Tuesday, August 25, 2020

Gloria Steinem Term Paper Example | Topics and Well Written Essays - 1250 words

Gloria Steinem - Term Paper Example Her grandma Pauline Steinem was a venerated suffragette in her day. In any case, in the early long stretches of Gloria’s life, there was little proof to recommend that she would maintain her grandmother’s inheritance. Since her dad needed to migrate to new urban communities every now and again, the youthful Gloria Steinem couldn't be taken a crack at an ordinary school. All her initial training was given by her mother at home. This fragile family harmony reached an unexpected conclusion, when Gloria was just 8 years of age her folks severed their marriage. Not exclusively was youthful Gloria denied of a dad figure, she was additionally pushed into an existence of crushing neediness in the following hardly any years. Entangling an effectively desperate circumstance was her mother’s penchant to endure mental discouragement. In the years following the separation, Steinem’s mother fell into such an appalling sorrow, that the mother-little girl jobs turned arou nd for once and Gloria was left to deal with her weak mother. When in her late youngsters, she went to live with her senior sister in Washington, D.C., where she selected for Smith College. Similarly as she was going to finish her degree, she got a break which were to demonstrate noteworthy. In 1956, in the time of her graduation, she got chose for a multi year grant program in India ((Sondra, 1987). The two years Steinem spent in India during her early stages were to demonstrate significant for her comprehension of women’s issues. The experience widened and developed her grip of the status of ladies in the Third World and how socio-political real factors force extreme limitations for opportunity of ladies. She understood that â€Å"the elevated requirement of living most Americans underestimate was not accessible to all. She remarked at the time that ‘America is a tremendous iced cupcake in a great many starving people’. She returned unequivocally roused to battle social treachery and set out on her profession as a journalist†. (www.gale.cengage.com) Encouraged by her

Saturday, August 22, 2020

Psychology Piaget and Skinner Sample Essay Example For Students

Brain research: Piaget and Skinner Sample Essay The psychological position is a hypothesis that endeavors to explain human conduct by understanding our idea system. Our data strategy is contrasted with that of a processing machine: Inputting. putting away and having informations. One of the most praised psychological therapists was a researcher called Jean Piaget ( 1896-1980 ) . Fitting to Piaget. understanding comes in the signifier of ‘schemas’ ( Fritscher. 2011 ) . Mappings are psychological developments that speak to specific features of the universe ( pre-considered musings for things ) . Patterns create through in any event two systems: absorption and change. Absorption is only including new data into a bing plan however keeping up the general idea the equivalent. Modification is the methodology where we change our bing plan. The individual will look to suit the old plan round the new data however in the terminal they just suit another plan ( Atherton. 2011 ) . Through recognizing and tuning in to his ain childr en. Piaget recommended that their idea does non grow wonderfully ; on the other hand they experience stages. â€Å"Each stage is portrayed by a general development in footings of which the main conduct structures can be explained† ( Gross. page 739 ) . Stage one is called ‘The sensorimotor stage’ ( 0 †2 mature ages old ) . At this age. kids utilize centripetal and engine data to do conspire. They gets self insightful and they see object permanency ( McLeod. 2010 ) . Stage two is called ‘The pre-operational stage’ ( 2 †7 mature ages old ) . The child is currently get bringing down to talk and can collaborate with others using address and different signifiers of imparting. They begin sorting out their ain purpose of perspectives from what they know however they are self absorbed and don’t adjust great to others purpose of perspectives. Piaget’s most commended explore ‘the three mountains task’ ( 1940’s ) showed such selfishness. The analysis comprised of a child sitting at a plain exhibit in forepart of three distinc t mountains. One had snow on top. one had a cabin at the top and the other had a bronzed cross on the top. The child was permitted to go around the hypothetical records and agree with a particular position to sit. Piaget would so put a doll at arranged topographic focuses around the plain exhibit. The child is so demonstrated 10 presentation of various purpose of perspectives and needs to show out the introduction that showed the dolls purpose of position. Vanity is demonstrated when the child chooses the presentation that shows their place of position. non the dolls. The outcome was that a four twelvemonth old could ever take the wrong introduction while a seven twelvemonth old had the option to accept all the more consistently and have the option to take the correct perspective. Piaget went to the choice this was on the grounds that Children in the preoperational stage can focus on just one aspect or measurement of an occupation. On the off chance that a child is playing with four bronzed and four blue structure squares and you request that they split them each piece. they will naturally gather all the rosy 1s and all the pale blue 1s together. Stage three is called ‘The concrete operational stage’ ( 7 †11 mature ages old ) . At this stage the child is presently get bringing down to accept legitimately about articles and occasions. Instinct is supplanted by sure contemplations yet the child can just work with Ã¢â‚¬Ë œconcrete’ considerations rather than theoretical 1s. Piaget accepted this was a significant defining moment in a child’s obtaining improvement. Stage four is called ‘The formal operational stage’ ( 11+ mature ages old ) . This is the finishing up intellectual stage. At the point when a child hits this age. they can get down using theoretical considerations and are sure bounty to ask requests and research the obscure. Thoroughly analyze Essay About Two FriendsOn the different manus Skinner other than indicated how negative help functioned by puting a rodent in his ‘Skinner box’ thus exposing it to a horrendous electric flow. As the rodent moved about the case it would by chance strike hard the switch. Similarly in a matter of seconds as it did as such. the electric flow would be exchanged away. The rodents quickly figured out how to make a trip legitimately to the switch after a couple of times of being placed in the case. The impact of get awaying the electric flow guaranteed that they would repeat the activity again and again. Taking a gander at all the data on both traditional and work molding. it is obvious to see that our condition impacts human conduct. Operant molding is still broadly utilized and is every now and again applied in schoolrooms and the work environment ( Tuckman. 2003-2009 ) . It can glance in numerous signifiers: * Consumable ( e. g. Henry desserts )* Social ( e. g. Recognition )* Activity ( e. g. Time using registering machines. abundance cut for interference ) * Exchangeable ( e. g. Spines for good conduct. ethics for good work ) Psychologists who design the operant molding hypothesis accept that larning simply happens through help. This is one of the greatest troublesome judgment from specialists as they accept that it isn't right. Another horrible judgment is that operant molding is uncaring as it removes a person’s choice. Carl Rogers ( 1902-1987 ) . a clinician who designs the humanistic position. put stock in unconditioned positive regard ( psychandsensibility. wordpress. com ) . Rogers discussed that Skinner’s universe is one without opportunity or centrality. Another ruin in Skinners hypothesis is that kids with chemical imbalance may require a serious conduct program that incorporates a lower breaking point of 20 hours a hebdomad for one individual. This would non be c onceivable in most state funded schools ( Forti. Sollner 1999 ) There is no vulnerability that work molding is an incredible mainstay of taking in kids wrong from right. in any case, bit of being human is larning from your blunders. Notices: * Alberto. P. A. . A ; Troutman. A. C. ( 2006 ) . Applied conduct examination for educators ( seventh release ) . Pearson. page 12 * Atherton. J S. ( 2011 ) . Learning and Teaching ; Piaget’s formative hypothesis hypertext move convention:/www. learningandteaching. data/learning/piaget. htm * Castella. Claire. ( 2011 ) . Jean Piaget’s Theory on Child Language Development ] hypertext move convention:/www. ehow. com/about_6587239_jean-hypothesis kid language-improvement. hypertext markup language

Sunday, August 9, 2020

Managing Stress

Managing Stress As we age, we take on more responsibility, and I’ve found that its all too easy to feel drowned and overtaken. I think that before many of you reach the university, it would  benefit  you to prepare yourself for an increase in responsibility and discover ways to manage stress. I’ve decided to list a few ways I manage stress, but since everyone is different, it’s still important for you to figure out what stresses you out the most and how to combat it. 1.  Watch a movie.  I’ve always been quite the movie buff, so watching a new movie or a funny classic always helps me unwind and forget about my troubles (at least for an hour or so). 2. Call my mom.  Whenever something is really pressing down on me, I find it really soothing to call my mom and just listen to her voice. I like to think that this goes back to my days as a fetus, when  my mom would talk to me from outside her belly so I would move around more. 3. Use my hands.  When in a state of distress, I find it helpful to create something with my hands, whether that be a drawing, a fortune teller, or a letter to a friend. By focusing on what Im creating, I start to lose sight of whatever was bothering me. Thats what helps me. I hope these suggestions  help you guys in finding out what helps you, too. ?? Thanks for reading, Indyia Indyia Class of 2019 I’m an Art Foundation student in the College of Fine and Applied Arts, and after Art Foundation I plan on majoring in Art Education. With my degree and teaching certificate, I want to teach children how to use their emotions, thoughts, and surroundings to create art.

Saturday, May 23, 2020

Países en los que matrimonio gay es legal

En Estados Unidos, los matrimonios gays tienen los mismos beneficios  migratorios que los heterosexuales, tanto para el caso de obtencià ³n de una tarjeta de residencia por matrimonio como para obtener una visa derivada no inmigrantes. Cabe destacar que para que la unià ³n surta efectos migratorios en Estados Unidos es requisito indispensable que se trate de un matrimonio. En otras palabras, no es suficiente una relacià ³n de hecho. El à ºnico requisito es que el matrimonio celebrado entre dos hombres o dos mujeres tiene que ser legal segà ºn las leyes del lugar de celebracià ³n. Matrimonio gay en Estados Unidos Una decisià ³n de la Corte Suprema de los Estados Unidos del 26 de mayo de 2015 declarà ³ inconstitucional las leyes de los estados que prohibà ­an el matrimonio entre dos hombres o dos mujeres.   Como consecuencia de esta sentencia, en todos los estados de los Estados Unidos es legal el matrimonio gay. Sin embargo, las reglas sobre quà © se necesita las determinan cada estado e, incluso, en casos, los condados o las municipalidades.   Asimismo, es legal en todos los territorios de Estados Unidos: Puerto Rico, Guam, Samoa y las Islas Và ­rgenes americanas. Y, por supuesto, en Washington D.C., la ciudad capital de los Estados Unidos. Lo à ºnico que pide Inmigracià ³n es que el matrimonio no sea fraudulento, es decir, que su à ºnico fin no sea la obtencià ³n de papeles para el cà ³nyuge extranjero. Otros paà ­ses en los que es và ¡lido el matrimonio gay Las autoridades de inmigracià ³n de Estados Unidos reconocen para Inmigracià ³n todos los matrimonios celebrados en el extranjero que son và ¡lidos de acuerdo a sus leyes. Por lo tanto, se puede pedir una tarjeta de residencia  o una visa derivada para el marido o la esposa cuando el matrimonio homosexual se ha celebrado en un lugar donde es legal, aunque sea ilegal en el lugar habitual de residencia. Son legales los matrimonios entre dos personas del mismo sexo en: Alemania, Argentina, Australia, Austria, Bà ©lgica, Brasil, Canadà ¡, Colombia, Dinamarca, Ecuador, Espaà ±a, Estados Unidos, Finlandia, Francia, Holanda, Irlanda, Islandia, Luxemburgo, Malta, Mà ©xico, Noruega, Nueva Zelanda, Portugal, Sudà ¡frica, Suecia, Taiwà ¡n, Reino Unido (excepto Irlanda del Norte) y Uruguay. En Costa Rica, la Corte Suprema declarà ³ el 8 de agosto de 2018 que toda la legislacià ³n que prohibà ­a el matrimonio gay era inconstitucional y establecià ³ un plazo de 18 meses para aprobar nuevas leyes reconociendo su validez. Finalmente, en el caso de Israel, no se celebran los matrimonios gays, pero sà ­ que se reconoce la legalidad de los celebrados và ¡lidamente en otros paà ­ses. Matrimonio gay e inmigracià ³n de los Estados Unidos En Estados Unidos, se puede obtener la tarjeta de residencia permanente, tambià ©n conocida como green card, por peticià ³n de ciudadano americano o de residente permanente legal a favor de su cà ³nyuge extranjero. No importa si el matrimonio es entre un varà ³n y una mujer o entre dos personas del mismo sexo. A efectos migratorios, son iguales. El matrimonio puede celebrarse en Estados Unidos o en cualquier otro paà ­s, lo à ºnico que importa es que reà ºna todos los requisitos legales en el lugar de celebracià ³n. Asimismo, en numerosos casos las personas que obtienen la green card por otra causa distinta a peticià ³n por parte de cà ³nyuge ciudadano o residente pueden emigrar a EE.UU. con sus cà ³nyuges, sin que importe si se trata de un matrimonio gay o heterosexual. Por ejemplo, en el caso de ganar la loterà ­a de visas de la diversidad, obtencià ³n de residencia por inversià ³n en EE.UU., asilo, etc. Por otro lado, el matrimonio da derecho a obtener visas derivadas en determinados casos. Por ejemplo, en el caso de estudiantes con visa F-1, extranjeros inmersos en programas de intercambio J-1, trabajadores extranjeros con visas temporales H-1B, H-2A o H-2B o inversionistas extranjeros con la visa E-2, etc., se pueden solicitar visas derivadas para los cà ³nyuges. Dichos cà ³nyuges pueden ser del mismo sexo que el titular de la visa o de distinto sexo. A efectos migratorios no importa si se trata de un matrimonio homosexual o heterosexual. Puntos clave: matrimonio gay y beneficios migratorios EE.UU. reconoce beneficios migratorios a parejas heterosexuales y homosexuales.El matrimonio debe ser legal en el lugar de celebracià ³n para que produzca efectos migratorios.En los 50 estados que conforman EE.UU. y en todos sus territorios el matrimonio gay es legal. Este es un artà ­culo informativo. No es asesorà ­a legal para ningà ºn caso concreto.

Tuesday, May 12, 2020

Why Do We Still Have an Embargo of Cuba - 1688 Words

Summary In the article, â€Å"Why Do We Still Have an Embargo of Cuba?† Patrick Haney explores the history of the embargo and the different factors which have maintained and tightened its restrictions over the past fifty years. The embargo consists of a ban on trade and commercial activity, a ban on travel, a policy on how Cuban exiles can enter the U.S., and media broadcasting to the island. These once-executive orders now codified into law by the Helms-Burton Act, have become a politically charged topic which wins and loses elections, spawned influential interest groups, and powerful political action committees. One year and a half after Castro’s forces took power in Cuba, President Eisenhower first imposed an embargo on Cuba, with the†¦show more content†¦Bush opposed the Cuban Democracy Act, which would tighten restriction on state. Candidate Clinton wins the support of the Cuban-Americans and the election by receiving twenty percent of the Cuban-American vote, up from Dukakis’s previous five percent in 1988 (Haney, 2010). Tapping into this typically right-wing group, Clinton forced Bush to additional time and money in Florida, which restricted his ability to campaign in other parts of the country. To please Cuban-Americans, Clinton signed the Cuban Liberty and Democratic Solidarity Act (Helms-Burton law), which codified years of executive orders into law and further tightened restrictions. Primarily in the volatile South Florida and New York City areas, candidates will take particular care in pleasing Cuban-Americans, as they are a powerful voting bloc that has continually altered elections (Haney, 2010). In the 2000 presidential election, Governor Bush promised to enforce the Helms-Burton law, and won over 80% of the Cuban-American vote in Florida (Congress, 2010). This state officially cast 537 more votes for Bush than for Gore, which means that the Cuban-Americans essentially secured Bush’s victory. Upon assuming office, Bush appointed Cuban-American hard-liner Otto Reich, to a top position in the State Department. The appointment was blocked by the Senate, but Reich eventually a recess appointment. As another act of appreciation, Bush appointed a Cuban-American to Secretary of Housing andShow MoreRelatedEmbargo on Cuba984 Words   |  4 PagesEmbargo on Cuba The U.S. imposed an Embargo on Cuba on Oct. 19, 1960. Has the time come for the United States to lift the 5-decade embargo? The Embargo on Cuba was a part of America’s Cold War strategy against the Soviet Union, imposed on the basis that Cuba was a threat to the U.S. National Security because of their alliance with the Soviet Union. Although Cuba would like the U.S to terminate the embargo against their country, the U.S. wants Cuba to make their situation a better living environmentRead MoreThe Warming Of Relations Between Cuba And The United States1285 Words   |  6 PagesA controversial subject,yet not spoken about enough,the warming of relations between Cuba and the U.S exists only due to the two countries having a rough past with each other. This â€Å"rough past† consists of aspects such as the protectorate status the U.S had previously put onto Cuba, which severely limited their independence and the U.S had, ironically, just helped them achieve. Some take a st ance that we as countries should stay distant from each other due to our vast governmental and cultural differencesRead MoreEssay Reconciling the Cuban Embargo1249 Words   |  5 Pagesbe as lucky with our embargo policy towards Cuba. A policy that may have a major impact on the US, both domestically and internationally, is truly only actively discussed in the swing state of Florida. Is the US heading in the wrong direction with this policy? Certainly the author thinks so, and if hes right its not likely that well receive a ticker tape parade at the end of journey like Corrigan did. Alex Lightman walks us through 78 reasons to end the embargo of Cuba. He does this by statingRead MoreFidel Castro And The Cuban Revolution1517 Words   |  7 Pagesdiplomatic relations with Cuba were cut in 1961. Even prior to the break in relations, President Eisenhower agreed to a CIA-backed plan to overthrow Fidel Castro. When John F. Kennedy was elected, he was informed of the CIA s plan. The newly elected president, unfortunately approved of the plan to attempt an uprising in Cuba against Fidel Castro. Before the Bay of Pigs invasion was developed; the United States tentatively backed Castro, in hopes of keeping a good relationship with Cuba. During the shortRead MoreShould the Cuban Embargo be Lifted?1940 Words   |  8 PagesIs the Cuban Embargo a cruel reminder of the Cold war, or is it an important factor of American Democracy fighting the spread of Communism? The Cuban Embargo was a declaration issued by American President John Fitzgerald Kennedy. The embargo was issued because of the threat that the Communist government of Cuba, led by Fidel Castro in 1959, had on American security, assets and democracy at the height of the Cold War. Some 1.8 billion worth of industrial assets were lost with Cuban communist nationalizationRead MoreCub A Long History With Cuba2896 Words   |  12 PagesThe United States has had a long history with Cuba. Within that long history came many arguments and accusations, such as the demand that Castro request that the U.S. embassy staff be reduc ed. Following that request came an outrageous accusation stating that the embassy was being used as a foundation for spies. This made U.S. officials think that Castro’s government was too anti-American to be trusted. Castro started nationalizing foreign property and companies as a response to the U.S., so the UnitedRead MoreCub A Destination Page Build Out997 Words   |  4 PagesCuba - TravelStore Destination Page Build Out TRIPS TO CUBA ARE BECOMING EASIER FOR AMERICANS BY AIR, LAND AND SEA. With a fascinating culture and music scene, Caribbean s largest island, Cuba, offers a glimpse into another world that s remote, yet lies just 90 miles off the U.S. coast. While Americans visiting Cuba still need to travel with a properly licensed operator, it s getting easier as more tour operators and cruise lines develop trips that enable you to visit this unique and fascinatingRead MoreThe Embargo On Cuba And The United States1781 Words   |  8 Pagesrelations with Cuba. Cuba and the United States have been hostile since the Cuban Revolution of 1959, when Fidel Castro overthrew the US-supportedbacked dictator, Fulgencio Batista, and established a Communist regime. The US rejected Castro’s bid for equal economic partnership because they wanted to maintain economic dominance. As such, Castro began seizing US assets, causing back-and-forth actions that culminated in Presidents Eisenhower and Kennedy placing an embargo in 1960-61. The embargo was intensifiedRead More Polici es On Cuba Essay1888 Words   |  8 Pages Policies on Cuba In Juan Rulfos novel, Pedro Paramo, the reader follows a dusty road to a town of death, where the following is said ÓUp and down the hill we went, but always descending . We had left the hot wind behind and were sinking into pure, airless heat. The stillness seem to be waiting for someone. ÔIts hot here Ô I said ÔYou might say, but this is nothing. My companion relied. ÔTry to take it easy. Youll feel it even more when we get to Comala. That town sits on the coals of the EarthRead MoreEssay on Lift the Trade Ban on Cuba2012 Words   |  9 Pages Unlock the Gate to Cuba In the long and turbulent history between Cuba and the United States, it can well be argued that Cuba did not turn out quite like its other Latin American peers. Things seemed to be on the right track in the early 1900’s, when it appeared that Cuba was destined for a future of â€Å"independence†, like its neighbour Puerto Rico and it was yet another South American nation rife with the now atypical blend of affluent American investors and poor workers usually native to the land

Wednesday, May 6, 2020

Discourse Organization on Asian Fashion Blogs Free Essays

Discourse Organization of Asian Fashion Blobs Introduction Background of the study Blobbing has emerged as one of the most popular forms of online discourse. The ease and lack of expense in setting blobs has raised intriguing possibilities for language learning in social media. The unique nature of its architecture and its low cost have not only affected how different floggers can publish and distribute their work to a wider audience but also how they see themselves as writers. We will write a custom essay sample on Discourse Organization on Asian Fashion Blogs or any similar topic only for you Order Now According to Blood (2002), blobs have been used in various ways: as online Journals, a meaner of signing hypertext’s, and more radically, to create what calls the first native form of discourse on the internet. She argues that blobbing best reflects the dream of Tim Burners-Lee (2000), who was one of the principal designers of the World Wide Web, to make the Web into something truly interactive both in terms of how texts are read and how they can be easily posted and accessed. The growing interest in blobbing has aroused the interest of English as a Second Language and English as a Foreign Language fashion floggers who see blobbing as a simple and low cost way of giving traders an access to publishing, advertising and distributing their writings on the internet as a method of providing them with the experience of writing in a digital format, and as a meaner of discussing issues related to their social and personal lives. According to Fleischman (2002), blobbing is the art of turning one’s own filter on news and the world into something others might want to read, link to, and write about. The openness can give the floggers a greater sense of the variety of possible audiences they can reach, both for understanding these audiences and learning strategies to spoon to them. These types of on-line discussions have been referred to as â€Å"gated communities† (Lowe Williams, 2004). With regards to world English, Karachi (1992) conceived the idea of three concentric circles of the language. The inner circle represents the traditional bases and is composed of native speakers of English (e. G. United Kingdom, the United States, Australia, New Zealand, Ireland, Anglophone Canada and South Africa, and some of the Caribbean territories). The outer circle includes countries where English is not the native tongue but they use it as a second language (e. . India, Philippines, Singapore, Hong Kong) while those that belong to the expanding circle are the rest of the world where English is used as the primary foreign language (e. G. Russia, China, Japan, Korea, Egypt, Indonesia etc. ). This idea has helped to classify the eight Asian countries that will serve as the subject in this study on how they use English as a language. Kaplan (1966) claims that English writing is characterized by directness and deductive reasoning, while other languages (e. G. Oriental languages and Arabic) favor indirectness and inductive reasoning. At the same time, he attempts to link the differences in discourse organization between English and other languages to their respective cultures and thought patterns. He marked the birth of the notion now known as Contrastive Rhetoric. It assumes that different languages had their own specific and culturally bound conventions and patterns of writing. This may also tell if there are such characteristics in Asian fashion blobs. Moreover, with regards to each Asian flogger’s writing style, contrastive rhetoric should also be considered. Contrastive rhetoric is an area of research in second language acquisition that identifies problems in imposition encountered by second language writers and, by referring to the rhetorical strategies of the first language, attempts to explain them. As summarized by Connors (1997), some internal and external forces give rise to this change in perspective. The internal force comes from criticism of contrastive rhetoric, which has required it to go beyond traditional linguistic parameters of analysis to consider discursive features, processes and contexts of writing. The external forces come from new developments in discourse analysis and changing focuses in first language composition research. To enrich further the structure of each blob, genre analysis will also be considered. This may identify if fashion blobbing belongs in a specific genre by studying how the SSL and FEEL floggers use the language when writing. The focus of this study is on the discourse organization of Asian fashion blobs. Considering their writing style, comparing the blobs of these particular Asian countries that are categorized into two groups will be done throughout the study. Statement of the problem This study aims to answer the following questions: 1 . What are the structures of a fashion blob? . What are the similarities and the differences between the fashion blobs of SSL and FEEL writers? Significance of the study College students of English Language Related Programs Knowing that blob can also be studied as it is a part of our social world, this study can still be given more attention by giving further enrichment by the future researchers. They can provide new findings supported by different related literatures. As the traditional way of analyzing language data from academic institutions, this paper will thoroughly investigate the language used in fashion blobs. This will further explore the online discourse by plunging into the grounds of computer-mediated-communication (CM). Researchers in the Field of Linguistics This research paper will be able to support future research papers that are related to discourse analysis, world English, contrastive rhetoric and genre analysis. As most of us today enjoy the web 2. 0 which includes blobbing (http://www. Slideshows. Net/ muzzy/blobbing), it challenges the researchers to become more analytical in their field. As language researchers move forward by conducting thorough investigations, here will probably be new ideas that will be contributed to the field of Linguistics. Teachers and Professors of Language The study on contrastive rhetoric among students has always been limited to the doctorate material for pedagogical purposes which is believed to limit learners’ ability to express themselves. The paper will further explicate the online discourse specifically fashion web logging which has been considered as one of the tools to express oneself in social network. This would provide enough knowledge to expand the language teachers’ repertoire in different writing styles. Floggers Whether these people are in different forms of blobbing, this study may inform them how important language is. In fashion blobbing, it is inspired with different marketing strategies boxed with pictures that are inviting, description of every detail of it and stories experienced by the flogger. Also, they may be informed that this style of marketing includes certain rhetoric in it. Furthermore, this style of writing can be one of the factors of the increasing subscribers and viewers. A. Scope and Limitation With the number of studies about the circularity and linearity among the SSL and FEEL argumentative essays, court proceedings, business letters and newspapers, this paper focuses on the discourse organization of Asian fashion blobs. The study will only look into the structure of a fashion blob and to identify the differences and similarities of SSL and FEEL writers. The FEEL countries are Malaysia, Indonesia, Cambodia and Thailand and the SSL countries are India, Singapore, Philippines and Hong Kong. These countries are only limited for each group. B. Definition of terms Blob is another term for web log, a social networking site (http://www. Slideshows. Net/ cubic/blobbing) of discussion or information site published on the World Wide Web consisting of discrete entries (â€Å"posts†) typically displayed in reverse chronological order so the most recent post appears first. Usually, it is being used as an online Journal (http://en. Wisped. Erg/wick/Blob). FEEL stands for English as a foreign language and pertains to how speakers use English for limited utilities, for example, for research references and sign boards. The countries that belong to this group are Malaysia, Indonesia, Cambodia and Thailand while, SSL stands for English s a second language and refers to English speakers who could speak it intensely and intimately. In Cracker†™s concentric circles, this group encompasses the countries that were colonized by the Western countries such as India, Singapore, Hong Kong and Philippines ( Karachi and Nelson, 2006). How to cite Discourse Organization on Asian Fashion Blogs, Essays

Saturday, May 2, 2020

The Fish - Elizabeth Bishop free essay sample

Fish is a narrative poem, told in the first person, about the confrontation between an amateur fisher-fishing in a rented boat and a tremendous battle-worn fish. A poem that acknowledges awareness in nature, The Fish, although a narrative, sings in the way we expect lyric poetry to sing, for it is rich with imagery, simile, metaphor, as well as rhetorical and sound devices. I say confrontation, but really the fish, with evidence of having been caught at least five other times, confronts the speaker only with its presence: the fight has gone out of him. The real confrontation is the speakers internal struggle: should she keep the fish or throw it back? In a moment of illumination, she does the latter. Bishops poem endows its fish with an awareness not very different from human awareness. That this is a poem of twofold consciousness, to use Robert Blys term for poems that grant nature an enormous amount of consciousness , is indicated by Bishops calling the fish a he instead of an it. We will write a custom essay sample on The Fish Elizabeth Bishop or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page This is not mere personification, for she treats the fish as a sentient being, with feelings not unlike those of a human being. She admires the fishs sullen face as his eyes tip toward the light, light which for us humans would symbolize consciousness but which for the creature of the water symbolizes the unconsciousness of death. The narrative may be summed up quickly, for what happens happens more quickly than the time it takes to read the poem. The speaker, out in a battle-worn, rented boat, catches the old fish, holds it half out of water, with my hook / fast in a corner of his mouth. After examining the fish closely and sympathetically, she has, ironically, a moment of recognition or an epiphany and tosses the fish back into the water: I let the fish go. Summarized, the poem is ordinary enough. What makes the poem extraordinary is the way the experience is related: the structure is shaped by the language of the poem . Bishops images appeal to all the senses: sound (He hung a grunting weight . . . his gills were breathing in / the terrible oxygen); smell (shapes like fullblown roses .. . rags of green weed hung down); touch (she holds the fish); taste (I thought of the coarse white flesh); and of course sight (the green weed, among many other examples). Combining simile and metaphor, Bishop creates sympathy for the fish. The five old pieces of fish-line . . . with all their five big hooks / grown firmly in his mouth are Like medals with their ribbons frayed and wavering, a five-haired beard of wisdom trailing from his aching jaw.

Sunday, March 22, 2020

Herman Melville Essays (1689 words) - Moby-Dick, Herman Melville

Herman Melville Herman Melville: An anti- transcendentalist or not Melville, Herman (1819-91), American novelist, a major literary figure whose exploration of psychological and metaphysical themes foreshadowed 20th-century literary concerns but whose works remained in obscurity until the 1920s, when his genius was finally recognized. Melville was born August 1, 1819, in New York City, into a family that had declined in the world. ?The Gansevoorts were solid, stable, eminent, prosperous people; the (Herman's Father's side) Melvilles were somewhat less successful materially, possessing an unpredictable. erratic, mercurial strain.? (Edinger 6). This difference between the Melville's and Gansevoorts was the beginning of the trouble for the Melville family. Herman's mother tried to work her way up the social ladder by moving into bigger and better homes. While borrowing money from the bank, her husband was spending more than he was earning. ?It is my conclusion that Maria Melville never committed herself emotionally to her husband, but remained primarily attached to the well off Gansevoort family.? (Humford 23) Allan Melville was also attached financially to the Gansevoorts for support. There is a lot of evidence concerning Melville's relation to his mother Maria Melville. ?Apparently the older son Gansevoort who carr ied the mother's maiden name was distinctly her favorite.? (Edinger 7) This was a sense of alienation the Herman Melville felt from his mother. This was one of the first symbolists to the Biblical Ishamel. In 1837 he shipped to Liverpool as a cabin boy. Upon returning to the U.S. he taught school and then sailed for the South Seas in 1841 on the whaler Acushnet. After an 18 month voyage he deserted the ship in the Marquesas Islands and with a companion lived for a month among the natives, who were cannibals. He escaped aboard an Australian trader, leaving it at Papeete, Tahiti, where he was imprisoned temporarily. He worked as a field laborer and then shipped to Honolulu, Hawaii, where in 1843 he enlisted as a seaman on the U.S. Navy frigate United States. After his discharge in 1844 he began to create novels out of his experiences and to take part in the literary life of Boston and New York City. Melville's first five novels all achieved quick popularity. Typee: A Peep at Polynesian Life (1846), Omoo, a Narrative of Adventures in the South Seas (1847), and Mardi (1849) were romances of the South Sea islands. Redburn, His First Voyage (1849) was based on his own first trip to sea, and White-Jacket, or the World in a Man-of-War (1850) fictionalized his experiences in the navy. In 1850 Melville moved to a farm near Pittsfield, Massachusetts, where he became an intimate friend of Nathaniel Hawthorne, to whom he dedicated his masterpiece Moby-Dick; or The White Whale (1851). The central theme of the novel is the conflict between Captain Ahab, master of the whaler Pequod, and Moby-Dick, a great white whale that once tore off one of Ahab's legs at the knee. Ahab is dedicated to revenge; he drives himself and his crew, which includes Ishmael, narrator of the story, over the seas in a desperate search for his enemy. The body of the book is written in a wholly original, powerful narrative style, which, in certain sections of the work, Melville varied with great success. The most impressive of these sections are the rhetorically magnificent sermon delivered before sailing and the soliloquies of the mates; lengthy ?flats,? passages conveying nonnarrative material, usually of a technical nature, such as the chapter about whales; and the more purely ornamental passages, such as the tale of the Tally-Ho, which can stand by themselves as short stories of merit. The work is invested with Ishmael's sense of profound wonder at his story, but nonetheless conveys full a wareness that Ahab's quest can have but one end. And so it proves to be: Moby-Dick destroys the Pequod and all its crew save Ishmael. There is a certain streak of the supernatural being projected in the writings of Melville, as is amply obvious in Moby Dick. The story revolves around the idea of an awesome sea mammal, which drives the passions of revenge in one man and forces him to pursue a course of action which leads ultimately to his death as

Thursday, March 5, 2020

Security Plan For Longfellows Wine Group Information Technology Essay Essay Example

Security Plan For Longfellows Wine Group Information Technology Essay Essay Example Security Plan For Longfellows Wine Group Information Technology Essay Essay Security Plan For Longfellows Wine Group Information Technology Essay Essay With the duty for the private informations of 1000s of clients, its no admiration that Longfellows group counts information security as one of its top precedences. The end of Longfellows security plan is to implement cost effectual countermeasures that mitigate the exposures that will most likely lead to loss. This paper discusses the menaces which put Longfellows most at hazard of loss and the controls which they employ to countermeasure those menaces. A elaborate security policy is discussed, sketching single duties, security processs and catastrophe recovery programs. This paper besides makes future recommendations as to how Longfellows could break increase the security of their systems into the hereafter. Executive Summary: 2 1. Introduction 4 2. Organisation Description 4 Comprises of Longfellows Insurance Brokers, Longfellows Wine Export Pty Ltd, Winefellows Pty ltd, and Longfellows Shanghai Trading Pty Ltd. Presently they have 5 full clip employees in the Melbourne Office with two authorised representatives for the insurance securities firm one in QLD and one in NSW. The Melbourne office comprises of our chief / manager, Senior Insurance agent, Support Marketing and Administration trough, bookkeeper and Wine Export Logistics and China liaison. 4 There is eight staff in the Shanghai office including the Shanghai manager wholly related to gross revenues and disposal of wine exports into China from Australia. 4 . 4 2.1 Current Networked System 4 2.2 Organisational Chart 5 3 Security Policy 6 3.1 Security Goals 6 3.1.1 Duties of the Principle Director 6 3.1.2 Duties of the Operations Manager 7 3.1.3 Duties of the Marketing Officer 7 3.1.4 Duties of the Financial Controller 8 3.1.5 Duties of the IT Manager 9 3.2 Duties for Goals 9 3.3 Committedness to Security. 10 4. Current Security Status 10 4.1 Accidents and Catastrophes 10 4.1.1 Threats and Controls 10 4.1.2 Data Analysis 11 4.1.3 Cost Effectiveness of Controls 11 4.2 Data Attacks 12 4.2.1 Threats and Controls 12 4.2.2 Data Analysis 12 4.2.3 Cost Effectiveness of Controls 13 5. Decisions 13 6. Recommendations 14 6.1 Internal A ; External menaces 14 6.1.1 Threats and Controls 14 6.1.2 Data Analysis 14 6.1.3 Cost Effectiveness of Controls 15 7. Execution of recommended controls 15 7.1 Timetabling 15 7.2 Responsibility 15 7.3 Schedule for Review of Security and Control Items 16 Mentions 17 18 Appendix B 19 Appendix C 22 1. Introduction With the of all time increasing menace from virus, spyware, hackers and individuality offense the demand for secure calculating informations and equipment has reached new degrees in the modern age. Every administration and computing machine user knows all to well the harm malicious package can make to a computer science system, with that in head, major Information technology companies have develop ways to battle against these menaces and most employ more than one technique. Longfellows is Insurance company which offers securities firm and policies to concern and single clients likewise. Longfellows understands the demand to protect client s personal informations utilizing the best industry patterns and equipment available. Henry wadsworth longfellows do nt officially hold a security policy in relation to its calculating system but do hold one in topographic point for their employees. This papers will assist to sketch that policy and place the duties of all users. This papers chief focal point is to place those menaces probably to do failure or loss to Longfellows calculating systems and to seek to quantify those menaces and set up the cost of the controls to decrease those menaces. 2. Administration Description Comprises of Longfellows Insurance Brokers, Longfellows Wine Export Pty Ltd, Winefellows Pty ltd, and Longfellows Shanghai Trading Pty Ltd. Presently they have 5 full clip employees in the Melbourne Office with two authorised representatives for the insurance securities firm one in QLD and one in NSW. The Melbourne office comprises of our chief / manager, Senior Insurance agent, Support Marketing and Administration trough, bookkeeper and Wine Export Logistics and China affair. There is eight staff in the Shanghai office including the Shanghai manager wholly related to gross revenues and disposal of wine exports into China from Australia. . 2.1 Current Networked System Desktops: They presently have 10 Desktop machines in the Melbourne office with two of these moving as waiters and two of these are run on a splitter for the disposal manger/ selling. Laptop computing machines: Two laptops in Melbourne office for manager and senior agent and authorized reps have a lap top each. Printers: Three One coloring material bubble jet / Two Black and white optical masers. Waiters: One waiter runs HPML 10 Windowss Microsoft windows little concern waiter 2003 R2 and other one runs HP ML 10 Windows 2003 R2 Internet connexion: Speed is ADSL 2 plus provided by TPG cyberspace 2.2 Organisational Chart George Zaal Director Kellie Rose Administration/ Marketing Insurance A ; Wine Export Alex Jenner Operation Manager Insurance Lee Yan Logisticss and Supply Office for vino export Spirio Bombos IT Manager Johanna Garry Histories Insurance and Wine Export 3 Security Policy 3.1 Security Goals 3.1.1 Duties of the Principle Director Longfellows rule manager assures the security of all calculating assets processed internally or externally. ( Caelli, 1991 ) . This duty entails the execution of equal safe guards, including physical, administrative and proficient, to protect personal proprietorship and other sensitive informations, which may shack within the company s legal power. Giving consideration to Longfellows bing security patterns and past jobs a proficient security plan should incorporate at least the followers: Assign exclusive duty of all hardware and package installings to Spirio or to those who may win his place. Keep a showing and interview procedures for all those who operate or maintain computing machine systems with sensitive company informations. Levels of showing should be performed by the appropriate degree of direction with equal accomplishments to judge campaigners for the function. Specify a control procedure, implemented by appropriate direction to guarantee all new computing machine applications and alterations are physically and technically safe from failure, if informations is peculiarly sensitive so at a lower limit a bomber set of constabularies and duties should be included. Approve all application alterations prior to installing of the application and guarantee the person responsible for the security of the application has appropriate blessing. Review and look into all application proving, to see if the application meets approved security specifications. Upon completion of proving, a alteration of the consequences should be documented. Any interested parties should site the papers, there by admiting the application performs harmonizing to the trial process and meets the security policy. Longfellows rule manager and IT director will carry on and sporadically supervise the security precautions of sensitive application informations. Any amendments shall be documented and organised as portion of security paperss. Monitoring of system applications will be determined at appropriate intervals by direction and IT director. Any procurance of new hardware, package or other calculating peripherals are to be reviewed to guarantee they run into appropriate security demands and they conform to bing security constabularies. Assign duty to the IT director to carry on a hazard analysis of each computing machine installing. The hazard analysis should specify any possible failing with each constituent and aid cut down loss of sensitive informations in a ruinous event. An analysis should be performed whenever a new piece of equipment is introduced into the system, prior to blessing by direction and at periodic intervals non transcending longer than three old ages. Assign duties to guarantee the appropriate eventuality programs are topographic point to cover with a information loss event or equipment failure. These programs should detail the appropriate action/s and responsible parties in order to the return services. Plans should be reviewed when there are alterations to the system or the resulting losingss are increased. 3.1.2 Duties of the Operations Manager The operations director Alex Jenner ( current ) or predecessors shall help the manager and IT Manager in keeping the unity and security of all insurance informations and client contact inside informations. The operations director should adhere to current security policies and guarantee all personal and properness insurance informations is secure from failure. Should guarantee that equal cheques are performed before leting persons to come in or modify sensitive informations. Should guarantee in the event of failure that information is recoverable and that losingss are keep to a lower limit. 3.1.3 Duties of the Marketing Officer The Marketing director Kellie Rose ( current ) or predecessors shall help the manager and IT Manager in keeping the unity and security of all selling informations and email contact inside informations. The selling director should adhere to current security policies and guarantee all personal and properness selling informations is secure from failure. Should guarantee that equal cheques are performed before leting persons to come in or modify sensitive informations. Should guarantee in the event of failure that information is recoverable and that losingss are keep to a lower limit. 3.1.4 Duties of the Financial Controller The fiscal accountant Johanna Garry ( current ) or predecessors shall help the manager and IT Manager in keeping the unity and security of all fiscal informations. The fiscal accountant should adhere to current security policies and guarantee all personal and properness insurance informations is secure from failure. Should guarantee that equal cheques are performed before leting persons to come in or modify sensitive informations. Should guarantee in the event of failure that information is recoverable and that losingss are keep to a lower limit. 3.1.5 Duties of the IT Manager The IT director, with the blessing and way, of the rule manager shall: Issue and enforce security constabularies in line with the companies legal demands company criterions and industry best pattern for implementing calculating security. Ensure any purchase of new calculating equipment, whether package or hardware fitting current security policies Monitor and supply appropriate installations to house calculating equipment, so that ruinous events are minimised and unauthorized entry to sensitive calculating equipment is prevented. Ensure all calculating users are cognizant of system security steps and to react in instances of system failure. Conduct and reappraisal package and hardware system before and after their debut to the system. The reappraisal procedure must be documented and approved by appropriate direction. 3.2 Duties for Goals Position Incumbent Goals Director George Zaal 3.1.1 3.1.1.1 3.1.1.2 3.1.2 3.1.3 3.1.4 3.1.5 Operationss Manager Alex Jenner 3.1.2 Marketing Military officer Kellie Rose 3.1.3 Financial Controller Johanna Garry 3.1.4 IT Manager Spirio Bombos 3.1.5 3.3 Committedness to Security. As Longfellows is chiefly an Insurance agent, security is of the topmost importance. All of Longfellows employees are required to reexamine and subscribe the company s Information Security Policy, as per employee contracts. The aim of these contracts is to educate employees on the sensitiveness of the confidential informations stored on the Longfellows systems and to guarantee that all protections are taken to safe guard Information Assets and bound exposure to those people without a demand to cognize. Personal and Insurance information that is held on by Longfellows is protected through the usage of secure watchwords, firewalls and a locked and restrained premiss. Entree to personal information is limited to those who specifically need it to carry on their concern duties. Longfellows besides maintain physical security processs to pull off and protect the usage and storage of paper records incorporating personal information. Longfellows will merely maintain personal information so long as required by jurisprudence and will take sensible stairss to destruct or for good de-identify personal information when we no longer needed. Longfellows will non unwrap information about you to a company which is non a related entity unless the revelation is required or authorised by jurisprudence, or you have consented to unwraping the information about you. If you apply for an insurance policy, they may necessitate to unwrap your information to our related entities, our distributers such as agents and agents, other insurance companies, and insurance mention agency in order to find your claims history. I believe Longfellows is extremely committed to guaranting calculating security and personal security of all their clients. This degree of security committedness helps to develop a trusting relationship with their clients and unafraid prospective concern in the hereafter. 4. Current Security Status 4.1 Accidents and Catastrophes 4.1.1 Threats and Controls Power rushs, Fire, hardware failures and inadvertent omissions are low hazard events. As the companies chief office is in a major capital power breaks are uncommon, the last reported major power outage was summer of 2009 for Melbourne ( ABC News, viewed 3 May 2009 ) which caused important jobs for most of the metropolis. Rush defenders are placed on all electrical calculating sockets to pretext against unexpected power rushs. Fire could do the most important harm to the calculating system hardware and any non backup informations. The waiter room is protected by a gas extinction system which would protect hardware if the fire started else ware. All desktops would necessitate replacing as the fire system is a standard H2O system. Accidental omissions are non common events, if they were to happen informations from the backup thrust could be used to reconstruct services and informations. Hardware failures may ensue in non antiphonal constituents of the system, if a constituent is suspected of being faulty a suited replacings are readily available at a really low cost. 4.1.2 Data Analysis Figures are derived from Figure 1 Appendix A. The likeliness of exposure is a quantitative figure scaled from 0.0 to 1.0. The higher the figure indicates a high opportunity of exposure to a menace. A figure of 0.3 for power loss indicates this menace is non likely to happen shortly but still may go on at some point. Unrelated to likelihood value Level of exposure figure is per centum figure which indicates the effect should a menace eventuate. A high per centum figure would bespeak for illustration, that should a fire destroy the system so merely approximately 25 % of the system would be affected, insurance A ; personal informations could be restored from backups and waiter and desktop package re-installed from purchased package discs, all located off-premise. The cost of replacing all calculating hardware is around $ 12,000. Control bing are based upon the in agreement values of controls in topographic point to battle possible menaces, Longfellows has a dedicated waiter room with a gas fire suppression system. It has a really high apparatus associated with the apparatus The one-year loss anticipation figure is derived from the value of the plus and it quantitative value should it be compromised by a menace. As most of the menaces are see low the loss is every bit low. Combined control effectivity is a per centum figure which represents the entire effectivity of all controls against menaces for information onslaughts it s estimated to be about 99 % effectual. Savingss are calculated against the one-year cost anticipation combined with control effectiveness figure, weighted against the cost of implementing the controls. Covered Loss describes the exposed cost against the possible nest eggs. 4.1.3 Cost Effectiveness of Controls The entire hazard analysis is planned for five old ages, if the company were non to see against the possible menaces so they could anticipate to lose around $ 4000 per twelvemonth. The high apparatus cost with the fire system reduces nest eggs for the first three old ages until the system pays for itself in old ages four and five. Hardware failure and package omissions are good covered by informations backup and the comparatively inexpensive cost of calculating system on the market. Security menaces from internal and external users are besides considered in the analysis. Logins from a distant beginning utilizing a valid user ID is possible given entree is granted to insurance field agents, likely interlopers could utilize cardinal lumbermans or package sniffers to observe an unfastened session with Longfellows waiter and addition entry via utilizing valid login certificates. Internal user may inadvently may derive entree to countries of sensitive informations through the internal web, to which they may non hold rights to position. This sort of invasion may travel unnoticed but if the employee were of all time to travel on so sensitive information may be used or divulged to an un-trusted outside beginning. 4.2 Datas Attacks 4.2.1 Threats and Controls As Longfellows employ s two waiters, eight desktops and two remote login computing machines for field employees it has high exposure to data onslaughts. Internet entree is allowed with no limitations so the menace from viruses either come ining from internal or external beginnings is high. Types of informations onslaughts may include worms, Trojan horses, and Spam or electronic mail lumbermans. As with any company or single utilizing the cyberspace, the menace of virus and other malicious package is considered high. Controls against this sort of onslaught are by and large provisioned for by utilizing the latest anti virus package, presently Longfellows usage Symantec Antivirus corporate edition, with a 12 month renewable licence. Two other controls are considered the Native O/S, Longfellows uses Microsoft little concern waiter, which contains security logs as portion of the O/S. Logs can capture any unusual events which may happen when the system is running. The other control is the external difficult rive which is used for regular backups of the sever informations, the thrust is maintain off premiss and is used hebdomadally. 4.2.2 Data Analysis The likeliness of exposure is a quantitative figure scaled from 0.0 to 1.0. The higher the figure indicates a high opportunity of exposure menace. A figure of 0.9 indicates this menace is likely to happen at some point. Unrelated to likelihood value Level of exposure figure is per centum figure which indicates the effect should a menace eventuate. A high per centum figure would bespeak for illustration, that should a virus enter the system so 85 % of the system could be affected. Control bing are based upon the in agreement values of package or hardware controls in topographic point to battle possible menaces, Longfellows uses antivirus package which is renewable every 12 months, a portable difficult thrust for system backup and the pick of O/S for the system ( i.e. Windows ) used for logging studies and audits of the system. The one-year loss anticipation figure is derived from the value of the plus and it quantitative value should it be compromised by a menace. A virus for illustration could be the company a $ 100,000 in corrupted informations. Each twelvemonth the value of a loss increases a 100 % . Combined control effectivity is a per centum figure which represents the entire effectivity of all controls against menaces for information onslaughts it s estimated to be about 80 % effectual. Savingss are calculated against the one-year cost anticipation combined with control effectiveness figure, weighted against the cost of implementing the controls. Covered Loss describes the exposed cost against the possible nest eggs. 4.2.3 Cost Effectiveness of Controls The entire hazard analysis is planned for five old ages, if the company were non to see against the possible menaces so they could anticipate to lose in surplus of $ 1000000 in lost informations but by passing $ 5000 over five old ages could anticipate to command any of the menaces happening at all. 5. Decisions Longfellows implements some really good criterion patterns for procuring calculating informations, the usage of an industry trusted waiter which comes bundle with security characteristics built in, for illustration user histories, watchword creative activity and user privileges on the web. A current anti-virus bundle is used in concurrence with the O/S to protect against information onslaughts, with updates this should maintain the system free from viruses introduced via cyberspace or by work users. As an insurance agent they evidently keep sensitive personal and fiscal informations about clients so to protect this plus, they use of an external Hardrive kept of premiss, and used on a regular basis to maintain the system current in the event of system failure or inadvertent omissions. The chief disbursal is for the fire system in the waiter room, its initial spending was high and the company should truly merely be seeing a return on this in the hereafter. On the whole most controls have been comparatively inexpensive to implement and supply great security benefits. Overall the administration is non in demand of a major system upgrade, but could fasten overall security by implementing some of the undermentioned recommendations. 6. Recommendations As Longfellows system is comparatively unafraid merely one recommendation is presented. This is to fasten security with regard to external and internal interlopers. As two users have remote login with the system, it possibly possible for hackers to happen ways to externally commandeer the system. Detailed below is analysis for commanding such menaces. 6.1 Internal A ; External menaces 6.1.1 Threats and Controls Whether by accident or with malicious purpose the menace of unwraping secure information by internal employees is a existent menace. Longfellows employees are signed into contracts saying confidentiality about company clients, but it is still possible for an internal user to derive entree to unauthorized countries of a system by-passing security characteristics. The menace of external interlopers is of higher importance sophisticated computing machine usage s can utilize arrange of tools to derive entree to procure system, package sniffing, cardinal lumbermans and unfastened Sessionss are ways external user addition entree so go forth a back door for ulterior entry, all the clip seeking to intensify privileges within the system. It s recommended that Longfellows use a two fold attack to command these types of menaces An ISA endeavor firewall, a Microsoft merchandise specifically designed to run with Windowss little concern server a basic bundle provides unafraid coverage for a little to medium size web 2. Another hardware device a NIDS ( web invasion sensing system ) switch. All traffic will go through through the inline NIDS. Unlike a regular bridging device though, the inline NIDS will inspect the package for any exposures that it is configured to look for. If a package contains a piece of information that trips a signature the package can be forwarded or dropped and either logged or unlogged. This type of system is utile if you do nt desire the aggressor to cognize that their onslaughts are unsuccessful or if you want the aggressor to go on to assail one of your systems in an effort to garner more grounds. NIDS can besides be configured to analyze packages within the internal web. 6.1.2 Data Analysis The likeliness of exposure is a quantitative figure scaled from 0.0 to 1.0. The higher the figure indicates a high opportunity of exposure menace. A figure of 0.7 indicates this menace is extremely likely to happen at some point. Unrelated to likelihood value Level of exposure figure is per centum figure which indicates the effect should a menace eventuate. A high per centum figure would bespeak for illustration, that should an interloper enter the system so 85 % of the system could be affected. Control costing is based upon the in agreement market values of package or hardware controls in topographic point to battle possible menaces Longfellows if they were to implement these controls would be around $ 10,000 The one-year loss anticipation figure is derived from the value of the plus and it quantitative value should it be compromised by a menace. An external onslaught for illustration could be the company a $ 200,000 if the interloper went unnoticed and stole personal information of Longfellows clients. Each twelvemonth the value of a loss increases a 100 % . Combined control effectivity is a per centum figure which represents the entire effectivity of all controls against menaces for information onslaughts it s estimated to be about 80 % effectual. Savingss are calculated against the one-year cost anticipation combined with control effectiveness figure, weighted against the cost of implementing the controls. Covered Loss describes the exposed cost against the possible nest eggs. 6.1.3 Cost Effectiveness of Controls Longfellows would derive vastly from implementing tighter control of internal and external aggressors, really important personal informations, which may include recognition and banking inside informations could be capable to unauthorized entree. By put ining a more robust firewall and NIDS system security breaches become more hard for likely interlopers. The cost of puting the controls in topographic point far outweighs the loss, if a security breach of all time occurs. 7. Execution of recommended controls 7.1 Timetabling See Appendix C -Gantt chart 7.2 Duty Control Undertaking Description Undertaking duty Supervision NIDS switch Acquisition A ; Purchase Financial Controller IT Manager Director Installation A ; Initial proving IT Manager Director Final System proving IT Manager Director ISA Firewall Acquisition A ; Purchase Financial Controller IT Manager Director Installation A ; Initial proving IT Manager Director Final System proving IT Manager Director 7.3 Schedule for Review of Security and Control Items Item for Review Duty Frequency Virus package reappraisal IT Manager Weekly O/S upgrade + licensing Financial accountant Annually External Hardrive proving + ascent IT Manager 3 months Rush defenders proving Constructing care officer A ; IT director 12 months Fire system proving Fire section 6 months ISA Firewall IT director 3 months NIDS switch IT trough 3 months Password file Administration officer Weekly Security policy reappraisal IT Manager/ Director 12 months

Tuesday, February 18, 2020

Determination of conductance of various solutions Assignment

Determination of conductance of various solutions - Assignment Example 4. From the data collected in the experiment, the following have been classified as either strong acid, weak acid, strong base or weak base. HCL- strong acid HNO3- strong acid KOH- strong base CH3CO2H- weak acid NH3- weak base 5. KNO3, Ca (NO3)2, Al (NO3)2, HNO3. All these compounds have the same anion i.e. NO3- but differ only in the cation present. This difference brings about the difference in their conductance. The differences arise due to the difference in mobility of the various cations. All those metals plus hydrogen have different mobility in aqueous form, therefore, will conduct electric current differently. 6. The conductance of KCl is 660Â µS while that of KNO3 is 2.9mS. These two values differ due to the conductance contributed by nitrate and chloride ions to the total conductance of the solution. Therefore based on the same principle NaNO3 is expected to have a higher conductance than NaCl. 7. From the conductance of KCl, HCl, and HNO3 the conductance of KNO3 can be calculated as: LKNO3 = LKCl+ LHNO3 - LHCl LKNO3 = 0.66mS+8.6mS-8.1mS LKNO3 = 1.16mS. 8. a) The conductance value for tap water was 0.2mS signifying that it was a weak electrolyte. Therefore it did not contain any ionic impurities since they would have given a higher conductance value. b) The tap water could have contained molecular impurities which were responsible for the small conductance recorded. These impurities partially dissolved in the aqueous solution and hence recorded the small conductance value observed.

Monday, February 3, 2020

The Culture and History of Switzerland Assignment

The Culture and History of Switzerland - Assignment Example The main principle that characterizes the country’s political system is that the citizens have the highest political authority in the states of Swiss. They have the leverage of conveying their opinion at the levels such as communal, cantonal, and federal. Moreover, they can not only vote on different issues but also elect representatives of the Federal Assembly (Swiss Community, 2015). Response to question 3 The geopolitics and geography of the Swiss sustained and allowed a tension-laden but polycentricity that was effective. The cantons stubbornly, on autonomy, canalized the attempts, as well as, state-building into a league mode of association instead of centralizing the unitary state model. The ultimate sovereignty neither depends on the citizen nor in some of the central universal principle though it will depend on the autonomous communities. This can be explained by the difference of in the democratic process of this country in comparison to other democracies. It has a direct democracy where the citizens influence government activities directly through either referenda or initiatives. In the federalism, the constitutional powers are citizen centered as well as the cantons. Moreover, they have consociational democracy where the cantonal majority rules. Cantons that are small have equal weight to those that are big (Swiss Community, 2015). Response to question 4 In my opinion, the culture and color character of the Zurich, Geneva, and Basel relatively differ. This can be attributed to the fact that the culture of the citizens is firmly anchored by the cantons. These cities are important facets of cultural identity as they contribute to the cultural and social substance towards the maintenance of the nation that is polycentric.

Sunday, January 26, 2020

Opportunities and risks of FDI in China

Opportunities and risks of FDI in China China, the worlds biggest and most populated country, which has fourth largest area in world. There is not a single aspect in which china is running behind. All the sectors for China are really working fast with fastest growing rate of economy of any major nation. The countrys GDP ratio is so high, economic structure is working good, social and cultural aspects for business and country is bilateral. But when it is not always true, that all the countrys can enjoy success rate much than failure. There are some sections where China needs to look after like, education, health and safety and environmental crisis. As it is a developing country, there are chances of increasing their business prospective in very huge sense with our developed or developing country. According to the news, China and the rest of the world have become closely interconnected with its large territory and population which guarantees the environmental impacts on all over the world. From the point of view of world, they try to increase these impacts by means of the trade and investment which fuels Chinas rapid economic growth. From the business sector aspect, the trade was negligible before 1980s and even FDI in China was nevertheless negligible till 1991. But the way they are accelerating their fast moving economy which is almost exponential. In economic terms there was 40-fold increase in international trade between 1978 and 2003. Therefore, there are several aspects we need to look at in order to find out the success ratio for Chinese Economy. In following article, we have tried to cover the main aspects of the Chinese strengths and weaknesses, as well as other factors such as political, legal and investments and so on. According to the analysis and research we did, the important aspect for Chinese government are legal, political, motivation and obstacles for multinational firms to invest in the country, sectors or industries likely to attract FDI and what are the reasons, there can be possibility of bigger risk for foreign companies which would like to enter in this country and how can these risks be reduced and so on. The political/legal environment: A very good aspect of global marketing is legal/political features. A binding of rules and regulations with their own principles of state and nations is known as International Law. There are two different characteristics, the first is a law which belongs to an individual in a country and that particular law only exists to certain amount of degree that an individual nations are willing to relinquish their rights. The second law is, lack of truly comprehensive international legal system, which has an adequate international judicial and administrative framework for the countries legal system. If we talk about international business, than it will also relate political decrees which are made by government for different home and host countries. There can be different measures which government would like to consider maintaining enough funding and operating smoothly in host country. Host governments take measures like taxations, ownership controls, operating restrictions or expropriation. Whereas for home country government, they take measure like make deal with eligible and approved parties, in order to avoid frauds and to grant an export licence, or withdrawal of export guarantee cover. Availability of the legal or political system as if like, ideology, nationalism, stability and international relations out of which the main features are best described to know legal and political implications: Expropriation: This can be the main possibilities of investor which may try to reduce their risk of doing business in the country. There are certain points which need to be considered while doing business in China. The country should try to make the business transactions so easy, as in case of local supply infrastructure which will help the people to believe in new entrants of the company with similar tastes, whereas it will reduce any adverse action/damages for the host country. In a way, this can be benefitted to both home and host country. Host country should try to make rapid depreciation of assets and repatriation of funds, if in case, there are uncertainties occurring in China, due to which the company has to wind up, it will also helpful for the company to stand with the loss if they are occurring. For the assets and funds they can be transferred at manipulated prices. For Chinese market, whenever any new company or MNEs wants to enter, they should try to invest as much as they can in order to maintain the stability of the market status, as well as they know the tastes of Chinese people which might be helpful for the host countries companys. To maintain the local stock market rates at the same levels, the company has to retain the control of critical inputs. That means, whenever they share any market share with higher price, needs to maintain the prices of those markets shares within the country. Even to make it low prices in order to earn profit, the company needs to maintain their cost of products to certain limit. Incentives: There are different aspects of providing incentives to motivate their workers, employees, public and for their own benefits. There are many countries which try to reduce their own potential risk of promoting their products, brands or advertising its products in different markets. Therefore, many countries try to reduce perceived risk of advertising or promoting inward investment as they are not tied with sharing, during the condition of tax breaks, free posts, free trade zones etc. this type of barriers affects the countries economy, as for example government tries to attract mobile investor, or considering the scheme for poor local skills which might be withdrawn once capital has been accumulated. It is same in the case of incentives which depend on feasibility of incentives compared to real return on investment? Assessing political vulnerability There are political aspects of economy, which create helplessness for the host and home countries business and its growth. Following are some the crucial aspects which we found out are the main features to make the companys profit or loss in host country. Even Chinese economy could not deny to these aspects: For a new MNEs entering in to any new market, needs to create good relations with its legal, political, CSR and environmental aspects, as in case of its own home country. The products should be good in quality, sensible to consumers, and trustworthy relationship with customers industry. Company needs to keep in mind the area and location of it growth. In order to reduce miscommunication, code of conduct, health and safety and good operating services. Promotions of the products, brands and services are much more important for success. Therefore, visibility of the firm is must, in a way advertising the products in host country gives huge public entrance with competitors. As we have discussed different political and legal aspect of host countrys in order to work out strategy accordingly. Contribution to the host country, that means, giving charity, investing in shares or stocks, merging, partnerships, joint ventures, providing employment, good salaries to employees, motivation, incentives, and pensions to the current workers and so on, it is important to bring up a good goodwill in host country. Localization of operations, in order to reduce import-export duties, getting cheaper rates of raw materials, cheap labor, etc. Marketing implications After discussing the internal implications, we can also describe briefly the main external implication which might be the reason for failure in host country. International law on marketing operations is multitude or crowded. Price controls/decisions- taxation, value added systems, resale price value/maintenance, price freezes after certain level in inflation. Distribution- channel of retail or wholesale agents or distributors, physical distribution or manufacturing the products on your own, insurance policies for products, brands or patents. Product decisions- includes designs of products, healthy and safety measure for using that product, overall performance measurement, packaging, labeling and warranty of the products. Promotion- advertising for the products and its services is must, product restriction includes within which age group the product can be used to reduce dangers with peoples life, and sales promotion for products gives better results. The most important market research- collection of details which are required by local public, tastes of particular brand, stock valuation, storage capacity for delivering goods to different areas and transmission of data to its local branches. Reasons for sectors and industries which are more likely to attract FDI in China: What is FDI? FDI means a multinational or transnational firm which engages in Foreign Direct Investment and owes its controls with value-added activities in more than one host country. The most used and widely accepted by data collecting agencies such as organization for Economics Co-operation and Development (OECD), UNCTADs Division on Investment, Technology and Enterprise Development (DITE) adjoined with national governments and supranational entities. There are main points for the development of Chinese economy which are mentioned below: 1. There has been a positive development trend for Chinese economy, as the economy provides a huge entrance for FDI. In this situation and circumstances, the growth of global economy will rise slowly but the highly developed countries like US and Japan will grow slowly as Chinese government guide lines describes expansion of internal demand, implement of positive financial policy and steady monetary policy which will try to accelerates the adjustment of economic structure in Chinese economy. From this aspect further expansion is possible which will open outside world and will run actively and steadily to promote the reforms which will be in favor of Chinas situation as well as its legislation of market economy, it will boost the overall quality and benefit of economy to run smoothly, which will maintain a strong bond with home and host country with its individual growth. 2. With stable political situation, Chinese economy has encouraged FDI as a part of its main entry policy. For certain period of time, the government itself was taking part to consider foreign direct investment in China which resulting made continuous efforts in improving or growing FDI investment. It was also protecting legal rights and interest of foreign investors. 3. After having FDI in China, foreign firms were attracted to start its business in order to earn like the foreign investors. Even some of the firms who invested experienced success in China. Since last 20 years of Chinas restructuring and strengthens of foreign investors in investing in Chinese Economy increase confidence of every individual to make first choice for every firms, MNEs or joint ventures to work in China or start Business in China. 4. Broad Market Potential: As now we all have an idea that China has got highest population with highest growth rate like developed country. The economy is fast growing, and domestic market of its services and products are massive. This is all because of Chinas consistent political environment; low labor cost with high quality of work, whole range of industries, and return on investment is good and so on. In a way China exhibits strengthen and charismatic attraction to an number of foreign firms and enterprises or MNEs. Motivation and obstacles for MNEs to invest in the China: Market size and growth MNEs need more space to wide-spread their rapid growth and they have comfortable market environment in China. E.g. Tesco Cheap labor cost As China is highly populated country and in this country people are ready to work at any cost, the concerned to earn money for their normal standard of living. Exchange rate The huge difference is currency rate. For example, if US wants to start a business than it will double profitable from the budgeted cost for starting a new business, as they can export- or can get each and every raw materials from China at cheaper rates. High investment return As we have studied, FDI has improved the economical level of China; therefore we can say every country is dreaming to start its ventures in China due to this reason, as before we earn profit we can earn money from the investment itself. E.g. shares, funds and charities Government incentive Policies Local government system is quite compatible to motivate and encourage business to do in China, though is not in case of internal motivation but when it comes to business, the different policies are benefitted for outsiders. E.g. free trade zones, loans, etc. Political stability Rules and regulations are not frequently changing with government; therefore it will be benefitted for new MNEs to enter as they dont have to think about any new shortcuts to enter or any other changes with its business working structure and strategies. Part of companys globalization strategy As we know that china is booming with all the aspect all over the world, that means if the countrys economy is booming, there are chances of new entrants to hit the set targets and run business successfully rather than home country. E.g. Wal-Mart Serving as an export platform Being a mediator China serves all the main countries its varieties of goods, technologies and cheap labor. E.g. watches made in China and sold in USA/India with a brand name, as well as toys. Chinas advanced technology This point is not much used by any MNEs as we all have idea about Chinese technological power, what sort of machinery they use for manufacturing and production. Therefore, for MNEs they dont have to worry about its production of goods, as it can be made with cheap labor, materials but with consistent quality. Chinas weak Indus. infrastructure Infrastructure doesnt really matter as the people in China want to adopt western trend, but they are facing constraints while adopting it. The reason might by cultural. Obstacles for MNEs firms to invest in Chinese environment: Political stability This factor can be weakness, as there is no improvement in political aspect of country so there are no chances of MNEs to innovate something new, or nothing such which is beneficial to MNEs Unsatisfactory foreign trade policy Trade, tariffs, subsidies- aid and loans, custom valuation. Whereas regarding the quotas, MNEs needs to consider- Buy Local Legislation, standards and labels, specific permission required, administrative delays, reciprocal requirements, restrictions on services. These factors are not up to certain limit to satisfy the Foreign firm. Regulations not strictly implemented Legal and illegal actions can take place while doing new business or continuing business. The laws which a business man is bound to follow, which are not being followed properly to maintain sustainability of economy. Unsatisfactory banking system The rates for interest, return on investment and etc., are not too enough for MNEs to get its return with double profit. Even the facility of banking is not sufficient for the new company to enter in China and provide every information/database. This can be the important aspect to be a huge obstacles as employees of the companys who has got bank account will not get up to the mark information, resulting failure. The development of business related industry China is huge in area, so in order to increase GDP, China is out sourcing too much to get the companies in to China for employment, high standard of living, good infrastructure etc. Low productivity Because of cheap labor and materials there are chances of doing fraud with public by providing them duplicate products and earn profit. Risks for entering in to market and how to reduce the risks in host country: Risk is such a big factor, which will consider by every firm, organization or enterprise as hindrance towards success. Even in here, there are different aspects of risks, which includes social, economical, political, legal, environmental and technological. But there are certain features which are the main to consider while you enter in host country. Some of them have been discussed below: Build strategies to recruit and train capable managers: In this case, there are many graduates from Chinese business schools, but they are lacking necessary skills like team leading, managing targets and so on. Chinese universities have formed partnerships in order to get successful and efficient employees to work within the companys environment and its management curriculum. They are providing trading promises for future employment by doing partnership with MNEs. firms are being trained properly, capable and intelligent Chinese student to get jobs in host countrys company. Safeguard intellectual property rights: Confidentiality is much more important while starting a new business in host country. Therefore foreign companies need to be cautious while transferring any important or proprietary information regarding its business growth or its development in china. There are chances of information being stolen and privacy for business strategy, budgets, and employees details can be hacked. Firms can pursue legal action for its patent but they are finding difficulties to maintain within Chinese border. With the help of technological development firms are being operated with creative solutions like existing computer code, alliances with Chinese partners, and joint ventures for production and patents for local public use. Some of the firms have found the solution for their problem, an opportunity of greater chance of influencing Chinese policy and enforcement strategies, which will help a lobby to speak for many parties or it can be a representative for one. Understand the competition. To bit the cut throat competition, Chinese are not competing home countries companies but they are also challenging host countrys company. They work on strategy which emphasis on production of high value added products, which resulting in to increase in amount of production or benefitted for foreign firms over Chinese companies. From the Chinese companys opinion, they are not aware about particular design, marketing strategy or any new distribution channel system. Therefore they are required to have experience for the same. Diversify risk: Corporate governance and strategy in China is very crucial as the elements of RD, production and supply chains are not present or not concentrated in any one Chinese province or region or overall Chinese border. Develop strategies to maintain CSR: After being followed first step, employees and local workers are being trained by foreign firm, as well as they invest for their education and in philanthropy/return firms will support host countrys charities which might be helpful for them to construct strong political relations locally. More or less Chinese communities are sensitive, therefore to perceive anything as corporate efforts to change the infrastructure and development of its country, according to western prescriptions. Have an exit strategy: All over the world, everyone is aware that China is emerging economy and everybody praises that. It will be the most attractive market with new development and emerging strategies within next few years. After all this compliments and comments, the long term perception is more likely uncertain. The reason is they dont have political institutions like India, to minimize/reduce long-term risks of sweeping political change. So it is worth to be secure for long-term profits, as if it prematurely cashes in its chips and moves out. So its better to have an exit strategy as plan B, if plan A doesnt work.

Saturday, January 18, 2020

Candide’s Old Woman

Despite â€Å"growing old in misery and in shame, having only half a backside and remembering always that I was the daughter of a Pope† as she, the Old Woman told Candide, â€Å"a hundred times I wanted to kill myself, but always I loved life more†¦Ã¢â‚¬  The Old Woman endured an series of unrelenting episodes which would have made anyone want to kill themselves but at her old age, instead of appearing doubtful and full of regret, like Candide, she looked at the bright side and still had the desire to live her life even if it began with hardships.Suicide is seen a very coward like act in the eyes of society, back then and today. Especially for one who practices Christian values. It can be said that one of the reasons why a person who would commit such an act of violence against themselves is because that person does not value and love their own self enough to stop feeling sorry and down for themselves and know that they're worth more than anything, pick up the pieces an d themselves back up.The Old Woman did not start off well in life, being the daughter of a Pope did not mean that she had been granted a place in the world or had started off with a sunny predisposition, quite the contrary, instead she was the product of a woman and a man who disobeyed the vows of celibacy. with that said, her parents, her dad more than anything, had bore shame upon themselves. In their eyes, her sole existence was illegitimate. The Old Woman, as wise as she was, was also strong. People with strong mentalities are able to endure and survive obstacles that others would have given up on long ago.The old woman thought that loving life was a ridiculous weakness that one â€Å"that chooses to carry a burden that no one wants to cast on the ground, to hold existence in horror and to cling to it? To fondle the serpent which devours us till it has eaten out our heart? † we as humans, can be weak sometimes and succumb to renounce own lives in order to end pain and suf fering of a situation that we feel that we have no control over and will not be able to surpass. The old woman endured many tragedies but still, she rose above them. She was widowed at a young age, raped, sold, enslaved, not to mention had half of her butt eaten!Any woman's from this day and age wouldn't think twice about committing suicide over losing half of a butt! Being the daughter of a Pope didn't ensure that she was going to be protected in any way against the hardships she had to bear to get to where she was as she related to Candide and Miss Cunegonde. The only reason why she told her story to them was because they both provoked her by talking about their own petty misfortunes compared to what she had been through. Weather a person believes in God or not, life is something that must be cherished while we still have it.There are extreme episodes of trauma that we can experience and at times feel like we won't survive that particular experience and commit suicide, just drop a nd terminate with our burdens right then and there. It seems very easy, that's why some people choose that route. Those that persevere don't choose the easy way and are resilient to a world that shows no mercy. Any human being that has walked the face of this earth and has had a traumatic event happen to them at one point in their lives and that didn't choose suicide as their last resort is a hero in their own way.They are heroes of their own lives and their own fate. In the end, one will still continue to go though the motions of life and new problems will always arise. Life will go on. Those that have become resilient to difficult life experiences only become wiser and stronger and are able to deal with other tough situations. That is the reason why the old woman was able to make it to her old age of course, she didn't get to be who she was, a strong willed woman who was determined to live by giving up.

Friday, January 10, 2020

Psychological Perspectives

In this assignment I will be explaining the principal psychological perspectives. I will explain the different psychological approaches to health and social practice and assessing the different psychological approaches to study. Psychology is the focus on different subjects such as the human development, social behaviour and cognitive processes. There are different approaches that have been developed in order to explain the psychology. These perspective or approaches include the behaviourist, social learning, psychodynamic, humanistic, and cognitive and the biological perspectives.These perspectives focus on trying to explain human development by focusing on how people learn and develop. Also the perspectives explain how an individual’s behaviour can be influenced by ones childhood (notes). The behaviourist approach focuses on how people are influenced by the environment and the behaviour of an individual is learnt from the environment. As psychology is a scientific study, beh aviorist, as a psychological perspective it obtains its evidence. The behaviorist approach uses scientific studies as they can be objectively measured.This perspective does not believe in what people say but believes in how the environment determines behavior. The behaviorist perspective as a scientific study it observe behavior relating to the basis that behavior can be reduced to learned stimulus-response units. The behaviourist approach includes two theories of learning. These theories of learning include the classical and operant conditioning. These theories explain how people learn from the environment (www. simplypsychology. org). The classical condition is was a theory which was developed by a Russian physiologist by the name of Ivan Pavlov.The classical conditioning theory is a learning process that occurs when there is a link/association between an environmental stimulus and a naturally occurring stimulus. As classical conditioning involves a stimulus and a natural occurrin g stimulus. He used the dog experiment in order to back up his theory. Pavlov used the digestive research of the dog in order to back up his theory. The observation of the experiment suggested that salivation was a learned response. Dogs normally salivate when the see food, however Pavlov was intrigued and interested to see why dogs started to salivate when they see people who normally feed them.For him to reach to a conclusion he set up the dog experiment. In order to show that salivation was a learned response his experiment is as explained. (www. niu. edu) When it was time for the Pavlov assistant to feed the dogs, they would ring a bell. The amount of the saliva was measure. The assistant did this a couple of times to make sure that the dog was used to the routine. After the trials, Pavlov then rang the bell without showing the food and the result was that the dog had salivated the same way when it saw the food. The classical conditioning procedure Food was considered as the sti mulus or in other words the unconditioned stimulus. This stimulus caused the response to happen naturally. * The dog salivated when it saw the food. When this happened it was considered as an unconditioned response. This response happened naturally. * When the bell was rung the dog would salivate. This happened because that the production of saliva was there because the bell was associated with the presenting of food. This is a conditioned stimulus * The salivation is a conditioned response because the dog is reacting to the thought that the bell is associated with food. www. niu. edu) Then operant conditioning is a theory that was developed by an American psychologist called Burrhus Fredic Skinner. His experiment was based on his experiment on rats and pigeons. He developed a well-known device caused the Skinners Box. The operant conditioning looks at ones actions and its consequences. The operant conditioning was based on two types of reinforcement, the positive and negative reinf orcement. His experiment showed positive and negative reinforcement through his experiment. He did this by putting a rat in his famous box (www. sychology. uiowa. edu). The rat that he placed in the box was meant to be hungry. The rat would sniff around in order to familiarise itself with the environment while doing this the rat will, accidentally press the lever and a food pellet will be released. When the rat had done this frequently it would learn that when the lever is pressed food would be releases. The food pellet was a positive reinforcement (www. psychology. uiowa. edu). In order to show the negative reinforcement side of the experiment, Skinner placed an electric current on the floor of the box.A rat is placed in a cage and immediately receives a mild electrical shock on its feet. The shock is a negative condition for the rat. The rat presses a bar and the shock stops. The rat receives another shock, presses the bar again, and again the shock stops. The shock was a negative reinforcement (www. psychology. uiowa. edu). (P2) Classical conditioning can be used in health practice. For example, a patient receives a, a certain injection frequently maybe for example 3 times a week. The injections are administered in a very small room every session. The drug causes increased heart rate.However, after certain trips to the hospital, being in a small room make cause the persons heart rate. Referring to the classical conditioning this is how the theory works: * The drug is the unconditioned stimulus. * The accelerated heart rate is the unconditioned response. * The small room is the conditioned stimulus. * The accelerated heart rate to the room is the condition response. (P3) Operant conditioning can be used in social practice. At a nursery operant condition can be used when dealing with children’s behaviour. When a child hits another child they are given time out which is negative reinforcement.When a child plays nicely with other and tidies up after play time they will receive a golden star. This is positive reinforcement. (M1) The behaviourist has been successful due to the methods it has used to explain people’s behaviour. The scientific experiments that have been used to study people’s behaviour tend to be very reliable due to the evidence that they end up with being based on facts. However, this approach is it does not considered mental processes that can affect an individual’s behaviour. This perspective only focuses on how people learn form their own experience.People like Bandura who introduce social learning approach disagree with this perspective as he believes that people can learn from observing and learning other people’s behaviour and experiences. Furthermore, studies of a wide range of human behaviours have shown that classical and operant conditioning cannot adequately explain how people are able to solve problems without the extended period of trial and error that behaviourism would say i s necessary. These findings imply that mental processes must play a part in explaining much human behaviour www. psychlotron. org. uk). The approach has been successful in explaining learning as it has provided a practical experiment which has shown results that are valid. This perspective has seemed to be working when dealing with people’s behaviour. For example, the operant conditioning is very effective as children are aware that when they do something good they are given a reward. This perspective can be improved by making sure it includes different factors that can influence individual’s behaviours such as genes and family influences.This is so because through for example genes a person can develop a genetic condition that can affect the person’s behaviour. People may not behave in the same ways as the behaviourist approach. This is so because it is not guaranteed that a child can change behaviour from being placed on timeouts when they have done something wrong. However, other people believe that people may behave the same way because there is the same influence of a combination of instinct and learning. The social learning approach explains how people learn from observing other people behaviour. This approach was developed by Albert Bandura an American psychologist. Most human behaviour is learned observationally through modelling: from observing others, one forms an idea of how new behaviours are performed, and on later occasions this coded information serves as a guide for action. † (Bandura). In order for people to learn from modelling, there are certain effects that should be present in order for an individual to learn from others. These effects include * Availability-in order for observation to take place a learnt behaviour should be available. * Attention – the individual who is observing should be able to notice the behaviour.The level of paying attention can be influenced by the characteristic of the role model. For example, if it is a celebrity that a person admires, chances are they are going to pay more attention to the behaviour. * Retention- the individual must be able to remember the behaviour that he/she was paying attention to. * Reproduction- is when the parson is bale to repeat the same behaviour that has been learnt (latent learning). * Motivation- the behaviour that has been learnt, the individual is now able to repeat it. The repeating can occur due to seeing and recalling the reinforced model. Moodle notes) The social learning theory explains the self-fulfilling prophecy and the social role. The self-fulfilling prophecy is a two way interaction that explains how we behave and how others see us and behave towards. For example, when a person who does not believe in him/herself that they can achieve a certain goal, if they are motivated they are able to fulfil the prophecy by working hard. The role theory is almost the same as the self-fulfilling prophecy. The role theory sugges ts that since we live within a certain culture or social group we are influenced by the society.When this happens it leads to an individual accepting that they are certain roles that they are expected to live to due to what society says. For example, the mother is expected to look after the children and feeding them. The role of the mother can change when they are in a different environment for example when going for an outing with friends the mother takes up the role of being a friend (Stretch et al, 2010). (P2) In health practice social learning can be used to change the health of an alcoholic or a drug addict. Positive and negative reinforcement can be used when explaining the behaviour of people who are alcoholic and drug addicts.Positive reinforcement is that when the people take drugs or alcohol they have a certain pleasure or euphoria they receive from that. The negative reinforcement that addiction can lead to unpleasant feelings such as depression or anxiety and also the ca n cause the developing of health related illnesses. Social learning will then relate to this situation. For example, public health authorities can use a role model to advertise a programme such as rehabilitation. By seeing the role model the individual will enrol for the programme in order to change their lifestyle (P3) The social learning approach can be used to promote health behaviours.By the media introducing health related storylines in famous TV programmes such as East Enders. The role model in that programme is able to influence people to change their behaviour. It easy for role models to send a health related message to the people than an ordinary person. For example a celebrity like Davina McCall was able to influence people to take up exercising by making sure she produced a DVD on how to exercise so that people are able to learn the behaviour of taking up exercising (www. dailymail. co. uk). (M1) The social learning is that it has demonstrated the strong effect of social influences on people’s behaviour.This approach has strongly explained how people are influenced by role models. People do learn from role model as they motivate individuals in achieving a goal. For example, without the help of celebrities such as Jamie Oliver who is the founder of Jamie Oliver Foundation, people who have not made an effort in changing their eating habits in order to improve their health. This show the effectiveness of this theory as social learning is influential to the people in the society. The social learning approach uses different approach as well in order to study the mind.For example, the social learning approach agrees to what the behaviourist approach says as children learn their behaviours by imitating their parents. In this case the parents will be the role model of the children. The social learning approach can be improve by stressing the point or explaining how children’s cognitive development can be affected as the child may observe the w rong information. This approach may not relate to everyone in the society as they are people who do not learn from observing others. For example, there are people called theorist who think logically. They like to learn things based on facts/theories.They like to know facts behind things. This approach would not apply these people. The psychodynamic approach was developed by an Austrian psychologist by the name Sigmund Freud. The psychodynamic approach suggests that experiences in our earliest years can affect our emotions, attitudes and behaviour in later years without us being aware that it is happening which is our unconscious. We can never have access to the information that is located in the unconscious part of the mind. Freud believed that the information that we are not aware of can sometimes ‘leak out’ as dreams or the slip of the tongue.When things that were are aware of it is explained as the conscious mind. When Freud came to explain the conscious and the unco nscious part of the mind he gave reference to an ice berg. He described the tip of an iceberg as the couscous mind as it is the small part being available to awareness. The middle part of the ice berg he described it as the pre-conscious minds where we can assess some of the memories. The bottom of the ice berg was the unconscious part of the mind where thought are kept and we do not have access to the information or memories. Freud suggested the psyche has three parts to it, the ID, Superego and the Ego.The Inner Desire is the part of the mind that is unconscious. The Superego is the formed due to socialisation as this part of the mind that represents a view of our ideal self. The Ego tries to balance the demands that can arise from both id and superego as the superego can be hash. Freud the argued how childhood experience plays a crucial part in adult development, including the development of adult personality. He believed that the behaviour is caused by the mind and portrait thro ugh the use of the ego-defence mechanism. This mechanism protects people from getting harmed by something that are stored in the unconscious mind.The defence mechanisms are divided into seven. * Repression-pushing painful memories deep down into our unconscious mind, so they are effectively forgotten. * Rationalisation- is making decisions based on reasons that have facts to it. * Compensation-when a person covers up their flaws by keeping a positive mind. * Transference-is when an individual transfers their emotions to another person. For example, when a person is angry the might shout at the other person. * Denial- is used when a person denies the fact that something wrong is going on with them so that they are not hurt much. Projection-is used when a person attaches their own thoughts, feeling and motives to another person. * Suppression- is used when a person hide their feelings in order for people not to know what is going to them. (Moodle notes) Freud also developed a theory o n personality development. This theory was known as the psycho-sexual theory. This theory explained the different personality development based on the different part of the body and age. He believed in order to reach the next step you were supposed to meet the all the needs before that. Freud believed that personality development in hildhood would influence the personality in adulthood. The table below shows the different developmental stage and the outcomes . Oral stage-He believed that the outcome was either going to be positive or negative for example, if the infant was weaned too early, it would forever feel under-gratified or this would lead to the person becoming a pessimistic or sarcastic person. If the child was weaned too late, it would be over-gratified . Due to this a person would develop a gullible personality, naively trusting in others and with the tendency to believe anything (notes).Anal stage- this stage the libido is focused on of toilet training. When a child feel s that they are being forced to potty train before they are ready they can retain their faeces in other terms it is defined as anal retention. When this happens to the child they may develop personality characteristic when they are older which includes obstinacy or greediness (Stretch et al, 2010). Phallic stage- the fixation stage is being associated with anxiety and guilty feeling about sex and fear of castration for males. At this stage there is an unresolved situation that a girl may become a lesbian.This can lead to personality characteristics such as castration anxiety (Stretch et al, 2010). Latency-at this stage the child develops a relationship with siblings, relatives and adults and solidifies the habits of earlier development stages. The personality characteristic that a person can develop is being Asexual (Moodle notes). Genital puberty- at this stage Freud’s believes that a person fixated on developing a strong heterosexual relationship. During this stage a person who is involved in a relationship is able to show love towards the partner. In order for this stage to happen other stages should have happened (Stretch et al, 2010).Erick Erickson was a psychologist who agreed with most of Freud’s theories. He believed that we develop through a series of conflicts. By this he meant that the stages the conflicts were basically a part of social nature. Erick disagreed with Freud as he believed that Freud only paid great attention on people’s desire for satisfaction and not really focusing on that people have needs that we want to be accepted by society so that we can live a meaningful life. He believed that people go through certain psycho-social life crises and these are trust vs. basic mistrust, autonomy vs. shame and doubt initiative vs. uilt, industry vs. inferiority, identity vs. role confusion, intimacy vs. isolation, generativity vs. stagnation and ego integrity vs. despair. For example, to the trust versus mistrust stage of Eri ck Erikson theory of psychosocial development this stage occurs between birth and approximately 18 months of age. According to Erikson, the trust versus mistrust stage is the most important period in a person’s life. This is so because how a baby is entirely dependent upon his or her caregivers, the quality of care that the child receives plays an important role in the shaping of the child’s personality.During this stage, children learn whether or not they can trust the people around them. If these needs are met the child is then able to go to the career for emotional support. If the child does not feel dependent on the parent and does not trust them it can lead to fear and suspicion in the later age (Stretch et al, 2010). (P2) The psycho-dynamic approach can be applied to understand why an adolescent in a child home who is continuously rebelling against all the rules and appears to be developing signs of delinquent behaviour. This can be explained by looking at Freud approach.The reason why the adolescent acts that way is because there is no balance between the ID and the superego in the mind causing the memories of his bad childhood to take over. (P3) The approach can also be used to explain how an individual who has been given a diagnosis of cancer but is refusing to accept that they have the disease. I think that the person does not want to accept as he is living in denial. When there is denial a person is able to trap certain though or emotions in order to hurt themselves emotionally. (M1) The psychodynamic approach explains how a child learning can be influenced by their childhood experience.If the child did not feel like he/she can trust a person it would to them withdraw from society and end up hating the parents. This shows that childhood is a critical period in one’s life. For the child to hate the parents the memories in the pre-conscious part of the mind would have been revealed and people will remember the bad childhood memori es. This approach can be improved by making sure that it does not only focus on how the psyche and the psycho sexual stages influence behaviour. However, it can considered factors such as bio chemistry and genetics.According to this approach people may behave the same ways as adults have the tendency of using the same defence mechanism (www. thestudentroom. co. uk). The humanist approach is a psychological approach that emphasizes the study of the whole person. Humanistic psychologists look at human behavior not only through the eyes of the observer, but through the eyes of the person doing the behaving. This approach was developed by two psychologists Abraham Maslow and Carl Rogers. Abram Maslow’s believed that every individual is seeking to become the best we can be spiritually, intellectually, emotionally and socially.He developed a hierarchy of needs and it included the different needs that a person will need when growing up according to the importance. The hierarchy of n eeds illustrated that the basic needs should be met before reaching to the next level. For example, for an individual’s love and emotional needs to be met the basic physical needs and safety and security needs should be met. Maslow believed that the most important need is self-actualization. Self actualisation is when the person reaches the point of achieving full potential ((Stretch et al, 2010).Carl roger was interested in the concept of self-concept. Self-concept is the way a person see him/herself. Self includes how we see ourselves biologically and physically. Self-concept starts to develop from an early age. This is so because of a child is being constantly told that he/she is naughty. This can have a negative impact on their self-concept as they we start to see their selves the way they are being portrait as. On the other hand if a child is praised it encourages the child to work harder in order to achieve a certain goal they have set out for their selves (Stretch et a l, 2010). P2) The humanistic approach can be used to explain how staff is trained to understand the importance of unconditioned positive regard in working patients and clients. Unconditioned positive regard is when a person stays positive about a situation and does not concentrate on the bad side of the story unconditioned positive regard can be shown when a nurse comforts a patient when they are feeling down and shows empathy. This is very important to show this kind of attitude as it creates a better professional relationship between nurse and patient. (P3)Humanistic approach can be of value when providing counseling services in a social care setting. This approach can be used to show empathy when a counselor is counseling a patient. Rogers has used this approach as a way for people to understand another person not only on an intellectual; level but also on an empathic understanding. When a counselor is able to understand another person’s emotions and feelings they are able to help the client. For example, when a therapist is counseling an alcoholic the therapist is able to find a way to help the client by understanding the causes of the drinking.It might be because of a childhood event that has affected the clients’ life. (M1) The human approach focuses on how people learn from being given the free will and ability to change. This approach has been seen to be very effective as it helps people with less severe problems. The importance of the ,Maslow’s hierarchy of needs is to give people the learning direction as it looks at the different step a person much go through in order to reach a point of self actualisation and at this step the person is able to be fulfilled as they have achieved the goals they wanted.However, consequences of unconditional positive regard are that the person feels free to try things out and make mistakes, even though this may lead to getting it worse at times. People who are able to self-actualize are more likely to have received unconditional positive regard from others, especially their parents in childhood. As the approach only focuses on helping people with severe problems it can be improved in order to meet ability to help those with more sever personality or mental health pathology. This approach does not include people with severe mental health problems (www. allpsych. om). The cognitive approach was developed by a Swiss psychologist called Jean Piaget. The cognitive approach focuses on understanding the cognitive processes such as attention, memory, perception, information, processing, problem solving, thought and language. In simpler term it is the study of how people perceive, remember, think, speak and solve problems. Jean came to a conclusion that cognitive development is achieved by going through 4stages (Stretch et al, 2010). Stage 1 sensorimotor stage- this stage happens between the ages of 0- 2 years. At this stage the child learning is limited.The child only learns through using they sense. This is why it is called the sensorimotor stage at the child uses their senses in order to do motor skills such as using reflexes such as the protective reflex. These reflexes are used in order for them to adapt to the world. Objects and events can be mentally represented by the child (sometimes called object permanence this stage comes to an end when the child starts to learn how to use his/her memory and language (www. simplypsychology. org). Stage 2 pre-operational stages- this stage happens between the ages of 2 to 7 year.This is the stage when children start to apply their skills of language (www. simplypsychology. org). Stage 3 concrete operational stages- this stage happens between the ages of 7 to 11 years. This is when individuals start to think abstractly and make rational judgments even though their rational thinking is restricted to realistic situations (www. simplypsychology. org) Stage 4 formal operational stage- this stage happens at the age of 11 an d going on. This is when an individual is able to think logically and use hypothetical thinking (www. implypsychology. org). George Kelly was a developed the theory called the Psychology of Personal Constructs. This theory looks at a person as a scientific making prediction about ones future, while testing them and when necessary the records are meant to revise in order to develop new evidenced. Interpreting and being mindful of reality and the environment is considered as construct. For example, when a person has HIV/ AIDS they may withdraw their selves form any social activities as they may see it as the end of world and they nothing to live for.However, the may not feel that way at take it a positive ways in which they can educate other people so that they do not make the same mistake as she did. He believed that people do not necessarily have to learn from their past experience (Stretch et al, 2010). (P2) Cognitive approach can be sued to explain how irrational thoughts experien ced by people suffering from eating disorder. This perspective relates to the situation. For example, when a person who has an eating disorder he/she can find themselves fighting against the disorder.The individual needs is based on trying process the thoughts to need to control, need to be thin and also a need to feel that they are happy being thin. This perspective is based on how the individual wants to live their lives and be happy the way they are than pleasing other people. However, the way a person can see their selves and think about themselves can happen because of the bad experienced which are leading to the person having eating disorders(Stretch et al, 2010). (P3) The principle of cognitive behavior therapy can help an individual dealing with feelings of depression.The cognitive behavioral therapy is a form of talking therapy based on cognitive therapy and behaviour therapy. It emphases on how people think about the things going on in your life, attitudes and how this imp acts on the way you behave and deal with emotional problems. It then looks at how you can change any negative patterns of thinking or behaviour that may be causing you difficulties. This approach is used as a way which is used to help people cope with their thoughts and behaviour.This therapy will help the person to solve their problems in terms of feelings. For example, when dealing with a person who feeling depressed the counsellor can first look for the cause of the person feeling depressed. Then the counsellor is able to relate to the cognitive approach in encouraging the person to be more positive(Stretch et al, 2010). (M1) The cognitive approach has been successful is explaining learning. This is so because the cognitive approach has been useful is contributing to most of the types that are being used.The success of the approach has comes form the fact the approach helps people to improve their cognitive processes such as language and memory. The cognitive behaviour help peopl e to understand what goes on in peoples mind. For example, the cognitive approach helps understand different people’s behaviour and thoughts of a person who it autistic. Furthermore the cognitive approach helps people who work with people who have difficulties in learning language as it provides different strategies to tackle the problem.The cognitive approach has become the leading approach in psychology particularly since it has become allied with neurology. The cognitive approach is now called the cognitive science. This is so because this approach has been able to provide a very refined understanding of how the brain processes information. However, the cognitive approach does not fully does not include other factors that can influence a person’s thoughts such as ecological validity which is the environment. The behaviour that this approach focuses on is not the behaviour that would happen in everyday situations (www. olah. co. uk). This approach can improve by addr essing reasons being a personality characteristic. According to the cognitive approach people think the same because the approach applies a nomothetic approach which includes studying a group of people. The biological approach (maturational theory) is concerned with how our genetic inheritance, evolution of the human species and the nervous system (both central and peripheral) affect how we think, feel and behave. Arnold Gessell was a very influential person in the field of development. He developed the maturation theory.Arnold Gessell described the maturation theory as â€Å"A highly biological theory that regarded child development as an evolutionary approach where there is a genetically determined series of events that unfold automatically. It is believed that development has a biological process that occurs in predictable stages over time†. (www. maturationtheory. gov. uk) As Arnold believed that development happens with a series of maturation, his belief has been explain ed by how uterus develops in the womb. The stages are as follows * Heart forms first and at the same time the rudimentary nervous system. Bones and muscles develop * Then the organism develops into a completely working human life form. * When a persons genes allow the person to become who he/she is destined to be with the influence of the environment providing support in the unfolding skills. (Stretch et al, 2010). Genes are also influential when it comes to person behaviour. Other behaviours are caused by certain genes disorders. For example the Huntington disease which is caused when one of the parent’s genes is dominates. Any one of the parent can pass the disease to the child.Disorders caused by genes are very influential to the person behaviour. Another example, autism is also a genetic condition than can alter a person’s behaviour. Peoples with autism develop behaviour traits. These behavioural traits include repetitive motor movements such as rocking and hand fl apping, avoid physical contact and also challenging behaviour including throwing things around when distressed(www. chw. org). There are more common disorders that are not genetically determined; however they have chances of leaving people vulnerable when it comes to developing the disorder.In order to find out the contribution of genes on behaviour there have been twin studies which have been carried out. Two types of twins were used monozygotic (100% of sharing of genetic material which results in the pair being identical) and dizygotic (50% of sharing genetic material which will result in the twins being fraternal). In order to show that genes are influential, Ritvos study showed that out of 23 pairs of identical twins 22 of the twins were autistic and 4 out of 17 pairs of fraternal twins were autistic. This shows that genes are influential (Stretch et al, 2010).The endocrine system influences ones behaviour. The endocrine system has to parts to it the central nervous system and the autonomic nervous system. The central nervous system consists of the brain and the spinal cord. The autonomic nervous system is associated with the endocrine system and it is divided into two systems. The sympathetic nervous system which is responsible for speeding up during response in activity and the parasympathetic nervous system that calms down the system. (Stretch et al, 2010). The autonomic nervous system produces effects by releasing hormones.These hormones are released from the endocrine glands which are stimulated by the system. There are different hormones that are released that alter behaviour. For example, testosterone which is hormone released in the testicles can cause a person to be aggressive. (P2) When a person is working a night shift they tend to find it difficult to stay awake when they are working. When the night shift is over the person goes home with intention of getting some rest however the person will find it hard to sleep. This happens because of the disruption to the circadian rhythm which is the rhythm of a day.The person’s behaviour is affected by the circadian rhythm. When a person is working at night his/her body temperature is low which will cause the person to be less alert. However, if the person is working during the day their temperature is normal which will cause the person to be more alert. The brain is influential to this process. In the brain there is a part called the pineal gland. This gland is responsible for producing a hormone called melatonin. When it gets darker, melatonin production is high because the pineal gland is triggered by the brain to produce higher levels of melatonin.When it is not dark the gland reduces the production of melatonin. The levels of melatonin can affect the person at a night shift because at night the levels of melatonin productions are high and this will cause the person to feel sleepy. This affects the person’s behaviour as the person is not alert when they are mean to be (Stretch et al, 2010). (P3) The biological approach is very important because it explains the importance of understanding the concept of circadian rhythms. Circadian rhythm is a roughly 24 hour cycle in the physiological processes of living beings.It is important as is determines the sleeping and eating patterns of an individual. The manager of a workplace is advised to have knowledge of biological rhythms. This knowledge will help the manager to take into consideration of the hours a person works. With the knowledge of the circadian rhythm the manager is able to draw up a pattern of shift work that is able to help the worker to have even sleep so that when they are working the are alert. For example, the manager may assign the worker with three days of week and two days off during the week (Stretch et al, 2010). (M1) The approach has been successful in explaining learning.The biological approach explanations have been variable as they are best on scientific research which can be measured tracked and examines. The effectiveness of the biological approach has been proved by psychosurgeons who were able to see the functioning of the brain by removing a part of a functioning brain. This process has been used by psychologists to prove that certain parts of the brain are associated with aggression. The researches that are carried out are scientifically reliable as they fulfil the aims of scientific research which is to conduct objective, well controlled studies and, ideally, to demonstrate causal relationships.The strength of the biological approach is that it lends itself to scientific research that can then be used to support biological explanations. The biological approach is also determinist and this is an advantage because the approach is able to know what sets our behaviour and how we able likely to treat people with abnormal behaviour. The strength of the biological approach is that it is determinist and provides explanations about the causes of behavi our so that we can use such understanding to improve people’s lives.For example, if mental illness is caused by biological factors, then we can treat mental illness using biological methods such as medication. The biological approach can be improved in order to consider individual approach as this approach only looks at nomothetic approach. This is a weakness as people do not necessary behave the same way. for example, when coping with stress conditions women normally react by seeking social contact and support from other female friends whereas keep it to themselves(www. oxfordschoolblogs. co. uk). (M2 and D1)The approaches I will be focusing on are the behaviourist approach and the psychodynamic approach. Both of these approaches can help with a health and social care setting. The behaviourist approach looks at hoe different people are influenced by the environment. As psychology is a scientific study, behaviorist, as a psychological perspective it obtains its evidence relat ing to the basis that behavior can be learnt. The behaviorist approach has seemed to work when explaining people’s behavior as the experiment that Skinner and Pavlov evidently showed that behavior can be learnt.The psychodynamic approach explains how ones past experience can affect a person’s behavior in the future. The past experience is stored in the unconscious part of the psyche and the memories sometimes leak causing to affect the person’s behaviour. For example, when a person was abused when they were young and this will cause the person to develop behavioural traits with include being withdrawal to the society or become abusive too. The approaches can be used within a health and social care setting in order to help individuals.For example, the behaviourist approach can be used when helping people to overcome a phobia and also to changes ones eating behaviour. When dealing with people who have phobias, the behaviouristic approach uses a classical condition ing. By this the approach uses a procedure which help the person overcome their fear. For example, a child who has a fear of going through a surgery procedure can overcome this fear by creating a hierarchy of fears. The hierarchy will show the least feared and most feared procedure. When this is done the person is able to relax and et over their fear because this procedure helps a person achieve a state of deep relaxation. This approach changes the aspect of fearing something by replacing it with the state of relaxation. When a person is at the hospital they can been shown how the procedure is going to happen and this will help the person relax as they will know exactly what is going to happen to them. When helping people with bad eating habit. The behaviourist approach explains how positive role models are influential. For example, Jamie Oliver has helped people start eating healthy by re-introducing freshly cooked school meals.His suggestion was taken seriously as there are more c hances that the public will listen to what a celebrity say compared to an ordinary person. The psychodynamic approach can be used when understanding challenging behaviour and also understanding anxiety and finding ways to cope with it. When helping a person with challenging behaviour it is important to understand first what is going on in the psyche of the person by making an assumption that the behavioural trait is due to the symptoms of what is happening in the unconscious mind.For example, when helping a person who is aggressive, in order to understand what is going on a person might make an assumption that the person grew up seeing his/ her parents fighting. When a person is anxious they may understand it by making an assumption that it is caused by what is happening in the unconscious mind for example an event that has happened before. The person can use the psychodynamic approach to manage anxiety by relating to one of the defence mechanism such as denial. The approach has sim ilarities and difference.The approaches both have similarities. One of the similarities is that both of the approaches are both deterministic. They are deterministic because they are based on the principle that something apart from organism is responsible for its behavior. For example behaviourist approach is based on previous experiences such as punishments and the psychodynamic approach is based on it’s typically tension between conflicting forces such as the id and superego. Another similarity is that both of the approaches (www. ngfl-cymru. org. k). The approaches have differences. The behaviourist approach focuses on how behaviour is learnt and the psychodynamic believes that behaviour is not learnt. The behaviourist shows how behaviour is learnt through explaining the operant and classical conditioning whereas the psychodynamic explain that behaviour is not learnt and ones behaviour is caused by forces in the unconscious part of the psyche. Another difference is that th e behaviourist approach is based on scientific experiment and the psychodynamic is unscientific.The explanation for this difference is that the behaviourist approach explained is theory by using experiments which were observed, measured, and manipulated whereas the psychodynamic approach was not based on a scientific experiment which could be observed, measured, and manipulated(www. ngfl-cymru. org. uk). The strength of the behaviourist approach is that is that it focuses only on behaviour that can be observed, measured and manipulated. Therefore, this approach has proved that experiments under laboratory conditions can explain behaviour through observing, measuring and manipulating.The behaviourist principles of learning have been, and continue to be, tested in the laboratory where learning can be objectively measured. For example, the experiment that was done by Ivan Pavlov was successful on explaining how people learn and how they behaviour because the experiments results were va lid as there were scientifically based. The other strength of the behaviourist approach is that the behaviourist approach concentrates on the present and current behaviour rather than exploring a person’s past or their medical history (www. ngfl-cymru. org. uk).This is a strength of the approach because when it comes to determining a persons behaviour, by looking at their past experience may not be helpful as the person may not remember the past events that might contribute to their behaviour. However the approach has got weakness. The behaviourist approach has been criticised for determining ones behaviour by using an experiment of animals. This is a weakness as animals do not necessarily behave as humans. Due to this it is hard to say that the behaviourist approach has been successful in explaining how people behave as the finding of the experiment are hard to generalise.The other weakness of the behaviourist approach is that the approach does not focus on how the complexit y of the psyche contributed to learning. This approach has been criticised by the cognitive and the humanistic psychologists because it does not look at how the brain can be influential to determining a person’s behaviour (www. pages. 123-reg. co. uk). The strength of the psychodynamic approach is that this approach was able to provide an important insight into how a person’s past experiences can affect their adult personality.For example, the Freud’s theory on personality suggested that if a baby is weaned too early, according to the oral stage, there are chances that when the baby grows up to an adult he/she is going to pessimistic or sarcastic. The other strength of the psychodynamic approach is that the approach has explained about defense mechanism that every individual can use. These defence mechanism arise naturally when a person feels that they are being threatened of their superego is on demand. For example, if a person is going through a hard time they can use denial as a defense mechanism as it can help the person to refuse to experience the pain.However the psychodynamic approach has got weaknesses. One of the weaknesses is that the approach is reductionist. Due to this it only relies on a basic set of structures that attempt to simplify a very complex picture. This is a weakness because there are other aspects that can influence ones behaviour for example genetics. Another weakness of the psychodynamic approach is that it can not be proved wrong. Any theory for it to be successful it should be able tested that it can be wrong; however the psychodynamic approach can not be tested. Freud view can not be tested if they are false.For example, Freud viewed that all men have repressed homosexual tendencies cannot be disproved. It is hard to find a man who has no repressed homosexual tendency, if a person could find any man who had no repressed homosexual tendency then it could be argued that they have them, it’s just they are so repressed they are not apparent. In other words, the prediction cannot be falsified. Overall, both of the approaches have similarities, differences, strengths and weaknesses. Despite the weakness both of the approaches have been successful in explain how each of its approach can determine how behaviour can be influenced.Aidan Sammons. (2007). The behaviourist approach: the basics. Available: http://www. psychlotron. org. uk/newResources/approaches/AS_AQB_approaches_BehaviourismBasics. pdf. Last accessed 04/07/2012. Brittan Barker. (2007). Glossary of Terms for the Experimental Analysis of Behavior. Available: http://www. psychology. uiowa. edu/faculty/wasserman/glossary/opcondition. html. Last accessed 04/07/2012. Children’s Hospital of Wisconsin. (2012). Autistic Disorder. Available: http://www. chw. org/display/PPF/DocID/22122/router. asp . Last accessed 05/07/2012. Holah. (2010). Cognitive Psychology. Available: http://www. olah. co. uk/study-area. php? slug=cognitive. Last accessed 05/07/2012. Learning-Theories. com.. (2012). Social Learning Theory (Bandura). Available: http://www. learning-theories. com/social-learning-theory-bandura. html. Last accessed 04/07/2012. Liz Thomas . (2007). Fitness queen Davina McCall tops DVD charts again . Available: http://www. dailymail. co. uk/tvshowbiz/article-2082943/Fitness-queen-Davina-McCall-tops-DVD-charts-again. html. Last accessed 04/07/2012. Niu. (2007). Classical Conditioning. Available: http://www3. niu. edu/acad/psych/Millis/History/2003/ClassicalConditioning. tm. Last accessed 04/07/2012. Psychology Perspectives. (2007). Psychology Perspectives. Available: http://www. simplypsychology. org/perspective. html. Last accessed 05/07/2012. Saul McLeod. (2007). Sensorimotor Stage. Available: http://www. simplypsychology. org/sensorimotor. html. Last accessed 05/07/2012. Science Daily. (2007). Circadian rhythm. Available: http://www. sciencedaily. com/articles/c/circadian_rhythm. htm. Last accessed 04/07/ 2012. http://pages. 123-reg. co. uk/psyuk-631767/advancedsuccessltd/id23. html http://www. ngfl-cymru. org. uk/vtc/ngfl/psychology/psy_1. doc