Thursday, August 22, 2019
All About Personal and Professional Health Care Essay Example for Free
All About Personal and Professional Health Care Essay Health care communication is an important practice in the treatment of a patient. Ensuring effective communication can help the patient understand their state of health. The Meaning and Nature of Healthcare Communication Healthcare communication involves an efficient line of communication between medical professionals, clients, and patient. A vital component of healthcare communication is the ability to share information that can enhance a patientââ¬â¢s knowledge. This is important in assuring quality healthcare (Williams, 2007). Personal healthcare communication is vital in promoting a physicianââ¬â¢s understanding through discussion and support groups. Healthcare communication considers factors such as the attitude of the patient, their behavior and belief which could have an impact on how the physician can improve the quality of health care (Williams, 2007). In addition, it requires empathy and understanding from the physician when communicating with their patients. An effective way of achieving effective communication is to get feedbacks from the person getting the information. The healthcare practitioner should carefully evaluate if the client can understand the message being relayed (Williams, 2007). One of the most effective ways of achieving an effective healthcare communication is by conducting a personal interview. This method will help determining the accuracy of information regarding their condition. The psychosocial aspects of the patientââ¬â¢s conditions can be considered when conducting the interview (Williams, 2007). The Relevance of Healthcare Communication An effective professional health care communication can improve the health outcome of a patient. The health care professional can utilize various guidelines to achieve effective healthcare communication. It can help the healthcare practitioner to establish a better understanding of the condition and history of their patients (Williams, 2007). In addition, effective healthcare communication can increase the patientââ¬â¢s satisfaction and knowledge of treatment and its possible outcomes. Without effective healthcare communication, the patient will not have a clear understanding of the state of their health. As a result, they are more likely to spend more on healthcare, take the wrong medication, and become depressed (Williams, 2007). The Principles of Therapeutic Communication The Talking Cure In the early history of health care, therapists or in this case health care professionals rarely say a word. Usually, the best way they understand the condition of their patient is through listening but they never communicate. However, it is likely to practice a non-threatening way of communicating with patients and will not hurt their self-esteem (Wachtel, 2008). In this process, the healthcare professional conceals their real message in a meta-message, which can both be demonstrated in a manner that would make it likely to address the conflicting issue which the patient has avoided (Wachtel, 2008). The manner of delivery by the therapist can have a huge effect on the patient compared to the real message. Most of the time, what the therapist says lowers the self-esteem or confidence of the patient (Wachtel, 2008). In this practice, the therapist must be consistent in monitoring their part in the therapeutic session (Wachtel, 2008). Cyclical Psychodynamics The theory of cyclical psychodynamics utilizes a series of repetitive cycles of communication between people. It combines views from interpersonal dynamics and behavioral and family systems (Wachtel, 2008). The cyclical psychodynamics theory states that people live in a contextual life and their behavior is always related to an individual or object. In therapeutic communication, it is important for the health care professional to understand the roots of the patientââ¬â¢s difficulties (Wachtel, 2008). Cyclical psychodynamics focuses on understanding the cause of the patientââ¬â¢s anxiety. The difficulty of a patient can be rooted from their early knowledge of being afraid of their feelings, thoughts, and inclinations. The aim of therapy in this sense is to help the patient refocus these feelings and integrate them into a complete life (Wachtel, 2008). One aim of therapeutic communication is to direct the patient to a variation of the truth that would help them see new possibilities in their life and to modify life patterns that have been responsible for their difficulties. By using meta-messages, the therapist will help the patient affirm, acknowledge, and understand their feelings (Wachtel, 2008). Other therapeutic techniques provide a different climate, focusing on inhibition, silence and non-engagement from the therapist. With cyclical psychodynamics, however, the health care professional is more involved in the therapeutic process (Wachtel, 2008). Conclusion Healthcare communication involves an efficient line of communication between medical professionals, clients, and patient. A vital component of healthcare communication is the ability to share information that can enhance a patientââ¬â¢s knowledge. This is important in assuring quality healthcare. An effective professional health care communication can improve the health outcome of a patient. The health care professional can utilize various guidelines to achieve effective healthcare communication. It can help the healthcare practitioner to establish a better understanding of the condition and history of their patients. Effective healthcare communication can increase the patientââ¬â¢s satisfaction and knowledge of treatment and its possible outcomes. Without effective healthcare communication, the patient will not have a clear understanding of the state of their health. As a result, they are more likely to spend more on healthcare, take the wrong medication, and become depressed. In the early history of health care, therapists or in this case health care professionals rarely say a word. Usually, the best way they understand the condition of their patient is through listening but they never communicate. However, it is likely to practice a non-threatening way of communicating with patients and will not hurt their self-esteem. In this process, the healthcare professional conceals their real message in a meta-message, which can both be demonstrated in a manner that would make it likely to address the conflicting issue which the patient has avoided Cyclical psychodynamics focuses on understanding the cause of the patientââ¬â¢s anxiety. The difficulty of a patient can be rooted from their early knowledge of being afraid of their feelings, thoughts, and inclinations. The aim of therapy in this sense is to help the patient refocus these feelings and integrate them into a complete life. With cyclical psychodynamics, the patient is directed to a variation of the truth that would help them see new possibilities in their life and to modify life patterns that have been responsible for their difficulties. By using meta-messages, the therapist will help the patient affirm, acknowledge, and understand their feelings. Compared with other therapeutic techniques, which focuses on inhibition, silence and non-engagement from the therapist, cyclical psychodynamics involves more involvement and participation by the health care professional in the therapeutic process
Wednesday, August 21, 2019
Vulnerability in Cloud Computing Essay Example for Free
Vulnerability in Cloud Computing Essay Abstractââ¬â Cloud computing has been developed to reduce IT expenses and to provide agile IT services to individual users as well as organizations. It moves computing and data away from desktop and portable PCs into large data centers. This technology gives the opportunity for more innovation in lightweight smart devices and it forms an innovative method of performing business. Cloud computing depends on the internet as a medium for users to access the required services at any time on pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers from threats and vulnerabilities that prevent the users from trusting it. Various be rainy as well, in other words this technology is not trustworthy as it is affected with threats and vulnerabilities. We have termed a cloud with threats and vulnerabilities as a stormy cloud. Based on Cloud Security Alliance (CSA) and our research, we have identified top seven threats and vulnerabilities that are the causes behind the creation of a stormy cloud [1]. The identified threats and vulnerabilities are ranked from top to bottom as shown in Fig.1. malicious activities from illegal users have threatened this technology such as data misuse, inflexible access control and limited monitoring. The occurrence of these threats may result into damaging or illegal access of critical and confidential data of users. This research paper describes the characteristics (threats, vulnerabilities) associated with a stormy cloud. Keywords- Illegal access, Threats, Vulnerabilities I.INTRODUCTION The traditional era of computing involves the use of software, hardware and storage to achieve the required computational service whereas cloud computing has isolated the services from resources (networks, storage, servers). The required services are provided to the users by utilizing the resources of provider. Users are no longer required to purchase hardware, software or to manage storages. Due the evolution of this technology users are required to pay for cloud services on consumption basis. New cloud based business models are being discussed, defined, and implemented as solutions in form of on-demand services that allows businesses to enhance their efficiency and scalability. Success or failure of this technology relies on usersââ¬â¢ trust whether the service provided is reliable, available and secure. Considering the benefits of cloud computing various organizations are moving towards IT solutions that are based on cloud however, before starting the journey to cloud, organizations must considers the possible threats and vulnerabilities that may convert their dreams of enhancing scalability and saving management cost into a nightmare of data loss and misuse. The users must consider that cloud can Figure 1. Characteristics of stormy cloud. In order to create awareness and protect the cloud users from adopting a stormy cloud, we are describing the impacts of threats and vulnerabilities in cloud computing so that organizations or users can adopt this technology with trust and from a trusted provider who has the powerful and trusted security polices as well as efficient techniques for securing the usersââ¬â¢ data on cloud. II.CLOUD COMPUTING THREATS As we already mentioned, there are several significant threats that should be considered before adopting the paradigm of cloud computing, these threats are discribed as follows : A. Abuse and Nefarious Use of Cloud Cloud providers facilitate the users with various types of services including unlimited bandwidth and storage capacity. Some cloud service providers offer free limited trial periods that gives an opportunity for hackers to access the cloud immorally, their impact includes decoding and cracking of passwords, launching potential attack points and executing malicious commands. Spammers, malicious code authors and other cybercriminals can conduct their activities with relative impunity, as cloud service providers are targeted for their weak registration systems and limited fraud detection capabilities. For example some cybercriminals use rich content applications such as flash files that enable them to hide their malicious code and utilize usersââ¬â¢ browsers to install malware [1]. B. Insecure Interfaces and APIs Cloud users are using software interfaces and APIs to access and manage the cloud services. These APIs need to be secured because they play an integral part during provisioning, management, orchestration and monitoring of the processes running in a cloud environment. The security and availability of cloud services is dependent upon the security of these APIs so they should include features of authentication, access control, encryption and activity monitoring. APIs must be designed to protect against both accidental and malicious attempts to avoid threats. If cloud service provider relies on weak set of APIs, variety of security issues will be raised related to confidentiality, integrity, availability and accountability such as malicious or unidentified access, API dependencies, limited monitoring/logging capabilities, inflexible access controls, anonymous access, reusable tokens/passwords and improper authorizations[1]. C.Malicious Insider Insider attacks can be performed by malicious employees at the providerââ¬â¢s or userââ¬â¢s site. Malicious insider can steal the confidential data of cloud users. This threat can break the trust of cloud users on provider. A malicious insider can easily obtain passwords, cryptographic keys and files. These attacks may involve various types of fraud, damage or theft of information and misuse of IT resources. The threat of malicious attacks has increased due to lack of transparency in cloud providerââ¬â¢s processes and procedures [2]. It means that a provider may not reveal how employees are granted access and how this access is monitored or how reports as well as policy compliances are analyzed. Additionally, users have little visibility about the hiring practices of their provider that could open the door for an adversary, hackers or other cloud intruders to steal confidential information or to take control over the cloud. The level of access granted could enable attackers to collect confidential data or to gain complete control over the cloud services with little or no risk of detection. Malicious insider attacks can damage the financial value as well as brand reputation of an organization. D. Virtualized Technology Due to the cloud virtualization, cloud providers are residing the userââ¬â¢s applications on virtual machines (VMs) within a shared infrastructure. The VMs are virtualized based on the physical hardware of cloud provider. In order to maintain the security of users, providers are isolating the VMs from each other so if any of them is malicious, it will not affect the other VMs under the same provider. The VMs are managed by hypervisor in order to provide virtual memory as well as CPU scheduling policies to VMs. As the hypervisor is main source of managing a virtualized cloud platform, hackers are targeting it to access the VMs and the physical hardware, because hypervisor resides between VMs and hardware [3], so attack on hypervisor can damage the VMs and hardware. Strong isolation should be employed to ensure that VMs are not able to impact or access the operations of other users running under the same cloud service provider. Several vendors such as Xen and KVM are providing strong security mechanisms of securing the cloud hypervisors, but still it is identified that sometimes security of VMs is compromised. E. Data Loss or Leakage Data loss can occur due to operational failures, unreliable data storage and inconsistent use of encryption keys. Operational failure refers to deletion or alteration of records without a backup of the original content that can take place intentionally or unintentionally. Unreliable data storage refers to saving of data on unreliable media that will be unrecoverable if data is lost [4]. The inconsistent use of encryption keys will result into loss and unauthorized accesses of data by illegal users that will lead to the destruction of sensitive and confidential information. Example of data loss is Twitter hacks. The online accounts of Twitter accessed by hackers and their numerous sensitive corporate documents were stolen. These documents were housed in Googles online web office service Google Docs. Although Google was not the one to be blamed for security break-in as the security of documents from twitter was not efficient enough. Instead, the entire company data was only one password crack away from discovery [5]. Itââ¬â¢s clear from this example that data loss or leakage can damage oneââ¬â¢s brand, reputation and cause a loss that may significantly impact employee, partner and usersââ¬â¢ morale as well as trust. Loss of core intellectual property can have competitive and financial implications beside the compliance violations and legal consequences. F.Account or Service Hijacking Account or service hijacking refers to unauthorized access gained by attackers to control the usersââ¬â¢ accounts, such as phishing, fraud and exploitation of software vulnerabilities. For example if an attacker gains access to usersââ¬â¢ credentials, they can spy on their activities/transactions, manipulate their data, return falsified information and redirect them to illegitimate sites [6]. Usersââ¬â¢ account or service instances may become a new base for the attackers who can leverage the cloud service providersââ¬â¢ reputation by launching subsequent attacks. With stolen credentials, attackers can often access critical areas of deployed cloud computing services, allowing them to compromise the confidentiality, integrity and availability of those services. Authentication and authorization through the use of roles and password protecting is a common way to maintain access control when using web-browsers to access cloud computing systems. However, this method is not suff icient enough to secure sensitive and critical data. G.Unknown Risk Profile It is important for the users to know software versions, security practices, code updates and intrusion attempts. While adopting cloud computing services, these features and functionality may be well advertised but what about the details orcompliance ofthe internal security procedures, configuration hardening, patching, auditing and logging. Users must be clarified how and where their data and related logs are stored. However, there is no clear answer that leaves users with an unknown risk profile that may include serious threats [1]. the VM within the virtualized cloud environment.VM escape is a vulnerability that enables a guest-level VM to attack its host. Under this vulnerability an attacker runs code on a VM that allows an OS running within it to break out and interact directly with the hypervisor as shown in Fig.2 [8]. III.CLOUD COMPUTING VULNERABILITIES There are several significant vulnerabilities that should be considered when an organization is ready to move their critical applications and data to a cloud compuitng environment, these vulnerabilities are discribed as follows : A. Session Riding and Hijacking Session hijacking refers to use of a valid session key to gain unauthorized access for the information or services residing on a computer system, it also refers to theft of a cookie used to authenticate a user to a remote server and it is relevant to web application technologies weaknesses in the web application structure at their disposal that gives the chance to hackers in order to accomplish a wide variety of malicious activities. While session riding refers to the hackers sending commands to a web application on behalf of the targeted user by just sending that user an email or tricking the user into visiting a specially crafted website. Session riding deletes user data, executes online transactions like bids or orders, sends spam to an intranet system via internet and changes system as well as network configurations or even opens the firewall [12]. However, the web technologies evolution and refinement also brings new techniques that compromise sensitive data, provide access to theoretically secure networks and pose threats to the daily operation of online businesses. B. Virtual Machine Escape Cloud computing servers use the same OS, enterprise and web applications as localized VMs and physical servers. The ability for an attacker or malware to remotely exploit vulnerabilities in these systems and applications is a significant threat to virtualized cloud computing environments [7]. In addition, co-location of multiple VMs increases the attack surface and risk of VM-to-VM compromise. Intrusion detection and prevention systems need to be able to detect malicious activity at VM level, regardless of the location of Figure 2. VM Escape. It allows the attacker to access the host OS and all other VMs running on that particular host. Hypervisors and VMââ¬â¢s complexity may cause an increase threat to attack surface that weakens security such as paging, check pointing and migration of VMs [8]. C. Reliability and Availability of Service In terms of reliability and availability, cloud computing is not a perfect technology. For-example in February 2008, Amazons Web Service (Amazons-S3) cloud storage infrastructure went down for several hours, causing data loss and access issues with multiple Web 2.0 services. With more services being built on top of cloud computing infrastructures, an outage orfailure can create a domino effect by taking down large amounts of Internet based services and applications which raise several questions such as in cases of failure, what forms of settlement exist for stakeholders? What is the responsibility of cloud providers? What will be appropriate procedures to overcome these issues? [9]. D. Insecure Cryptography Attackersââ¬â¢ can decode any cryptographic mechanism or algorithm as main methods to hack them are discovered. Itââ¬â¢s common to find crucial flaws in cryptographic algorithm implementations, which can twist strong encryption into weak encryption or sometimes no encryption at all. For example in cloud virtualization providers uses virtualization software to partition servers into images that are provided to the users as on-demand services [10]. Although utilization of those VMs into cloud providers data centres provides more flexible and efficient setup than traditional servers but they dont have enough access to generate random numbers needed to properly encrypt data. This is one of the fundamental problems of cryptography. How do computers produce truly random numbers that cant be guessed or replicated? In PCs, OS typically monitors users mouse movements and key strokes to gather random bits of data that are collected in a so-called Entropy Pool (a set of unpredictable numbers that encryption software automatically pulls to generate random encryption passkeys). In servers, one that dont have access to a keyboard or mouse, random numbers are also pulled from the unpredictable movements of the computers hard drive. VMs that act as physical machines but are simulated with software have fewer sources of entropy. For example Linux-based VMs, gather random numbers only from the exact millisecond time on their internal clocks and that is not enough to generate strong keys for encryption [11]. E. Data Protection and Portability Although the cloud services are offered based on a contract among client and a provider but what will happen when the contract is terminated and client doesnââ¬â¢t wants to continue anymore. The question is, will the sensitive data of client be deleted or misused by the provider. Secondly if the provider went out of business due to any reason, what will happen to the services and data of the client? Will the provider handout the data of client to some other provider, if yes, will client trust the new provider? Considering these questions we can say that data protection and portability remains as one of main weaknesses of cloud computing. F. Vendor Lock-in This vulnerability occurs due to immature providers and new business models which raise the risk of failure and going out of the business. Lock-in, makes a client dependent on a provider for products and services so they will be unable to deal with another provider without substantial switching costs. Clients must be sure of their potential provider prior to provider selection process. Lack of standards may also lock-in the clients with only one provider. Due to heterogeneous standards and policies settled by each provider, clients are not able to easily migrate from one provider to another even though they want to do so [13]. G. Internet Dependency Cloud computing is an internet dependent technology where users are accessing the services via web browser. What if internet is not available or service is down, what will happen to users systems and operations that are very critical and need to run 24 hours such as Healthcare and Banking systems. In some Asian and African underdeveloped countries where service of internet is not considered as reliable enough, will organizations adopt this paradigm to move their significant systems on cloud? IV.CONCLUSION AND FUTURE WORK In this research paper we have discussed the characteristics of a stormy cloud that contains threats and vulnerabilities. Cloud computing has a dynamic nature that is flexible, scalable and multi-shared with high capacity that gives an innovative shape of carrying out business [14]. However, beside these benefits there are seven deadly threats and vulnerabilities encountered in this technology. Therefore, we believe there is still tremendous opportunity for researchers to make revolutionary contributions in this field and bring significant impact of their development to the industry. There is need to develop and design in-depth security techniques and policies in terms of people, processes and technology. By considering the contributions from several IT industries worldwide, itââ¬â¢s obvious that cloud computing will be one of the leading strategic and innovative technologies in the near future. ACKNOWLEDGMENT The glory of accomplishing this research paper goes to our parents for their moral support. We are also thankful to our supervisor for encouraging us to write this research journal. Finally, we are thankful to IJAEST for assisting us to review this journal and providing us timely response. REFERENCES [1]CSA, ââ¬Å"Security Guidance for Critical Areas of Focus in Cloud Computing V2.1â⬠Cloud Security Alliance, 2009, [Online], Available: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf, [Accessed: 08-July-2011]. [2]E., Mathisen, ââ¬Å"Security challenges and solutions in cloud computing,â⬠in Digital Ecosystems and Technologies Conference (DEST), 2011 Proceedings of the 5th IEEE International Conference on, 2011, pp. 208-212. [3]Wei Chen, Hongyi Lu, Li Shen, Zhiying Wang, Nong Xiao, and Dan Chen, ââ¬Å"A Novel Hardware Assisted Full Virtualization Technique,â⬠in Young Computer Scientists, 2008. ICYCS 2008. The 9th International Conference for, 2008, pp. 1292-1297. [4]S. Farrell, ââ¬Å"Portable Storage and Data Loss,â⬠Internet Computing, IEEE, vol. 12, no. 3, pp. 90-93, 2008. [5]R., Trope, C., Ray, ââ¬Å"The Real Realities of Cloud Computing: Ethical Issues for Lawyers, Law Firms, and Judges ââ¬Å", [Online], Available: http://ftp.documation.com/references/ABA10a/PDfs/3_1.pdf , 2009, [Accessed: 15-Jul-2011]. [6]Karthick Ramachandran, Thomas Margoni and Mark Perry, ââ¬Å"Clarifying Privacy in the Cloudsâ⬠in CYBERLAWS 2011 : The Second International Conference on Technical and Legal Aspects of the e- Society, IARIA,2011. [7]S., Subashini, V. Kavitha. ââ¬Å"A survey on security issues in service delivery models of cloud computingâ⬠. Journal of Network and Computer Applications, vo l.34, pp.1-11, 2011. [8]Trend Micro, ââ¬Å"Making Virtual Machines Cloud-Readyâ⬠, [Online], Available: http://www.whitestratus.com/docs/making-vms-cloud ready.pdf. A Trend Micro White Paper, 2009 [Accessed: 16-Jul-2011]. [9]J., Grimes, P., Jaeger, J., Lin, ââ¬Å"Weathering the Storm: The Policy Implications of Cloud Computingâ⬠[Online], Availablehttp://ischools.org/images/iConferences/CloudAbstract13109F INAL.pdf , [Accessed: 19-Jul-2011]. [10] B. Grobauer, T. Walloschek, and E. Stocker, ââ¬Å"Understanding Cloud Computing Vulnerabilities,â⬠Security Privacy, IEEE, vol. 9, no. 2, pp. 50-57, 2011. [11] A., Greenberg, ââ¬Å"Why Cloud Computing Needs More Chaosâ⬠[Online], Available:http://www.forbes.com/2009/07/30/cloud-computing- security-technology-cio-network-cloud-computing.html, 2009, [Accessed: 20-Jul-2011]. [12] T. Schreiber, ââ¬Å"Session Riding a Widespread Vulnerability in Todays Web Applicationsâ⬠[Online], Available: http://www.securenet.de/papers/Session_Riding.pdf, white paper, 2004. [Accessed: 20-Jul-2011]. [13] G., Petri, ââ¬Å"Vendor Lock-in and Cloud computingâ⬠, [Online], Available: http://cloudcomputing.sys-con.com/node/1465147 , 2010, [Accessed: 23-Jul-2011].
Tuesday, August 20, 2019
Rehabilitation for Anterior Glenohumeral Subluxation
Rehabilitation for Anterior Glenohumeral Subluxation 6-weeks Physical Rehabilitation Protocol for Anterior Glenohumeral Subluxation in Athletes Abstract: Background: Anterior shoulder dislocations and subluxations are common in young athletes. The mechanism for the first or primary shoulder dislocation may involve a collision or a fall typically with the arm in an abducted and externally rotated position. Contact sports, such as rugby and ice hockey, provide frequent opportunities for this injury to occur. Shoulder dislocations can occur after much less trauma in patients with previous dislocations. Despite a period of immobilization and rehabilitation following traumatic dislocations, recurrent instability often results and can lead to significant disability. To minimize the need for surgical intervention, effective physical rehabilitation programs are needed. Purpose: The aim of this study was to design a physical rehabilitation program using elastic band and resistive exercise to improve joint strength and range of motion in individuals diagnosed with a first-time shoulder dislocation. à à Method: Twelve physically active males with a first-time acute shoulder dislocation were asked to volunteer. Participants began a physical rehabilitation program two weeks after the shoulder dislocation, which was confirmed by a referring physician. The rehabilitation program was 6 weeks in duration and required the participants to engage in progressive resistive loads/duration using elastic bands and weights five days per week. Pretest and posttest measures included shoulder strength and range of motion. All outcome measures were compared between the injured and uninjured shoulder, which served as the control condition in this study. Results: There were statistically significant differences between the injured and uninjured shoulder for measures of strength and range of motion during pretests (p Conclusions: The physical rehabilitation program proposed in this study was effective at improving strength and range of motion in the injured shoulder as evidenced by the similarity in posttest values between the injured and uninjured shoulder. These results are encouraging and suggest the physical rehabilitation program proposed in this study may help reduce the need for surgical intervention in healthy young males who experience a primary shoulder dislocation. Introduction: The shoulder is the most frequently dislocated joint in the human body, anterior dislocation being the most common injuries in our daily life, especially for young people (Rumian, et al., 2011; Liu, et al., 2014). It was estimated that the incidence rate of shoulder dislocation as 23.9 per 100,000 persons a year (Owens, et al., 2009). Anterior shoulder dislocations and subluxations are common injuries in young athletes (Kaplan, et al., 2005; Malhotra, et al., 2012). The disparity between the large humeral head and the small glenoid cavity gives the joint the ability to be injured (Brukner, 2012; Brandt, et al., 2013) Moreover, the anteriorly dislocated humeral head causes a labrum tear of the anterior and inferior labrum, a Bankart injury (UG, et al., 2014; Porcellini, et al., 2009), and a typical impression fracture (Hovelius, et al., 2008; Kim, et al., 2003). The mechanism of the first dislocations occurs after a forceful direct trauma or a fall typically with the arm in an abducte d and externally rotated or outstretched arm (Owens, et al., 2010; Rolf, 2007). Thus, in the majority of cases, the arm is abducted and the shoulder is externally rotated (Hardy, et al., 2010; Patel, et al., 2010). This is common in rugby, hockey, Handball, Football, riding, and cycling. In patients with lax shoulders or previous dislocations, dislocation can occur after much less trauma (Badr Gaballah, 2015; Kelly Terry, 2001; Brooks, et al., 2005). Recently, the most common management of treatment for primary anterior glenohumeral instability is nonoperative management (Gibson, et al., 2004; Zacchilli Owens , 2010) Rehabilitation and prevention of this injury were worthwhile of research because negligence of rehabilitation the first-time dislocation shoulder may lead to recurrent instability of the glenohumeral joint (Rumian, et al., 2011; Provencher, et al., 2010). Furthermore, there is a body of reports suggesting that younger athletes generally and contact sports particularl y most affected with the instability risk after a primary anterior shoulder dislocation. (Zacchilli Owens , 2010; Handoll, et al., 2006). This risk of the recurrence dislocation reported in young athletes with first-time anterior dislocation as height as 90-95% (Gibson, et al., 2016). However, the athletes with anterior shoulder dislocation which returning to activities with in season after lack rehabilitation have demonstrated high rates of recurrent dislocation from 37% to 90%. (Watson, et al., 2016; Castagna, et al., 2007). The goal of the primary rehabilitation for the acute anterior shoulder is to prevent long-term instability for the shoulder joint (Leroux, et al., 2014). However, patients with recurrent shoulder instability often need to surgical intervention or arthroscopic treatment. (Malhotra, et al., 2012; Provencher, et al., 2010; Porcellini, et al., 2009). Indeed, several modalities used conservative treatment for the acute dislocation shoulder (Liu, et al., 2014; Yamamoto, et al., 2010; Liavaag, et al., 2011) and injections (Nagata, et al., 2016). Some approaches have been conducted physical rehabilitation programs for first-time dislocation shoulder (Gibson, et al., 2004; Karatsolis Athanasopoulos, 2006; Salamh Speer, 2013). Other used the elastic resistance exercise which became one of the popular tools in physical rehabilitation. (Andersen, et al., 2010; Camci, et al., 2013; Brandt, et al., 2013) The major reason to use the elastic band that they have demonstrated excellent validity and reliability with shoulder muscle testing (Andersen, et al., 2016). Ultimately, the aim of this study was to design a physical rehabilitation program using an elastic band and resistive exercise to improve joint strength in individuals diagnosed with a first-time shoulder dislocation. Method: Subjects Physically active males who presented at the Mansoura university hospitals and the teaching hospital in Damietta, Egypt with acute anterior dislocation shoulder injury between September 2012 and February 2015 were randomly recruited as research participants. The magnetic resonance imaging (MRI) were conducted to determine the injury grade for 17 athletes. We excluded patients with recurrent dislocation shoulder or had a history of injury in the same joint. Twelve physically active males (age 18.6 Ãâà ± 1.32y, mass 74.48Ãâà ±3.22 Kg, height 178.4Ãâà ±3.21 cm and competitive experience 9.6Ãâà ±2.67 y) with a first-time acute shoulder dislocation were considered as research participants. The participants began a physical rehabilitation program two weeks after the shoulder dislocation, which was confirmed by a referring physician. Rehabilitation Program The external and internal rotation exercises have been chosen for the first stage which aimed to control the pain and inflammation caused by the dislocation and included seventeen flexibility and isotonic strength exercise with 12-15 1RM intensity were performed for the scapulothoracic muscles particularly, the rotator cuff muscles. (Figure 1). Fig 1. First rehabilitation stage exersices examples Fig. 2. Second rehabilitation exercises examples. The second stage aimed to restore higher level of muscle strength. The intensity of exercises was five sets with 8-10 1RM, was tested according to the healthy arm. Thirty-two exercises in particular, Deltoid M., Trapezius M. and serratus anterior M. exercises in this stage were performed widely in the horizontal and diagonal axes. Moreover, the exercises were chosen to enhance the range of motion (ROM) and muscles strength between 90-150Ãâà ° vertically, horizontally, and diagonally (Figure 2). The third stage, after the twenty rehabilitation sessions. The endurance, peromitric, and strength exercises were consisted of five sets of 8-10 repetitions using variable resistance: one at 75% of the 10 RM, and two at 95% of the 8 RM. 27 extremity weights rehabilitation exercises performed to reach 190 200Ãâà ° ROM and the equally health arms strength as well. (Figure 5,6). The Thera-Band resistance bands exercises were hired during the six weeks especially the four colors (red, blu e, black, silver, gold). The red and blue bands were used in the first stage and the black and silver used in second stage, addition, the gold has been performed in the third stage. Furthermore, all the exercises performed by stretching the band between 75 100 %. knowing that, the weight of stretching in Thera-Band between 75-100% is (red 3.3-3.9kg, blue 5.9-7.1kg, black 8.1-9.7, silver 11.1-13.2kg, and gold 18.1-21.6kg). (BiÃâ¡er, et al., 2015;Andersen, et al., 2010) Fig. 3. Third rehabilitation exercises examples. Statistics analyze: The paired t-test was used to compare the collected data before performing the exercise protocol (Pre-test) and those which obtained after 6-weeks physical rehabilitation period (Post-test). Whether the differences between the samples were significant at p Measurements: The rehabilitation program was comprised four testing sessions. The Pre-test (PRT) section was conducted after two weeks of the injury and before the beginning of the rehabilitation program. after two rehabilitative weeks, the second week tracking test (SWT) was realized. while the Fourth week tracking test was realized after the fourth rehabilitative week (FWT). Moreover, after a resting of 6 weeks, the Post-test was conducted in the Faculty of Sports Education, Damietta University, Egypt. Additionally, all the injured athletes were right handed injured and in each testing test, the healthy arms measurements were recorded. Continuously, the test results for the injured arm had been compared with the healthy arm for each person. Before reporting the force measurement all the participants were informed with the test procedures for both arms. Four basics Isotonic force measurements were reported by Isometric Dynamometer device (Biodex Isokinetic Dynamometer). These force measurements w ere conducted for muscles around shoulder girdle in the 90 Deg. vertically and horizontally. The force variables were flexion force (F.F), adduction force (AD.F), Abduction force (AB.F), and hyper extension force (HB.F). Whilst, the participants were asked to perform the maximum flexibility for the shoulder joint without feeling pain. Addition, the range of motion variables were obtained by Goniometer for flexion range of motion (F.ROM), abduction (AB.ROM), and hyper extension (HB.ROM). Results: The test results (i.e., strength and range of motion) shown that there were statistically significant differences between the injured and uninjured shoulder (p > 0.01) prior the rehabilitation procedure. After six weeks of physical rehabilitation, the test results shown considerable improvement of more than 50%. As obviously seen from table 1, the deference between the pre-testes and post- testes of force were, flexion force 4.41 Ãâà ±4.01N vs 121.5Ãâà ±12.4 N, abduction force 2.94Ãâà ±2.74 N vs 103.1Ãâà ± 9.8 N, Adduction 3.84Ãâà ±0.34 vs 133.7Ãâà ±9.26,Hyper-Extension 20.01Ãâà ±7.64 N vs 69.1Ãâà ±8.92 N. On the other hand, the range of motion of pre-testes and post-test were, Flexion 23.8Ãâà ±4.02à ¢Ã à ° vs 199.5Ãâà ±0.24à ¢Ã à °, Abduction was 29.3Ãâà ±3.62à ¢Ã à ° vs 195.5Ãâà ±2.13à ¢Ã à °, Hyper-extension 30.8Ãâà ±5.81à ¢Ã à ° vs. 108.5Ãâà ±5.72. Furthermore, the conducted post tests shown that there we re no significant differences (p Table 1. Improvement of the measurement among the rehabilitation stages. Improvment Healthy Shoulders Post-Test FWT SWT Pre- Test Unit Variables 94 % 128.2Ãâà ±10.4 121.5Ãâà ±12.44 91.04Ãâà ±8.13 48.7Ãâà ±4.31 4.41 Ãâà ±4.01 N Flexion Force 93% 110.9Ãâà ±8.32 105.1Ãâà ±9.81 76.2Ãâà ±10.41 41.3Ãâà ±5.92 2.94Ãâà ±2.74 N Abduction 99% 135.2Ãâà ±5.33 133.7Ãâà ±9.26 97.12Ãâà ±7.22 21.7Ãâà ±2.17 3.84Ãâà ±0.34 N Adduction 95% 72.71Ãâà ±5.42 73.1Ãâà ±8.92 65.7Ãâà ±4.51 37.04Ãâà ±4.21 20.01Ãâà ±7.64 N H-Extension 99.1% 201.3Ãâà ±1.25 199.5Ãâà ±0.24 168Ãâà ±7.48 73.8Ãâà ±8.32 23.8Ãâà ±4.02 Deg Flexion ROM 98.3% 198.9Ãâà ±1.06 195.5Ãâà ±2.13 163Ãâà ±6.94 64.7Ãâà ±8.81 29.3Ãâà ±3.62 Deg Abduction 99.4% 108.5Ãâà ±5.72 107.8Ãâà ±6.12 100Ãâà ±2.2 52.2Ãâà ±13.2 30.8Ãâà ±5.81 Deg H-Extension Discussion: The current study aimed to design a rehabilitation program passed on the elastic and weights exercises. Over the past decades, we have seen a huge boost in the rehabilitation of shoulder dislocation injuries. These injuries because of the anatomical structure of the glenohumeral joint which allow to wide movement of the joint. Therefore, derives its extensive movement at the expense of its consistency and coherence. More than 50% of acute anterior dislocations can reoccur, especially in young athletes. The aim of the physical rehabilitation is avoiding the recurrent dislocation and using an elastic band and resistive exercise to improve joint strength in individuals diagnosed with a first-time shoulder dislocation. The current study results shown that, there were weakness of the shoulder muscles in the pre-test measurements of Flexion, adduction, abduction force as a result of ache, swelling, and inflammation. Nevertheless, the hyperextension motion measurements were reported better than the other measurement in the pretest. The mechanism of the anterior dislocation occurred forwardly and downward. Out of the ordinary, that has affected adversely on the forward movement of the arm. (Turkel, et al., 1981) The return to activity after 2-3 weeks is available for athletes with a high risk of recurrence dislocation. which expected to arthroscopic remain and return to activity after 6-month surgical stabilization (Watson, et al., 2016). Many factors have been related to rehabilitate shoulder dislocation. Thus, the current study has been assumed that 6 weeks elastic resistant with weight exercise had great benefit for the shoulder muscles especially, the rotator cuff muscles. Recently, the popularity of elastic bands has increased because of their low prices, flexibility, adaptability, versatility, and simplicity. (Andersen, et al., 2010) (Jakobsena, et al., 2013). The incorporation between nautilus machine and the elastic bands exercises have been used to promote joint range of motion and muscles strength in training and rehabilitation purposes as well. thus, the elastic resistant exercise has been improved the influences of the strength-shorting cycle. Addition to, it has been used as tec hnique to produce the speed eccentric contraction. (Stevenson, et al., 2010). It is obviously seen in table 1. and Figure 2, 3. there are a considerable significant different between the pretests and the posttests of the injured shoulders. Addition, it is seeming to be similar with the healthy shoulder after the 6wks. physical rehabilitation program. The same resulted reported in previous study conducted on young volley ball players and have improved their muscle power, muscle strength and ball speed. (Mascarin, et al., 2016). Nevertheless, the elastic resistant and free weight exercise improve the dynamic stabilization and joint stability. (Andersen, et al., 2010) (Camci, et al., 2013). Addition, the exercise rehabilitation program for the unstable shoulder must include a joint position sensibility and dynamic stabilization to supporting the functional stability of the shoulder joint. The dynamic stabilization is promoted the co-activation of the force couples about the glenohumeral joint to exceptional position of the humerus hear in the center of glenoid. ( Naughton, et al., 2005). Previous studies have demonstrated same levels of muscle activation for using elastic resistance compared with free weights display similar or even greater levels of muscle activity for some muscles during an exercise. (Camci, et al., 2013) (Andersen, et al., 2010). In contrast, used parallel with free weight (Aboodardaa, et al., 2013). Other studies have shown high levels of muscles activation compared with weight machine (Brandt, et al., 2013). But all the modalities recommended to use the elastic band with the weights. Moreover, using elastic band with weights appear to be equally in muscle activity as traditional using isoinertial resistance (Jakobsena, et al., 2013). Finally, The physical rehabilitation program proposed in this study was effective at improving strength and range of motion in the injured shoulder as evidenced by the similarity in posttest values between the injured and uninjured shoulder. These results are encouraging and suggest the phy sical rehabilitation program proposed in this study may help reduce the need for surgical intervention in healthy young males who experience a primary shoulder dislocation. Aboodardaa, S. J. et al., 2013. Resultant muscle torque and electromyographic activity during high intensity elastic resistance and free weight exercises. European Journal of Sport Science, 13(2), pp. 155-163. Andersen, L. et al., 2010. Muscle Activation and Perceived Loading During Rehabilitation Exercises: Comparison of Dumbbells and Elastic Resistance. Physical Therapy, 90(4), pp. 538-549. Andersen, L., Vinstrup, J., Jakobsen, M. Sundstru, E., 2016. Validity and reliability of elastic resistance bands for measuring shoulder muscle strength. Scand J Med Sci Sports., Volume May. Badr, M. Gaballah, A., 2015. Common Injuries among Male Field Hockey Players According to Playing Positions.. Journal of Applied Sports Science, 5(1), pp. 19-26. BiÃâ¡er, M. et al., 2015. Effect of Strength Training Program with Elastic Band on Strength Parameters. Biology of Exercise , 11(2), pp. 111-122. Brandt, M. et al., 2013. Perceived loading and muscle activity during hip strengthening exercises: comparison of elastic resistance and machine exercises.. Int J Sports Phys Ther, 8(6), pp. 811-819. Brooks, J., Fuller, C., Kemp, S. Reddin, . D., 2005. Epidemiology of injuries in English professional rugby union: part 2 training injuries. British Journal of Sports Medicine, Volume 39, pp. 767-775. Brukner, P., 2012. Clinical sports medicine. 4 ed. Australia: McGraw-Hill Publishing. Camci, E. et al., 2013. Scapular Kinematics During Shoulder Elevation Performed With and Without Elastic Resistance in Men Without Shoulder Pathologies. Journal of Orthopaedic Sports Physical Therapy , 43(10), pp. 735-743. Castagna, A., Nordenson, U., Garofalo, R. Karlsson, J., 2007. Minor shoulder instability. The Journal of Arthroscopic Related Surgery, Volume 23, pp. 211-215. Gibson, K. et al., 2004. The effectiveness of rehabilitation for nonoperative management of shoulder instability: a systematic review. Journal of Hand Therapy, 17(2), pp. 229-242. Handoll, H., Hanchard, N., Goodchild, L. Feary, J., 2006. Conservative management following closed reduction of traumatic anterior dislocation of the shoulder.. Cochrane Database Syst Rev., 25(1), p. CD004962. Hardy, M., Summers, D., Edwards, J. Munro, N., 2010. The BMA guide to sports injuries, Dorling Kindersley Puplishing, UK, 2010.. London, UK: Dorling Kindersley Puplishing. Hovelius, L. et al., 2008. Nonoperative treatment of primary anterior shoulder dislocation in patients forty years of age and younger. A prospective twenty-five-year follow-up. J Bone Joint Surg, Volume 90, pp. 945-952. Jakobsena, M. et al., 2013. Muscle activity during leg strengthening exercise using free weights and elastic resistance: Effects of ballistic vs controlled contractions. Human Movement Science , 32(1), pp. 65-78. Kaplan, L. et al., 2005. Prevalence and variance of shoulder injuries in elite collegiate football players. 2005;33:1142-6.. Am J Sports Med. , Volume 33, pp. 1142-1146. Karatsolis, K. Athanasopoulos, S., 2006. The role of exercise in the conservative treatment of the anterior shoulder dislocation. Journal of Bodywork and Movement Therapies, Volume 10, pp. 211-219. Kelly, L. Terry, G., 2001. Team Handball: Shoulder Injuries, Rehabilitation, and Training. Sports Medicine Arthroscopy Review:, 9(2), pp. 115-123. Kim , S. et al., 2003. Accelerated rehabilitation after arthroscopic Bankart repair for selected cases: a prospective randomized clinical study.. Arthroscopy, 19(7), pp. 722-731. Leroux, T. et al., 2014. Epidemiology of Primary Anterior Shoulder Dislocation Requiring Closed Reduction in Ontario, Canada. The American Journal of Sports Medicine, 42(2), pp. 442-450. Liavaag, S. et al., 2011. Immobilization in external rotation after primary shoulder dislocation did not reduce the risk of recurrence: a randomized controlled trial.. J Bone Joint Surg Am, 93(10), pp. 897904. Liu, A. et al., 2014. The external rotation immobilisation does not reduce recurrence rates or improve quality of life after primary anterior shoulder dislocation: A systematic review and meta-analysis.. Injury, Int. J. Care Injured, Volume 45, pp. 1842-147. Malhotra, A., Freudmann, M. S. Hay, S. M., 2012. Management of traumatic anterior shoulder dislocation in the 17- to 25-year age group: a dramatic evolution of practice. J Shoulder Elbow Surg, Volume 21, pp. 545-553. Mascarin, N., De Lira, C., Vancini, R. Andrade, M., 2016. Strength Training Using Elastic Band Improves Muscle Power and Throwing Performance in Young Female Handball Players. Journal of sport rehabilitation, Volume 24, pp. 1-25.. Nagata, H., Thomas, W. Woods, D., 2016. The management of secondary frozen shoulder after anterior shoulder dislocation The results of manipulation under anaesthesia and injection. journal of orthopaedics, Volume 13, pp. 100-105. Naughton, J., Adams, R. Maher, C., 2005. Upper-body wobbleboard training effects on the post-dislocation shoulder. Physical Therapy in Sport, Volume 6, pp. 31-37. Owens, B. et al., 2009. Incidence of Glenohumeral Instability in Collegiate Athletics.. 37(9), pp. 1750-1754. Owens, B. et al., 2010. Pathoanatomy of First-Time, Traumatic, Anterior Glenohumeral Subluxation Events. The Journal of Bone and Joint Surgery, 92(7), pp. 1605-1611. Patel, D. R., Greydanus, D. E. Bak, R. J., 2010. Pediatric Practice Sports Medicine. New York, USA: McGraw-Hill. Porcellini, G. et al., 2009. Predisposing Factors for Recurrent Shoulder Dislocation After Arthroscopic Treatment. J Bone Joint Surg Am, 91(11), pp. 2537-2542. Provencher, M. T. et al., 2010. Recurrent Shoulder Instability: Current Concepts for Evaluation and Management of Glenoid Bone Loss. J Bone Joint Surg Am, 92(2), pp. 133-151. Rockwood, C. A., 2008. The Shoulder. 4 ed. s.l.:Elsevier, Health Science Publisher. Rolf, C., 2007. Sports Injuries Hand Book, Diagnosis and Management. London: A C Black Publishers. Rumian, A., Coffey, D., Fogerty, S. Hackney, R., 2011. Acute first-time shoulder dislocation. Orthopaedics and Trauma, 25(5), pp. 363-368. Salamh, P. A. Speer, K. P., 2013. Post-Rehabilitation Exercise Considerations Following Total Shoulder Arthroplasty. Strength Conditioning Journal, 35(4), pp. 56-63. Stevenson, M. et al., 2010. Acute Effects of Elastic Bands During the Free-weight Barbell Back Squat Exercise on Velocity, Power, and Force Production. Journal of Strength Conditioning Research, 24(11), pp. 2944-2954. Turkel, S., Panio, M., Marshall, J. Girgis, F., 1981. Stabilizing mechanisms preventing anterior dislocation of the glenohumeral joint.. J Bone Joint Surg Am, 63(8), pp. 1208-1217. UG, L. et al., 2014. Management of primary acute anterior shoulder dislocation: systematic review and quantitative synthesis of the literature.. Arthroscopy, 30(4), pp. 506-522. Yamamoto, N., Sano, H. Itoi, E., 2010. Conservative treatment of first-time shoulder dislocation with the arm in external rotation. J Shoulder Elbow Surg, Volume 19, pp. 98-103. Zacchilli, M. Owens , B., 2010. Epidemiology of shoulder dislocations presenting to emergency departments in the United States. J Bone Joint Surg Am , Volume 92, p. 542-549. Anterior shoulder dislocation
The Dynamic Friendship of Ernest Hemingway and Fitzgerald :: Biography Biographies Essays
The Dynamic Friendship of Hemingway and Fitzgerald In 1930 F. Scott Fitzgerald and Ernest Hemingway were both working on novels; Fitzgerald was writing Tender is the Night and Hemingway Death in the Afternoon. They were both living in vastly different places and dealing with different types of situations in their lives. Zelda Fitzgerald, F. Scott's wife, was hospitalized in Switzerland for the better part of 1930-31 after suffering a mental breakdown. Unfortunately for Scott this meant that he had to put aside his novel writing and write several short stories which would be sold to cover the cost of Zelda's medical treatment. Hemingway was residing in the United States during this time but also traveled to Spain during this period. There was no correspondence between the two about Zelda's illness until April, 1931, almost a year after her hospitalization. In October, 1931 Hemingway and Fitzgerald met but scholars are unclear as to the circumstances surrounding this meeting. Around this time however, the two authors began using Maxwell Perkins, their editor, as a courier for their messages to one another. This seems to show that Hemingway's and Fitzgerald's friendship was drifting apart. Perkins must have sensed this because he began to include news about each of them in his letters to them. It's thought that perhaps the lack of correspondence between Hemingway and Fitzgerald during this period fell more on the shoulders of Fitzgerald who was beginning to feel guilty about his writing and lack of success. In 1932, Zelda Fitzgerald suffered a relapse of her mental condition and had to be hospitalized again. During her hospitalization she wrote Save Me the Waltz which would be published by Scribner's in October, 1932. Fitzgerald became uneasy after learning that his wife's book would be published within months of Hemingway's Death in the Afternoon. Fitzgerald worried that Hemingway would resent the fact that Death in the Afternoon would be competing with Zelda's book. Hemingway and Fitzgerald met in New York in January 1933. This meeting, however, was ruined because Fitzgerald was in the middle of one of his benders. They met for dinner with their friend Edmund "Bunny" Wilson and most of the evening was spent with Fitzgerald arguing with both Wilson and Hemingway. This meeting furthered Hemingway's notion that Fitzgerald was a drunken fool who wasted his talent. Hemingway, in a letter to Max Perkins in February 1933, wrote of Fitzgerald: "He's gone into that cheap irish love of defeat, betrayal of himself etc.
Monday, August 19, 2019
Personal Justice and Homicide in Scottââ¬â¢s Ivanhoe: :: Scott Ivanhoe Psychology papers
Personal Justice and Homicide in Scottââ¬â¢s Ivanhoe Abstract: Scottââ¬â¢s Ivanhoe reveals a conflict between our innate concept of justice as personal justice and the impersonal justice which is imposed on us by the modern nation-state. This conflict causes the split between the proper hero, who affirms the order of impersonal justice, and the dark hero, who acts according to personal justice, in Scottââ¬â¢s work. In Evolution and Literary Theory, Joseph Carroll provides a paradigm for the integration of literary criticism with evolutionary psychology. First, he argues that literary critics should learn to understand and respect the evidence for the basic contention of evolutionary psychology, namely, that the human mind is not a blank slate which receives all of its content from an external culture, but that human cognition and the culture that is based on it are highly constrained by innate psychological mechanisms, which evolved in the environment in which humans spent most of their evolutionary history, the hunting-gathering bands of Pleistocene Africa. Humans evolved a rich array of specialized mental mechanisms for dealing with this environment, including mechanisms for determining mate value (see Buss), for protecting kin (see Daly and Wilson, 17-121), for social exchange (see Cosmides and Tooby 1992) and many others. These psychological mechanisms collectively form the human nature which underlies the production and consumption of literary texts. However, the scope of an evolutionarily informed literary analysis is not limited to simply finding these human universals in literary texts. Rather, many of these psychological mechanisms are ââ¬Å"open programsâ⬠which permit of a wide range of cultural and individual variation (Carroll 152). Carroll identifies the three levels at which a literary criticism informed by evolutionary psychology should work: human nature, cultural order, and individual identity (150). While human nature constrains all cultural productions, ââ¬Å"cultural forms are themselves the product of a complex interaction among various innate dispositions and between innate dispositions and variable environmental conditionsâ⬠(152). Evolutionary psychology enables us to understand not only literary universals, but also the complex and often conflicting relationship between human nature, culture, and the individual. In their book Homicide, evolutionary psychologists Margo Wilson and Martin Daly identify one such conflict between human nature and the contemporary cultural order. They argue that humans have an innate concept of justice which is based on the idea of personal revenge. According to this concept of justice, it is legitimate and even praise-worthy for people to whom a wrong has been done to avenge the wrong-doing themselves.
Sunday, August 18, 2019
Analysis of an Article on Obesity in America Essay -- Article Review
Obesity kills at least 111,000 Americans per year (Greenstreet 107). The government has made many approaches to reshape our food system and attempt to force us to buy the foods that make us fat. Especially during our recession, it is that much easier to buy fast foods because it simply is the cheaper thing to do. We have many needs as human beings that need to be met, with food being one of the most important and being in this recession has made us easy targets for the government. Organic foods and less-fatty foods are more expensive these days so even health-savvy people try to find cheaper alternatives and look for the positives in these not-so-healthy foods. Due to this, many people believe that the government and its power to control how expensive or cheap food is sold for is the biggest reason for obesity in America but in retrospect, it is simply our own fault because we make the decision to save money and eat less nutritiously over spending more money on the best food for yo ur diet. The reason for the growing population of obesity is not due to the government creating this epidemic because they in turn are trying to help out the growing obese population. Also, the obese population is constantly growing because of the personal choices of the people, the environment around them and the genetics of each individual. Immediately in the subtitle of the article, Greenstreet is quick to declare ââ¬Å"how corporations and the US Government create the obesity epidemicâ⬠(Greenstreet 107). He makes the government seem like they are the main enemies and contributors to the growing obesity epidemic, ââ¬Å"the government takes an extremely damaging and passive-aggressive role in contributing to a national health crisis...â⬠(Greenstreet 107). ... ...): 1095-1105. Raj, Manu and R. Krishna Kumar, ââ¬Å"Obesity in children & adolescents.â⬠Indian Journal of Medical Research 132.5 (2010): 598-607. Kouzoukas, Demetrios L. ââ¬Å"Legal Preparedness for Obesity Prevention and Control: The Structural Framework and the Role of Government.â⬠Journal of Law 37 (2009): 24-27 "Major Crops Grown in the United States | Ag 101 | Agriculture | US EPA." US Environmental Protection Agency. N.p., n.d. Web. 1 May 2011. . "Obesity and Genetics." Columbia St. Mary's Medical Moment. N.p., Web. 1 May 2011. . "Ten ways to distinguish between healthy and unhealthy food." Choosing and cooking healthy food. N.p., n.d. Web. 1 May 2011. .
Saturday, August 17, 2019
Sor Juana
Writing Assignment Maria Zuniga Book ReportDecember 9, 2005 Corrections ââ¬Å"Sor Juanaâ⬠is a biography of Sor Juana Ines de la Cruz written by Octavio Paz and translated by Margaret Sayers Peden. It is a book of 470 pages divided in six parts that besides Sor Juanaââ¬â¢s life and work, explain the difficulties of the time for an intellectual woman. It was published by The Belknap Press of Harvard University Press Cambridge, Massachusetts in 1988. Reading this book gave me the best opportunity to know more about someone that although has been very influential in my entire life, I didnââ¬â¢t know all her history.My admiration and respect for Sor Juana started since I was a child and one of my sisters used to read her poems. Through my literature classes I knew a little more about her and the admiration and respect continued growing. Sor Juana became for me a stereotype of intellect, power, femininity, persistence and freedom combined with the devotion to God. Her story ma kes me learn to follow my dreams, to be ambitious, and over all to never ever give up. Juana Ines de la Cruz was born in Mexico in 1648. She grew up in the Panayan Hacienda, which was run for her mother for more than thirty years although she never learned to read.Sor Juana started to take lessons at age or three. During a long period of her childhood, she didnââ¬â¢t eat cheese because ââ¬Å"It made one slow-witted,â⬠and ââ¬Å"Desire for learning was stronger than the desire for eating. â⬠By the time she was six or seven, she knew how to read and write. As she couldnââ¬â¢t go to the university (because she was a woman), she studied and read by herself. She used to cut-off several inches of her hair (when hair was considered one of the most important female features), as a challenge for new learning ââ¬Å"A head shouldnââ¬â¢t be adorned with hair and naked of learningâ⬠If she didnââ¬â¢t meet the goal, then she cut it again.Sor Juana was sent to Mexico City when she was eight to live with her grandfather, who had one of the biggest libraries of those times. By age 15, as one of the most learned women in Mexico, she was presented at court with the Viceroy and his wife (maximum authorities in Mexico). As a lady-in waiting, Juana Ines would become known at court for her wit and beauty as well as for her erudite intelligence. To ascertain the extent of her learning, the Marquise gathered together some of the most astute minds of the day, poets, historians, theologians, philosophers, and mathematicians.Juana Ines answered the questions and arguments directed at her, impressing them all with her mental prowess. At age 20 she entered the Convent of San Jeronimo, known for the mildness of its discipline. The convent was not a ladder toward God but a refuge for a woman who found herself alone in the world. She lived in a two-storey cell where she read insatiably and amassed an impressive library while pursuing her writing and intellectual pursuits. She brought the elegance of the court with her by transforming the convent locutory into an intellectual salon.The next Viceroy, the Marquis de La Laguna and the Marquise Maria Luisa, the Countess de Pareda, were among the court society and literary devotees who came to talk and debate with Sor Juana. Sor Juana wrote sacred poems and erotic love poems, vocal music, villancicos performed in the cathedral, plays, secular comedies, and some of the most significant documents in the history of feminism and philosophical literature. Her use of language, though characterized by the Baroque style, has a modern essence.Her public face reveals the impiousness of an undaunted spirit who appears, not as a nun, but as an independent woman. One of Sor Juanaââ¬â¢s archetypes was Isis, Egyptian goodness inventor of writing, a symbol of intellect. She also identified herself with maidens of antiquity, poetically divinely inspired to produce poems and prophecies thinking ââ¬Å"There we re not enough punishment or reprimands to prevent me from reading. â⬠The life and work of Sor Juana lines can be summed as: knowledge is a transgression committed by a solitary hero who then is punished.Not the glory of knowledge (denied to mortals) but the glory of the act of knowing. Sor Juana was a pivotal figure who lived at a unique point in history bound by two opposing world views: one the closed universe of Ptolemy and of the Inquisition, which still held sway in Mexico/New Spain; the other characterized by the new science of Copernicus, Newton, and Galileo. On her monumental philosophical poem Primer sueno/First Dream the soul is pictured as intellect, not a religious pilgrim. At the height of the journey, at the fullest understanding reason can attain, there was no vision.Instead, the soul drew back at the immensity of the universe and foundered in confusion. In 1690, requested by the Bishop, Sor Juana wrote her only theological criticism, which she insisted not for public view. However, the Bishop published and censured it with an imaginary name of ââ¬Å"Sor Philotea. â⬠In defiant response, Sor Juana wrote ââ¬Å"La Respuesta de la poetisa a la muy ilustre Sor Philotea de la Cruz,â⬠a feminist manifesto defending womenââ¬â¢s right to be educated and pursue learning, citing over 40 women who had made significant contributions throughout history.This work ignited the churchââ¬â¢s wrath. In a climate of intimidation and fear Sor Juana signed ââ¬Å"Protesta que rubricada con su sangre, hizo de su fe y amor a Diosâ⬠a statement of self-condemnation in bloodShe renewed her vows and surrendered her musical and scientific instruments, as well as her library of 4,000 volumes, considered at that time to be the largest in Mexico. Two years of silence and penance followed. Then in 1695, while ministering to nuns struck by an epidemic, she herself succumbed and died.Sor Juana has been an inspirational model to follow through all the situations that she faced. She succeeded in a world that was completely against her. The lack of father, which was almost a crime in that time, the lack of freedom to study, to talk, even to think, and over all the prohibition to be herself were some of her obstacles. Every time I am facing an obstacle, I just recall her story and imagine the innumerable sacrifices she had made to get the freedom of learning.After reading her story, I see the world in a different way. Now I know that all those small decisions that I take every day, such as the cloth I wear, what to eat, to read, what to say, and even what to feel are privileges granted for marvelous people like Sor Juan Ines de la Cruz. I also know that all those people had to pay a high price for these privileges; some of them pay with their lives. I feel not just impressed, but grateful to Sor Juana, her cultural heredity, and womanââ¬â¢s worth.
Subscribe to:
Posts (Atom)