was taught by these â€Å"boys† and they taught each other. These stories are not unique, you all have these same stories of obedience to a law of God and cherish in the blessings that you received . Each tim e that story is shared the blessings are relived and your excitement is filled.I want to warn us all to not think that these blessings are ours and ours alone. Many faithful people of all religions are given blessings and can feel of the Law of the Harvest. The lord is the same yesterday today and forever and when we do a righteous thing we will be blessed. For those of us who have strayed and who need help getting back on the path there is hope. Christ paid the price for our sin and know how to welcome us back. Luke 8 4- 15 Christ taught the parable of the sower And when much people were gathered together, and were come to him out of every city, he spake by a parable:A sower went out to sow his seed: and as he sowed, some fell by the way side; and it was trodden down, and the fowls of the air devoured it. And some fell upon a rock; and as soon as it was sprung up, it withered away, because it lacked moisture. And some fell among thorns; and the thorns sprang up with it, and choked it. And other fell on good ground, and sprang up, and bare fruit an hundredfold. And when he had said these things, he cried, He that hath ears to hear, let him hear. And his disciples asked him, saying, What might this parable be?And he said, Unto you it is given to know the mysteries of the kingdom of God: but to others in parables; that seeing they might not see, and hearing they might not understand. Now the parable is this: The seed is the word of God. Those by the way side are they that hear; then cometh the devil, and taketh away the word out of their hearts, lest they should believe and be saved. They on the rock are they, which, when they hear, receive the word with joy; and these have no root, which for a while believe, and in time of temptation fall away.And that which fell among thorns are they, which, when they have heard, go forth, and are choked with cares and riches and pleasures of this life, and bring no fruit to perfection. But that on the good ground are they, wh ich in an honest and good heart, having heard the word, keep it, and bring forth fruit with patience. Verse 13 tells of the hope that we have for these who fall away for a time. Let us do what we can to bring them back. The atonement of Christ is for all. I know that as a man soweth so shall he reap.

Monday, July 29, 2019

Present Status and Future Refinements Essay

Present Status and Fut ure Refinement s Jacqueline Fawcett, Ph. D. , F. A. A. N. Abstract The central concepts and themes of t he discipline of nursing are identified and formalized as nursing’s metaparadigm. Examples illustrate the direction provided by the metaparadigm for theory development. Refinements of the metaparadigm through conceptual models and programs of nursing research are proposed. T he discipline of nursing will advance only through continuous and systematic development and testing of nursing knowledge. Several recent reviews of the status of nursing theory development indicate that nursing has n o established tradition of scholarship. Reviewers have pointed out that most work appears unfocused and uncoordinated, as each scholar moves quickly from one topic to another and as few scholars combine their efforts in circumscribed areas (Chinn, 1983; Feldman, 1980; Hardy, 1983; Roy, 1983; Walker, 1983). Broad areas for theory development’ are, however, beginning to be recognized. Analysis of past and present writings of nurse scholars indicates that theoretic and empirical work has always centered on just a few global oncepts and has always dealt with certain general themes. This paper identifies these central concepts and themes and formalizes them as nursing’s metaparadigm. Examples are given to illustrate the direction provided by the metaparadigm for theory development. The paper continues with a discussion o f refinements of t he metaparadigm needed at the levels of ja cqueline Fawcett, Ph. D. , F. A. A. N. , i s Associate Professor, and Section Chairperson, Science and Role Development, School of Nursing, University of Pennsylvania, Philadelphia. Page 84 disciplinary matrices and exemplars nd concludes with proposals for future work needed to advance to the discipline of nursing. Present Status of the Metaparadigm of Nursing The metaparadigrn of any discipline i s a statement or group of statements identifying its relevant phenomena. These statements spell out the phenomena of interest in a most global manner. No attempt i s made to be specific or concrete at the metaparadigm level. Eckberg & Hill (1979) explained that the metaparadigm â€Å"acts as an encapsulating unit, or framework, within which the more restricted . . . structures develop† (p. 927). The Central Concepts of Nursing Evidence supporting the existence of a metaparadigm of nursing i s accumulating. A review of the literature on theory development in nursing reveals a consensus about the central concepts of the discipline-person, environment, health, and nursing (Fawcett, 1983; Flaskerud & Halloran, 1980). This consensus i s documented by the following statements: O ne may. . . demarcate nursing in terms of four subsets: 1 ) persons providing care, 2) persons with health problems receiving care, 3) the environment in which care i s given, and 4 ) an end-state, well-being. (Walker, 1971, p. 429) The major concepts identified (from an nalysis of the components, themes, topics, and threads of the conceptual frameworks of 50 baccalaureate nursing programs) were Man, Society, Health, and Nursing. (Yura &Torres, 1975, p. 22) The units person, environment, health, and nursing specify the phenomena of interest to nursing science. (Fawcett, 1978, p. 25) Nursing studies the wholeness or health of humans, reco gnizing that humans are in continuous interaction with their environments. (Donaldson & Crowley, 1978, p. 119) Image: The Journal of Nursing Scholarship Nursing’s focus i s persons, their environments, their health and nursing itself. Bush, 1979, p. 20) Nursing elements are nursing acts, the p atient, and health. (Stevens, 1979, p. l l ) The foci of nursing are the individual in relation to health, the environment, and the change process, whether it be maturation, adaptation, or coping. (Barnard, 1980, p. 208) Nursing i s defined as the diagnosis and treatment of human responses to actual or potential health problems. (American Nurses‘ Association, 1980, p. 9 ) The four conceptual areas of nursing are: the person receiving nursing; the environment within which the person exists; the health-illness continuum within which the erson falls at the time of the interaction with the nurse; and finally, nursing actions themselves. (Flaskerud, cited in Brink, 1980, p. 665) The do main of nursing has always included the nurse, the patient, the situation in which they find themselves, and the purpose of their being together, or the health of the patient. In more formalized terms, . . . the major components of the nursing [metalparadigm are nursing (as an action), client (human being), environment (of the client and of the nurse-client), and health. (Newman, 1983, p. 388) There i s general agreement that the central oncepts of the discipline of nursing are the nature of nursing, the individual who received nursing care, society-environment, and health. (Chinn, 1983, p. 396) These statements indicate that there i s considerable agreement among scholars as t o the concepts central to the discipline of nursing. In fact, a review of the literature revealed no contradictory statements. RecurringThemes The relationships between and among the concepts-person, environment, health, nursing-are elaborated in recurring themes found in works of nurse scholars since Nightin gale (1859). These themes are listed in Table 1. Summer, 1984, Volumo XVI, blo. 3 Metaparadigm of Nursing TABLE 1 THEMES OF THE YETAPARAWW OF NURSING 1. The principles and laws that govern the life-process, well-being. and optimum function of human beings, sick or well. 2. The patterning of human behavior in interaction with the environment in normal life events and critical life situations. 3. The process by which positive changes in health status are elfected. (Donaldson& Crowley, 1978, p. 113; Gortner, 1980, p. 180) The four central concepts and three recurring themes identify the phenomena central to the discipline of nursing in an abstract, global manner. They represent the metaparadigm. As such, they have provided some direction for nursing theory development. As Newman (1983) explained: It i s within the context of these four major components and their interrelationships that theory development in nursing has proceeded. Theoretical differences relate to the emphasis placed on one or more of the components and to the way in which their relationships are viewed. (p. 388) The relationship between the concepts â€Å"person† and â€Å"health† i s considered in the first theme. Theories addressing this theme describe, explain, or predict individuals‘ behavior during eriods of wellness and illness. Newman’s (1979) theory of health i s one example. This theory includes the concepts of movement, time, space, and consciousness. Newman proposes that â€Å"the expansion of consciousness i s what life, and therefore health, i s a ll about† (p. 66). Another example i s Orem’s (1980) theory of self-care, wh ich maintains that â€Å"self-care and care of dependent family members are learned behaviors that purposely regulate human structural integrity, functioning, and human development† (p. 28). S till another example i s Orern’s theory of self-care deficits. This theory maintains that individuals â€Å"are subject t o healthrelated or health-derived limitations that render them incapable of continuous selftare or dependent care or that result in ineffective or incomplete care† (p. 2 7). The relationships among the concepts †person,â€Å" †environment,† and â€Å"health† are considered in the second theme. Theories addressing this theme Summer, 1B84, Volume XVI, No. 3 describe, explain, or predict individuals’ behavioral patterns as they are influenced by environmental factors during periods of wellness and illness. Such theories place the individuals ithin the context of their surrounding environment rather than considering them in isolation, as in the first theme. Roy and Roberts’ (1981) theory of the person as an adaptive system i s an example. This theory proposes that the person i s a system that adapts to a constantly changing environment. Adaptation i s accomplished through the action of coping mechanisms called the â€Å"regulator† and the â€Å"cognator. † The relationships among the â€Å"person,’’ â€Å"health,† and â€Å"nursing† are considered in the third theme. Environment may also be taken into account here. This heme i s addressed by theories about nursing practice. These theories describe or explain nursing processes or predict the effects of nursing actions. King‘s (1981) theory of goal attainment i s one example. King explains: that a paradigm, or disciplinary matrix, i s more restrictive than a metaparadigm, and that i t â€Å"represents the shared commitments of any disciplinary community, including symbolic generalizations, beliefs, values, and a host of other elements† (p. 926). The authors went on to say, A disciplinary matrix may be seen as the special subculture of a community. It does ot refer to the beliefs of an entire discipline (e. g. biology), but more correctly t o those beliefs of a specialized community (e. g. phage workers in biology). (p. 926) Identification of the metaparadigm i s an important step i n the evolution of a scholarly tradition for nursing. The n e x t step i s r efinement o f t h e metaparadigm concepts and themes, which occurs at the level of the paradigm or disciplinary matrix, rather than at that of the metaparadigm. The Disciplinary Matrix Eckberg and Hill (1979) explained Most disciplines have more than one disciplinary matrix. Each one represents a distinctive frame of reference within which the metaparadigm phenomena are viewed. Furthermore, each disciplinary matrix reflects a particular research tradition by identifying the phenomena that are within its domain of inquiry, the methods that are to be used to investigate these phenomena, how theories about these phenomena are to be tested, and how d ata are to be collected (Laudan, 1981, p. 151). More specifically, the research tradition of each disciplinary matrix includes six rules that encompass all phases of an investigation. The first rule identifies the precise nature f the problem to be studied, the purposes to be fulfilled by the investigation, or both. The second rule identifies the phenomena that are to be studied. The third rule identifies the research techniques that are to be employed and the research tools that are to be used. The fourth rule identifies the settings in which data are to be gathered and the subjects who are to provide the data. The fifth rule identifies the methods to be employed in reducing and analyzing the data. The sixth rule identifies the nature of contributions that the research will make to the advancement of knowledge. (Schlotfeldt, 1975, p. ) In nursing, disciplinary matrices are most clearly exemplified by such conceptual models as Johnson‘s (1980) Behavioral System Model, King’s (1981) Open Systems Model, Levine’s (1973) Conservation Model, Neuman’s (1982) Systems Model, Orem’s (1980) Self-care Model, Rogers’ (1980) Life Process Model, and Roy’s (1984) Adaptation Model. Each Image: The Journal of Nursing Scholarship Page 85 . . . nurse and client interactions are characterized by verbal and nonverbal communication, in which information i s exchanged and interpreted; by transactions, in which values, needs, and wants of each ember of the dyad are shared; by perceptions of nurse and client and the situation; by self in role of client and self in ro le of nurse; and by stressors influencing each person and the situation in time and space. – (p. 144) Orem’s ( 1 980) theory of nursing systems is another example. This theory maintains that †nursing systems are formed when nurses use their abilities to prescribe, design, and provide nursing for legitimate patients (as individuals or groups) by performing discrete actions and systems of actions† (p. 29). Refinement of the Metaparadigm Metaparadigm of Nursing f these nursing models puts forth a distinctive frame of reference within which the metaparadigm phenomena are viewed. Each provides needed refinement of the metaparadigm by serving as a focus-†ruling some things in as relevent, and ruling others out due to their lesser importance† (Williams, 1979, p. 96). Conceptual models of nursing are beginning to make major contributions to the development of nursing theory. Theories derived directly from King’s model and from Orem’s model were identified earlier. A considerable amount of empirical work designed to test unique nursing theories as well as heories borrowed from other disciplines i s n ow being guided by nursing models. Some of the studies are listed in Table 2. TABLE 2 Examples of Research Derived From Conceptual Models of Nursing Oorothy Johnson’s BehavioralSystem Model -An instrument for theory and research development using the behavioral systems model for nursing: The cancer patient. Part I (Derdiarian, 1983). -An instrument for theory and research development using the behavioral systems model for nursing: The cancer patient. Part II (Derdiarian & Forsythe, 1983). -Achievement behavior in chronically ill children (Holaday, 1 974) Maternal response to their chronically ill infants’ attachment behavior of crying (Holaday, 1981) -Maternal conceptual set development: Identifyingpatterns of maternal response to chronically ill infant crying (Holaday, 1 982) -Development of a research tool : Patient indicators of nursing care (Majesky, Brester, & Nishio, 1 978) Myra Levine’s Conservation Model -Effects of lifting techniques on energy expenditure: A preliminary investigation (Geden, 1 982) – A comparision of two bearing-downtechniques during the second stage of labor (Yeates & Roberts, 1984) Betty Neuman’s Systems Model Effects of information on postsurgical coping (Ziemer. 1 983) Dorothea Orem’s Self-care Model -Application of Orem’s theoretical constructs to selfcare medication behaviors in the elderly (Harper, 1984) -Development of an instrument to measure exercise of self-care agency (Kearney & Fleischer, 1 979) Martha Roger’s Life Process Model -The relationship between identification and patterns of change in spouses’ body images during and after pregnancy (Fawcett, 1977) -Patients’ perceptions of time: Current research (Fitzpatrick, 1 980) -Reciprocy and helicy used t o relate mEGF and wound healing (Gill & Atwood, 1 981) Therapeutic touch as energy exchange: Testing the theory (Ouinn, 1 984) Callista Roy’s Adaptation Model -Needs of cesarean birth parents (Fawcett, 1981) -An exploratory study of antenatal preparation for ce- Page 86 sarean birth (Fawcett & Burritt, in press) -Clinical tool development for adult chemotherapy patients: Process and content (Lewis, Firsich. & Parsell, 1 979) -Content analysis of interviews using a nursing model: A look at parents adapting to the impact of childhood cancer (Smith, Garvis, & Martinson, 1 983) Despite the contributions already made by nursing models to theory development, much more work i s needed. In particular, rules addressing methodology and instrumentation must be specified. Moreover, programs of research emanating from each model must be conducted to refute or validate nursing theories. Programmatic research probably i s carried out most expediently by communities of scientists. Hardy (1983) explained that each community of scientists i s . . . a g roup of persons w h o are aware of their uniqueness and the separate identity of their group. The have a special coherence which separates them from neighboring groups, and this special bond means they have a shared set of values and a common commitment which operates as hey work together t o achieve a common goal. Coordination of their activities may include interaction among the coordination of institutions, organizations, groups, and individuals. Such coordinated groups hold a common perspective, common values and common bonds, a nd they have common sets of activities and functions which they carry out to achieve a common ou tcome. (p. 430) Each community of scientists, then, represents a distinctive subculture, or disciplinary matrix, of the parent discipline. It can be argued that communities of scientists may be formed outside the organizing framework of nursing models. However, it also can be argued that conceptual models of nursing, like the disciplinary matrices of other disciplines, are the most logical nuclei for communities of scientists. This argument i s supported by three facts. First, the curricula of most schools of nursing now are based on conceptual models. Second, most graduate programs and many undergraduate programs offer courses dealing with the content and uses of nursing models. And third, clinical agencies are beginning to organize the delivery of nursing care according to the tenets of conceptual ‘models. image: The Journal of Nursing Scholarship Collectively, these facts mean that cademicians, students, clinicians, and administrators are thinking about nursing theory, nursing research, and nursing practice within the context of explicit conceptual models. It i s probable, then, that eventually the development of a ll nursing theory will be directed by nursing models. It may even by possible to categorize seemingly isolate d past and current work according to conceptual models. This should provide more organization for extant nursing knowledge and should identify gaps and needed areas of inquiry more readily than is possible now. Moreover, such an endeavor should identify members of different ommunities of scientists to each other as w ell as t o the larger scientific community. Exemplars S till further refinement of the metaparadigm i s needed a t the most restrictive level-that of the exemplar. Eckberg and Hill (1979) identified the function of an exemplar as permitting â€Å"a way of seeing one’s subject matter on a concrete level, thereby allowing puzzle solving to take place† (p. 927). They went on to explain: For a discipline to b e a science it must engage i n puzzle-solving activity; but puzzle solving can only be carried out if a community shares concrete puzzle solutions, or exemplars. It i s t he exemplar that i s i mportant, not merely the disciplinary matrix, and certainly not merely the general presuppositions of t he community [i. e. , the metaparadigm]. The latter may be important, but they do n ot direct ongoing, dayto-day research. (p. 927) There i s some evidence of exemplars in nursing. This includes but is not limited to Fitzpatrick’s (1980) programmatic research on time perception; studies o effects of information f about a threatening procedure on a patient’s responses to the procedure (e. g. , Hartfied, Cason, & Cason, 1982; Johnson, Fuller, Endress, & Rice, 1978; Ziemer, 19831, and investigations of actors contributing to the outcomes of social support (Barnard, Brandt, Raff, & Carroll, 1984 in press). These researchers are beginning to solve some of the major puzzles of nursing. However, more work i s needed to identify other puzzles and to develop methods for their solutions. Summer, 1984, Volume XVI, No. 3 Metaparadigm of Nursing Con clusion It is time to formally accept the central concepts and themes of nursing as the metaparadigm of the discipline. It i s also time to direct efforts toward furf ther refinement o this metaparadigm by developing specific rules for the empirical work needed to generate nd test nursing theories within the context of conceptual ‘models. The metaparadigm must be refined still further through the developing of new puzzle-solving activities that will provide answers to the most pressing problems encountered by nurse clinicians, educators, and ddministrators. Any one of these activities would in itself make a significant contribution to the discipline; a ll three could quite possibly be the major accomplishments of the decade. ‘As used here, theory development reft. r to generation a nd testing of theory. and encornpasiei †ivory tower† theorizing as well as empirical rewarch. References American Nurses’ As5ocialion. Nursing: A social policy statement. Kansas City, Missouri: ANA, 1980. Barnard, K. E. Knowledge for practice: Direction5 for the future. Nursing Research, 1980. 29, 208-21 2. Barnard, K . E. , Brandt, P. , Raff. 8.. & Carroll, P. (Ed,. ). Social support and families of vulnerable infants. New York: March of Dimes, 1984. Brink, P. 1. Editorial. Western Journal of Nursing Research, 1980, 2, 665-666. Buih, H . A. Models for nursing. Advances i n Nursing Science, 1979, l ( 2 ) . 13-21. Chinn, P. L. Nursing theory development: Where we have been and where we are going. In N. L. Chaska (Ed. ), The nursing profession: A time to speak. New York: McCraw-Hill, 1983. Donaldson, S. K. , & Crowley, D. M . The discipline of nursing. Nursing Outlook, 1978, 26, 113-120. Eckberg, D. L .. & Hill, L. , Jr. The paradigm concept and sociology: A critical review. American Sociological Review, 1979, 44,925-937. Fawcett, 1. The â€Å"what† of theory development. In Theory developmenk What, why, how? (pp. 17-33). New York: National League for Nursing, 1978. Fawcett, 1. (1983). Hallmarks of success in nursing theory development. In P. L. Chinn, (Ed. ), Advances i n nursing theory development (pp. -17). Rockville, Maryland: Aspen. Feldrnan, H. R. Nursing research in the 1980s: Issues and implications. Advances in N ursing Science, 1980, 3(1);85-92. Fitzpatrick, 1. J . Patients perceptions of time: Current research. International Nursing Review, 1980, 27, 148-153, 160. Flaskerud. 1. H. , & Halloran, E. J. Areas of agreement in nursing theory development. Advances in Nursing Science, 1980, 3(1), 1-7. Hardy. M. Metaparadigrnsand theory development. In N. L. Chaska (Ed. ), The nursing profession: A t ime t o speak. New York: McCraw-Hill, 1983. Hartfield. M. k Cason, C. L. , & Cason, C. J . Effects of , information about a threatening procedure on patients‘ expectations and emotional distress. Nursing Research, 1 982,31,202-206. lohnson, D. E . The behavioral system model for nursing. In J . P. Riehl & C. Roy, (Eds. ), Conceptual models for nursing practice (2nd ed. ). New York: Appleton-Century-Crofts, 1980. Johnson. 1 . E. , Fuller, S . 5.. Endress, M. P . , & Rice, V S. . Altering patients’ responses to surgery: An extension and replication. Research in Nursing and Health, 1978, 1 , 111-121. King. I. M. A theory for nursing: Systems, concepts, process. New York: Wiley, 1981. Neurnan, B . The Neuman systems model: Application t o nursing education and practice. New York: Appleton-Century-Crofts, 1982. Newrnan, M. A. Theory development in nursing. Philadelphia: F. A. Davis, 1979. Newrnan, M . A. The continuing revolution: A history of nursing science. I n N. L. Chaska (Ed. ), The nursing profession: A time t o speak. New York: McGrawHill, 1983. Nightingale, F. Notes on nursing: What it is, a nd what it i s not. London: Harrison, 1859. (Reprinted by L i p pincott, 1946) Orem, D. E. Nursing: Concepts of practice (2nd ed. ). New York: McCraw-Hill, 1980. Rogers, M. E . A n introduction to t he theoretical basisk f nursing. Philadelphia: F. A. Davis, 1970. Roy, C. I ntroduction to nursing: An adaptation model. (2nd Ed. ). Englewood Cliffs, New Jersey: PrenticeHall, 1984. Roy, C. Theory development in nursing: Proposal for direction. In N. L. Chaska (Ed. ), The nursing profession: A time t o speak. New York: McCraw-Hill, 1983. Roy, C. , & Roberts, S . L . Theory construction i n nursing: An adaptation model. Englewood Cliffs, New Jersey: Prentice-Hall, 1981. Schlotfeldt, R. M. The needs for a conceptual framework, In P . J. Verhonick (Ed. ), Nursing research I. Boston: Little, Brown. 1975. Stevens, 8. J. N ursing theory. Analysis, application, evaluation. Boston: Little, Brown, 1979. Walker, L. 0. Toward a clearer understanding of the concept of nursing theory. Nursing Research, 1971, 20, 428-435. Walker, L. 0. Theory and research in the development of nursing as a discipline: Retrospect and prospect. In N . L. Chaska (Ed. ), The nursing profession: A time to speak. New York: McCraw-Hill, 1983. Williams, C. A. The nature and development of conceptual frameworks. In F. S . Downs & I . W . Fleming, (Eds. ) Issues in nursing research. New York: Appleton-Century-Crofts, 1979. Ziemer, M. M. Providing patients with information rior t o surgery and the reported frequency of coping behaviors and development of symptoms foll owing surgery. Unpublished doctoral dissertation, University of Pennsylvania, 1982. A Response to D r. J . Fawcett’s Paper: â€Å"The Metaparadigm of Nursing: Present Status and Fut ure Refinement s† June N. Brodie, R. N. , Ph. D. D r. Fawcett’s formulation of a metap aradigm for nursing represents a commendable effort to consolidate competing nursing theories and encompasses enormous potential for the advancement of nursing knowledge, research, and practice meriting serious consideration by nursing une N . Brodie, R. N. , Ph. D . i s Associate Professor of Nursing Education, Teachers College, Columbia University. Summer, 1984, Volume XVI, No. 3 scholars. This response focuses on how she accomplished this task (what she did and how she did it as well as what she didn’t do and what needs to be done). Essentially Dr. Fawcett’s metaparadigm can be viewed as an evolution of a nursing metaparadigm and an organization of the growth of nursing knowledge rather than as a completed and finalized product. To be more explicit, the basis of the paper exhibits the spirit of Darwinian Evolution and ould be treated as a manifestation of Image: The Journal of Nursing Scholarship a transitional phase i n the competition for the survival of the fitte st (theory). The metaparadigm represents a serious and scholarly attempt to negotiate entry into a different level of the theoretical arena of nursing knowledge. This task was accomplished by examining the concepts derived from the phenomena of the discipline and converging these concepts into a context pertinent to the domain of nursing by providing a structure (a metaparadigm) that has the potential of consolidating disparate nursing theories into Page 87

Science Meets Real Life Essay Example | Topics and Well Written Essays - 1500 words

Science Meets Real Life - Essay Example The scientific method is a process that gets used to form and test solutions to problems. It is gets used to create theories about how and why things work. It ought to reduce the influences of â€Å"faith† on the experimenter. This reduces bias or prejudice so as to make the process valid anywhere in the world. The scientific method presents us with two options. Working through the steps of the scientific problem and solving everyday problems with the scientific method. The scientific method can get used to solve any problem (Gauch, 2003). It follows five fundamental steps. They come in the following order; state the problem, research the problem, form a hypothesis, test the hypothesis and draw a conclusion from the data collected. These five key steps can get used to resolve problems that occur in everyday life. One should start by defining the problem. This is because a problem cannot be solved unless it gets understood first (Gauch, 2003). The problem is that the lights do not come on, and I need light to see around. The next thing I will do is to research the reason why the lights do not come on when I turn on the switch. I look at the possible reasons that can make the lights to no work. To solve the problem, I require a solution as to why the lights are not working. The possibilities are that; the power supply from the service provider is currently switched off so the problem is not within the house. The transformer that ensures power supply to my house may have blown up during the day due to overload. The switch that I may be used to put on the power may not be working. There might be a wiring problem. A tree may have fallen on the power line earlier and caused an interruption. This may also be a planned interruption that probably got announced on the news. After forming all my possibilities, I will proceed to eliminate the poor choices. The switch that I use to put the power on is a poor choice.

Sunday, July 28, 2019

The Theory of Ideology and Children's Drawings Assignment

The Theory of Ideology and Children's Drawings - Assignment Example Visual culture in the modern world has an immense capacity to influence children’s thinking (Duncum, 2001; Freedman, 2003; Kindler, 2003; Smith-Shank, 2002; Tavin, 2003; Wilson, 2003a). This is particularly true in terms of how they incorporate and integrate surrounding images and signs. Althussers formulation of interpellation has been essential to scholars of the post-structuralist era (Bateman, 2011), particularly for the investigation of image and meaning in visual culture studies. This investigative approach to children’s drawings in relation to art education illuminates the influence of children’s surroundings in modern life. The concept of interpellation was adapted to such uses by theorists of politics and media in the 1970s (Sturken & Cartwright, 2009). Below, I examine the ideas of French Marxist Louis Althusser, employing his concepts of interpellation and ideology to analyze how the drawings of young people are shaped by the visual culture around them. Such an exercise will demonstrate how visual culture shapes all of us. Children are products of their world, and the world in which they develop has a vested interest in ensuring that they conceive of their environment in certain ways. The power of the structures of visual culture needs to be clear and persistently justified by those in power. If the semiotics of visual culture functions as the elites desire them to function, children will see and render the world in ways others desire. However, one must bear in mind that a strictly structuralist view of Marxism, as well as a strictly structuralist reading of the theory of interpellation, fails to appreciate the role of human agency in shaping individual sensibilities. In short, while visual culture can be powerful, children’s drawings can rebel against received semiotics or the contrivances of the interpellative efforts of the state apparatus. As such, I

Saturday, July 27, 2019

Poem Analyze Essay Example | Topics and Well Written Essays - 500 words

Poem Analyze - Essay Example The description he gave to the woman is lampoon or could be compared to caricature of the conventional love sonnet. Analysis of Sonnet 130 Shakespeare symbolic use of terms in describing his mistress is manifested in Sonnet 130. Some of the comparisons are: (2) corals are more reddish compared to his lips/, (3) the breast is brownish gray compared to the white snow/, (4) the hair is black and not golden brown/, (8) compared to perfume the breath of his mistress is nasty or unpleasant. However, to Elizabethan, reeks would only mean simply â€Å"breaths forth’/. Those were some of the physical attributes Shakespeare gave to her mistress and this is extra ordinary to consider. It would be so hard to distinguish whether it is a compliment or an insult considering that this is an attribute being given to the beloved one. According to Shakespeare, (9) the voice of her mistress is not pleasing compared to music/ and the latter part of the Sonnet, (11) Shakespeare compared his mistre ss to a goddess that walk on the ground which expresses his admiration to the mistress/ and has considered his mistress to be rare among those that could be given false representation and ridiculous comparison (Hale, J. 2002). In line three, (3) Shakespeare uses the word dun in comparison to his mistress brownish gray breast.

Friday, July 26, 2019

The Origin of the Mexican Drug Cartels Weapons Is Not the US Thesis

The Origin of the Mexican Drug Cartels Weapons Is Not the US - Thesis Example †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.20 Racial Profiling†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..22 Straw" Purchases†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...23 Guns from China†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...25 Guns from Columbia†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦26 Accusations against the USA†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦..28 Trials for Fast and Furious Operation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 33 Reasons for Suspicion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...†¦Ã¢â‚¬ ¦.36 Surprise Night Shootouts†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦38 US and Mexico Border relationship†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦Ã¢â‚¬ ¦39 Immigration Patterns in Mexico†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.41 Mexico and Central America Border†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦43 Contributions of Cold war to The Spread of firearms†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...44 Bloody Murders by the Los Zetas†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦.45 Strategies by Mexican Presidents†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..46 US Congress Evaluation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦48 Sources of Military Grenade†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..49 US... The special focus of this study is to measure the intensity or the contribution of other countries apart from the United States. Through studies, any country that is found to have participated in the exchange of fire either arms directly or indirectly, confirms the claims and the validity of our conclusive remarks. For example, if we discover that Israel through any military operation passed on the ownership of a certain amount of military fire arms to their Mexican counterparts, whether it was directly or indirectly, we will conclude that indeed, the sources of the weapons supplied to the Mexican Drug Cartel are other countries, not the US. On the contrary, if our study fails to establish any other reasonable source, then our thesis statement automatically fails the test. Of course, from the inherent view of the matter, the Direct Commercial Sales was an open and legitimate agreement between USA and Mexico. The qualifier question for all the hypothetical notions is whether the USA i nitiated any other process beyond the Direct Commercial Sales that could probably have raised ethical and legal issues. Background The topic arises from controversial blames of the United States government for being the leading force behind the supply of firearms to the Drug Cartels in the Mexican territories. The magnitude of the supply of weapons to the drug cartels in Mexico is felt in the operation of notorious gang groupings in the Mexican drug areas. A serious example is the Los Zetas, which are popularly known to possess high quality military firearms. USA it attempt to clear its position in the list has however pointed out a number of times that its participation in the deal was a legitimate process.

Thursday, July 25, 2019

Science and Technology Essay Example | Topics and Well Written Essays - 500 words

Science and Technology - Essay Example Virtualization is one of the most essential concepts that will continue to play a dramatic role in the modern century. The problem that majority companies faced with the traditional IT infrastructure consists of several problems. One of the critical problems is the fact that it takes high energy costs. In addition, the traditional mainframe networks take too much space. Furthermore, the heat that is generated through these servers must be cooled. In fact, recent studies have found that organizations achieved on average an 18% reduction in their budget from cloud computing and a 16% reduction in data costs. Hence, virtualization should be embraced by organizations because it is cost-effective, flexible, and provides safe process of security protocols. Not only does virtualization allow corporations to be more â€Å"eco-friendly† but it also reduces costs which is crucial for success in the 21st century. Another main initiative that has been taken by both moguls is to introduce carbon .One of the high focal points that has been emphasized over the years as an alternative approach for energy source has been solar energy. A solar initiative can be a very robust solution that can be utilized for powering residential and industrial purposes. One of the many advantages that solar energy offer is substantial reduction in pollution since no waste product is yielded. The production of energy is being derived from use of fossil fuel. Another great facet that solar energy offers is the fact that it can harness electricity in remote locations. Undoubtedly, this provides flexibility and a seamless integration with the nation’s future technology roadmap. Embedding solar panels in remote location are cost-effective and can create a channel for an optimized energy production. The thought of an environment in which sun energy is utilized to power the communities and the nation’s infra structure can certainly be a reality. Although this innovative approach has been

Wednesday, July 24, 2019

Managing Multinational Operations IP 4 Essay Example | Topics and Well Written Essays - 1000 words

Managing Multinational Operations IP 4 - Essay Example Foreign investors need to consider many factors when planning their investments in China. There are many restrictions which apply only to them. In addition, the complex approval process, layers of government bureaucracy and consequent time delays are often difficult for investors unfamiliar with doing business in China to grasp. It is therefore recommended that specific and tailored professional advice is sought prior to commencing business in China. Comprehensive professional advice is available from legal officers in Greater China region. Due to the above discussed issues it is important for any foreign investor to consider the following factors when doing business in China. This is based on the fact that long term investment project require a thorough understanding of all business attributes of doing business in that country. From the onset, any potential foreign investor needs to understand that China is very restrictive on most direct investments into the country unless their ne ed is thoroughly justified. Foreign investments in China are strictly regulated on differential basis depending on the sector or industry. The catalogue for guiding foreign investments (Investment catalogue) is issued by the Ministry of Commerce and National Development and Reform commission and sets out the specific industries which are classified as â€Å"encouraged†, â€Å"restricted† or â€Å"prohibited† for foreign investment industries (Smithson, 2010). The ones that are not specified in the catalogue are classified as permitted for foreign investment. A consideration of the investment is one of the first tasks which should be undertaken by a foreign investor contemplating any investment in China. Business scope is also an issue to be considered. All business in China is required to operate within the terms of their business scope which must be approved by the relevant government authority. Approved business scope is evidenced by a business license issued by the State Administration of Industry and Commerce or its local office. Business activities are generally restricted to defined activities. As an entity may not act beyond its scope it is important that in determining the business scope it is not defined so narrowly that it restricts the permitted operations of the company. A foreign investor in China needs to consider too the accounting requirements that the regulatory framework imposes on all businesses in the country. Accounting laws and regulations have been formulated for enterprises with foreign investments and are generally close to internationally recognized accounting standards although slight differences exist. Statutory audits are required for enterprises with foreign investments. This is the surest way to win the trust of the Chinese that you are worth conducting a business in their country. It also shows the level of commitment and financial worthiness. Another decisive factor that also comes into focus in the pre-inv estment analysis and should never is ignored is the type of incentives to be offered is also a factor to consider. It is very necessary in a competitive business enterprise as it determines customer’s choice. At the same time it increases the expenses lowering the profit to be made so it must be selected wisely. In

Anthropology Essay Example | Topics and Well Written Essays - 1000 words - 6

Anthropology - Essay Example The present study has chosen the Darug Indigenous Australians for learning on what they say about their culture, tradition, their history, as well as their social situation. The Darug society is known to be the traditional owners of Western Sydney. The culture of the society is prosperous in religious implication. The individuals of the group are associated through relationships based on connections and a secure relationship with the location in which he or she was born. These relationships were associated with their responsibilities towards their lands, communities, plants and animal lives. The elders of the group had the charge of teaching these responsibilities to the newer individuals. The customs, ceremonies and conduct of the Darug were regulated by the aboriginal laws. The tradition and culture of the society reflected that only the needful for survival was to be taken from the nature. Women were in charge of collecting the fundamental foods, while men did the hunting and wild jobs (The Darug - Traditional Owners of Western Sydney). When the Europeans started settling in the West of Sydney, the Darug were not acknowledged to have any former rights. These people struggled both to protect their lands, the nature as well as their traditions and culture. The Aboriginal people suffered severely with their lands and children being taken away from them thereby not providing them with their rights. Today these people are known to regroup again realizing their kinship connections and relationships (The Darug - Traditional Owners of Western Sydney). The Darug were the largest group of Aboriginal people in the Sydney who resided from the coast across the Blue Mountains. These people spoke a common language although there are variants in the dialects that they used. They focused a lot on keeping the available resources abundant that was

Tuesday, July 23, 2019

Is trust really required to be an effective leader Literature review - 1

Is trust really required to be an effective leader - Literature review Example Trust in management: the role of employee voice arrangements and perceived managerial opposition to unions Trust in management is an element that is critical for an organization to foster. Trust has been found to contribute positive attitude towards valued work behaviors, and behavioral citizenship to the organization. (Dirks and Ferrin, 2002). Cooperation is a judging key element on how the employees relate with the management. The study is about the relationship between the voice of the employee arrangement and the trust of the employee in management. The literature of the employee relations and the social exchange theory is what brings the voice arrangements in an organization. The article also looks on the higher side to examine the EVA and the trust of employees in management relationship. EVA forms one means of participation and involvement and form part of HR practices and policies of an organization. (Tzafrir et al., 2004). The context of the national rela tion of employment is critical any relationship evaluation between trust and EVA given the mimetic and the normative pressures the actors are placed on. (Boxall and Purcell, 2011). In conclusion to this article, Union voice which is the provision of a two-way communication between the employees and management through the presence of a union which is incorporated with trust in the work place. Trust and quality management: Perspectives from marketing and organizational learning In this article trust as a concept is elaborated by comparing with quality management of traditional value. Organizational learning and marketing relationship are the bases of approaching trust in this area where it is a frequent element. The purpose is to create a trust framework based particularly on organizational learning and marketing relationship. Trust has been importantly recognized as a concept in marketing relationship. As trust is component that is more important in every

Monday, July 22, 2019

Type and density of liquid Essay Example for Free

Type and density of liquid Essay These are the variables that I could choose to focus on. I have chosen to focus and adapt on the idea of insulation. Prediction I predict that the more insulation (layers) there is, the smaller the reduction in heat. I think this because when the outside air tries to touch the container to cool it, it will be stopped by the insulation, so it will take longer to cool. Also, when heat tries to escape from the container, it will go into the first layer of insulation, which will then absorb the heat. It would then still keep the container warm, not letting as much heat out as fast. I also predict that if I have a lid it will take even longer to cool, because, as you can see in the picture below, evaporation will also take place. If I have a lid, the heat will then be stopped from escaping into the air through the top. As shown below- Equipment   Timer- this is to time the amount of time the liquid is in the container. This will make sure that the time will be the same for each experiment.   Data logger and Thermometer- this is to take the temperature of the water. I will use two forms of identifying the temperature. This way I can compare the two results and see if there are any drastic differences. Also, a datalogger is accurate, but I will still use a thermometer to back up my results.   Insulation Material- I am going to use a foam type material as my insulation.   Clamp- I will use a clamp to hold both the datalogger and thermometer above the container.   Container- I am going to use a glass beaker to hold the liquid. I am using this instead of a polystyrene cup, because the cup would hold residue heat, which would affect our results. Also a polystyrene cup is already quite insulated. * Kettle- this is to heat the liquid before I put it in the container. I will clean out the kettle, to make sure there is no black, therefore the heat will be reflected back into the kettle, instead off being absorbed. This should help it to reach its highest temperature. I will make sure that there is 1litre of water in the kettle each time put it on to boil. Measuring Apparatus- I will put the water directly into the glass beaker, measuring it in there. Lid- To put over the glass beaker to try and prevent evaporation. Fair Testing and Other Factors that need to be controlled There are things that I will need to try and make sure are the same throughout my experiment. These are: Amount of liquid- I will have to make sure that each time I refill the glass beaker I have the same amount of liquid. To do this I will measure it in some measuring apparatus. Each time I will use the same type and size of measuring apparatus, for the same accuracy. To make this even fairer I will simply measure the amount of water in my glass beaker, so I know that it will always be the same. Temperature of surroundings- there is not much I can do to control this, but to make sure there is no drastic change, I will stay away from radiators and places in direct sunlight. Shape, Colour, Size, Surface Area and Thickness of container- will have to be the same throughout my experiment to keep it fair and to get reliable results. For instance, if I had a different colour container each time I did my experiment it would affect my results. This would be, because instead of reflecting the heat back in, if I had a black container it would absorb the heat. To make sure of this I will use the same container each time.   Temperature of liquid to start- I will try to keep the around the same. If I cannot keep the temperature the same I will just measure the difference between the two (start and end). Type and Density of Liquid- I will keep using the same type of liquid throughout my experiment because some types may loose heat at a different rate than others. I will use water because it is easily available, and it is the same each time.   Surface container is on- will have to be the same. If for example I was to put it on a foam surface one day, and something different another day, it would affect how much heat is lost. This is due to the surface acting as insulation.   Lid- I am going to use a lid each time. This should stop a lot of heat reduction through evaporation, which I have already explained in my prediction.

Sunday, July 21, 2019

The Effects Of Cyber Crime Information Technology Essay

The Effects Of Cyber Crime Information Technology Essay Perhaps the most prominent form of cyber crime is identity theft, in which criminals use the Internet to steal personal information from other users. Two of the most common ways this is done is through phishing and pharming. Both of these methods lure users to fake websites (that appear to be legitimate), where they are asked to enter personal information. This includes login information, such as usernames and passwords, phone numbers, addresses, credit card numbers, bank account numbers, and other information criminals can use to steal another persons identity. For this reason, it is smart to always check the URL or Web address of a site to make sure it is legitimate before entering your personal information. The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquards employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime! We are currently living in Cyber age, where Internet and computers have major impacts on our way of living, social life and the way we conduct businesses. The usage of information technology has posed great security challenges and ethical questions in front of us. Just as every thing has positives and negatives, usage of information technology is beneficial as well as insecure. With the growth of the internet, network security has become a major concern. Cyber crimes have emerged rapidly in the last few years and have major consequences. Cyber criminals are doing every thing from stealing money, hacking into others computer, stealing intellectual property, spreading viruses and worms to damage computers connected on the internet and committing frauds. Stoppage of cyber crimes is a major concern today. Cyber criminal make use of the vulnerabilities in computer soft wares and networks to their advantage. Hacking: Hacking or Cracking is a major cyber crime committed today. Hacker makes use of the weaknesses and loop holes in operating systems to destroy data and steal important information from victims computer. Cracking is normally done through the use of a backdoor program installed on your machine. A lot of crackers also try to gain access to resources through the use of password cracking soft wares. Hackers can also monitor what u do on your computer and can also import files on your computer. A hacker could install several programs on to your system without your knowledge. Such programs could also be used to steal personal information such as passwords and credit card information. Important data of a company can also be hacked to get the secret information of the future plans of the company. Cyber-Theft: Cyber-Theft is the use of computers and communication systems to steal information in electronic format. Hackers crack into the systems of banks and transfer money into their own bank accounts. This is a major concern, as larger amounts of money can be stolen and illegally transferred. Many newsletters on the internet provide the investors with free advice recommending stocks where they should invest. Sometimes these recommendations are totally bogus and cause loss to the investors. Credit card fraud is also very common. Most of the companies and banks dont reveal that they have been the victims of cyber -theft because of the fear of loosing customers and share holders. Cyber-theft is the most common and the most reported of all cyber-crimes. Cyber-theft is a popular cyber-crime because it can quickly bring experienced cyber-criminal large cash resulting from very little effort. Furthermore, there is little chance a professional cyber-criminal will be apprehended by law enforcement. Viruses and worms: Viruses and worms is a very major threat to normal users and companies. Viruses are computer programs that are designed to damage computers. It is named virus because it spreads from one computer to another like a biological virus. A virus must be attached to some other program or documents through which it enters the computer. A worm usually exploits loop holes in soft wares or the operating system. Trojan horse is dicey. It appears to do one thing but does something else. The system may accept it as one thing. Upon execution, it may release a virus, worm or logic bomb. A logic bomb is an attack triggered by an event, like computer clock reaching a certain date. Chernobyl and Melissa viruses are the recent examples. Experts estimate that the My doom worm infected approximately a quarter-million computers in a single day in January 2004. Back in March 1999, the Melissa virus was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained. Solutions: An important question arises that how can these crimes be prevented. A number of techniques and solutions have been presented but the problems still exists and are increasing day by day. Antivirus And Anti spy ware Software: Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software. Anti spy wares are used to restrict backdoor program, Trojans and other spy wares to be installed on the computer. Firewalls: A firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two. A network firewall typically guards an internal computer network against malicious access from outside the network. Cryptography: Cryptography is the science of encrypting and decrypting information. Encryption is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender and the recipient. A number of cryptographic methods have been developed and some of them are still not cracked. Cyber Ethics and Laws: Cyber ethics and cyber laws are also being formulated to stop cyber crimes. It is a responsibility of every individual to follow cyber ethics and cyber laws so that the increasing cyber crimes shall reduce. Security soft wares like anti viruses and anti spy wares should be installed on all computers, in order to remain secure from cyber crimes. Internet Service Providers should also provide high level of security at their servers in order to keep their clients secure from all types of viruses and malicious programs. The Effects of Cyber crime When you purchase a home it comes with a door and a lock. You always will make sure that the door/lock exist and that the lock is working properly. If you want you can aim to further secure your home against any threats. You may purchase a new security system, an additional lock or maybe even a pet dog for added safety. Why would you not secure your investment? Would you invite criminals to use your home to commit additional crimes wherever he/she pleases? In the same fashion, computer viruses that can generate havoc on your PC system are just as criminal. Viruses can cost companies millions and dollars in time to repair an infected system. Recently, Microsoft went as far as to post a $250,000 bounty for the writers of the MSBlast worm and the SoBig.F virus. Organizations such as Interpol now have sections of their website devoted to cyber-crime, with other websites such as the IFCC Internet Fraud Complaint Center specializing in Internet Crime. In General, computer viruses can be transferred to an unsuspecting PC through a variety of formats. Viruses can appear through e-mail, infected software, diskettes, infected CD/DVD discs or computer documents. Furthermore, if you do not run regular Microsoft Windows updates (http://windowsupdates.microsoft.com), even regular Internet web browsing can cause major problems, through known security exploits in your Operating System. An unsuspecting user can open what they think is a legitimate webpage, however then end up downloading a virus or allowing access to their PC by a hacker. Viruses are showing up on a weekly basis. Your Anti-virus software, security applications or Windows Operating System is only as good as its last update. To get complete protection, you must regularly update with the latest virus definition files, scanning engines, patches and fixes. Prevention is always better then hours of frustration and lost data. Some of the main ways to ensure your PC is protected from malicious computer viruses are as follows. Computer-based crime Computers facilitate the theft of money and property and the destruction of data when there are inadequate controls against their misuse. Crimes perpetrated by unauthorized access to keyboards, terminals and communications devices generally can be described as thefts, misapplications of assets, or destruction of information. These terms may apply to the misappropriation of money and real property, or of proprietary information and intangible assets. The misuse of the computer may involve the forgery of computer signatures such as authorizing codes; the creation of false accounts payable to disburse cheques; improper use of personal information; the creation of virus or rogue programmes which interfere in software operations and destroy data. All of these crimes include programming the erasure of any evidence of the computer crime perpetrated. Probably the fastest growing category of computer related crime is that involving electronic fund transfer systems. The most significant types of computer crime were: arson, sabotage and malicious damage of computer installations; system penetration, or hacking; unauthorized use of computer time; thefts of assets, including software; embezzlement of funds; defrauding of consumers and investors; and destruction or alteration of data (including college transcripts and diplomas) and software. The motive is usually personal financial gain, anger or revenge but another significant impetus is the intellectual challenge associated with computer crime The absence of, or inadequate provision for, documentation and access controls for computer installations, facilitates computer crime. Unauthorized access to software and hardware is almost exclusively the means of crime perpetration. With authorized access, but with criminal collusion, two or more persons may commit crimes unnoticed, until financial audits, inventories, and computer operation system checks uncover the fraud or misuse. In the case of theft of intangible properties such as computer-stored patents of engineering, chemical or other designs, processes, or marketing and strategic data, the crime is exposed, if at all, by inferences drawn from the activities, products or knowledge shown by competitors Studies in the USA indicate that about one-third of such crimes were committed by staff or consultant data-processing personnel, almost exclusively below management level; but the bulk were committed by non-data-processing personnel with normal, job-related access to computers. A recent USA study has concluded that computer-related crime now rivals white collar crime in cost and seriousness. The report was based on a survey of 283 corporations and government agencies and among the conclusions were the following: about 48% of those surveyed reported some form of computer crime during 1983 with total annual losses estimated to be $145 million to $730 million. More recent estimates based on actual reported crime place losses in the USA at $3 billion per annum. An Australian computer expert has estimated that there were about 4000 computer-related frauds over the period 1975-1983. Pranksters in Canada in the past have re-routed the entire delivery system for Pepsi-cola; in 1971 the New Y ork-Penn Central Railroad Company discovered 200 of its box-cars had been re-routed and ended up near Chicago and another 200 cars were found to be missing. In New Jersey seven young people, all under 18 years, were charge with conspiring to use their home computers for exchanging stolen credit card numbers, information on how to make free phone calls, and to call coded phone numbers in the Pentagon. They were found with codes capable of changing the position of communication satellites. One youngster had run up a large phone bill at home and when berated by his parents, he proceeded to break into the phone billing system and cancelled the charge Few computer crimes are actually reported. In the US is required by law to report computer crimes; many commentators agree that only about 15% of computer-related crimes are actually reported. The Australian Computer Abuse Research Bureau argues that only one in 20 cases of the $2 million or so worth of computer-related offences in Australia during 1980 was in fact reported. The reasons given are that there is not much faith in the legal system and its ability to prosecute a case of computer crime successfully; that companies fear that to declare publicly that their system has been breached and that their assets are not as secure as once thought will cause a flight of capital in shareholders funds and deposits; and that there is a reluctance to expose the companys records and systems to public scrutiny and competitors In the UK in 1989, it was estimated that the cost to industry of computer-based crime was over  ¿Ã‚ ½400 million per year. The average annual incidence was9 incidents per 100 companies (rising in some cases to 1 in 2), costing on average  ¿Ã‚ ½46,000 per incident. Other estimates put the cost of computer crime as high as  ¿Ã‚ ½2 billion per year. The most vulnerable sector is the communications industry in which there were 192 incidents per 100 companies. Fraudulent input of information, notably on payroll systems, accounted for 4.1 million pounds of losses A person stealing trade secrets no longer has to physically copy documents because much scientific and technical information is now stored on computers. Instead of copying hundreds of pages of information on a duplicating machine, a person can download that material onto a single computer disk which can be easily concealed in a pocket. The information on the disk can then be sent or transmitted anywhere in the world without ever engendering the employers suspicions. Additionally, if a thief is able to illegally penetrate a companys computer system, he or she can download that companys trade secrets and transmit them on international computer networks without removing the originals from the victim company 1. While the Internet provides dramatic and exciting benefits to enhance our lives, it also allows those who want to violate or evade the law an opportunity to reach exponentially greater numbers of people Common Types of Computer Related Crime There are a number of common attacks and methods of committing a computer related crime. Some of these are less sophisticated than others, and can be committed by someone with limited knowledge of computers. Others require programming skills and/or an advanced knowledge of how computers and various software can work together to commit a crime. COMPUTER VIRUSES Computer viruses are programs that can attach themselves to other programs or files. The virus infected files can then become carriers of the virus, or become damaged in some way. The virus may effect computer services, displaying messages or playing sounds, or may crash the operating system so that the computer wont run as expected (if at all). You can prevent computer viruses by installing an anti-virus program on your computer, which scans files for known viruses. There are a number of these programs on the market, and they can be purchased from software stores or acquired on the Internet. Once installed, you will need to regularly update anti-virus files, which are used to detect and remove viruses from your system. DATA DIDDLING Data diddling involves changing data prior or during input into a computer. In other words, information is changed from the way it should be entered by a person typing in the data, a virus that changes data, the programmer of the database or application, or anyone else involved in the process of having information stored in a computer file. The culprit can be anyone involved in the process of creating, recording, encoding, examining, checking, converting, or transmitting data. This is one of the simplest methods of committing a computer-related crime, because it requires almost no computer skills whatsoever. Despite the ease of committing the crime, the cost can be considerable. For example, a person entering accounting may change data to show their account, or that or a friend or family member, is paid in full. By changing or failing to enter the information, they are able to steal from the company. To deal with this type of crime, a company must implement policies and internal controls. This may include performing regular audits, using software with built-in features to combat such problems, and supervising employees. HACKERS AND CRACKERS In computer jargon, hacker has a variety of meanings, including being synonymous with programmers and advanced computer users. In these cases, it refers to someone who hacks away at a keyboard for long periods of time, performing any number of computer-related tasks. In recent years, hacking has come to mean the same as another term cracker, which is a person who cracks the security of a system or computer application. Hacking (and cracking) now refers to the act of gaining unauthorized access to a computer, network, Web site, or areas of a system. A person may hack their way into a system for a variety of reasons; curiosity, the challenge of breaking through security measures, or to perform malicious actions and destroy or steal data. All to often, it involves performing mischief and damaging a Web site or corporate network in some manner. Commonly, hackers will impersonate a valid user to gain access to a system. If the system requires a username and password before allowing entry, a hacker may take an authentic users identity. On a network or an office with Internet access, a hacker can impersonate someone else by simply sitting at the unattended workstation of another user who hasnt logged off. It also commonly occurs when someone has an easy to guess username and password, or allows this information to be known by others. Another common method hackers use to gain access is to guess or crack a username and password thats used to access a computer, network, or Internet account. To prevent being hacked in this manner, you should use passwords that are difficult to guess. You should also make your passwords a mixture of letters, numbers, and special characters (e.g. !, @, #, $, %, ^, , *).   You should change your password at regular intervals, and set a minimal length to passwords (such as being a minimum of six or eight characters). LOGIC BOMBS A logic bomb is a program that runs at a specific date and/or time to cause unwanted and/or unauthorized functions. It can effect software or data, and can cause serious damage to a system. Generally, it will enter a system as hidden content, or may be installed on the system by someone within a company. For example, a disgruntled employee may write a program designed to crash the system one month after he plans to quit the company. When this date and time arrives, the program then executes. In other words, the bomb goes off. Often, logic bombs arent detected until after they execute à ¢Ã¢â€š ¬Ã‚ ¦ when the damage is done. However, by installing anti-virus software, firewalls, and other security software, you can block hidden content, and stop the bomb before it becomes a problem. Anti-virus software can detect known logic bombs, trojan horses, and viruses. Firewalls allow you to set policies on your system that will strip hidden content out of messages, removed file attachments, and so forth. TROJAN HORSE Trojan horses get their name from the story of the attack on Troy. In the story, the army couldnt get past the gates of Troy to attack. A covert attack was needed, so soldiers hid inside of a giant wooden horse, which was offered as a gift to the citizens of Troy. Once inside the gates of the city, the Trojan Horse opened and the attack began. In computer terms, Trojan Horses live up to the name derived from the Greek story. Covert instructions are hidden inside of a program. These instructions are embedded in software or email, and may provide any number of undesired or unauthorized functions. Once opened, they may modify or damage data, or send information over the Internet (which can then be used by a hacker for future attacks). By dealing hidden content in messages or software, you can avoid problems with Trojan Horses. Using anti-virus software, firewalls, and other security software, your system can check for Trojan Horses and prevent them from attacking. Computer Crime Prevention Computer crime is becoming ever prevalent in our society. More and more, companies and individuals rely on the services and resources provided through networks and computers. Companies may be dependent on the data to conduct business, while individuals may store information that is important to their personal or work-related activities. Due to this, it becomes vital that steps are taken to protect computer systems and the data thats stored on them. It is important to remember that no system can ever be completely secure. The only network, Web site, or computer system thats 100% secure is one that cant be accessed by anyone or anything, which makes it completely unusable. Natural disasters, malicious, users who make mistakes, or motivated criminals can compromise security and/or cause damage. The goal for securing your system should be to balance security with accessibility. Community Crime Prevention Everyones Doing It: Planning a Successful Community Crime Prevention Project Are you tired of walking by playgrounds that are filled with trash and broken equipment? You know kids wont play there because its such a mess. Make a difference by cleaning up that playground as a community crime prevention project. Keeping Insider Information Inside Protect confidential information against insider leaks, and corporate espionage. Take Crime Prevention to Work Local law enforcement agencies will experience greater cooperation and success with crime prevention programs if they include local businesses and corporate offices. Presentations at local businesses are designed to provide basic information and tips on crime prevention. Safer Seniors An increasing population of senior citizens, including those in assisted-living communities, has made police officers aware of the challenges of reaching this group with safety information. Strong support from the police chief and elected officials helps ensure that time, staff, and resources are dedicated to aiding seniors. Also see Neighborhood Watch and School Safety