Saturday, August 31, 2019

Moods

No doubt man is a social being and can never live a mundane custom always. Man undergoes dissimilar swings and moods in his every day life. It is true that moods are intense feelings that are directed at someone or something. Unlike a computer or any automatic tool, man gets worn out or gets weary easily. He cannot carry out any repeated action incessantly without a break. Let us take a quick tour of an instance of an exacting student who was a characteristic bookworm. He was very careful and he did studies and not anything else the whole day. Ironically, his marks never used to demonstrate the efforts he used to take. The cause for this absurdity was that he always kept poring into books with no positive mood. No doubt he never used to take even a minute gap of rest. This forced his mind to start inattention and stay put in reveries. This would obviously influence his academic and over all presentation in school activities. There is one more cause to hold up this statement. On taking a break from a usual behavior, say, studies would give a touch to the person. One would feel rather guilty for homicide the time into other behavior. This would prompt the person to study harder and go in an earlier rate with full attentiveness in his studies. Thus, still a half an hour break would save hours of time which would just be exhausted in reveries. (Thayer, 1997) Taking a diminutive period of break would give rest to the mind. The person would feel invigorated to go back to work in an improved mood. A person wearied out or in a bad swing would sense joyous and happy if he/she takes a break by doing amazing attractive or even by taking respite for a while.   Furthermore one could take a break by connecting in any sport movement or spend various times by a hobby. Going for sports could be a high-quality time-pass. This will get better one's health and obviously enrich one's mind since a sound mind forever dwells in a sound body. It would also get better a person's aptitude in sports or additional co-curricular activities like illustration, music etc. A person could get improved himself in an over-all method, not only in work but also in engage in recreation. Therefore, I powerfully believe that it is true saying moods are intense feelings that are directed at someone or something. References Thayer E. Robert, (1997), The Origin of Everyday Moods: Managing Energy, Tension, and Stress. Oxford University Press, New York.

Friday, August 30, 2019

What’s Happening To Our Girls

Written my Maggie Hamilton presents the Issue that girls all over the world feel pressures at some stage of their lives. Hamilton presents this idea to the reader in a negative way in comparison to how popular culture and wider society encourages it. As girls are growing up, they feel pressures regarding their desires to be a woman, body Image and pressures from parents and teachers. Hamilton expresses these Ideas through the use of expository conventions such as interviews, facts and expert opinion.Young girls ranging from the ages of 3-12 are becoming more and more like managers. Their clothes are getting skimpier and their desires are constantly growing. The expository text What's happening to our girls? Presents this issue through the use of interviews expert opinion. Hamilton conveys the idea of young girls losing their childhood in a negative way to the reader through the use of her expert opinion. An example of this from the text Is â€Å"Teenage life can't come quickly enoug h for most teens.By now they're more than ready to leave their little-girl self behind. † (Peg. 31 ) This is explaining how girls are losing their valuable and replaceable childhood experiences that they are now missing out on due to the strong Influences that popular culture has on them. Hamilton is encouraging the parents of these young girls to not spoil their children by giving them everything they desire but to engage them within their community and to mix with a variety of people from different generations. Another convention used to convey the message is facts.An example of this In the text is â€Å"In one study of girls aged 5-8, over a quarter of the 5-year-old-galls wished they were These facts support the idea that arils are growing up too fast and that these are the issues that adults should be worrying about, not young girls. In popular culture, these ideas are also presented, but in a deferent way. Girls are being encouraged to have the latest technology, clothe s and makeup through the use of Images In magazines. Magazine companies use specific images to encourage girls to step into the world of woman hood.An example of this is in one Bliss magazine, they published the A-Z of sex. This is handing out unnecessary information to young readers that they would never need to know at their age. Girls feel that they have to live up to these expectations that boys and their peers have of them and they will do anything to be accepted. While the majority of parents would be horrified by the way these Ideas are presented to their young girls, many parents support the idea of their little girls wearing bras, makeup and obsessing about their clothes.In my personal opinion I believe that young girls should embrace and enjoy their worries and carefree days Like I did when I was a child. Hamilton suggests that this Is a growing concern in our society today as it encourages girls to become over sexualities. Popular culture is encouraging the over exultatio n's of girls and wider society Is trying their best to stop It. 1 OFF expresses this idea through the use of conventions such as facts and interviews in a negative way to the reader. Majority of girls in modern society are very self- conscious.Afraid of being constantly Judged, girls are relentlessly striving to keep up with the latest fashions and their desires to be thin Just so they can fit in. Many girls go to the extremes of starving themselves and purging Just to feel accepted by others. Hamilton is presenting this issue in a negative way to the reader through the SE of interviews. An example of this is in the text is â€Å"Eating disorders are really quite a common thing, but you kind of get used to it-like that's the way it is. † Peg. 07). This is explaining to the reader how common eating disorders are becoming and how girls don't think much of it anymore. In popular culture the idea of beauty is extremely distorted. With the use of Photos, companies believe that the y can make more money by making girls look thinner and more attractive. When girls view these warped images, they believe that these are the features they need to have to be dutiful. Examples of these features include the thigh gap, a flat stomach and collar bones.Hamilton used the convention of facts to present this idea to the reader. An example of this in the text is â€Å"Links have now been made between the representation of thin models in magazines and eating disorders. In one study, the teenage girls who watched TV ads with skinny models were less confident and happy with their bodies than girls not exposed to these ads. † (Peg. 103) These fact positions the reader to have a negative point of view towards magazine companies who are sending these storied messages to young girls.In wider society, parents want to protect their young girls from bad influences that can be put on them. Majority of parents don't know what their girls are reading in their magazines and would b e horrified to know what information these girls are absorbing. In my opinion, I believe that girls need to be themselves and understand their individuality and to not constantly worry about their appearance. Hamilton suggests that poor body image is taking over our girls' mindsets and their values they have of themselves are plummeting.Popular culture s influencing girls to believe that they are not up to the standards of being beautiful and wider society is trying to prevent them from thinking down on themselves. Girls all over the world are feeling pressures from their parents, friends and teachers. Hamilton conveys this message to the reader in a negative way through the use of expository conventions such as interviews and expert opinion. As young girls are growing up in a modern world, their parents have high expectations of them to succeed in school and to secure a financially rewarding Job.Along with the pressures f grades, friends and boys this leads to a lot of stress in gi rls lives. Hamilton expresses this idea to the reader through the use of her expert opinion. An example of this in the text is â€Å"It's a big ask for any teenager to be perfect and popular, wear the right clothes, look cool and achieve excellent grades. There's little opportunity here to build solid self-esteem. Is it any wonder so many are feeling depressed? â€Å"(Peg. 80). This opinion describes to the viewer the many pressures girls face in their daily lives and how it is affecting their physiological state.Another convention used is interviews. An example of this in the text is â€Å"l don't go out very much during the amount of pressure put on you at school to do well- and you Just get stressed out. † (Peg. 75) This conveys the message to the reader as it explains Just how stressed out girls can be even over the little things. Popular culture also doesn't help girls either. Maggie Hamilton explains â€Å"The pressure on girls is also apparent in teen magazines, whe re there's endless editorial on what it means to be a successful woman-how to have a better body, better skin, better grades. â€Å"(Peg. ) When girls are reading these articles they are comparing themselves to the text and their self- esteem goes down as they know that they do not live up to the standards. Wider society is also a contributing factor towards girls feeling pressured. Parents who are expecting well-behaved children with good grades and teachers loading them up with homework don't help downsize girls' stress levels, it Just rapidly increases them. In my opinion, I believe that girls do face a lot of pressures throughout their teen years and that they need to find ways to cope and work around them.Hamilton presents the issue of pressures in a negative way to the reader whilst popular culture and wider society are finding ways to increase the stress levels girls have today. Hamilton presents the idea of pressures widely throughout the expository text What's hipping to o ur girls?. The ideas of girls growing up too fast, body image and expectations and presented within the text through the use of conventions. These conventions include the use of expert opinion, facts, statistics and interviews. Hamilton presents these ideas in a negative way to the reader and explains ways that arenas and friends can help their girls move past them.Popular culture is a major contributor to the way girls think they should be living and also has huge influenced on their attitudes, values and behavior. A large majority of wider society wants their girls to grow up in a carefree environment where they can learn to be creative and enjoy their individuality. I believe that girls should be able to live their lives to the fullest and not worry about what others think of them. If every girl in the world accepted each other for who they were, imagine the freedom and enjoyment everyone would have.

Thursday, August 29, 2019

A Review Of Tom Shadyacs Movie Patch Adams

A Review Of Tom Shadyac's Movie Patch Adams Hunter â€Å"Patch† Adams is a doctor who, among other things, founded the Gesundheit Institute to try and change the medical profession. After attempting suicide, he finds himself and realizes that he wants to help people. He can do this directly by becoming a doctor, but when he notices medicine is a cold, unfeeling process he wants to change, he attempts to do just that. Over the course of the movie, he faces several injustices in the face of his righteous quest, but does not give up and is where he is now because of this. The circle of faith in action model is defined as â€Å"awareness, analysis, and action†. In his fight to make medicine more friendly to the people it helps, he takes these three steps and achieves his goal. His own awareness begins to take shape while he is in the mental institution after his suicide attempt. Despite being a rehabilitation facility, none of the faculty seem to really care about the patients and only do what they do for a paycheck. The dismissive attitude of the hospitals main people and the orderlies shows this quite well. This starts Patch on his quest to change things, but not before he enters medical school and sees the injustice in an even worse form there. Students are not allowed to see the patients until their 3rd year, and even then in a purely educational sense. The strict Dean Walcott makes sure of this, and Patch is disciplined and threatened with expulsion several times for â€Å"aggravating patients† and â€Å"embarassing the community† when in reality hes only trying to make it more fun for everyone-doctors, students, and most importantly patients. After analysis of this situation, he decides that medicine must be changed. Patch then buys an old ranch farmhouse and converts it into a small clinic. With his friends he is able to run it well. However, this clinic isnt just an ordinary clinic. No one there is labelled as a â€Å"doctor†, or more clearly, everyone is. Whether the people there seek treatment or give it, everyone has a job. This goes from actually administering treatment to cleaning up after others, or (most critically in Patchs operation) entertaining patients with any means necessary. After Patch graduates, he creates the Gesundheit Institute, a medical facility using alternative cheap methods to treat patients and employing entertainment to eliminate the cold atmosphere many hospitals have. The whole reason Patch does what he does in the first place is the somewhat inhumane treatment by hospitals to their patients. He disagrees with the ridiculous costs of healthcare. Even today, simple visits can cost upwards of thousands of dollars. To Patch, this cannot stand, as he believes humans deserve their right to be treated. On a more personable level, he dislikes the social treatment given to patients. To him, most doctors see their patients not as human beings with a right to be medically treated but as a â€Å"job† or a â€Å"number†. To him, most are only concerned about the money they get from the treatment and not about whether the patient is actually okay. This has a real world basis, as the sterile, boring, darkness of hospitals can contribute to depression and in turn make medical issues even worse as your will to fight slips away. Patch doesnt just try to change the system, he does. While hes in school he promotes fair treatment of patients and visits them (cancer-stricken children foremost) even though he isnt allowed. He convinces his roommate (who detests Patchs attempts to change) that his cause is worth it. Even Dean Walcott and the school board is convinced of his talent by the time Patch finally graduates. More importantly, they accept his unorthodox methods as legitimate, and begin to move their education tactics and treatment methods to a more personal, fun type. Patch knew what he wanted to do, and he did. Even today you can see hospitals with decorations, entertainment, easier treatment, and many other new things that set them apart from the treatment of many years ago. And it would be unfair to say Patch and his Gesundheit institute didnt have a hand in that. The first Catholic Social Teaching theme is respect of the life and dignity of the human person- and this is what Patch, and the entire movie are all about. The real Patchs life is dedicated to fair treatment of patients and to an extent, everyone. He also says death should be treated with dignity and respects that one day, everyone has to go. Patch starts medicine towards more humane treatment and his work has had an effect today. Patch believes medicine should be a community, so everyone- doctors and patients should unite for good treatment. In his first clinic everyone has a job, not just those who are administering the treatment to the patients. He promotes family values and makes sure every voice is heard. Patchs responsibility as a doctor is to help his patient. He must respect their rights and do everything in his power to respect a patient and carry out their wishes. He must make sure they survive as long as they can, but respects their right to die. However, Patch takes his minimum responsibilities as a doctor and takes it much further- he becomes a helper. He makes his patients feel good not just bodily, but in their minds as well. Patch believes healthcare should be low-cost or even free, because every human deserves medical care. His first clinic and his full hospital today are both non profit and rely on volunteers, patient assistance and tireless work from those involved to keep them running. No one is turned away, especially the vulnerable who really need the help. Patch is a natural helper and will do anything he can if someone is in need of his help. Patch respects dignity. Those who assist him in his medical work do it not out of a desire for money but out of the goodness of their hearts. They are treated just as fairly as the patients. To Patch, medicine isnt just about the patient. Its about the doctor as well, and they have rights. To Patch, we must all stand together as a community. In his perfect world, medicine and any other kind of help is always given for free. Humans are naturally good and he took what was in him and revolutionized a huge part of society. Even after hes gone, the protocol he put into practice will remain and Patch will only truly die when medicine regresses back to the almost robotic way it was years ago. Doctor and patient must stand as one unit for the good of themselves. Solidarity is key in Patchs world, and you must stand up for what you believe in. Even after the death of his girlfriend, his expulsion, his suicide attempt, and the several other obstacles in his way Patch never gave up, and this attitude spread to his close friends. As a doctor, caring for Gods creation is Patchs job. He works with humans, but he would surely help an animal or plant in need if he knew how. Patch respects and cares for the planet. As his influence spreads, many others do as well. His organizations are non-profit to make sure no one is turned away, and Patch continues to work with his patients to this day. Patch Adamss influence on medicine was critical to the field. Today, every medical institution is more humanized and treats its patients with the respect they deserve as human beings. Because of him, patients feel better and will heal faster because of it. This is a huge step in the right direction and its insane that it took that long for the medical profession to realize.

Wednesday, August 28, 2019

Help make Barnes and Noble successful Essay Example | Topics and Well Written Essays - 1500 words

Help make Barnes and Noble successful - Essay Example The report will include several parts including a company background, financial analysis, and an in-depth analysis of the change initiatives that the firm must implement to adapt to the market challenges of the 21st century. Company Background Barnes & Nobles was acquired by Leonardo Riggio in the 1970s. The first Barnes and Nobles stored operated by Riggio was located in Manhattan. The stored was transformed by its new owners into the largest bookstore in the world. The firm has always been at the forefront of innovation. â€Å"In 1974, Barnes & Noble was the first bookseller in America to advertise on television† (Barnesandnobleinc, 2013). Barnes & Noble throughout its history has always adapted well to market changes and it has increased its market share in the book industry. The company in its early years expanded its sales by selling books through catalogs. The firm began to sell books online in the late 1980s. A key acquisition for the company was buying Sterling publish ing in 2003. Sterling publishing has over 5,000 titles in print including educational resources, children’s picture books, puzzles and games, adult fiction, craft and photography, cookbooks, self-help and classics (Barnesandnoblesinc, 2013). The firm became the world’s largest publisher of digital books in 2009. ... The previous year the firm achieved a net income of $36.67 million. One of the reasons for the bad performance of the company is the fact that cost of good sold and occupancy increased by 26%. The net margin of the firm was -1.06%. The earnings per share (EPS) of the firm in 2011 was -$1.31. Barnes & Noble paid dividends per share of $0.75. At the end of 2011 the firm had total assets of $3.60 billion. The total assets of the firm in 2011 went down by 3.03%. The current ratio shows the ability of a company to pay off its current debt. A good current ratio is above 1.0. In 2011 the current ratio of Barnes & Nobles was 1.01. The company is in a good position to pay off its current debt. The return on assets (ROA) of the organization in 2011 was 2.06%. This ratio shows how effective a company has been at generating revenues from its total assets. The return on equity (ROE) of Barnes & Noble in 2011 was 9.02%. â€Å"When compared to the return on total assets, measures the extent to whi ch financial leverage is working for or against common stockholders (Garrison, Noreen, 2003, pg.784). The inventory turnover ratio shows how many times the company has sold its inventory during the year. Barnes & Noble had an inventory turnover ratio of 3.78 in 2011. Change Initiatives The company must implement changes in its corporate strategies to achieve the sales expectations of its shareholder. The goal of the company should be to maximize shareholders wealth. A new strategic approach for the company is to change its strategy to expand its retail sales from the domestic marketplace into the international landscape. The firm has an expertise in how to run bookstores in college marketplace. The company should seek a similar strategy

Tuesday, August 27, 2019

Deductive Technology ( Project Plan) Essay Example | Topics and Well Written Essays - 4000 words

Deductive Technology ( Project Plan) - Essay Example ld help them to understand the cause-effect relationship between different incidents and would also enable them to become familiar with numerical figures. The company wants to expand its presence across US, which has been estimated to have a market size of nearly six times than the UK market. As per the estimations of the company, the US market is estimated to offer a much greater growth potential than its UK counterpart. Though the company has set up a subsidiary unit in US, but it wants to tap the entire demand of the market. Moreover, the company is also eager to penetrate into the smaller markets like Canada and Australia. This makes it essential for the company to upgrade its technology processes and also the existing resources available. To meet the challenges of expansion, the company has identified the need of corporate restructuring and an absolute necessity of integrating the various facets of its operational processes. As per the management, in order to meet its underlined growth objectives in terms of sales, the company needs to bring about significant developments in its processes. The company had decided to strengthen it s marketing operations and integrate the various business operations so that they would be able to easily foray into any international market. As a project manager, it is important to adopt strategies by which an overall integration of the different functional operations of the company with the help of developed software tools is achieved as that would help the organization to strengthen its marketing strategy, which is vital for the adoption of an aggressive growth strategy. Such a strong marketing network would enable the company to procure more orders and meet the deadlines. This would enable the company to gain access to more projects which in turn would steer the company’s growth. The company wants to adopt a business reengineering process to bring about an overall corporate restructuring. This is necessary as that would help

Monday, August 26, 2019

Logistics and Supply Chain Management Essay Example | Topics and Well Written Essays - 2500 words

Logistics and Supply Chain Management - Essay Example It studies how it can be improved and gives recommendations. Since Zara is one of the industry leaders and has one of the best supply chains, it required fewer recommendations for improvement. Finally, the paper analyzes the location of the company’s plants and distribution centers to see whether they are optimal. In Zara’s case, they are in the short run but may cause problems in the long run. Zara is a Spanish flagship store of the Inditex Group and a key player in the European fashion retail market. It started operations in 1975 by opening its first store in La Coruna and since then has been operating as a fast fashion company. It is one of the largest brands, by the Inditex Fashion Retail Group, that has 723 stores in 56 countries making sales of Euro 3.8 billion (India Supply Chain Council, 2006). Its business model is simple; it imitates fashion off the runway and distributes it to the customers in the shortest time possible, even before designers themselves can reach the customers. Therefore, it has shorter lead times, more styles but scarce supply of these styles. To manage this kind of efficiency, Zara’s supply chain management must be efficient and that, it is. Zara uses a vertical supply chain management system, one of the best in the industry that allows it to implement its business model of fast fashion effectively. Zara’s position is an industry leader in the fashion retail market. It has a very high product turnover – it produces more than 11,000 products annually. It caters to the trendy, middle class man and woman of ages 14 to 35. The mother buys Zara because it is affordable and the daughter buys from Zara because it is trendy (Dutta, 2002). This paper will study Zara in the light of its Logistics and Supply Chain Management. It will be broken down into four main parts. First of all, the importance of measuring the performance of Zara’s Supply Chain will be analyzed. Secondly, key performance indicators or KPIs will

Enhancing the Marketing Plan Essay Example | Topics and Well Written Essays - 1250 words

Enhancing the Marketing Plan - Essay Example Further, the macro environmental factors will also be considered in the paper to understand the significant trend which can impact on the business of the company. Company’s Competitor Geno's Sports Apparel deals in athletic footwear and apparel products and seeks to achieve higher sales and good brand reputation. The athletic footwear and apparel industry is considered as highly competitive as there are several big players in the market where Geno’s Sports Apparel operates. The major competitor of Geno’s Sports Apparel in terms of athletic footwear products is Finish Line which operates in the similar marketing segment. Besides Finish Line, Geno’s Sports Apparel also faces a direct competition from other athletic goods providing organizations such as Payless ShoeSource, Dick’s Sporting Goods among others. The major strengths of Finish Line, one of the biggest competitors is the ability to understand the preferences of customers and act accordingly. Thus, the company offers coupons and discounts to the customers to increase sales. Finish line is much concerned about promoting latest products to the customers. The major weakness of Finish Line has been the number of retail outlets. The number of stores of Finish Line is less which creates difficulty for the company to distribute products effectively. Besides, providing newest products can also cost more and are inefficient in this business environment as many customers can concentrate on saving money and purchasing inexpensive products due to economic downturn (Sweeney, 2009). The other competitors named Payless ShoeSource have good geographic location which provides the company a competitive advantage. Its business is expanded in almost 50 counties within the international market. Payless ShoeSource has great financial strength which helps to spread the business globally. Besides, the sales in women’s shoe category are strong and the company has also strong position in t he market of the USA. The major weakness of Payless ShoeSource is higher fixed cost which led to lower profit margin. Furthermore, the company experienced huge amount of loss due to surplus inventory. The business of Payless ShoeSource is highly reliant on third party producers which make the company much vulnerable to survive in the competitive market (Cullin, 2007). Differentiation of Products Differentiation is necessary in order to improve the business and develop a unique brand identity. The main differentiation of Geno’s Sports Apparel with respect to the other competitors is the innovative marketing strategy. Geno’s Sports Apparel will provide tailored retailing programs and develop exclusive store atmosphere which replicates a distinct retailing style than other rivals. The effective enactment of this strategy helps the company to increase the customer base and preserve brand reliability. Geno’s Sports Apparel can also differentiates the brand from close st competitor Finish Line through providing customers with ranges of athletic attires which are designed according to their requirement. The company needs to offer focused collection of sports equipments to the customers which is the other differentiating factor (Sweeney, 2009). Through the advanced marketing communication strategies, such as implementing good customer service model, Geno’

Sunday, August 25, 2019

The Issue of Performance Measurement Essay Example | Topics and Well Written Essays - 2000 words

The Issue of Performance Measurement - Essay Example This paper seeks to address the issue of measurement within the context of SWOT, PESTEL and Porter’s Five Forces Analysis in response to Jengo Limited. The paper further illuminates on how budgeting would benefit Jengo Ltd’s in planning and controlling its inventory, recruitment, and cash management activities. Finally, it zeroes on how a balanced scorecard approach to measuring performance would benefit this company. SWOT analysis Broadly speaking, SWOT analysis is used to evaluate and aid in project formulation and strategic plans (Bohm 2008, p. 3). Just like Bohm notes, a SWOT analysis should be used in mapping out an organization’s Strengths and Weaknesses of the products and services and assess the extent to which they are in tandem and how they could possibly be improved. Beyond this, SWOT analysis is used to reflect on the Opportunities and Threats exposed by information accrued usually through evaluation of the external environment and through comparative studies (Bohm 2008, p. 3, Habour 1997, p. 38). POSITIVE NEGATIVE INTERNAL Strengths 1. Financially sound with good profit margins 2. An established name among customers 3. Offers quick modern services 4. Initiates Brand strategies 5. Many distribution channels 6. offers long-lasting, fashionable clothes by a variety of established designers 7. Sound management Weaknesses 1. Few branches across the United Kingdom 2. Poor planning in terms of staffing and training 3. Integration of operations worldwide 4. High prices 5. No product differentiation 6. Poor planning in budgeting and documentation EXTERNAL Opportunities 1. Emerging Markets in other parts of the United Kingdom and elsewhere 2. A number of interested companies to be shareholders including palisade Plc 3. Can use e-marketing strategy to further enhance market base 4. Support from Palisade Plc Threats 1. Stiff Competition from other clothing business providers in the United Kingdom 2. Competition from similar Business offeri ng the same services at cheaper prices 3. Government Regulation –business overregulated Porters Five Forces Analysis of Jengo This framework was developed by Michael Porter. The tool essentially enables businesses to deal with dynamic markets, gauge competitive ground and make decisions regarding entering target markets successfully (Friedman 1999, p. 5, Hoffman 2001). Further, it enables in identifying partner as well as implications that joint ventures may pose (Bradford & Duncan 1999). This is done by evaluating the following five key areas as espoused by Porter: New Entrants: At the moment for Jengo, there seem to be many potential businesses that may want to venture into clothing, fashion, and design business. Buyer’s Power: The buyers that Jengo has to seem to be solid. However, they seem to complain about prices. Alternatives should be provided since they may shift their loyalty. Substitute Products and Services: Certainly, there are alternatives to what Jango d oes and this may invite donors to look elsewhere. Power of Suppliers: The suppliers for Jengo are few and this means that they determine a great deal especially in strategy formulation within the company. Current Competition: Competition does exist as there are many companies who offer the same products even at lower prices.

Saturday, August 24, 2019

Usability of a Principles of Marketing Course in the Field of Research Paper

Usability of a Principles of Marketing Course in the Field of Information Technology Project Management - Research Paper Example Project stakeholders as well as the target group will only be aware of the progress following the project marketing. This is where the Principles of Marketing Course comes in. it is very important in this field in various other ways. The course gives solid foundation on marketing management principles and the relationship with marketing research which is very vital in the field of information technology project management (Autor, 2000). Principles of Marketing Course can be used in the field of information technology project management in defining tasks of marketing management and process planning that will be used in delivering the project goals and objectives to the stakeholders and the clients. The course can also be used in explaining and defining the research methods and the primary marketing information need in the management of the project. Through this course, a specialist in the field of information technology project management will be able to market effectively and efficiently in order to capture the attention and interest of the stakeholders, who are concerned with the results of the project (Autor,

Friday, August 23, 2019

Leader Traits, Power, and Corruption Essay Example | Topics and Well Written Essays - 1250 words

Leader Traits, Power, and Corruption - Essay Example What happened at Enron as well as at WorldCom not only questioned the role of corporate governance and ethics within organizations but it also put on test the very qualities of the leadership because in all those episodes of corporate failures, leadership was the main culprit. Leaders in those organizations wielded powers entrusted to them in ways which may not be considered as ethical in any sense. Leadership is a very complex process and requires different approaches to deal with different situations as they arise. One of the basic characteristics of leadership is the fact that it succeed in wielding power which others may find hard to exercise. The sources and means of various powers entrusted to leadership are various however what is critical is the facts that by exercising such powers leaders aim to achieve something which others cannot achieve. The gradual shift from bureaucracy to more flexible and so called radix organizations, the role of leadership has further become complicated and somewhat more fluid and demanding in nature. (Schneider, 2002). Since leadership is often defined as the use of "noncoercive influence" in order to accomplish different tasks (Jago, 1982) therefore in fluid organizations with much emphasis on delegation, exercising powers is considered as a delicate art. This paper will present an analysis of the different powers leaders within organizations use as well as exploring how these powers can be exercised to avoid operational, administrative as well as ethical problems faced by the organizations. Leadership Sources of Power There are different sources of powers which a leader can exercise within an organization to achieve the desired objectives and strategic aims. Since, leadership is a process where non-coercive influence is used therefore it is often assumed that while exercising such powers, leaders always do it in the best interest of the organization. Following are the different sources of power for leaders: Expert Power The source of this power is the expertise of the leader. If leader is expert in his or her field of business than the wielding of this power allow a leader to exercise certain degree of influence. This power is therefore based on an individual leader's competence and expertise in certain areas of work i.e. Bill Gates being the CEO as well as Chief Software Architect of Microsoft. Legitimate Power The source of this power is individual's position within an organization. By having a certain position, status, leaders derive this power to achieve leader-follower behavior because others follow them due to their legitimate power within an organization. Reward Power The source of this power is the leader's ability to reward any behavior. Due to this, most of the employees within an organization tend to follow their leaders and obey them because leaders exercise the power of rewarding them. This power is also one of the most important in the sense that it may allow collusion of employees/managers with the leaders to engage into unethical business practices. Coercive Power Since leaders due to their position within the organization control both rewards as well as punishments therefore the source of coercive power is when the leader control the punishment i.e. he or she has the power and ability to fire, fine, punish etc any employee. Coercive power

Thursday, August 22, 2019

All About Personal and Professional Health Care Essay Example for Free

All About Personal and Professional Health Care Essay Health care communication is an important practice in the treatment of a patient. Ensuring effective communication can help the patient understand their state of health. The Meaning and Nature of Healthcare Communication Healthcare communication involves an efficient line of communication between medical professionals, clients, and patient. A vital component of healthcare communication is the ability to share information that can enhance a patient’s knowledge. This is important in assuring quality healthcare (Williams, 2007). Personal healthcare communication is vital in promoting a physician’s understanding through discussion and support groups. Healthcare communication considers factors such as the attitude of the patient, their behavior and belief which could have an impact on how the physician can improve the quality of health care (Williams, 2007). In addition, it requires empathy and understanding from the physician when communicating with their patients. An effective way of achieving effective communication is to get feedbacks from the person getting the information. The healthcare practitioner should carefully evaluate if the client can understand the message being relayed (Williams, 2007). One of the most effective ways of achieving an effective healthcare communication is by conducting a personal interview. This method will help determining the accuracy of information regarding their condition. The psychosocial aspects of the patient’s conditions can be considered when conducting the interview (Williams, 2007). The Relevance of Healthcare Communication An effective professional health care communication can improve the health outcome of a patient. The health care professional can utilize various guidelines to achieve effective healthcare communication. It can help the healthcare practitioner to establish a better understanding of the condition and history of their patients (Williams, 2007). In addition, effective healthcare communication can increase the patient’s satisfaction and knowledge of treatment and its possible outcomes. Without effective healthcare communication, the patient will not have a clear understanding of the state of their health. As a result, they are more likely to spend more on healthcare, take the wrong medication, and become depressed (Williams, 2007). The Principles of Therapeutic Communication The Talking Cure In the early history of health care, therapists or in this case health care professionals rarely say a word. Usually, the best way they understand the condition of their patient is through listening but they never communicate. However, it is likely to practice a non-threatening way of communicating with patients and will not hurt their self-esteem (Wachtel, 2008). In this process, the healthcare professional conceals their real message in a meta-message, which can both be demonstrated in a manner that would make it likely to address the conflicting issue which the patient has avoided (Wachtel, 2008). The manner of delivery by the therapist can have a huge effect on the patient compared to the real message. Most of the time, what the therapist says lowers the self-esteem or confidence of the patient (Wachtel, 2008). In this practice, the therapist must be consistent in monitoring their part in the therapeutic session (Wachtel, 2008). Cyclical Psychodynamics The theory of cyclical psychodynamics utilizes a series of repetitive cycles of communication between people. It combines views from interpersonal dynamics and behavioral and family systems (Wachtel, 2008). The cyclical psychodynamics theory states that people live in a contextual life and their behavior is always related to an individual or object. In therapeutic communication, it is important for the health care professional to understand the roots of the patient’s difficulties (Wachtel, 2008). Cyclical psychodynamics focuses on understanding the cause of the patient’s anxiety. The difficulty of a patient can be rooted from their early knowledge of being afraid of their feelings, thoughts, and inclinations. The aim of therapy in this sense is to help the patient refocus these feelings and integrate them into a complete life (Wachtel, 2008). One aim of therapeutic communication is to direct the patient to a variation of the truth that would help them see new possibilities in their life and to modify life patterns that have been responsible for their difficulties. By using meta-messages, the therapist will help the patient affirm, acknowledge, and understand their feelings (Wachtel, 2008). Other therapeutic techniques provide a different climate, focusing on inhibition, silence and non-engagement from the therapist. With cyclical psychodynamics, however, the health care professional is more involved in the therapeutic process (Wachtel, 2008). Conclusion Healthcare communication involves an efficient line of communication between medical professionals, clients, and patient. A vital component of healthcare communication is the ability to share information that can enhance a patient’s knowledge. This is important in assuring quality healthcare. An effective professional health care communication can improve the health outcome of a patient. The health care professional can utilize various guidelines to achieve effective healthcare communication. It can help the healthcare practitioner to establish a better understanding of the condition and history of their patients. Effective healthcare communication can increase the patient’s satisfaction and knowledge of treatment and its possible outcomes. Without effective healthcare communication, the patient will not have a clear understanding of the state of their health. As a result, they are more likely to spend more on healthcare, take the wrong medication, and become depressed. In the early history of health care, therapists or in this case health care professionals rarely say a word. Usually, the best way they understand the condition of their patient is through listening but they never communicate. However, it is likely to practice a non-threatening way of communicating with patients and will not hurt their self-esteem. In this process, the healthcare professional conceals their real message in a meta-message, which can both be demonstrated in a manner that would make it likely to address the conflicting issue which the patient has avoided Cyclical psychodynamics focuses on understanding the cause of the patient’s anxiety. The difficulty of a patient can be rooted from their early knowledge of being afraid of their feelings, thoughts, and inclinations. The aim of therapy in this sense is to help the patient refocus these feelings and integrate them into a complete life. With cyclical psychodynamics, the patient is directed to a variation of the truth that would help them see new possibilities in their life and to modify life patterns that have been responsible for their difficulties. By using meta-messages, the therapist will help the patient affirm, acknowledge, and understand their feelings. Compared with other therapeutic techniques, which focuses on inhibition, silence and non-engagement from the therapist, cyclical psychodynamics involves more involvement and participation by the health care professional in the therapeutic process

Wednesday, August 21, 2019

Vulnerability in Cloud Computing Essay Example for Free

Vulnerability in Cloud Computing Essay Abstract— Cloud computing has been developed to reduce IT expenses and to provide agile IT services to individual users as well as organizations. It moves computing and data away from desktop and portable PCs into large data centers. This technology gives the opportunity for more innovation in lightweight smart devices and it forms an innovative method of performing business. Cloud computing depends on the internet as a medium for users to access the required services at any time on pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers from threats and vulnerabilities that prevent the users from trusting it. Various be rainy as well, in other words this technology is not trustworthy as it is affected with threats and vulnerabilities. We have termed a cloud with threats and vulnerabilities as a stormy cloud. Based on Cloud Security Alliance (CSA) and our research, we have identified top seven threats and vulnerabilities that are the causes behind the creation of a stormy cloud [1]. The identified threats and vulnerabilities are ranked from top to bottom as shown in Fig.1. malicious activities from illegal users have threatened this technology such as data misuse, inflexible access control and limited monitoring. The occurrence of these threats may result into damaging or illegal access of critical and confidential data of users. This research paper describes the characteristics (threats, vulnerabilities) associated with a stormy cloud. Keywords- Illegal access, Threats, Vulnerabilities I.INTRODUCTION The traditional era of computing involves the use of software, hardware and storage to achieve the required computational service whereas cloud computing has isolated the services from resources (networks, storage, servers). The required services are provided to the users by utilizing the resources of provider. Users are no longer required to purchase hardware, software or to manage storages. Due the evolution of this technology users are required to pay for cloud services on consumption basis. New cloud based business models are being discussed, defined, and implemented as solutions in form of on-demand services that allows businesses to enhance their efficiency and scalability. Success or failure of this technology relies on users’ trust whether the service provided is reliable, available and secure. Considering the benefits of cloud computing various organizations are moving towards IT solutions that are based on cloud however, before starting the journey to cloud, organizations must considers the possible threats and vulnerabilities that may convert their dreams of enhancing scalability and saving management cost into a nightmare of data loss and misuse. The users must consider that cloud can Figure 1. Characteristics of stormy cloud. In order to create awareness and protect the cloud users from adopting a stormy cloud, we are describing the impacts of threats and vulnerabilities in cloud computing so that organizations or users can adopt this technology with trust and from a trusted provider who has the powerful and trusted security polices as well as efficient techniques for securing the users’ data on cloud. II.CLOUD COMPUTING THREATS As we already mentioned, there are several significant threats that should be considered before adopting the paradigm of cloud computing, these threats are discribed as follows : A. Abuse and Nefarious Use of Cloud Cloud providers facilitate the users with various types of services including unlimited bandwidth and storage capacity. Some cloud service providers offer free limited trial periods that gives an opportunity for hackers to access the cloud immorally, their impact includes decoding and cracking of passwords, launching potential attack points and executing malicious commands. Spammers, malicious code authors and other cybercriminals can conduct their activities with relative impunity, as cloud service providers are targeted for their weak registration systems and limited fraud detection capabilities. For example some cybercriminals use rich content applications such as flash files that enable them to hide their malicious code and utilize users’ browsers to install malware [1]. B. Insecure Interfaces and APIs Cloud users are using software interfaces and APIs to access and manage the cloud services. These APIs need to be secured because they play an integral part during provisioning, management, orchestration and monitoring of the processes running in a cloud environment. The security and availability of cloud services is dependent upon the security of these APIs so they should include features of authentication, access control, encryption and activity monitoring. APIs must be designed to protect against both accidental and malicious attempts to avoid threats. If cloud service provider relies on weak set of APIs, variety of security issues will be raised related to confidentiality, integrity, availability and accountability such as malicious or unidentified access, API dependencies, limited monitoring/logging capabilities, inflexible access controls, anonymous access, reusable tokens/passwords and improper authorizations[1]. C.Malicious Insider Insider attacks can be performed by malicious employees at the provider’s or user’s site. Malicious insider can steal the confidential data of cloud users. This threat can break the trust of cloud users on provider. A malicious insider can easily obtain passwords, cryptographic keys and files. These attacks may involve various types of fraud, damage or theft of information and misuse of IT resources. The threat of malicious attacks has increased due to lack of transparency in cloud provider’s processes and procedures [2]. It means that a provider may not reveal how employees are granted access and how this access is monitored or how reports as well as policy compliances are analyzed. Additionally, users have little visibility about the hiring practices of their provider that could open the door for an adversary, hackers or other cloud intruders to steal confidential information or to take control over the cloud. The level of access granted could enable attackers to collect confidential data or to gain complete control over the cloud services with little or no risk of detection. Malicious insider attacks can damage the financial value as well as brand reputation of an organization. D. Virtualized Technology Due to the cloud virtualization, cloud providers are residing the user’s applications on virtual machines (VMs) within a shared infrastructure. The VMs are virtualized based on the physical hardware of cloud provider. In order to maintain the security of users, providers are isolating the VMs from each other so if any of them is malicious, it will not affect the other VMs under the same provider. The VMs are managed by hypervisor in order to provide virtual memory as well as CPU scheduling policies to VMs. As the hypervisor is main source of managing a virtualized cloud platform, hackers are targeting it to access the VMs and the physical hardware, because hypervisor resides between VMs and hardware [3], so attack on hypervisor can damage the VMs and hardware. Strong isolation should be employed to ensure that VMs are not able to impact or access the operations of other users running under the same cloud service provider. Several vendors such as Xen and KVM are providing strong security mechanisms of securing the cloud hypervisors, but still it is identified that sometimes security of VMs is compromised. E. Data Loss or Leakage Data loss can occur due to operational failures, unreliable data storage and inconsistent use of encryption keys. Operational failure refers to deletion or alteration of records without a backup of the original content that can take place intentionally or unintentionally. Unreliable data storage refers to saving of data on unreliable media that will be unrecoverable if data is lost [4]. The inconsistent use of encryption keys will result into loss and unauthorized accesses of data by illegal users that will lead to the destruction of sensitive and confidential information. Example of data loss is Twitter hacks. The online accounts of Twitter accessed by hackers and their numerous sensitive corporate documents were stolen. These documents were housed in Googles online web office service Google Docs. Although Google was not the one to be blamed for security break-in as the security of documents from twitter was not efficient enough. Instead, the entire company data was only one password crack away from discovery [5]. It’s clear from this example that data loss or leakage can damage one’s brand, reputation and cause a loss that may significantly impact employee, partner and users’ morale as well as trust. Loss of core intellectual property can have competitive and financial implications beside the compliance violations and legal consequences. F.Account or Service Hijacking Account or service hijacking refers to unauthorized access gained by attackers to control the users’ accounts, such as phishing, fraud and exploitation of software vulnerabilities. For example if an attacker gains access to users’ credentials, they can spy on their activities/transactions, manipulate their data, return falsified information and redirect them to illegitimate sites [6]. Users’ account or service instances may become a new base for the attackers who can leverage the cloud service providers’ reputation by launching subsequent attacks. With stolen credentials, attackers can often access critical areas of deployed cloud computing services, allowing them to compromise the confidentiality, integrity and availability of those services. Authentication and authorization through the use of roles and password protecting is a common way to maintain access control when using web-browsers to access cloud computing systems. However, this method is not suff icient enough to secure sensitive and critical data. G.Unknown Risk Profile It is important for the users to know software versions, security practices, code updates and intrusion attempts. While adopting cloud computing services, these features and functionality may be well advertised but what about the details orcompliance ofthe internal security procedures, configuration hardening, patching, auditing and logging. Users must be clarified how and where their data and related logs are stored. However, there is no clear answer that leaves users with an unknown risk profile that may include serious threats [1]. the VM within the virtualized cloud environment.VM escape is a vulnerability that enables a guest-level VM to attack its host. Under this vulnerability an attacker runs code on a VM that allows an OS running within it to break out and interact directly with the hypervisor as shown in Fig.2 [8]. III.CLOUD COMPUTING VULNERABILITIES There are several significant vulnerabilities that should be considered when an organization is ready to move their critical applications and data to a cloud compuitng environment, these vulnerabilities are discribed as follows : A. Session Riding and Hijacking Session hijacking refers to use of a valid session key to gain unauthorized access for the information or services residing on a computer system, it also refers to theft of a cookie used to authenticate a user to a remote server and it is relevant to web application technologies weaknesses in the web application structure at their disposal that gives the chance to hackers in order to accomplish a wide variety of malicious activities. While session riding refers to the hackers sending commands to a web application on behalf of the targeted user by just sending that user an email or tricking the user into visiting a specially crafted website. Session riding deletes user data, executes online transactions like bids or orders, sends spam to an intranet system via internet and changes system as well as network configurations or even opens the firewall [12]. However, the web technologies evolution and refinement also brings new techniques that compromise sensitive data, provide access to theoretically secure networks and pose threats to the daily operation of online businesses. B. Virtual Machine Escape Cloud computing servers use the same OS, enterprise and web applications as localized VMs and physical servers. The ability for an attacker or malware to remotely exploit vulnerabilities in these systems and applications is a significant threat to virtualized cloud computing environments [7]. In addition, co-location of multiple VMs increases the attack surface and risk of VM-to-VM compromise. Intrusion detection and prevention systems need to be able to detect malicious activity at VM level, regardless of the location of Figure 2. VM Escape. It allows the attacker to access the host OS and all other VMs running on that particular host. Hypervisors and VM’s complexity may cause an increase threat to attack surface that weakens security such as paging, check pointing and migration of VMs [8]. C. Reliability and Availability of Service In terms of reliability and availability, cloud computing is not a perfect technology. For-example in February 2008, Amazons Web Service (Amazons-S3) cloud storage infrastructure went down for several hours, causing data loss and access issues with multiple Web 2.0 services. With more services being built on top of cloud computing infrastructures, an outage orfailure can create a domino effect by taking down large amounts of Internet based services and applications which raise several questions such as in cases of failure, what forms of settlement exist for stakeholders? What is the responsibility of cloud providers? What will be appropriate procedures to overcome these issues? [9]. D. Insecure Cryptography Attackers’ can decode any cryptographic mechanism or algorithm as main methods to hack them are discovered. It’s common to find crucial flaws in cryptographic algorithm implementations, which can twist strong encryption into weak encryption or sometimes no encryption at all. For example in cloud virtualization providers uses virtualization software to partition servers into images that are provided to the users as on-demand services [10]. Although utilization of those VMs into cloud providers data centres provides more flexible and efficient setup than traditional servers but they dont have enough access to generate random numbers needed to properly encrypt data. This is one of the fundamental problems of cryptography. How do computers produce truly random numbers that cant be guessed or replicated? In PCs, OS typically monitors users mouse movements and key strokes to gather random bits of data that are collected in a so-called Entropy Pool (a set of unpredictable numbers that encryption software automatically pulls to generate random encryption passkeys). In servers, one that dont have access to a keyboard or mouse, random numbers are also pulled from the unpredictable movements of the computers hard drive. VMs that act as physical machines but are simulated with software have fewer sources of entropy. For example Linux-based VMs, gather random numbers only from the exact millisecond time on their internal clocks and that is not enough to generate strong keys for encryption [11]. E. Data Protection and Portability Although the cloud services are offered based on a contract among client and a provider but what will happen when the contract is terminated and client doesn’t wants to continue anymore. The question is, will the sensitive data of client be deleted or misused by the provider. Secondly if the provider went out of business due to any reason, what will happen to the services and data of the client? Will the provider handout the data of client to some other provider, if yes, will client trust the new provider? Considering these questions we can say that data protection and portability remains as one of main weaknesses of cloud computing. F. Vendor Lock-in This vulnerability occurs due to immature providers and new business models which raise the risk of failure and going out of the business. Lock-in, makes a client dependent on a provider for products and services so they will be unable to deal with another provider without substantial switching costs. Clients must be sure of their potential provider prior to provider selection process. Lack of standards may also lock-in the clients with only one provider. Due to heterogeneous standards and policies settled by each provider, clients are not able to easily migrate from one provider to another even though they want to do so [13]. G. Internet Dependency Cloud computing is an internet dependent technology where users are accessing the services via web browser. What if internet is not available or service is down, what will happen to users systems and operations that are very critical and need to run 24 hours such as Healthcare and Banking systems. In some Asian and African underdeveloped countries where service of internet is not considered as reliable enough, will organizations adopt this paradigm to move their significant systems on cloud? IV.CONCLUSION AND FUTURE WORK In this research paper we have discussed the characteristics of a stormy cloud that contains threats and vulnerabilities. Cloud computing has a dynamic nature that is flexible, scalable and multi-shared with high capacity that gives an innovative shape of carrying out business [14]. However, beside these benefits there are seven deadly threats and vulnerabilities encountered in this technology. Therefore, we believe there is still tremendous opportunity for researchers to make revolutionary contributions in this field and bring significant impact of their development to the industry. There is need to develop and design in-depth security techniques and policies in terms of people, processes and technology. By considering the contributions from several IT industries worldwide, it’s obvious that cloud computing will be one of the leading strategic and innovative technologies in the near future. ACKNOWLEDGMENT The glory of accomplishing this research paper goes to our parents for their moral support. We are also thankful to our supervisor for encouraging us to write this research journal. Finally, we are thankful to IJAEST for assisting us to review this journal and providing us timely response. REFERENCES [1]CSA, â€Å"Security Guidance for Critical Areas of Focus in Cloud Computing V2.1† Cloud Security Alliance, 2009, [Online], Available: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf, [Accessed: 08-July-2011]. [2]E., Mathisen, â€Å"Security challenges and solutions in cloud computing,† in Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on, 2011, pp. 208-212. [3]Wei Chen, Hongyi Lu, Li Shen, Zhiying Wang, Nong Xiao, and Dan Chen, â€Å"A Novel Hardware Assisted Full Virtualization Technique,† in Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for, 2008, pp. 1292-1297. [4]S. Farrell, â€Å"Portable Storage and Data Loss,† Internet Computing, IEEE, vol. 12, no. 3, pp. 90-93, 2008. [5]R., Trope, C., Ray, â€Å"The Real Realities of Cloud Computing: Ethical Issues for Lawyers, Law Firms, and Judges â€Å", [Online], Available: http://ftp.documation.com/references/ABA10a/PDfs/3_1.pdf , 2009, [Accessed: 15-Jul-2011]. [6]Karthick Ramachandran, Thomas Margoni and Mark Perry, â€Å"Clarifying Privacy in the Clouds† in CYBERLAWS 2011 : The Second International Conference on Technical and Legal Aspects of the e- Society, IARIA,2011. [7]S., Subashini, V. Kavitha. â€Å"A survey on security issues in service delivery models of cloud computing†. Journal of Network and Computer Applications, vo l.34, pp.1-11, 2011. [8]Trend Micro, â€Å"Making Virtual Machines Cloud-Ready†, [Online], Available: http://www.whitestratus.com/docs/making-vms-cloud ready.pdf. A Trend Micro White Paper, 2009 [Accessed: 16-Jul-2011]. [9]J., Grimes, P., Jaeger, J., Lin, â€Å"Weathering the Storm: The Policy Implications of Cloud Computing† [Online], Availablehttp://ischools.org/images/iConferences/CloudAbstract13109F INAL.pdf , [Accessed: 19-Jul-2011]. [10] B. Grobauer, T. Walloschek, and E. Stocker, â€Å"Understanding Cloud Computing Vulnerabilities,† Security Privacy, IEEE, vol. 9, no. 2, pp. 50-57, 2011. [11] A., Greenberg, â€Å"Why Cloud Computing Needs More Chaos† [Online], Available:http://www.forbes.com/2009/07/30/cloud-computing- security-technology-cio-network-cloud-computing.html, 2009, [Accessed: 20-Jul-2011]. [12] T. Schreiber, â€Å"Session Riding a Widespread Vulnerability in Todays Web Applications† [Online], Available: http://www.securenet.de/papers/Session_Riding.pdf, white paper, 2004. [Accessed: 20-Jul-2011]. [13] G., Petri, â€Å"Vendor Lock-in and Cloud computing†, [Online], Available: http://cloudcomputing.sys-con.com/node/1465147 , 2010, [Accessed: 23-Jul-2011].

Tuesday, August 20, 2019

Rehabilitation for Anterior Glenohumeral Subluxation

Rehabilitation for Anterior Glenohumeral Subluxation 6-weeks Physical Rehabilitation Protocol for Anterior Glenohumeral Subluxation in Athletes Abstract: Background: Anterior shoulder dislocations and subluxations are common in young athletes. The mechanism for the first or primary shoulder dislocation may involve a collision or a fall typically with the arm in an abducted and externally rotated position. Contact sports, such as rugby and ice hockey, provide frequent opportunities for this injury to occur. Shoulder dislocations can occur after much less trauma in patients with previous dislocations. Despite a period of immobilization and rehabilitation following traumatic dislocations, recurrent instability often results and can lead to significant disability. To minimize the need for surgical intervention, effective physical rehabilitation programs are needed. Purpose: The aim of this study was to design a physical rehabilitation program using elastic band and resistive exercise to improve joint strength and range of motion in individuals diagnosed with a first-time shoulder dislocation.       Method: Twelve physically active males with a first-time acute shoulder dislocation were asked to volunteer. Participants began a physical rehabilitation program two weeks after the shoulder dislocation, which was confirmed by a referring physician. The rehabilitation program was 6 weeks in duration and required the participants to engage in progressive resistive loads/duration using elastic bands and weights five days per week. Pretest and posttest measures included shoulder strength and range of motion. All outcome measures were compared between the injured and uninjured shoulder, which served as the control condition in this study. Results: There were statistically significant differences between the injured and uninjured shoulder for measures of strength and range of motion during pretests (p Conclusions: The physical rehabilitation program proposed in this study was effective at improving strength and range of motion in the injured shoulder as evidenced by the similarity in posttest values between the injured and uninjured shoulder. These results are encouraging and suggest the physical rehabilitation program proposed in this study may help reduce the need for surgical intervention in healthy young males who experience a primary shoulder dislocation. Introduction: The shoulder is the most frequently dislocated joint in the human body, anterior dislocation being the most common injuries in our daily life, especially for young people (Rumian, et al., 2011; Liu, et al., 2014). It was estimated that the incidence rate of shoulder dislocation as 23.9 per 100,000 persons a year (Owens, et al., 2009). Anterior shoulder dislocations and subluxations are common injuries in young athletes (Kaplan, et al., 2005; Malhotra, et al., 2012). The disparity between the large humeral head and the small glenoid cavity gives the joint the ability to be injured (Brukner, 2012; Brandt, et al., 2013) Moreover, the anteriorly dislocated humeral head causes a labrum tear of the anterior and inferior labrum, a Bankart injury (UG, et al., 2014; Porcellini, et al., 2009), and a typical impression fracture (Hovelius, et al., 2008; Kim, et al., 2003). The mechanism of the first dislocations occurs after a forceful direct trauma or a fall typically with the arm in an abducte d and externally rotated or outstretched arm (Owens, et al., 2010; Rolf, 2007). Thus, in the majority of cases, the arm is abducted and the shoulder is externally rotated (Hardy, et al., 2010; Patel, et al., 2010). This is common in rugby, hockey, Handball, Football, riding, and cycling. In patients with lax shoulders or previous dislocations, dislocation can occur after much less trauma (Badr Gaballah, 2015; Kelly Terry, 2001; Brooks, et al., 2005). Recently, the most common management of treatment for primary anterior glenohumeral instability is nonoperative management (Gibson, et al., 2004; Zacchilli Owens , 2010) Rehabilitation and prevention of this injury were worthwhile of research because negligence of rehabilitation the first-time dislocation shoulder may lead to recurrent instability of the glenohumeral joint (Rumian, et al., 2011; Provencher, et al., 2010). Furthermore, there is a body of reports suggesting that younger athletes generally and contact sports particularl y most affected with the instability risk after a primary anterior shoulder dislocation. (Zacchilli Owens , 2010; Handoll, et al., 2006). This risk of the recurrence dislocation reported in young athletes with first-time anterior dislocation as height as 90-95% (Gibson, et al., 2016). However, the athletes with anterior shoulder dislocation which returning to activities with in season after lack rehabilitation have demonstrated high rates of recurrent dislocation from 37% to 90%. (Watson, et al., 2016; Castagna, et al., 2007). The goal of the primary rehabilitation for the acute anterior shoulder is to prevent long-term instability for the shoulder joint (Leroux, et al., 2014). However, patients with recurrent shoulder instability often need to surgical intervention or arthroscopic treatment. (Malhotra, et al., 2012; Provencher, et al., 2010; Porcellini, et al., 2009). Indeed, several modalities used conservative treatment for the acute dislocation shoulder (Liu, et al., 2014; Yamamoto, et al., 2010; Liavaag, et al., 2011) and injections (Nagata, et al., 2016). Some approaches have been conducted physical rehabilitation programs for first-time dislocation shoulder (Gibson, et al., 2004; Karatsolis Athanasopoulos, 2006; Salamh Speer, 2013). Other used the elastic resistance exercise which became one of the popular tools in physical rehabilitation. (Andersen, et al., 2010; Camci, et al., 2013; Brandt, et al., 2013) The major reason to use the elastic band that they have demonstrated excellent validity and reliability with shoulder muscle testing (Andersen, et al., 2016). Ultimately, the aim of this study was to design a physical rehabilitation program using an elastic band and resistive exercise to improve joint strength in individuals diagnosed with a first-time shoulder dislocation. Method: Subjects Physically active males who presented at the Mansoura university hospitals and the teaching hospital in Damietta, Egypt with acute anterior dislocation shoulder injury between September 2012 and February 2015 were randomly recruited as research participants. The magnetic resonance imaging (MRI) were conducted to determine the injury grade for 17 athletes. We excluded patients with recurrent dislocation shoulder or had a history of injury in the same joint. Twelve physically active males (age 18.6  ± 1.32y, mass 74.48 ±3.22 Kg, height 178.4 ±3.21 cm and competitive experience 9.6 ±2.67 y) with a first-time acute shoulder dislocation were considered as research participants. The participants began a physical rehabilitation program two weeks after the shoulder dislocation, which was confirmed by a referring physician. Rehabilitation Program The external and internal rotation exercises have been chosen for the first stage which aimed to control the pain and inflammation caused by the dislocation and included seventeen flexibility and isotonic strength exercise with 12-15 1RM intensity were performed for the scapulothoracic muscles particularly, the rotator cuff muscles. (Figure 1). Fig 1. First rehabilitation stage exersices examples Fig. 2. Second rehabilitation exercises examples. The second stage aimed to restore higher level of muscle strength. The intensity of exercises was five sets with 8-10 1RM, was tested according to the healthy arm. Thirty-two exercises in particular, Deltoid M., Trapezius M. and serratus anterior M. exercises in this stage were performed widely in the horizontal and diagonal axes. Moreover, the exercises were chosen to enhance the range of motion (ROM) and muscles strength between 90-150 ° vertically, horizontally, and diagonally (Figure 2). The third stage, after the twenty rehabilitation sessions. The endurance, peromitric, and strength exercises were consisted of five sets of 8-10 repetitions using variable resistance: one at 75% of the 10 RM, and two at 95% of the 8 RM. 27 extremity weights rehabilitation exercises performed to reach 190 200 ° ROM and the equally health arms strength as well. (Figure 5,6). The Thera-Band resistance bands exercises were hired during the six weeks especially the four colors (red, blu e, black, silver, gold). The red and blue bands were used in the first stage and the black and silver used in second stage, addition, the gold has been performed in the third stage. Furthermore, all the exercises performed by stretching the band between 75 100 %. knowing that, the weight of stretching in Thera-Band between 75-100% is (red 3.3-3.9kg, blue 5.9-7.1kg, black 8.1-9.7, silver 11.1-13.2kg, and gold 18.1-21.6kg). (BiÇer, et al., 2015;Andersen, et al., 2010) Fig. 3. Third rehabilitation exercises examples. Statistics analyze: The paired t-test was used to compare the collected data before performing the exercise protocol (Pre-test) and those which obtained after 6-weeks physical rehabilitation period (Post-test). Whether the differences between the samples were significant at p Measurements: The rehabilitation program was comprised four testing sessions. The Pre-test (PRT) section was conducted after two weeks of the injury and before the beginning of the rehabilitation program. after two rehabilitative weeks, the second week tracking test (SWT) was realized. while the Fourth week tracking test was realized after the fourth rehabilitative week (FWT). Moreover, after a resting of 6 weeks, the Post-test was conducted in the Faculty of Sports Education, Damietta University, Egypt. Additionally, all the injured athletes were right handed injured and in each testing test, the healthy arms measurements were recorded. Continuously, the test results for the injured arm had been compared with the healthy arm for each person. Before reporting the force measurement all the participants were informed with the test procedures for both arms. Four basics Isotonic force measurements were reported by Isometric Dynamometer device (Biodex Isokinetic Dynamometer). These force measurements w ere conducted for muscles around shoulder girdle in the 90 Deg. vertically and horizontally. The force variables were flexion force (F.F), adduction force (AD.F), Abduction force (AB.F), and hyper extension force (HB.F). Whilst, the participants were asked to perform the maximum flexibility for the shoulder joint without feeling pain. Addition, the range of motion variables were obtained by Goniometer for flexion range of motion (F.ROM), abduction (AB.ROM), and hyper extension (HB.ROM). Results: The test results (i.e., strength and range of motion) shown that there were statistically significant differences between the injured and uninjured shoulder (p > 0.01) prior the rehabilitation procedure. After six weeks of physical rehabilitation, the test results shown considerable improvement of more than 50%. As obviously seen from table 1, the deference between the pre-testes and post- testes of force were, flexion force 4.41  ±4.01N vs 121.5 ±12.4 N, abduction force 2.94 ±2.74 N vs 103.1 ± 9.8 N, Adduction 3.84 ±0.34 vs 133.7 ±9.26,Hyper-Extension 20.01 ±7.64 N vs 69.1 ±8.92 N. On the other hand, the range of motion of pre-testes and post-test were, Flexion 23.8 ±4.02à ¢Ã‚ Ã‚ ° vs 199.5 ±0.24à ¢Ã‚ Ã‚ °, Abduction was 29.3 ±3.62à ¢Ã‚ Ã‚ ° vs 195.5 ±2.13à ¢Ã‚ Ã‚ °, Hyper-extension 30.8 ±5.81à ¢Ã‚ Ã‚ ° vs. 108.5 ±5.72. Furthermore, the conducted post tests shown that there we re no significant differences (p Table 1. Improvement of the measurement among the rehabilitation stages. Improvment Healthy Shoulders Post-Test FWT SWT Pre- Test Unit Variables 94 % 128.2 ±10.4 121.5 ±12.44 91.04 ±8.13 48.7 ±4.31 4.41  ±4.01 N Flexion Force 93% 110.9 ±8.32 105.1 ±9.81 76.2 ±10.41 41.3 ±5.92 2.94 ±2.74 N Abduction 99% 135.2 ±5.33 133.7 ±9.26 97.12 ±7.22 21.7 ±2.17 3.84 ±0.34 N Adduction 95% 72.71 ±5.42 73.1 ±8.92 65.7 ±4.51 37.04 ±4.21 20.01 ±7.64 N H-Extension 99.1% 201.3 ±1.25 199.5 ±0.24 168 ±7.48 73.8 ±8.32 23.8 ±4.02 Deg Flexion ROM 98.3% 198.9 ±1.06 195.5 ±2.13 163 ±6.94 64.7 ±8.81 29.3 ±3.62 Deg Abduction 99.4% 108.5 ±5.72 107.8 ±6.12 100 ±2.2 52.2 ±13.2 30.8 ±5.81 Deg H-Extension Discussion: The current study aimed to design a rehabilitation program passed on the elastic and weights exercises. Over the past decades, we have seen a huge boost in the rehabilitation of shoulder dislocation injuries. These injuries because of the anatomical structure of the glenohumeral joint which allow to wide movement of the joint. Therefore, derives its extensive movement at the expense of its consistency and coherence. More than 50% of acute anterior dislocations can reoccur, especially in young athletes. The aim of the physical rehabilitation is avoiding the recurrent dislocation and using an elastic band and resistive exercise to improve joint strength in individuals diagnosed with a first-time shoulder dislocation. The current study results shown that, there were weakness of the shoulder muscles in the pre-test measurements of Flexion, adduction, abduction force as a result of ache, swelling, and inflammation. Nevertheless, the hyperextension motion measurements were reported better than the other measurement in the pretest. The mechanism of the anterior dislocation occurred forwardly and downward. Out of the ordinary, that has affected adversely on the forward movement of the arm. (Turkel, et al., 1981) The return to activity after 2-3 weeks is available for athletes with a high risk of recurrence dislocation. which expected to arthroscopic remain and return to activity after 6-month surgical stabilization (Watson, et al., 2016). Many factors have been related to rehabilitate shoulder dislocation. Thus, the current study has been assumed that 6 weeks elastic resistant with weight exercise had great benefit for the shoulder muscles especially, the rotator cuff muscles. Recently, the popularity of elastic bands has increased because of their low prices, flexibility, adaptability, versatility, and simplicity. (Andersen, et al., 2010) (Jakobsena, et al., 2013). The incorporation between nautilus machine and the elastic bands exercises have been used to promote joint range of motion and muscles strength in training and rehabilitation purposes as well. thus, the elastic resistant exercise has been improved the influences of the strength-shorting cycle. Addition to, it has been used as tec hnique to produce the speed eccentric contraction. (Stevenson, et al., 2010). It is obviously seen in table 1. and Figure 2, 3. there are a considerable significant different between the pretests and the posttests of the injured shoulders. Addition, it is seeming to be similar with the healthy shoulder after the 6wks. physical rehabilitation program. The same resulted reported in previous study conducted on young volley ball players and have improved their muscle power, muscle strength and ball speed. (Mascarin, et al., 2016). Nevertheless, the elastic resistant and free weight exercise improve the dynamic stabilization and joint stability. (Andersen, et al., 2010) (Camci, et al., 2013). Addition, the exercise rehabilitation program for the unstable shoulder must include a joint position sensibility and dynamic stabilization to supporting the functional stability of the shoulder joint. The dynamic stabilization is promoted the co-activation of the force couples about the glenohumeral joint to exceptional position of the humerus hear in the center of glenoid. ( Naughton, et al., 2005). Previous studies have demonstrated same levels of muscle activation for using elastic resistance compared with free weights display similar or even greater levels of muscle activity for some muscles during an exercise. (Camci, et al., 2013) (Andersen, et al., 2010). In contrast, used parallel with free weight (Aboodardaa, et al., 2013). Other studies have shown high levels of muscles activation compared with weight machine (Brandt, et al., 2013). But all the modalities recommended to use the elastic band with the weights. Moreover, using elastic band with weights appear to be equally in muscle activity as traditional using isoinertial resistance (Jakobsena, et al., 2013). Finally, The physical rehabilitation program proposed in this study was effective at improving strength and range of motion in the injured shoulder as evidenced by the similarity in posttest values between the injured and uninjured shoulder. These results are encouraging and suggest the phy sical rehabilitation program proposed in this study may help reduce the need for surgical intervention in healthy young males who experience a primary shoulder dislocation. Aboodardaa, S. J. et al., 2013. Resultant muscle torque and electromyographic activity during high intensity elastic resistance and free weight exercises. European Journal of Sport Science, 13(2), pp. 155-163. Andersen, L. et al., 2010. Muscle Activation and Perceived Loading During Rehabilitation Exercises: Comparison of Dumbbells and Elastic Resistance. Physical Therapy, 90(4), pp. 538-549. Andersen, L., Vinstrup, J., Jakobsen, M. Sundstru, E., 2016. Validity and reliability of elastic resistance bands for measuring shoulder muscle strength. Scand J Med Sci Sports., Volume May. Badr, M. Gaballah, A., 2015. Common Injuries among Male Field Hockey Players According to Playing Positions.. Journal of Applied Sports Science, 5(1), pp. 19-26. BiÇer, M. et al., 2015. Effect of Strength Training Program with Elastic Band on Strength Parameters. Biology of Exercise , 11(2), pp. 111-122. Brandt, M. et al., 2013. Perceived loading and muscle activity during hip strengthening exercises: comparison of elastic resistance and machine exercises.. Int J Sports Phys Ther, 8(6), pp. 811-819. Brooks, J., Fuller, C., Kemp, S. Reddin, . D., 2005. Epidemiology of injuries in English professional rugby union: part 2 training injuries. British Journal of Sports Medicine, Volume 39, pp. 767-775. Brukner, P., 2012. Clinical sports medicine. 4 ed. Australia: McGraw-Hill Publishing. Camci, E. et al., 2013. Scapular Kinematics During Shoulder Elevation Performed With and Without Elastic Resistance in Men Without Shoulder Pathologies. Journal of Orthopaedic Sports Physical Therapy , 43(10), pp. 735-743. Castagna, A., Nordenson, U., Garofalo, R. Karlsson, J., 2007. Minor shoulder instability. The Journal of Arthroscopic Related Surgery, Volume 23, pp. 211-215. Gibson, K. et al., 2004. The effectiveness of rehabilitation for nonoperative management of shoulder instability: a systematic review. Journal of Hand Therapy, 17(2), pp. 229-242. Handoll, H., Hanchard, N., Goodchild, L. Feary, J., 2006. Conservative management following closed reduction of traumatic anterior dislocation of the shoulder.. Cochrane Database Syst Rev., 25(1), p. CD004962. Hardy, M., Summers, D., Edwards, J. Munro, N., 2010. The BMA guide to sports injuries, Dorling Kindersley Puplishing, UK, 2010.. London, UK: Dorling Kindersley Puplishing. Hovelius, L. et al., 2008. Nonoperative treatment of primary anterior shoulder dislocation in patients forty years of age and younger. A prospective twenty-five-year follow-up. J Bone Joint Surg, Volume 90, pp. 945-952. Jakobsena, M. et al., 2013. Muscle activity during leg strengthening exercise using free weights and elastic resistance: Effects of ballistic vs controlled contractions. Human Movement Science , 32(1), pp. 65-78. Kaplan, L. et al., 2005. Prevalence and variance of shoulder injuries in elite collegiate football players. 2005;33:1142-6.. Am J Sports Med. , Volume 33, pp. 1142-1146. Karatsolis, K. Athanasopoulos, S., 2006. The role of exercise in the conservative treatment of the anterior shoulder dislocation. Journal of Bodywork and Movement Therapies, Volume 10, pp. 211-219. Kelly, L. Terry, G., 2001. Team Handball: Shoulder Injuries, Rehabilitation, and Training. Sports Medicine Arthroscopy Review:, 9(2), pp. 115-123. Kim , S. et al., 2003. Accelerated rehabilitation after arthroscopic Bankart repair for selected cases: a prospective randomized clinical study.. Arthroscopy, 19(7), pp. 722-731. Leroux, T. et al., 2014. Epidemiology of Primary Anterior Shoulder Dislocation Requiring Closed Reduction in Ontario, Canada. The American Journal of Sports Medicine, 42(2), pp. 442-450. Liavaag, S. et al., 2011. Immobilization in external rotation after primary shoulder dislocation did not reduce the risk of recurrence: a randomized controlled trial.. J Bone Joint Surg Am, 93(10), pp. 897904. Liu, A. et al., 2014. The external rotation immobilisation does not reduce recurrence rates or improve quality of life after primary anterior shoulder dislocation: A systematic review and meta-analysis.. Injury, Int. J. Care Injured, Volume 45, pp. 1842-147. Malhotra, A., Freudmann, M. S. Hay, S. M., 2012. Management of traumatic anterior shoulder dislocation in the 17- to 25-year age group: a dramatic evolution of practice. J Shoulder Elbow Surg, Volume 21, pp. 545-553. Mascarin, N., De Lira, C., Vancini, R. Andrade, M., 2016. Strength Training Using Elastic Band Improves Muscle Power and Throwing Performance in Young Female Handball Players. Journal of sport rehabilitation, Volume 24, pp. 1-25.. Nagata, H., Thomas, W. Woods, D., 2016. The management of secondary frozen shoulder after anterior shoulder dislocation The results of manipulation under anaesthesia and injection. journal of orthopaedics, Volume 13, pp. 100-105. Naughton, J., Adams, R. Maher, C., 2005. Upper-body wobbleboard training effects on the post-dislocation shoulder. Physical Therapy in Sport, Volume 6, pp. 31-37. Owens, B. et al., 2009. Incidence of Glenohumeral Instability in Collegiate Athletics.. 37(9), pp. 1750-1754. Owens, B. et al., 2010. Pathoanatomy of First-Time, Traumatic, Anterior Glenohumeral Subluxation Events. The Journal of Bone and Joint Surgery, 92(7), pp. 1605-1611. Patel, D. R., Greydanus, D. E. Bak, R. J., 2010. Pediatric Practice Sports Medicine. New York, USA: McGraw-Hill. Porcellini, G. et al., 2009. Predisposing Factors for Recurrent Shoulder Dislocation After Arthroscopic Treatment. J Bone Joint Surg Am, 91(11), pp. 2537-2542. Provencher, M. T. et al., 2010. Recurrent Shoulder Instability: Current Concepts for Evaluation and Management of Glenoid Bone Loss. J Bone Joint Surg Am, 92(2), pp. 133-151. Rockwood, C. A., 2008. The Shoulder. 4 ed. s.l.:Elsevier, Health Science Publisher. Rolf, C., 2007. Sports Injuries Hand Book, Diagnosis and Management. London: A C Black Publishers. Rumian, A., Coffey, D., Fogerty, S. Hackney, R., 2011. Acute first-time shoulder dislocation. Orthopaedics and Trauma, 25(5), pp. 363-368. Salamh, P. A. Speer, K. P., 2013. Post-Rehabilitation Exercise Considerations Following Total Shoulder Arthroplasty. Strength Conditioning Journal, 35(4), pp. 56-63. Stevenson, M. et al., 2010. Acute Effects of Elastic Bands During the Free-weight Barbell Back Squat Exercise on Velocity, Power, and Force Production. Journal of Strength Conditioning Research, 24(11), pp. 2944-2954. Turkel, S., Panio, M., Marshall, J. Girgis, F., 1981. Stabilizing mechanisms preventing anterior dislocation of the glenohumeral joint.. J Bone Joint Surg Am, 63(8), pp. 1208-1217. UG, L. et al., 2014. Management of primary acute anterior shoulder dislocation: systematic review and quantitative synthesis of the literature.. Arthroscopy, 30(4), pp. 506-522. Yamamoto, N., Sano, H. Itoi, E., 2010. Conservative treatment of first-time shoulder dislocation with the arm in external rotation. J Shoulder Elbow Surg, Volume 19, pp. 98-103. Zacchilli, M. Owens , B., 2010. Epidemiology of shoulder dislocations presenting to emergency departments in the United States. J Bone Joint Surg Am , Volume 92, p. 542-549. Anterior shoulder dislocation

The Dynamic Friendship of Ernest Hemingway and Fitzgerald :: Biography Biographies Essays

The Dynamic Friendship of Hemingway and Fitzgerald In 1930 F. Scott Fitzgerald and Ernest Hemingway were both working on novels; Fitzgerald was writing Tender is the Night and Hemingway Death in the Afternoon. They were both living in vastly different places and dealing with different types of situations in their lives. Zelda Fitzgerald, F. Scott's wife, was hospitalized in Switzerland for the better part of 1930-31 after suffering a mental breakdown. Unfortunately for Scott this meant that he had to put aside his novel writing and write several short stories which would be sold to cover the cost of Zelda's medical treatment. Hemingway was residing in the United States during this time but also traveled to Spain during this period. There was no correspondence between the two about Zelda's illness until April, 1931, almost a year after her hospitalization. In October, 1931 Hemingway and Fitzgerald met but scholars are unclear as to the circumstances surrounding this meeting. Around this time however, the two authors began using Maxwell Perkins, their editor, as a courier for their messages to one another. This seems to show that Hemingway's and Fitzgerald's friendship was drifting apart. Perkins must have sensed this because he began to include news about each of them in his letters to them. It's thought that perhaps the lack of correspondence between Hemingway and Fitzgerald during this period fell more on the shoulders of Fitzgerald who was beginning to feel guilty about his writing and lack of success. In 1932, Zelda Fitzgerald suffered a relapse of her mental condition and had to be hospitalized again. During her hospitalization she wrote Save Me the Waltz which would be published by Scribner's in October, 1932. Fitzgerald became uneasy after learning that his wife's book would be published within months of Hemingway's Death in the Afternoon. Fitzgerald worried that Hemingway would resent the fact that Death in the Afternoon would be competing with Zelda's book. Hemingway and Fitzgerald met in New York in January 1933. This meeting, however, was ruined because Fitzgerald was in the middle of one of his benders. They met for dinner with their friend Edmund "Bunny" Wilson and most of the evening was spent with Fitzgerald arguing with both Wilson and Hemingway. This meeting furthered Hemingway's notion that Fitzgerald was a drunken fool who wasted his talent. Hemingway, in a letter to Max Perkins in February 1933, wrote of Fitzgerald: "He's gone into that cheap irish love of defeat, betrayal of himself etc.

Monday, August 19, 2019

Personal Justice and Homicide in Scott’s Ivanhoe: :: Scott Ivanhoe Psychology papers

Personal Justice and Homicide in Scott’s Ivanhoe Abstract: Scott’s Ivanhoe reveals a conflict between our innate concept of justice as personal justice and the impersonal justice which is imposed on us by the modern nation-state. This conflict causes the split between the proper hero, who affirms the order of impersonal justice, and the dark hero, who acts according to personal justice, in Scott’s work. In Evolution and Literary Theory, Joseph Carroll provides a paradigm for the integration of literary criticism with evolutionary psychology. First, he argues that literary critics should learn to understand and respect the evidence for the basic contention of evolutionary psychology, namely, that the human mind is not a blank slate which receives all of its content from an external culture, but that human cognition and the culture that is based on it are highly constrained by innate psychological mechanisms, which evolved in the environment in which humans spent most of their evolutionary history, the hunting-gathering bands of Pleistocene Africa. Humans evolved a rich array of specialized mental mechanisms for dealing with this environment, including mechanisms for determining mate value (see Buss), for protecting kin (see Daly and Wilson, 17-121), for social exchange (see Cosmides and Tooby 1992) and many others. These psychological mechanisms collectively form the human nature which underlies the production and consumption of literary texts. However, the scope of an evolutionarily informed literary analysis is not limited to simply finding these human universals in literary texts. Rather, many of these psychological mechanisms are â€Å"open programs† which permit of a wide range of cultural and individual variation (Carroll 152). Carroll identifies the three levels at which a literary criticism informed by evolutionary psychology should work: human nature, cultural order, and individual identity (150). While human nature constrains all cultural productions, â€Å"cultural forms are themselves the product of a complex interaction among various innate dispositions and between innate dispositions and variable environmental conditions† (152). Evolutionary psychology enables us to understand not only literary universals, but also the complex and often conflicting relationship between human nature, culture, and the individual. In their book Homicide, evolutionary psychologists Margo Wilson and Martin Daly identify one such conflict between human nature and the contemporary cultural order. They argue that humans have an innate concept of justice which is based on the idea of personal revenge. According to this concept of justice, it is legitimate and even praise-worthy for people to whom a wrong has been done to avenge the wrong-doing themselves.

Sunday, August 18, 2019

Analysis of an Article on Obesity in America Essay -- Article Review

Obesity kills at least 111,000 Americans per year (Greenstreet 107). The government has made many approaches to reshape our food system and attempt to force us to buy the foods that make us fat. Especially during our recession, it is that much easier to buy fast foods because it simply is the cheaper thing to do. We have many needs as human beings that need to be met, with food being one of the most important and being in this recession has made us easy targets for the government. Organic foods and less-fatty foods are more expensive these days so even health-savvy people try to find cheaper alternatives and look for the positives in these not-so-healthy foods. Due to this, many people believe that the government and its power to control how expensive or cheap food is sold for is the biggest reason for obesity in America but in retrospect, it is simply our own fault because we make the decision to save money and eat less nutritiously over spending more money on the best food for yo ur diet. The reason for the growing population of obesity is not due to the government creating this epidemic because they in turn are trying to help out the growing obese population. Also, the obese population is constantly growing because of the personal choices of the people, the environment around them and the genetics of each individual. Immediately in the subtitle of the article, Greenstreet is quick to declare â€Å"how corporations and the US Government create the obesity epidemic† (Greenstreet 107). He makes the government seem like they are the main enemies and contributors to the growing obesity epidemic, â€Å"the government takes an extremely damaging and passive-aggressive role in contributing to a national health crisis...† (Greenstreet 107). ... ...): 1095-1105. Raj, Manu and R. Krishna Kumar, â€Å"Obesity in children & adolescents.† Indian Journal of Medical Research 132.5 (2010): 598-607. Kouzoukas, Demetrios L. â€Å"Legal Preparedness for Obesity Prevention and Control: The Structural Framework and the Role of Government.† Journal of Law 37 (2009): 24-27 "Major Crops Grown in the United States | Ag 101 | Agriculture | US EPA." US Environmental Protection Agency. N.p., n.d. Web. 1 May 2011. . "Obesity and Genetics." Columbia St. Mary's Medical Moment. N.p., Web. 1 May 2011. . "Ten ways to distinguish between healthy and unhealthy food." Choosing and cooking healthy food. N.p., n.d. Web. 1 May 2011. .

Saturday, August 17, 2019

Sor Juana

Writing Assignment Maria Zuniga Book ReportDecember 9, 2005 Corrections â€Å"Sor Juana† is a biography of Sor Juana Ines de la Cruz written by Octavio Paz and translated by Margaret Sayers Peden. It is a book of 470 pages divided in six parts that besides Sor Juana’s life and work, explain the difficulties of the time for an intellectual woman. It was published by The Belknap Press of Harvard University Press Cambridge, Massachusetts in 1988. Reading this book gave me the best opportunity to know more about someone that although has been very influential in my entire life, I didn’t know all her history.My admiration and respect for Sor Juana started since I was a child and one of my sisters used to read her poems. Through my literature classes I knew a little more about her and the admiration and respect continued growing. Sor Juana became for me a stereotype of intellect, power, femininity, persistence and freedom combined with the devotion to God. Her story ma kes me learn to follow my dreams, to be ambitious, and over all to never ever give up. Juana Ines de la Cruz was born in Mexico in 1648. She grew up in the Panayan Hacienda, which was run for her mother for more than thirty years although she never learned to read.Sor Juana started to take lessons at age or three. During a long period of her childhood, she didn’t eat cheese because â€Å"It made one slow-witted,† and â€Å"Desire for learning was stronger than the desire for eating. † By the time she was six or seven, she knew how to read and write. As she couldn’t go to the university (because she was a woman), she studied and read by herself. She used to cut-off several inches of her hair (when hair was considered one of the most important female features), as a challenge for new learning â€Å"A head shouldn’t be adorned with hair and naked of learning† If she didn’t meet the goal, then she cut it again.Sor Juana was sent to Mexico City when she was eight to live with her grandfather, who had one of the biggest libraries of those times. By age 15, as one of the most learned women in Mexico, she was presented at court with the Viceroy and his wife (maximum authorities in Mexico). As a lady-in waiting, Juana Ines would become known at court for her wit and beauty as well as for her erudite intelligence. To ascertain the extent of her learning, the Marquise gathered together some of the most astute minds of the day, poets, historians, theologians, philosophers, and mathematicians.Juana Ines answered the questions and arguments directed at her, impressing them all with her mental prowess. At age 20 she entered the Convent of San Jeronimo, known for the mildness of its discipline. The convent was not a ladder toward God but a refuge for a woman who found herself alone in the world. She lived in a two-storey cell where she read insatiably and amassed an impressive library while pursuing her writing and intellectual pursuits. She brought the elegance of the court with her by transforming the convent locutory into an intellectual salon.The next Viceroy, the Marquis de La Laguna and the Marquise Maria Luisa, the Countess de Pareda, were among the court society and literary devotees who came to talk and debate with Sor Juana. Sor Juana wrote sacred poems and erotic love poems, vocal music, villancicos performed in the cathedral, plays, secular comedies, and some of the most significant documents in the history of feminism and philosophical literature. Her use of language, though characterized by the Baroque style, has a modern essence.Her public face reveals the impiousness of an undaunted spirit who appears, not as a nun, but as an independent woman. One of Sor Juana’s archetypes was Isis, Egyptian goodness inventor of writing, a symbol of intellect. She also identified herself with maidens of antiquity, poetically divinely inspired to produce poems and prophecies thinking â€Å"There we re not enough punishment or reprimands to prevent me from reading. † The life and work of Sor Juana lines can be summed as: knowledge is a transgression committed by a solitary hero who then is punished.Not the glory of knowledge (denied to mortals) but the glory of the act of knowing. Sor Juana was a pivotal figure who lived at a unique point in history bound by two opposing world views: one the closed universe of Ptolemy and of the Inquisition, which still held sway in Mexico/New Spain; the other characterized by the new science of Copernicus, Newton, and Galileo. On her monumental philosophical poem Primer sueno/First Dream the soul is pictured as intellect, not a religious pilgrim. At the height of the journey, at the fullest understanding reason can attain, there was no vision.Instead, the soul drew back at the immensity of the universe and foundered in confusion. In 1690, requested by the Bishop, Sor Juana wrote her only theological criticism, which she insisted not for public view. However, the Bishop published and censured it with an imaginary name of â€Å"Sor Philotea. † In defiant response, Sor Juana wrote â€Å"La Respuesta de la poetisa a la muy ilustre Sor Philotea de la Cruz,† a feminist manifesto defending women’s right to be educated and pursue learning, citing over 40 women who had made significant contributions throughout history.This work ignited the church’s wrath. In a climate of intimidation and fear Sor Juana signed â€Å"Protesta que rubricada con su sangre, hizo de su fe y amor a Dios† a statement of self-condemnation in bloodShe renewed her vows and surrendered her musical and scientific instruments, as well as her library of 4,000 volumes, considered at that time to be the largest in Mexico. Two years of silence and penance followed. Then in 1695, while ministering to nuns struck by an epidemic, she herself succumbed and died.Sor Juana has been an inspirational model to follow through all the situations that she faced. She succeeded in a world that was completely against her. The lack of father, which was almost a crime in that time, the lack of freedom to study, to talk, even to think, and over all the prohibition to be herself were some of her obstacles. Every time I am facing an obstacle, I just recall her story and imagine the innumerable sacrifices she had made to get the freedom of learning.After reading her story, I see the world in a different way. Now I know that all those small decisions that I take every day, such as the cloth I wear, what to eat, to read, what to say, and even what to feel are privileges granted for marvelous people like Sor Juan Ines de la Cruz. I also know that all those people had to pay a high price for these privileges; some of them pay with their lives. I feel not just impressed, but grateful to Sor Juana, her cultural heredity, and woman’s worth.