Monday, September 30, 2019

Betrayal: Rhetoric and Ethos Julius Caesar

To get credit for the collaboration activity, Betrayal 01, 02, 04, 05, and 06: A. ) Submit this attachment in A Collaboration Process. Then copy and paste the below information in the student comment area of A Collaboration Product and Betrayal 01, 04, and 05: 1. Date you attended the session. 2. At least 3 sentences explaining how Shakespeare’s story about Julius Caesar is different than what really (historically) happened in Caesar’s life. 3. Give examples of the three persuasive techniques from either Antony’s or Brutus’s speech. logos, pathos, and ethos) 4. Give an example of one traitor and one patriot with supporting examples from the play. 5. At least 3 sentences explaining what you did in the session so that someone who did not attend would have an understanding of it. 6. At least 3 sentences evaluating how well your group worked together to accomplish your task. B. ) Submit this in Betrayal 02: 1. Complete the Lesson 2 Quiz. For the essay question s, you may respond, â€Å"I attended the Betrayal Live Lesson on __________ (date). C. ) Schedule Betrayal 6 DBA as we still need to complete that on the phone. If you are an honors student, complete the honors assignment before the dba. D. ) If you are an honors student, complete lesson 8. Lesson 8 Assignment 1. ) Choose which character from â€Å"The Lay of the Were-Wolf† you would like to defend. 2. ) Analyze the story to find examples of logos, pathos, and ethos that support your character’s innocence. 3. ) Determine how to present your examples in a persuasive argument. 4. Write a three-paragraph â€Å"closing argument† for the trial that will persuade the jury that your character is not a monster. a. ) Paragraph #1 – logos b. ) Paragraph #2 – pathos c. ) Paragraph #3 – ethos Julius Caesar Recordings: a read-along for each act. Enjoy! Act I, Scenes i, ii, iii https://sas. elluminate. com/site/external/jwsdetect/playback. jnlp? psid=201 2-01-23. 1812. M. 18C7F05BEF4B1A91008CFEA56749A1. vcr&sid=679 Act II, Scenes i, ii, iii, iv https://sas. elluminate. com/site/external/jwsdetect/playback. jnlp? psid=2012-02-03. 107. M. 18C7F05BEF4B1A91008CFEA56749A1. vcr&sid=679 Act III, Scenes i, ii, iii https://sas. elluminate. com/p. jnlp? psid=2012-02-07. 0726. M. 18C7F05BEF4B1A91008CFEA56749A1. vcr&sid=679 Acts IV & V https://sas. elluminate. com/p. jnlp? psid=2012-02-07. 0817. M. 18C7F05BEF4B1A91008CFEA56749A1. vcr&sid=679 Brutus’s Funeral Speech: http://www. youtube. com/watch? v=ab68AjRMKmA Antony’s Funeral Speech: http://www. youtube. com/watch? v=Zd9BLib8448 Materials from Live Lesson and Play in original language: http://vimeo. com/41708712 Betrayal: Rhetoric and Ethos Julius Caesar To get credit for the collaboration activity, Betrayal 01, 02, 04, 05, and 06: A. ) Submit this attachment in A Collaboration Process. Then copy and paste the below information in the student comment area of A Collaboration Product and Betrayal 01, 04, and 05: 1. Date you attended the session. 2. At least 3 sentences explaining how Shakespeare’s story about Julius Caesar is different than what really (historically) happened in Caesar’s life. 3. Give examples of the three persuasive techniques from either Antony’s or Brutus’s speech. logos, pathos, and ethos) 4. Give an example of one traitor and one patriot with supporting examples from the play. 5. At least 3 sentences explaining what you did in the session so that someone who did not attend would have an understanding of it. 6. At least 3 sentences evaluating how well your group worked together to accomplish your task. B. ) Submit this in Betrayal 02: 1. Complete the Lesson 2 Quiz. For the essay question s, you may respond, â€Å"I attended the Betrayal Live Lesson on __________ (date). C. ) Schedule Betrayal 6 DBA as we still need to complete that on the phone. If you are an honors student, complete the honors assignment before the dba. D. ) If you are an honors student, complete lesson 8. Lesson 8 Assignment 1. ) Choose which character from â€Å"The Lay of the Were-Wolf† you would like to defend. 2. ) Analyze the story to find examples of logos, pathos, and ethos that support your character’s innocence. 3. ) Determine how to present your examples in a persuasive argument. 4. Write a three-paragraph â€Å"closing argument† for the trial that will persuade the jury that your character is not a monster. a. ) Paragraph #1 – logos b. ) Paragraph #2 – pathos c. ) Paragraph #3 – ethos Julius Caesar Recordings: a read-along for each act. Enjoy! Act I, Scenes i, ii, iii https://sas. elluminate. com/site/external/jwsdetect/playback. jnlp? psid=201 2-01-23. 1812. M. 18C7F05BEF4B1A91008CFEA56749A1. vcr&sid=679 Act II, Scenes i, ii, iii, iv https://sas. elluminate. com/site/external/jwsdetect/playback. jnlp? psid=2012-02-03. 107. M. 18C7F05BEF4B1A91008CFEA56749A1. vcr&sid=679 Act III, Scenes i, ii, iii https://sas. elluminate. com/p. jnlp? psid=2012-02-07. 0726. M. 18C7F05BEF4B1A91008CFEA56749A1. vcr&sid=679 Acts IV & V https://sas. elluminate. com/p. jnlp? psid=2012-02-07. 0817. M. 18C7F05BEF4B1A91008CFEA56749A1. vcr&sid=679 Brutus’s Funeral Speech: http://www. youtube. com/watch? v=ab68AjRMKmA Antony’s Funeral Speech: http://www. youtube. com/watch? v=Zd9BLib8448 Materials from Live Lesson and Play in original language: http://vimeo. com/41708712

Forrest Gump Analysis

Forrest Gump Watching Forrest Gump for the first time I feel that the movie has a little of everything in it, from action and war to love and romance. For one man to overcome so many hardships and live a life full of love and happiness it is inspiring. Each character had something that reached viewers. From Jenny to Lieutenant Dan they all had something that made them easy to connect with. Even the people that sat on the bench next to Forrest created interest; they listened and were in the story for us, but were not truly part of it.Forrest Gump could be referred to as stupid, but I believe that the way he tries to understand the world around him and make the best of everything is rather clever. When the film begins we start from Forrest’s childhood. We learn about the high expectations that his mother had for him. We see that he is lonely, and we see his growing love for Jenny. For a boy that is bullied so much and has so many obstacles in his life he loves deeply. Due to his mental disabilities, Forrest became the victim of academic discrimination, but as she will always be him mother fights for him to have the same opportunities as the other children.She completely believes in Forrest and wants him to be the best that he can be. During this stage of his life I thought of Erikson’s industry vs. inferiority concept. During that time children are supposed to work toward mastering knowledge and intellectual skills. (Santrock, 2011 p23) The negative possibility of not mastering those skills would be that children would feel incompetent and unproductive. As Forrest Gump grows he still maintains his mental disability, but his athletic abilities have started to make a difference in his life.He runs so fast that he gets asked to play football for the University of Alabama. Though he grows older he still has the innocence of a child. During his adolescence where most other people are experimenting with sex he seems almost upset by the idea. He loves Jenn y yet when she tries for sexual contact with him he looks hurt and confused by it. This stage in his life he would be going through Erikson’s identity vs. identity confusion. (Santrock, 2011 p 23) During this time individuals are trying to figure out who they re and what they are going to do in life. If the adolescent explores in a healthy way then they will form a positive identity; however, if they struggle and have a difficult time then it may result in continued identity confusion. Forrest was an active part of many important events including protests against desegregation, the Vietnam War, anti-war activism, Black Panther Party meetings, and the Ping Pong diplomacy period. Those important events should have made a difference to him, but he went through it all as if it didn’t really affect him.During the whole movie he seemed completely oblivious to the significance of everything that was going on around him and the part he played in those events. Forrest’s generally happy go lucky demeanor and unobservant nature contrasted harshly with Jenny. Jenny Curran as a child was Forrest Gump’s best friend and possibly his only friend. Jenny has a much harsher life at home than Forrest has. While Forrest has a loving mother that raises him Jenny has an abusive dad. Jenny spent a lot of time with Forrest as a child because she didn’t want to be alone.Jenny and Forrest were like â€Å"peas and carrots†. When they were young Jenny taught Forrest how to read, and Forrest shared his mellow, carefree attitude with her. When Jenny is young after Forrest comes over to her house and sees the way her father treats her they run into the fields trying to get as far away from her home as possible. Jenny falls down to the ground and prays to God to make her a bird so she can fly far away. There are many developmental consequences of abuse on children. Santrock, 2011 p 258) Some of the consequences of abuse and maltreatment in childhood a nd adolescence are poor emotional regulation, attachment problems, problems in peer relations, difficulty adapting to school and other psychological problems such as depression and delinquency. The abuse that Jenny sustained in her childhood caused problems throughout her life. As a young adult Jenny went to an all girls’ college while Forrest played football at the University of Alabama. This was the beginning of Forrest’s success and Jenny’s bad decisions.Jenny started messing around with boys and getting in trouble. Forrest rescued her from being with a guy, but Jenny could not let herself be close to Forrest even though her cared for her deeply. Her bad behavior caused her to be kicked out of school. Jenny decided that she wanted to become a famous singer, but somewhere along the way she ended up singing naked in a strip club. Again Forrest rescued her and again she was ungrateful and ended up leaving behind the one person in her life that cared about her mo st. The next time Jenny is seen she had been spending time with hippies at anti-war protests.Forrest tries to get Jenny out of another abusive relationship, but she doesn’t want to be saved and leaves Forrest again. When Jenny went through Erikson’s identity vs. identity confusion (Santrock, 2011 p 23) stage her past abuse caused her to make the wrong choices and left her in continued identity confusion. Each time we see Jenny in the movie she is into drugs and running with the wrong crowd. During the adult years, people who were abused as children often have a difficulty maintaining healthy adult relationships.According to Miller-Perrin, Perrin, Kocur (Santrock, 2011 p 258) those adults are at a higher risk for violent behavior toward other adults-especially dating partners and marital partners- as well as substance abuse , anxiety and depression. During New Year’s Eve 1972 Jenny contemplates suicide, at that point she has reached her very lowest and we see her change her mind and leave hopefully to change for the better. The rest of the movie is a rollercoaster of emotion for Jenny and Forrest. Forrest wants nothing more than to be with the only woman other than his mother that he has loved his entire life.When Jenny and Forrest are finally together Forrest thought they were going to be together forever, and Jenny ran away again. Her past abuse leaves her afraid of both trusting Forrest to love her and allowing herself to feel worthy of being loved. By the end of the movie, Jenny has finally found herself. After Forrest spent his time after her leaving running for 3 years, 2 months, 14 days, and 16 hours she finally wants to see him. From their night together she had gotten pregnant and had a son that she named Forrest.Perhaps it was having a child that helped settle Jenny into adulthood or maybe she had just finally come to terms with the lasting effects of abuse, but she decided to marry Forrest and live with him for her remaining time alive. In that time that she is a wife and mother she looks more at peace than ever. It took Jenny her whole life to come to terms with the abuse she endured as a child and the abuse she subjected herself to as an adult. She experienced an abusive father, played out jobs, abusive boyfriends and grabby customers, drugs and thoughts of suicide before she could let herself be loved by Forrest.During Forrest Gump’s time in the military he meets Lt. Dan Taylor. Though Lt. Dan is more of a peripheral character, his struggles fit well with the movie. Lieutenant Dan Taylor was born into a family with the proud military tradition that someone in his family had died in every American war. He was sent to Vietnam during the Vietnam War and assigned to the fourth platoon where he met Bubba and Forrest. While serving in Vietnam is was evident that he was paranoid of snipers and surprise attacks in general. When his platoon encountered an ambush he called for a Napalm drop.During the ambus h he was hit in the legs, and was certain that his time had come to fulfill the family legacy of dying in that war. However, Forrest Gump in his search for his fallen best friend Bubba comes across Lt. Dan and carries him and many other men to safety. Lt. Dan is sent to a field hospital and his legs are amputated. Forrest Gump is brought to the same hospital and Lt. Dan confronts Forrest about saving him. He is very upset that he didn’t get to die like other men in the family and feels that his destiny has been ruined. At this time Lt.Dan is coming to terms with his possible selves (Santrock, 2011 p 602). As he is recovering from his double amputation he has to consider the life that he had, the death he thought he was going to have, and the life he is left as an amputee. Lt. Dan is eventually discharged due to his handicap and he ends up in New York City. He spends his time after being discharged living in New York, possibly off the government or programs for injured veteran s. He lives in a trashy motel room and drinks far too much. He looks like he has been living a hard life since his time in the military.On New Year’s Eve he meets up with Forrest again and even though he still has not come to terms with Forrest saving his life, he treats Forrest like a friend. He defends Forrest from the women he had over and promises Forrest to be his first mate if he ever becomes the captain of a shrimping boat. When Forrest actually buys a shrimping boat Lt. Dan does become the first mate. Lt. Dan guides Forrest to where he believes there will be shrimp which leads to many failures. While out fishing Lt. Dan and Forrest endure Hurricane Carmen. Lt.Dan is at the highest point that the boat has to offer yelling and challenging God. At this point Lt. Dan seems to come to terms with the life he has ben dealt. Lt. Dan looks more positively on life after this point and even thanks Forrest for saving his life. The hurricane destroyed the entire fleet of shrimping boats in Bayou La Batre, except for the Jenny. As a result, Forrest Gump’s shrimping business takes off. Lt. Dan invests the already high profits of the Bubba Gump Shrimp Company into a new computer company, Apple Computers, making both Forrest Gump and himself very wealthy.With his new found wealth Lt. Dan Taylor is able to afford custom made prosthetic legs which give him the ability to walk again. Lt. Dan also faces Erikson’s identity vs. identity confusion (Santrock, 2011 p 23) during his life several times. When he has to come to terms with who he thought he was going to be he struggles with his identity then again when he has to live as an amputee and once more when he gets new legs. After all he had to go through in his adulthood he finally meets and marries Susan, his Korean wife. Another peripheral character is Pvt. Benjamin Buford ‘Bubba' Blue.When Forrest first gets on the bus for the military he faces the same problems as an adult that he did as a ch ild, nobody wanted to sit with him. Walking between the rows of seats looking for a friendly face he found Bubba. Bubba appeared to have many of the same problems that Forrest did. Bubba possibly faced issues with his ethnic identity (Santrock, 2011 p 385) as he was given the name Bubba just like one of those redneck boys. While serving in the U. S. Army Bubba and Forrest become close friends. Bubba knows everything there is to know about shrimp, Forrest and Bubba make a deal to start their own shrimp business one day.However, Bubba never makes it back to America alive. After some time, Forrest finally goes to Bayou La Batre, where Bubba’s family lives. Forrest buys a shrimp boat to start the Bubba Gump Shrimp Company. The Bubba Gump Shrimp Company later earned a spot in Fortune magazine, and Forrest sent a check with Bubba’s earnings to Bubba’s mother. This film dealt a lot with death and accepting death as a part of life. Robert Kastenbaum’s death syste m comes in to play several times during this movie. Forrest has to go through the death of several people he cares about.First he endured Bubba’s death whom he had planned a future and had become close friends. Then he survived the death of his mother. She was the only person in his entire life that he could always count on. Just before her death Forrest’s mother tells him one last time how proud of him she is and reminds him the â€Å"life is like a box of chocolates, you never know what you’re going to get†, she says that it was her destiny to raise Forrest. She was always there for him, and rooting for him, and telling him that he could be whatever he wanted to be.Her death was a tough thing to work through and for a time he completely left the boat and company to Lt. Dan and stayed at his mother’s home, taking care of things and grieving. Then eventually he had to endure the death of Jenny. He had loved Jenny his whole life then it seemed almos t as soon as they were finally together she had died. Forrest’s emotions for Jenny come out at her grave, and while there he leaves her a letter written by Forrest Jr. As the film closes Forrest Jr is at the bus stop and we are reminded of Forrest’s first bus ride and how far he has come since his days of being bullied.The feather that was in the beginning is at the end as well symbolizing destiny. Forrest himself says â€Å"I don’t know if we each have a destiny, or if we’re all just floating around accidental-like on a breeze, I think maybe it’s both. Maybe both is happening at the same time. † Forrest couldn’t have put it into better words. During his story we see several characters and watch their life unfold. We know that Lt. Dan had his own ideas for his destiny then his life turned out completely different. Jenny never had a clear path for her destiny, and Forrest only ever wanted to love and be loved by Jenny.

Saturday, September 28, 2019

Sex/Gender and Personal Care Products

Sex/Gender and Personal Care Products For this application paper, I chose to write about personal care products as they relate to sex and gender. I chose this topic because I think that separate personal care products for men and women are, for the most part, ridiculous, and I also wanted to see what sort of differences there were between the two genders’ answers to the questions. The people I had complete the survey were around the same age, which could have affected the results, but I found that women used about 4-6 more products than the men, on average.However, the women had a significantly higher proportion of products used to maintain appearance. One of the men reported that he did not use any products only to improve appearance, while all of the women listed at least 3 products for appearance purposes only. I found the most interesting responses on the question that asked which 5 products the person would choose if they could only use 5 products for an entire week. All of the men included toothpaste, shampoo, soap/bodywash, and deodorant.One of the three men included hair gel, but he was the only man who included anything in the list of 5 items that was exclusively for appearance purposes. On the contrary, all of the women included body lotion and body soap, but one woman wrote that she would choose mascara and lip balm and not toothpaste. An interesting observation that I made was that the men had trouble understanding the difference between which products were for good health/hygiene and which were for appearance.None of the women asked me questions about those two questions on the survey, but all of the men did. While all of the women assumed that the two categories were mutually exclusive, none of the men did, and answered the two questions with very similar numbers (for example, the health/hygiene proportion would be 9/10, and appearance proportion would be 10/10). The women had more even proportions, with about 1:3 to 1:1 appearance:hygiene ratio. My findings mostly support society’s views on gender differences, that the genders are very different and should be separated distinctly.With personal care products, society is conflating sex and gender. People claim that it’s â€Å"natural† for people to use products designed for their gender. However, sex is biological, but gender is socially constructed. Therefore, the personal care product companies are catering to social constructions. It is obvious that they are more concerned with social constructions than biological differences with a quick glance strolling down the aisles at a pharmacy. Products for men, for example, Dove Men + Care, use colors like gray and blue.Dove products targeted at women feature shades of pink and fruity scents. While gray and blue are associated with masculinity and pink with femininity, these are not inborn, biological differences. They are socially constructed ideas about what should be associated with each gender. With the weak and easily disproved argument that personal care products are rooted in biological differences tossed aside, it is easy to see many issues with gendering personal care products.First of all, women have many more personal care products than men. With the exception of feminine hygiene products like tampons and sanitary pads, women and men, for the sake of hygiene, have very similar personal care product needs. Both use soap, shampoo, toothpaste, deodorant, and maybe lotion and shaving products. However, while men’s products are often streamlined, like 2-in-1, women have a whole array of products targeted specifically toward them that do not have a male equivalent.For example, anti-aging cream, makeup, eye cream, and other products designed to improve appearance are targeted at women, which sends the message that women need to worry about their appearances much more than men. Furthermore, not only are women encouraged to use more products than men, they are often more expensive. I examined the differences between men’s and women’s deodorants on drugstore. com and found that 2. 6 oz of Degree for Women deodorant/antiperspirant is $4. 99, while 2. 7 oz of Degree for Men is $3. 49. Not only do women have more products targeted at them, they are more expensive.Another thing I noticed in the deodorant section was that while most men’s deodorants come in both an antiperspirant and non-antiperspirant variety, almost all of the women’s deodorants contained antiperspirants. This sends a message that sweating, a basic and necessary biological function that all humans do, is okay for men, but not for women. The findings were mostly what I expected. I did expect the women to report using a higher number of personal care products, but I also know that they most likely forgot about some things that they use on a regular basis; however, the men could have also forgotten some things that they use.

Friday, September 27, 2019

Business Policy and Strategic Management Research Paper

Business Policy and Strategic Management - Research Paper Example The author of the paper states that growth is the way of life. Almost all organizations plan to expand. This is why expansion strategies are the most popular corporate strategies. Companies aim for sustainable growth. A growing economy, burgeoning markets, customers seeking new ways of need satisfaction, and emerging technologies offer ample opportunities for companies to seek expansion. Apart from competitive strategies, competition could coexist with cooperation. Corporate strategies could take into account the possibility of mutual cooperation with competitors while competing with them at the same time so that the market potential could expand. Cooperative strategies could be of the following types: 1. Mergers 2. Takeovers (or Acquisitions). 3. Joint Ventures & 4. Strategic Alliances.  Merger and takeover (or acquisition) strategies essentially involve the external approach to expansion. Basically two, or occasionally more than two, entities are involved. There is not much diffe rence in the three terms used for such types of strategies and they are frequently used synonymously. But a subtle distinction can be made. While mergers take place when the objectives of the buyer firm and the seller firm are matched to a large extent, takeover or acquisitions usually are based on the strong motivation of the buyer firm to acquire. The takeover is a common way for acquisition and maybe defining as "the attempt (often spring as a surprise) of one firm to acquire ownership or control over another firm against the wishes of the later management (and perhaps some of its stockholders). Joint ventures occur when an independent firm is created by at least two firms. In an era of globalization, joint ventures have proved to be invaluable strategies for companies looking for expansion opportunities globally. Strategic alliances are partnerships between firms' whereby their resources, capabilities, and core competencies are combined to pursue mutual interests to develop, man ufacture or distribute goods or services. Organizations follow the growth paths can be pursued via external expansion and mergers are the most popular measures. In this case (Merger) the business does not create the productive facilities itself, but purchases existing production. A merger is a situation in which, as a result of the mutual agreement two firms decide to bring together their business operations. A merger is distinct from a take over in so far as a takeover involves one firm bidding for another's shares. One firm thereby acquires another. A merger implies that managers through negotiation have reached an agreement acceptable to both sides. Mergers provide a much quicker means to growth than internal expansion. Not only does the firm acquire new capacity, but also it acquires additional consumer demand. Building up this level of consumer demand by internal expansion might have taken a considerable length of time.  

Thursday, September 26, 2019

Patriarchal Society and Neo-patriarchy Essay Example | Topics and Well Written Essays - 1000 words

Patriarchal Society and Neo-patriarchy - Essay Example An example of a patriarchal society and family system is that of the Muslim societies in Arab countries (Sharabi, 1988). Their society is "male dominated, male identified, and male centred." Neo-patriarchy is a modernized form of patriarchy but not modernity (Sharabi, 1992; Tamadonfar, 1994). Sharabi demonstrates this as exemplified by the Arab world. by showing how authentic change was blocked and distorted forms and practices subsequently came to dominate all aspects of social existence and activity--among them militant religious fundamentalism, an ideology symptomatic of neo-patriarchal culture. Elhum Haghighat (2005) says a neo-patriarchal society is a "modernized" patriarchal society going through rapid economic development and modernization as in many oil-producing countries since the mid-1950s. As explained by Sharabi (1988), the process of modernization is a uniquely European phenomenon. Accordingly, only Western societies experienced modernization in a "pure" sense because it happened without interference from other nations. Today's developing countries would not follow the footsteps of Western nations because of their dependent political and economic position and their cultural differences (Sharabi, 1988; Haghighat, 2005). Canada. Canada. The concept of neo-patriarchy greatly helps to understand the case of Canada. Canada is multicultural and therefore may be considered highly neo-patriarchal. In Sharabi's (1988) model, the patriarchy in Canada is cultural in social structure. Understandably, there are dominant and minority groups, as well as contending cultures and religions. Ziba Mir-Hosseini (2005) mentioned Canada as a place where Muslims live as a minority. A spate of media stories about multiculturalism in Canada is nothing new (Fahlman, 1994). During one of their recent elections, there was controversy as to whether multiculturalism should be an "official" government policy with funds attached to encourage minority and ethnic groups. That the policy leads to a fragmented society of too many identities as in Indo-Canadian, British Canadian, and such like was felt by most (Fahlman, 1994). Many argue that if a group wants to keep their cultural traditions, all taxpayers should not fund these, as each group should fund their own activities (Fahlman, 1994) In Europe, Canada is ranked as one of the countries with secular government ranking (Haghighat, 2005). This means the government promotes neither religion nor irreligion. There is hostility based on the perception that "special groups" are getting not only privileges but preferred treatment in Canada. For example, the Ontario employment equity policy has created negative feelings among "older" Canadians towards new minorities (Fahlman, 1994). One look at the National Anti-Racism Council of Canada (NAARC) website ("Canada," 2007) is very much informing on Canada and its conditions. For example, it is inferred that there is racial discrimination in that country. The United Nations is deemed to have required the Canadian Government to eliminate all forms of racial discrimination as shown in its shadow report of July 2004. The report, covering a wide range of issues including immigration, employment and human rights, presents a community perspective on the status of compliance with the Convention by the Canadian government.

Stephen Kings Novels Recreated into Films Movie Review

Stephen Kings Novels Recreated into Films - Movie Review Example The story of Dr Louis Creed (Midkiff) and his efforts to revive his three-year-old son (Hughes), killed by one of the giant trucks that thunder past their new Maine home, is more like a sketchy outline than a finished work. No film about a scalpel-wielding three-year-old psycho zombie could be entirely devoid of shocks. But reams of tedious exposition, about a children's pet 'sematary' and the magical resurrecting properties of an Indian burial ground, stretch patience and credulity to their limits, while Lambert fails to exploit the potential of the novel's best set pieces. The stories told in flashback by Creed's wife (Crosby) and their elderly neighbour (Gwynne) also seem hopelessly contrived, arresting the book's page-turning plot without adding emotional or psychological depth. If Pet Sematary was just a movie, then it might seem somehow acceptable: its plot, sort of a modern day zombie flick, is fairly creepy, and its premise is sufficiently horrific. Pet Sematary is not, however, a stand-alone film. It is, after all, a translation of a novel, and a great novel, at that. Though plotwise, the film stays fairly true to Stephen King's novel, it remains flat and unconvincing throughout. Unfortunately, this is a fate that has befallen most of King's work. Stephen King's novels don't, as a rule, translate well onto the silver screen. In much the same way that Church, having come back from the dead, seems to be missing something vital, so do King's books when they transition to movies. Perhaps this is because so much of the action in Stephen King's novels, so much of what is horrifying in them, happens to the characters internally. It is their thoughts, their fears, their histories and hopes, that make King's novels so successful. Films often have difficulty con veying this, and this is especially true of the horror genre. Pet Sematary is no exception to this rule. The novel that Pet Sematary is based on is probably one of the best, most terrifying horror novels ever written, and that only makes the movie even more disappointing. In his novel, Stephen King reveals the horror layer by layer, peeling away the sense of normality and safety little by little, until all that is left is sheer terror. Dreamcatcher Starring: Morgan Freeman, Thomas Jane, Director: Lawrence Kasdan, Release Date: March 2003, Genres: Horror, Suspense. The movie opens with four troubled guys in their late twenties, Dr. Henry Devlin (Thomas Jane), Joe 'Beaver' Clarendon (Jason Lee), Gary 'Jonesy' Jones (Damian Lewis) and Pete Moore (Timothy Olyphant), dealing with their gift. These lifelong buddies were given the ability to read minds and more by a mentally challenged guy named Douglas 'Duddits' Cavell (Donnie Wahlberg) when they were young. Now they use their magic to do such mundane things as finding the lost car keys of a real estate agent that one of them wants to date. But their talents will soon be put to the test. Meanwhile back in the snow-covered woods where the guys are going for their annual outing, trouble is brewing. The mad Colonel Abraham Kurtz (Morgan Freeman), ably assisted by

Wednesday, September 25, 2019

Reflective journal on Leadership Essay Example | Topics and Well Written Essays - 500 words

Reflective journal on Leadership - Essay Example In elucidating Vrooms expectancy theory, Pattanayak (2005: 183) posits that "Under conditions of free choice, an individual is motivated towards that activity which he is most capable of understanding and which he believes has the highest probability of leading him to his most preferred goal". Vroom in his theory supposed that human beings are inspired to achieve a particular purpose by anticipated standards or principles, coupled with the inference that the action geared towards the achievement of the purpose will result to the preferred principles (Pattanayak, 2005: 183). Vrooms theory has a number of components, namely valence, instrumentality, and expectancy. According to Pattanayak (2005: 183), valence denotes peoples partiality towards specific end results, and instrumentality denotes peoples acuity with regard to whether a guaranteed reward will essentially be awarded to them. Expectancy, on the other hand, represents the divergent anticipations among people in regards to thei r abilities. Vroom, as asserted by Pattanayak (2005: 183), is of the opinion that inspiration towards achievement of a specific purpose is dependent on valence, instrumentality, and expectancy. In reference to Vrooms expectancy theory, my productivity and performance in my workplace is directly related to my skills, experience, and abilities. An example of one of my skills include effective listening skills. Listening helps me effectively understand or comprehend my responsibilities in my workplace and as a result, I always achieve good results. There are also financial incentives given in my workplace. It is worth noting that these incentives act as motivators. Hard economic times in the contemporary world necessitates people to work harder in order to achieve better results, and as a consequence get better rewards. Additionally, my activities or actions are also motivated by the end results. For instance, recycling

Tuesday, September 24, 2019

Entrepreneurship Essay Example | Topics and Well Written Essays - 1750 words

Entrepreneurship - Essay Example Entrepreneurial Journey of Oleg Tinkov According to Paul Burns (2001), personal characteristics and traits, societal culture, antecedent influence and situational factors are the strongest influencers on entrepreneur (Burns, 2001). Thus, it is important to note that Oleg Tinkov’s journey towards becoming an entrepreneur started at his childhood itself due to his father’s influence. As he grew old, cycling became one of his favorite leisure activities. Entrepreneurial analysis with respect to personal traits and characteristics suggests that entrepreneurs possess similar characteristics to those of sportsmen. Therefore, it is implied that his passion for cycling also has led him forward in his journey towards entrepreneurship. As challenging moves for Oleg Tinkov during his start ups, situational factors played an important role too. The micro-environment factors were prevalent within the country such as that of changes in perception, mood and meaning of the societal com munities. Oleg Tinkov challenged the macro economic factors such as economic changes within the country and market structure. His challenge was initiated by his motive of grasping the first mover advantage in the market generated after the disintegration in the Soviet Union. He held extremely strong instinct of defeating any challenge and every time evolved as a winner and this trait has been activated upon him through his immense interest in cycling (Tinkov, 2006). Entrepreneurial Opportunity for Oleg Tinkov Oleg Tinkov is a constant seeker of business opportunities and it is his search for the best which has never allowed him to remain stiff to a single... This editing researches an entrepreneurial background of Oleg Tinkov, his entrepreneurial opportunities and its transformation into business, business strategies and decisions of Oleg Tinkov, challenges and remedial actions to those challenges by Oleg Tinkov, his entrepreneurial network and role of luck and fortune. From the overall analysis of entrepreneurial traits of Oleg Tinkov, it can be stated that there cannot be the most appropriate ingredient for the best entrepreneur blended with certain portion of characteristics and certain portion of luck or fortune. Conversely, it is a combination of various factors which can only be enhanced by the entrepreneur himself. The entrepreneurs, who realize the importance of the most appropriate factors, ultimately become successful. However, at the same time, the entrepreneurs can conduct an in-depth analysis of the situational factors for interpreting the entrepreneurial traits and strive towards adopting those traits. It has also been foun d out from the entrepreneurial analysis that people who are more indulged in challenging activities such as that of sports and hold strong notion of winning each of the game are more likely to become a successful entrepreneur. Above all these facts behind becoming a successful entrepreneur lay the capability of identifying opportunities in the market and grasping each of the opportunities. Change identification and adaptation to changed environment are undeniably the most important characteristics of an entrepreneur.

Monday, September 23, 2019

A literary analysis of The Red Masque of Death Research Paper

A literary analysis of The Red Masque of Death - Research Paper Example He also used gothic tales at times to raise questions about the cultural anxieties of his era†¦Ã¢â‚¬  (50). Similarly the Masque of Red Death is one of the master pieces of Poe’s works. This story depicts a tale of the lives of the aristocracy. In order to save his loyal and noble friends and their families from a fatal disease called Red Death Prince Prospero arranges for an estate where all his fellow aristocrats would be safe from the death and disease. Through this story Poe mocks the social hierarchy and its discrimination according to which the commoners should suffer all the decay and disease as stated in the story, â€Å"the external world could take care of itself† (106). Here the external world represents the commoners while the nobles are kept safe in the walls of the royal estate. Poe makes use of various stylistic and linguistic techniques in his short story to illustrate death which is the bitterest reality of life and tries to make his readers under stand that in the eyes of God and fate bloodlines hold no importance because the ultimate end of every human being is death. 2. Theme of Death The concept of death that Poe uses in the story itself represents plague. This plague can be perceived as the decaying and degeneration of human morals and ethical values, injustices of the social hierarchy as well as the invincible side of human nature that leads them to believe that this life is permanent instead of a temporary habitat. The various techniques that Poe uses to demonstrate the theme of death includes color imagery, symbol of the seven rooms and the indirect amalgamation of the concepts of Christian mythology with over all destruction and degeneration that is usually associated with death. 2.1. Color Imagery As it is also apparent from the title the red color has a lot of symbolic significance in the prose as red is the color of passion and it is also associated with anger and wrath. In terms of the title the color red can als o be interpreted as the symbolic representation of wrath of Poe that is directed towards the absurd social strictures of the society and the mentality of human beings who believe that wealth and royal bloodlines gives them the testimony and asserts that misery and suffering cannot reach them because of their superior stature in the society. As Sova also suggests, â€Å"The story also contains elements of an allegory that represents death as being inseparable despite one’s social status and all human efforts to run from it and shut it out† (110). The gradual progression of the inhabitants of Prospero’s estate from one colored room to another at the party also holds a lot of symbolic significance. As Quinn and Rosenheim also state that, â€Å"The description of luxurious chambers of prince prospero leads, step by step, to flaming scarlet of the last room, which throws its weird light against the ebony blackness of the velvet curtains† (331). The contrast of red against black is very dark yet vibrant. According to Pennell’s understanding, â€Å"†¦decorated in black the final room glows in red the two colors associated with passion and death† (55). Another interpretation of this contrasting pairing of the two colors can also be that it is Poe’s style of mocking his fellow beings according to which black symbolizes the monotonous life and ignorance of the elite class and figuratively the eminent red color reiterates a death knell or an

Sunday, September 22, 2019

Ethnic Challenge Essay Example for Free

Ethnic Challenge Essay The article, â€Å"Ethnic Challenge† by Hollie Shaw discussed about marketing to ethnic groups in Canada. Shaw stated that understanding ethnic groups’ culture, beliefs, and realities is the key to successfully penetrate into their market. Companies, however, need to deliver their promises to these groups to boost sales and guarantee loyalty. Even though Canada adheres to multiculturalism, Shaw further noted that marketing to ethnic groups was never the case, as ads had only featured immigrants but had not directly targeted their market before. Today, however, companies like Shoppers Drug Mart Corp. Costco Wholesale Canada Ltd. , Hudson Bay Co. , and Wal-Mart Canada Corp. , uses cultural marketing. Moreover, Shaw pointed out the case of Sunsilk, a famous shampoo brand in South Asia, which reworked its proposed ad after research found that its ad featuring a gay male hairdresser and his female client and confidante will not be effective, as South Asian women do not have this kind of relationship with their hairdressers. In conclusion, Shaw stated that ethnic marketing will become more important in the coming years as more and more immigrants are finding home in Canada. Shaw’s â€Å"Ethnic Challenge† is related to the course material in that the latter justifies the contentions discussed in the former. Shaw began the article by saying that before, big companies lacked the efforts in â€Å"marketing to Canadian immigrants† (par. 1). The course material mentioned a world systems theory, which contends that there exists a â€Å"dominant core and a subordinate periphery in the contemporary world,† so people have the natural tendency to give more importance and attention to power and authority (p. 271). Consequently, based on the theory, big companies would give marketing priority to the dominant core that holds power and authority. In addition, the ethnic groups were previously excluded in marketing and advertising since the dominant culture perceived them as different â€Å"individuals and groups who do not conform to† societal expectations (p. 272). However, Shaw pointed out that marketing, which excludes immigrants and ethnic groups has been changing, as more businesses try to target them through their ads (pars. 2-3). This new focus of marketing can be credited to the rise of new philosophical approaches on humanism that questioned power and inequality. Furthermore, as human geographers increasingly become more aware of the diversity of people and places, cultures are not just viewed as a way of life but as a process that allows involvement from people who would construct their own landscapes (p. 270). Thus, the critical knowledge that theories have laid down affect how Canadian lifestyle and living has been, including marketing and advertising. In addition, the article, which discussed the shift of focus in marketing target and the course material, which mentioned the rise of critical definition of culture are very clear manifestations that Canada respects all ethnicities, as marketing now targets previously-ignored immigrants (par. 5) and as Canadian policies continue to actively encourage multiculturalism, respectively (p. 270). After reading through the course material and the article, I have come to realize the question we should ask ourselves as native Canadians: Do we want immigrants to be assimilated or acculturated into the Canadian society? Shaw’s article answered this by clearly discussing marketing and advertising that cater to ethnic cultures, tastes, beliefs, and realities – an acculturation which allows ethnic groups to become part of the larger Canadian society, but still retaining their distinctive identity. Personally, I do not want them to be completely assimilated to our society as they have native and original cultures that they naturally live by. Thus, ads should truthfully reflect and represent their realities if companies want to be successful in their businesses. Moreover, since there is no group or culture that stands above the others, if ads need to have different versions, in different languages, let them be. In this way, every group, ethnic or not, will feel that they are given attention and they have a place in the society. Paul Dalby’s â€Å"Truly an Epidemic: The Diabetes Epidemic,† revealed that diabetes, which was once considered a disease of the middle age, is becoming an â€Å"epidemic† in Ontario as Canadians, regardless of age groups, has been found to carry the disease. The article started with the case of Michael Jacoby, once an all-star athlete but now struggling with type 2 diabetes, â€Å"in which the pancreas does not produce sufficient insulin or the body does not properly use the insulin it makes. † Ninety percent of diabetics have this type of diabetes (par. 4). Dalby further revealed that there are 2. 25 million diabetics in Canada, one-third of which lives in Ontario – a 69 percent jump of the prevalence of the disease (pars. 7-8). Moreover, what is more alarming is that â€Å"children as young as 10 years old† have been found to have diabetes (par. 0). Thus, according to Dr. Diane Finegood, â€Å"a massive campaign to change bad habits† (par 22), which means a change from â€Å"supersized food† and â€Å"sedentary lifestyles† (par. 14) to proper eating and enough exercise (par. 23) is required. The course material is related to Dalby’s article in that the former can explain the details discussed in the latter. For instance, Dalby named diabetes an â€Å"epidemic,† which the course material defined as a temporary but widespread outbreak of a disease. Furthermore, the current statistics, which stated that one-third of the 2. 5 million diabetics come from Ontario, can be explained by the fact that the province, which is home to big cities, lives a very fast-paced life and holds more food choices. Thus, there is a greater opportunity to eat unhealthy foods. Moreover, Ontario, being an industrialized area, people tend to work longer hours and thus become less active to engage in exercise. However, according to the course material, the poor are less likely to be unhealthy. In Ontario, this does not seem to be the case, as those who acquire diabetes are â€Å"poor† in lifestyle choices – presence of a different culture and lack of exercise. Nevertheless, in other countries, the poor being unhealthy is justified because they are underfed. But in the case of Canada, most people are underfed of healthy foods. Furthermore, Dalby mentioned that a change in lifestyle of bad habits is needed to stop the rise of people suffering from diabetes and get Canadians to be healthy. The course material defined â€Å"being healthy† as living a healthy lifestyle; watching good eating habits, good physical and mental health, and strong immune system; not smoking or drinking; and regularly seeing a doctor for checkups. Moreover, Dalby’s revelation of diabetes being an epidemic is a cause of alarm for everyone because as the course material discussed, there is an interconnection between population, health, and environment, a study known as medical geography. With the unstoppable increase in Canada’s population, it cannot help but worry about the cause and spread of diabetes, the huge cost of healthcare systems to fight the epidemic, and the effects of a changing environment on the health of Canadians. The data that the course material provided enabled me to be worried about my own health, as well as the health of my fellow Canadians, particularly the children. Most of us are lured by fast food and unhealthy foodstuffs because of their unique and delicious tastes and availability; most also do not even do exercise due to lack of time and unwillingness. However, living in a fast-paced world is no excuse for us to disregard our health. If more, we should be primarily concerned because our population is not growing any smaller and our healthcare facilities are not getting any cheaper. Furthermore, we have to watch carefully our lifestyles against unhealthy food and habits because with the population boom, we do not know how our world can adequately provide for our basic needs for us to live happy, healthy, and satisfying lives. In addition, the innocent little ones, so fond of sweets and junk foods should be strictly guided and monitored to eat only healthy foods because without them, how can our nation function well in the future?

Saturday, September 21, 2019

Detection and Mitigation of DDOS Attack

Detection and Mitigation of DDOS Attack A Survey on Detection and Mitigation of Distributed Denial of Service attack in Named  Data Networking Sandesh Rai1*, Dr. Kalpana Sharma 2, and Dependra Dhakal 3 1Sikkim Manipal Institute of Technology, Student, Computer Science Engineering, Rangpo, Sikkim. 2Sikkim Manipal Institute of Technology, Head of Department, Professor, Computer Science Engineering, Rangpo, Sikkim 3Sikkim Manipal Institute of Technology, Assistant Professor, Computer Science Engineering, Rangpo ,Sikkim Abstract. There are various number of on-going research are taking place thats aims to provide next best Internet architecture although there are varieties of scope and maturity. This research is mainly based on to provide better security and better privacy as basic requirements of the protocol. Denial of Service Attacks which is a major issue in current Internet architecture also plays a critical issue in any new upcoming internet architecture and requires major focus for the same. The paper focus on the Interest flooding attack which is one the different type of Distributed Denial of service attack (DDOS).NDN incorporates better security features that detect and mitigate certain attack in the networks. But its resilience to the attacks has not analyzed yet. It presents the Distributed Denial of Service (DDOS) in Named Data Networking where an adversary sends out Interest packet with spoof names as an attacking packet to the NDN router. Keywords: NDN, DDOS, Content store, Pending Interest Table, Cache pollution. 1 Introduction Clearly internet has become a part of the day todays life of the people. Millions of people around the world use it to do various type of day todays task. It connect millions of people around the world via wired ,wireless, mobile or fixed computing devices and host huge amount of information(which is in the digital form) to be used by people. Internet provides information to be exchanged and has exponentially grown over time. The main ideas of the Todays internet architecture were developed in 70s.The telephone where conversation was point to point. The utilization of the Internet has dramatically changed since 70s and current internet has to adapt well with new usage model, new application and new services. To cope up with these changes, a variety number of research is taking place to design a new Internet architecture. Named Data Networking (NDN) [1] is one of the ongoing research .Its main objective is to developed a next best Internet architecture for upcoming generation. Its an instantiation of the of the Information Centric approach (ICN) or Content Centric approach (CCN) [1][2][3]. The main objective of the CCN is to provide more flexibility, security and scalability. CCN provide more security by securing the individual pieces of content rather than securing the connection. It provides more flexibility by using content name instead of using IP addresses. NDN is one of the instances of Information Centric Networking (ICN).NDN is based on the working principle of Content-Centric Networking (CCN) [3], where content instead of hosts are the main focus in the communications architecture. NDN is one of the research projects funded by the United State of National Science Foundation (NSF) which is under Future Internet Architecture (FIA) Program [3].NDN focus on the name rather than the location of th e host. In NDN every pieces of the data is digitally signed by its source producer. The signing in data allows the producer to be trusted and authenticated. Caching of the data is one of the core features of the NDN which helps to optimum use of network bandwidth use in the network . NDN provide an attractive architecture for the data distribution, anonymous communication. 1.1 Distributed Denial of service attack: As the years goes by, Distributed denial of service (DDOS) attack have become common and dangerous and it remains among the most critical threats on the current Internet. They are very difficult to detect and mitigate. Any new architecture should detect and mitigate DoS attack or at least minimum their effeteness. NDN appear to be efficient for the distribution of the content for the legitimate parties but unknown to malicious parties. Instead of using single host computer and single connection for the internet, the DDOS attack utilizes various number of host computers and various number of internet connections. The host computers for an attack are distributed across the whole wide world. The difference between a DOS attack VS a DDOS attack is that the victim host will be overloaded by thousands number of resources requests. In the attacks process, the adversary host node in the network sends request a huge number of zombie for the attack to take place. A malicious user attacks the n etwork host by requesting resources in a huge number in the form of Interest packets with spoofed names or without spoofed name. These huge numbers of Interest consumes the bandwidth of the network and exhaust a routers memory. This type of attack is known as Interest Flooding Attack (IFA) and this paper exclusively focus on this problem and their proposed countermeasures. 2 Overview of NDN Architecture Named data networking is an new and ongoing research architecture whose motivation is the architectural mixed of current internet architecture and its various usage. However the architecture design and principles are motivational derivation from the successes of todays Internet architecture [4]. The thin waist as can be seen in Figure 1 of hour glass architecture was the key service of the enormous growth of the internet by allowing both upside layer and bottom layer technologies to innovate independently. The NDN architecture contains the same hourglass shape as shown in Figure 1.2.1, but changes the thin waist by using data directly rather than its location. Figure 2.1 [4]: NDN Hourglass Architectures For communication, NDN provide two different packets i.e. Interest and Data packets. A user asks for resources by issuing Interest packet to the router in the network, which contains a name for those particular resources that identifies and verifies the desired data for the host. Different fields of a data packet [5]: 1.Signature: To verify data. 2. Key locator: To verify signature. 3. Publisher Public Key Digest: Public key hash of the producer. 4. Content name: Name of the requested data. 5 Selector: which include scope: and reserved. Figure 2.2 [6]: Packets in the NDN Architecture Any node having data that satisfies it, a Data packet is issued by the satisfied router [7], each router of NDN contains following different three data structures for Interest packet and Data packet forwarding. i) Content Store (CS): Recently used data are store. ii) Forward Information Base (FIB): Routing table of name of the data and it guides Interests toward data producers [8]. iii) Pending Interest Table (PIT): Store unsatisfied data request. It record the requested data name[8]. 3 Interest Flooding attacks By using the information and state of the Pending Interest Table (PIT), a routing of content by router is performed. In the PIT the name of requesting content is looked up for identifying its entry. The malicious node uses the state of the PIT to perform DDOS attacks. Basically there are three types of Interest Flooding attack [9]: a) Static: This type of attack attacks the infrastructure of the network and is limited and caching provides a build in solution. The interest is satisfied by the content of the cache [10]. b) Dynamically generated: Here the requested resources is dynamic and all the requested interest reaches to the content producer depleting the network bandwidth and state of the Pending Interest Table (PIT).Since the requested content is dynamic, in build cache does not serve as countermeasure for the attacks[10]. c) Non- existing: This report focus on this attack type where attacker involves non-satisfiable interest for a non-existing content in the network. These kinds of interest are not taken care by the router and are routed to the content producer depleting network bandwidth and router PIT states [11]. In all three types of attacks the malicious host uses a very large number of fake request, which are distributed in nature, An adversary host can use two features unique to NDN, namely CS and PIT, to perform DDoS attacks [12] in the router. We focus on attacks that overwhelm the PIT, which keeps record which are not fulfill by a router. The adversary host issues a large set of fake request, which are possibly distributed in nature, to generate a large number of Interest packets with spoofed name as shown in Figure 1.3.1 aiming to (1) overwhelm PIT table in routers, and (2) swamp the target content producers [13][14]. Figure 3.1 [15]: Example of Interest flooding attack Once the PIT is exceed its threshold, all incoming interests are dropped as there will no memory space available to create entries for new resourced interests. Since the names are spoofed, no Interest packets will be satisfied by the content [16]. These packets request will remain in the PIT for as much as possible, which will definitely exhaust the router memory and router resources on routers. This is the goal of Interest flooding attack. 4 Related Works Gasti et al. [17] analyzed the resilience of Named Data networking to the DDOS attacks. The paper discussed two different types of attacks with their effect and proposed two countermeasure mechanisms: a) Router Statistics and b) Push-back approaches. Afanasyev et al. [18] addressed the flooding attack. Their works explain the feasibility of the interest flooding attacks and the requirement of the effective solution. In terms of evaluation of the attack the proposed mitigation plan is complementary to Poseidon mitigation .Afanasyev et al. proposed three different mitigation algorithms: a) token bucket with per interface fairness b) satisfaction-based pushback c) satisfaction-based interest acceptance. All the three algorithms exploit their own state information to stop Interest flooding attacks. Satisfaction based pushback mechanism among three algorithms effectively detect and mitigate the attack and ensure all the interest form a legitimate user. Campagno et at. [19] Addressed the flooding attacks and proposed a mitigation algorithm called Poseidon. This algorithm is strictly used for non-existing type of interest flooding attacks. This mitigation algorithm is used for local and distributed interest flooding attacks. Dai et al. [20] addressed the flooding attacks and proposed a mitigation algorithm. The solution is based on the collaboration of the router and the content producer. Dai et al. proposed Interest traceback algorithm. The algorithm generates a spoof data packet to satisfy the interest in the PIT to trace the originators. According to the, the algorithm is not proactive, that overhead the network by sending out spoof data packet for the interest depleting the bandwidth of the network and creating traffic. The main shortcoming of this approach is that its take the long unsatisfied interest in the PIT as adversary interest and others as legit interest. So the router drops any long incoming interest packet which may be a legitimate interest. Choi et al. [21] addressed the overview of the Interest Flooding attacks for strictly non-existing content only on NDN. The paper tries to explain the effectiveness of the attack in the network and in quality of services. Karami et al. [22] addressed and provide a hybrid algorithm for the solution. The algorithm is proactive. There are two phase 1) detection 2) reaction. In detection phase the attack is detect using combination of multi objective evolutionary optimization and Radial basis function (Neural Network).In the reaction phases an adaptive mechanism for reaction is used to mitigate the attacks. 5 Analysis of survey The following table show the analysis of the all the paper and comparison related only on the project. The table is a comparison of different paper which is written by well-known publishers. The Analysis try to provide a possible research gap that is present on the paper. Table 1.Comparison of different NDN related paper SLno Title Publication Details Summary Research Gap 1 DoS DDoS in Named Data Networking P. Gasti, G. Tsudik, E. Uzun, and L. Zhang. DoS DDoS in named-data networking. Technical report, University of California. Discussed two types of attacks with their effects and potential countermeasures (Router Statistics and Push-back Mechanisms). 1. The paper only put a light on the attack and its possible countermeasures. 2 Interest flooding attack and countermeasures in Named Data Networking A. Afanasyev, P. Mahadevan, I. Moiseenko, E. Uzun, and L. Zhang. Interest flooding attack and countermeasures in Named Data Networking. In IFIP Networking. Proposed three mitigation algorithms. (token bucket with per-interface fairness, satisfaction-based Interest acceptance, and satisfaction-based pushback). 1.Improvements in token bucket with per-interface fairness, satisfaction-based Interest acceptance was less effective than satisfaction based pushback. 3 Poseidon: Mitigating interest flooding DDoS attacks in named data networking. A. Compagno, M. Conti, P. Gasti, and G. Tsudik, Poseidon: Mitigating interest flooding DDoS attacks in named data networking,Conference on Local Computer Networks. Proposed a framework, named Poseidon, for mitigation of local and distributed Interest flooding attack for non-existing contents 1.Fixed Threshold. 4 A hybrid multiobjective RBFPSO method for mitigating DoS attacks in named data networking. A. Karami and M. Guerrero-Zapata, A hybrid multiobjective RBFPSO method for mitigating DoS attacks in named data networking,Neurocomputing. Introduced an intelligent combination algorithm for the solution. 1.Investigating inter-domain DoS attacks and applying Hybrid approach. 5 Threat of DoS by interest flooding attack in content-centric networking S. Choi, K. Kim, S. Kim, and B.-H. Roh,:Threat of DoS by interest flooding attack in content-centric networking, in International Conference on Information Networking. Explain the difficulty for getting a solution flooding attacks in the PIT. 1.Analyzing DDoS attacks and their countermeasures. 6 Mitigate ddos attacks in ndn by interest traceback H. Dai, Y. Wang, J. Fan, and B. Liu. Mitigate ddos attacks in ndn by interest traceback. In NOMEN. Introduced a traceback solution where a node sends a spoof data packet to trace the host. 1. Only the request which is long is considered as malicious request. 6 Conclusion This report starts with a brief introduction of the CCN, NDN architecture and which is further followed by common and most critical attacks in todays internet. NDN mainly focuses on the data security, data privacy for the users. This report clearly represents only the starting step for mitigating DDOS attacks on the Pending Interest Table in the context of NDN. In this paper, we have explained DDOS attack and its various types namely, interest flooding attack. We have discussed current research regarding the attack, their existing solution, and try to analyze the given solution for detection and mitigation. The adversary tries to exploit interest forwarding rule to make certain interest for the packet with the never existing content name. We analyzed that the victim of the attack is host and PIT of the router. Thus a huge amount of Interest packet will reside on the PIT of the router which use and exhaust the memory of the router and computing resources of the router which will defin itely degrade the performance of the router. The NDN is the latest ongoing research topic and a new propose Internet architecture where limited research have been done for the mitigation and detection of the interest flooding attack thus there is a very much need for details analysis on the security before the architecture actually deployed. References V. Jacobson, M. Mosko, D. Smetters, and J. Garcia-Luna-Aceves.: Content- centric networking, Whitepaper, Palo Alto Research Center, pp. 2-4 (2007) V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard,.:Networking named content,in Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, ACM(2009) L. Zhang, D. Estrin, J. Burke, V. Jacobson, J. D. Thornton, D. K. Smetters, B. Zhang, G. Tsudik, D. Massey, C. Papadopoulos et al.: Named data networking (NDN) project, Relatorio Tecnico NDN-0001, Xerox Palo Alto Research Center-PARC( 2010) J. Pan, S. Paul, and R. Jain.: A survey of the research on future internet architectures, Communications Magazine, IEEE (2011) A. Hoque, S. O. Amin, A. Alyyan, B. Zhang, L. Zhang, and L. Wang.: NLSR: Named-data link state routing protocol,in Proceedings of the 3rd ACM SIGCOMM Workshop7Information-Centric Networking, ACM, pp. 15-20(2013) V. Jacobson, J. Burke, L. Zhang, B. Zhang, K. Claffy, D. Krioukov, C. Papadopoulos, L. Wang, E. Yeh, and P. Crowley.:Named data networking (NDN) project 2013- 2014 report,http://named-data.net, Annual Progress Report( 2014) C. Ghali, G. Tsudik, and E. Uzun.: Elements of trust in named-data networking, ACM SIGCOMM Computer Communication Review, ACM, vol. 44, no. 5, pp. 1-9 (2014) M. Aamir and S. M. A. Zaidi,.:Denial-of-service in content centric (named data) networking: A tutorial and state-of-the-art survey, Security and Communication Networks, vol. 8, no. 11, pp. 2037-2059 (2015) M. W ¨ahlisch, T. C. Schmidt, and M. Vahlenkamp.: Backscatter from the data plane threats to stability and security in information-centric networking. CoRR, abs/1205.4778 (2012) Content centric networking (CCNx) project. http://www.ccnx.org. A. Afanasyev, I. Moiseenko, and L. Zhang.: ndnSIM: NDN simulator for NS-3. Technical Report NDN-0005, 2012, University of California, Los Angeles(2012) Wang R, Jia Z, Ju L.: An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined Networking. InTrustcom/BigDataSE/ISPA, Vol. 1, pp. 310-317(2013) Kumar, K., Joshi, R.C. and Singh, K..: A distributed approach using entropy to detect DDoS attacks in ISP domain. In Signal Processing, Communications and Networking, ICSCN07. International Conference on pp. 331-337(2007) Feinstein L, Schnackenberg D, Balupari R, Kindred D. :Statistical approaches to DDoS attack detection and response. InDARPA Information Survivability Conference and Exposition, 2003. Proceedings Vol. 1, pp. 303-314(2003) Krishnan, R., Krishnaswamy, D. and Mcdysan, D.: Behavioral security threat detection strategies for data center switches and routers. In Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on pp. 82-87(2014) Zhang Y.:An adaptive flow counting method for anomaly detection in SDN. InProceedings of the ninth ACM conference on Emerging networking experiments and technologies pp. 25-30(2013) P. Gasti, G. Tsudik, E. Uzun, and L. Zhang, DoS and DDoS in named data networking, in 22nd International Conference on Computer Communications and Networks (ICCCN), pp. 1-7(2013) A. Afanasyev, P. Mahadevan, I. Moiseenko, E. Uzun, and L. Zhang.:Interest flooding attack and countermeasures in named data networking, in IFIP Networking Conference, pp. 1-9(2013) A. Compagno, M. Conti, P. Gasti, and G. Tsudik,Poseidon: Mitigating interest flooding DDoS attacks in named data networking,in 38th Conference on Local Computer Networks (LCN), IEEE, pp. 630- 638(2013) H. Dai, Y. Wang, J. Fan, and B. Liu, Mitigate DDoS attacks in NDN by interest traceback, in Conference on Computer Communications Workshops.(INFOCOM WKSHPS), IEEE,pp. 381- 386(2013) S. Choi, K. Kim, S. Kim, and B.-H. Roh, Threat of DoS by interest flooding attack in content-centric networking, in International Conference on Information Networking (ICOIN), pp. 315-319(2013) A. Karami and M. Guerrero-Zapata.: A hybrid multiobjective RBFPSO method for mitigating DoS attacks in named data networking, Neurocomputing, vol. 151, pp. 1262-1282(2015)

Friday, September 20, 2019

A student on parental effects on education

A student on parental effects on education This chapter gives an overall picture of the design of the study research tools used for the study, nature and selection of the sample, analysis and interpretation of the data in the light of other research studies. Academic achievement is one of the aims of education. A childs academic achievement is highly improved by parent-child relationship. It is also enforced by the nature of the school and teachers, students socio economic status, attitudes, motivation, personality factors, cognitive styles and intelligence which is indulged with the parents. The parent-child relationship is a good key factor for a child to have adjustment in environment and to perform well in academics also. The need for undertaking this research study is to replicate the parent-child relationship and how it enhances the childs adjustment ability. The friendly motivation given to the child enables him/her to empower concentration and boost them to explore in academics. The educational capacity of the student is judged by his achievement in the school. The academic performance in school subjects will lead them to choose the future course of life. In the high school level itself the basic things will be known by the students. This is an important stage not only for studying habits influencing the academic achievement, but also to bear on the whole personality of the school students. The investigator would like to know, Is there any relationship between parents behavior on the childs adjustment and academic achievement of the School students?. The knowledge of the relationship between these variables under study would help the parents and students to make the needed changes. Understanding the relationship between parents behaviour on the childs adjustment and his academic achievement will be of great importance in determining the interrelation between the variables under study. The results of the present study will be useful to understand the fact, whether parent child relationship has greater impact on the childs adjustment and academic outcome of the students. The findings can be utilized in the field of education to develop remedial measures, favorable relationship between the parent and the child which in turn will help the high school students. As a result healthier school community, society and the nation will be formed. The prime focus of this project was to examine developmental changes in parent-child relationships, and their associations with child adjustment related to academic achievement of them as students. 3.03 STATEMENT OF THE PROBLEM The present investigation entitled A study on the effects of parent child relationship on the childs adjustment and academic achievement has been undertaken keeping in view the importance of explicating the effect of parent-child relationship on childs adjustment and academic achievement of high school students. 3.04 MEANING OF THE PROBLEM In the process of learning, Motivation is the central factor to get a perfect result. Adjustment is the process by which a person tries to strike a balance between his requirements ((i.e.) needs, desires, drives urges) and varying life situations. Adjustment is a continuous process by which a person varies his behaviour to produce more harmonious relationship between himself and his environment. Parents involvement is critical in facilitating childrens development and achievement and in preventing and remedying educational and developmental problems. Substantial evidence exists to show that children whose parents are involved in their schooling have significantly increased their academic achievement and cognitive development. Academic achievement is an important predictor of adjustment and has been associated with several factors such as parenting styles and parental involvement The present study is intended to study the following objectives. 3.05 OBJECTIVES OF THE STUDY 1. To find out the effect of Parent-child relationship, Parent-child adjustment and Academic achievement of students. 2. To find out the significant difference in the mean scores of the a) Gender b) Medium c) Types of School d) Types of management e) Locality 3.06 HYPOTHESES: Based on the objectives of the present study the following hypotheses were framed. 1. Gender does not show significant difference between the father-childs relationships with regard to their different dimensions of Parent-child relationship. 2. Gender does not show significant difference between the mother-childs relationships with regard to their different dimension of Parent-childs relationship. 3. Gender does not show significant difference between the father-childs adjustments with regard to their different dimension of childs adjustment. 4. Gender does not show significant difference between the mother-childs adjustments with regard to their different dimension of child adjustment. 5. Gender does not show significant difference between the childs relationships with regard to Parent-childs relationship. 6. Gender does not signify difference between the childs adjustments with regard to Parent-childs adjustment. 7. Gender does not show significant difference between the Academic Achievement with relation to Parent-childs relationship and Parent-childs Adjustment. 8. Medium of instruction does not show significant difference between the father-child relationships with regard to their different dimension of Parent-childs relationship. 9. Medium of instruction does not show significant difference between the mother-childs relationships with regard to their different dimension of Parent-childs relationship. 10. Medium of instruction does not d show significant difference between the father childs adjustments with regard to their different dimension of Parent-childs adjustment. 11. Medium of instruction does not show significant difference between the mother childs adjustments with regard to their different dimension of Parent-childs adjustment. 12. Medium of instruction does not show significant difference between the childs relationships with regard to Parent-childs relationship. 13. Medium of instruction does not show significant difference between the childs adjustments with regard to Parent-childs adjustment. 14. Medium of instruction does not show significant difference between the Academic Achievement with relation to Parent-childs Adjustment and Parent-childs relationship. 15. Type of School does not show significant difference between the father-childs relationships with regard to dimension of protecting behaviour of Parent-childs relationship. 16. Type of School does not show significant difference between the father-childs relationships with regard to dimension of Symbolic Punishment Behaviour of Parent-childs relationship. 17. Type of School does not show significant difference between the father-childs relationships with regard to dimension of Rejecting Behaviour of Parent-childs relationship. 18. Type of School does not show significant difference between the father-childs relationships with regard to dimension of Object Punishment Behaviour of Parent-childs relationship. 19. Type of School does not show significant difference between the father-child relationships with regard to dimension of Demanding Behaviour of Parent-childs relationship. 20. Type of School does not show significant difference between the father-child relationships with regard to dimension of Indifferent Behaviour of Parent-childs relationship. 21. Type of School does not show significant difference between the father-child relationships with regard to dimension of Symbolic Reward Behaviour of Parent-childs relationship. 22. Type of School does not show significant difference between the father-child relationships with regard to dimension of Loving Behaviour of Parent-childs relationship. 23. Type of School does not show significant difference between the father-childs relationships with regard to dimension of Object Reward Behaviour of Parent-childs relationship. 24. Type of School does not show significant difference between the father-child relationships with regard to dimension of Neglecting Behaviour of Parent-childs relationship. 25. Type of School does not show significant difference between the father-childs relationships with regard to Parent-childs relationship. 26. Type of School does not show significant difference between the mother-childs relationships with regard to dimension of protecting behavior of Parent-childs relationship. 27. Type of School does not show significant difference between the mother-childs relationships with regard to dimension of Symbolic Punishment Behavior of Parent-childs relationship. 28. Type of School does not show significant difference between the mother-childs relationships with regard to dimension of Rejecting Behaviour of Parent-childs relationship. 29. Type of School does not show significant difference between the mother-childs relationships with regard to dimension of Object Punishment Behavior of Parent-childs relationship. 30. Type of School does not show significant difference between the mother-childs relationships with regard to dimension of Demanding Behaviour of Parent-childs relationship. 31. Type of School does not show significant difference between the mother-childs relationship with regard to dimension of Indifferent Behaviour of Parent-childs relationship. 32. Type of School does not show significant difference between the mother-childs relationships with regard to dimension of Symbolic Reward Behaviour of Parent-childs relationship. 33. Type of School does not show significant difference between the mother-childs relationships with regard to dimension of Loving Behaviour of Parent-childs relationship. 34. Type of School does not show significant difference between the mother-childs relationships with regard to dimension of Object Reward Behaviour of Parent-childs relationship. 35. Type of School does not show significant difference between the mother-childs relationships with regard to dimension of Neglecting Behaviour of Parent-childs relationship. 36. Type of School does not show significant difference between the mother-childs relationships with regard to Parent-childs relationship. 37. Type of school does not show significant relationships between the father-childs adjustments with regard to their different dimension of child adjustment. 38. Type of school does not show significant relationship between the mother-childs adjustments with regard to their different dimensions of Parent-childs adjustment. 39. Type of school does not show significant difference in child relationship with regard to Parent-childs relationship. 40. Type of Schools does not show significant difference between the child adjustments with regard to Parent-childs adjustment. 41. Type of Schools does not show significant relationship between the Academic Achievement with relation to Parent-childs relationship and Parent-childs Adjustment. 42. Type of Management does not show significant difference between the father-childs relationships with regard to dimension of protecting behavior of Parent-childs relationship. 43. Type of Management does not show significant difference between the father-childs relationship with regard to dimension of Symbolic Punishment Behaviour of Parent-childs relationship. 44. Type of Management does not show significant difference between the father-childs relationships with regard to dimension of Rejecting Behaviour of Parent-childs relationship. 45. Type of Management does not show significant difference between the father-childs relationships with regard to dimension of Object Punishment Behaviour of Parent-childs relationship. 46. Type of Management does not show significant difference between the father-childs relationships with regard to dimension of Demanding Behaviour of Parent-childs relationship. 47. Type of Management does not show significant difference between the father-childs relationships with regard to dimension of Indifferent Behaviour of Parent-childs relationship. 48. Type of Management does not show significant difference between the father-childs relationships with regard to dimension of Symbolic Reward Behaviour of Parent-childs relationship. 49. Type of Management does not show significant difference between the father-childs relationships with regard to dimension of Loving Behaviour of Parent-childs relationship. 50. Type of Management does not show significant difference between the father-childs relationships with regard to dimension of Object Reward Behavior of Parent-childs relationship. 51. Type of Management does not show significant difference between the father-childs relationships with regard to dimension of Neglecting Behaviour of Parent-childs relationship. 52. Type of Management does not show significant difference between the father-childs relationships with regard to Parent-childs relationship. 53. Type of Management does not show difference between the mother-childs relationships with regard to dimension of protecting behavior of Parent-childs relationship. 54. Type of Management does not show significant difference between the mother-child relationships with regard to dimension of Symbolic Punishment Behaviour of Parent-childs relationship. 55. Type of management does not show significant difference between the mother-childs relationships with regard to dimension of Rejecting Behaviour of Parent-childs relationship. 56. Type of Management does not show significant difference between the mother-childs relationships with regard to dimension of Object Punishment Behaviour of Parent-childs relationship. 57. Type of Management does not show significant difference between the mother-childs relationships with regard to dimension of Demanding Behaviour of Parent-childs relationship. 58. Type of Management does not show significant difference between the mother-childs relationships with regard to dimension of Indifferent Behaviour of Parent-childs relationship. 59. Type of Management does not show significant difference between the mother-childs relationships with regard to dimension of Symbolic Reward Behaviour of Parent-childs relationship. 60. Type of Management does not show significant difference between the mother-childs relationships with regard to dimension of Loving Behaviour of Parent-childs relationship. 61. Type of Management does not show significant difference between the mother-childs relationships with regard to dimension of Object Reward Behaviour of Parent-childs relationship. 62. Type of Management does not show significant difference between the mother-childs relationships with regard to dimension of Neglecting Behaviour of Parent-childs relationship. 63. Type of Management does not show significant difference between the mother-childs relationships with regard to Parent-childs relationship. 64. Type of Management does not show significant relationship between the father-childs adjustments with regard to their different dimension of child adjustment. 65. Type of Management does not show significant relationship between the mother-childs adjustments with regard to their different dimensions of Parent-childs adjustment. 66. Type of Management does not show significant difference in child relationship with regard to Parent-childs relationship. 67. Type of Management does not show significant difference between the child adjustments with regard to Parent-childs adjustment. 68. Type of Management does not show significant relationship between the Academic Achievement with related to Parent-childs relationship and Parent-childs Adjustment. 69. Locality does not show significant difference between the father-childs relationships with regard to their different dimension of Parent-childs relationship. 70. Locality does not show significant difference between the mother-childs relationships with regard to their different dimension of Parent-childs relationship. 71. Locality does not show significant difference between the father-childs adjustments with regard to their different dimension of child adjustment. 72. Locality does not show significant difference between the mother-childs adjustments with regard to their different dimension of child adjustment. 73. Locality does not show significant difference between the child relationships with regard to Parent-childs relationship. 74. Locality does not show significant difference between the child adjustments with regard to Parent-childs adjustment. 75. Locality does not show significant difference between the Academic Achievement with related to Parent-childs relationship and Parent-childs Adjustment. 76. There is no significant association between parent child relationship and parent childs adjustment. 77. There is no significant association between parent childs relationship and academic achievement. 78. There is no significant association between parent childs relationship and academic achievement. 79. There is no Correlation between Parent childs relationship and Parent childs adjustment. 80. There is no Correlation between Parent child relationship and Academic achievement. 81. There is no Correlation between Parent childs adjustment and Academic achievement of students. 3.07 METHOD OF STUDY Survey was made as per the present study among the Standard XII students in high schools of Chennai, Kanchipuram and Thiruvallur districts in Tamil Nadu to identify parent-child relationship, childs adjustment inventory, academic achievement and other related variables. 3.08 VARIABLES OF THE STUDY The variables selected for the present study are given below: 3.08.01 RESEARCH VARIABLES Parent-Child Relationship (independent variable) Childs Adjustment Inventory (dependent variable) Academic Achievement (dependent variable) The dimensions of parent-child relationship are given below: Protecting Symbolic Punishment Rejecting Object Punishment Demanding Indifferent Symbolic Reward Loving Object Reward Neglecting The dimensions of childs adjustment inventory are given below: Emotional Social Educational 3.08.02 OTHER VARIABLES Gender Medium Type of Schools Type of management of the schools Locality 3.09 TOOLS USED IN THE STUDY The investigator used the following tools in this study Parent child relationship scale (PCRS) Author: Dr.Nalini Rao (1989) Adjustment inventory for school students (AISS) Author: A.K.P.Sinha and R.P. Singh (1993) 3.09.01 PARENT-CHILD RELATIONSHIP, CHILDS ADJUSTMENT INVENTORY AND ACADEMIC ACHIEVEMENT To test the hypothesis framed for the present investigation, parent-child relationship scale and childs adjustment inventory has been used to collect information of the high school students. 3.09.02 Description The description of the parent childs relationship is given below: It is a 5 point scale. The tool contains 100 items categorized into 10 dimensions namely, protecting, symbolic punishment, rejecting, object punishment, demanding, indifferent, symbolic reward, loving, object reward and neglecting. Items of the scale are arranged in the same order as the dimensions and they rotate in a cycle through the scale. Each respondent score the tool for both Father and Mother separately. Items are common to both parents. The description of the childs adjustment inventory is given below: It is a 2 point scale. The tool contains 60 items categorized into three dimensions namely, emotional, social and educational. Items of the scale are arranged in the same order as the dimensions and they rotate in a cycle through the scale. 3.09.03 Administration Before administering the test, necessary instructions and directions were given to the students. No time limit is given to the students were asked to complete the inventory as early as possible. 3.09.04 Scoring Procedure Parent child relationship scale (PCRS) Respondents are asked to rate statements as to their own perception of their relationship with either father or mother on a five point scale ranging from Always to very rarely weighted 5, 4, 3, 2, and 1 on the scale points. The scale is scored separately for each of the parent thus every respondent obtains ten scores for father form and ten for mother form on the ten dimensions of the scale. Each sub-scale yields a score found by summing the scores of the ratings on each item of the sub-scale. Table 3.1 Dimensions, Item of Number of Parent Child Relationship Scale S.No. Dimensions Item Numbers 1 Protecting 1,11,21,31,41,51,61,71,81,91 2 Symbolic Punishment 2,12,22,32,42,52,62,72,82,92 3 Rejecting 3,13,23,33,43,53,63,73,83,93 4 Object Punishment 4,14,24,34,44,54,64,74,84,94 5 Demanding 5,15,25,35,45,55,65,75,85,95 6 Indifferent 6,16,26,36,46,56,66,76,86,96 7 Symbolic Reward 7,17,27,37,47,57,67,77,87,97 8 Loving 8,18,28,38,48,58,68,78,88,98 9 Object Reward 9,19,29,39,49,59,69,79,89,99 10 Neglecting 10,20,30,40,50,60,70,80,90,100 Adjustment inventory for school students (AISS) The questions were to be answered in Yes or No. The use of designer letters A, B and C corresponding to Emotional adjustment, Social adjustment and Educational adjustment enables the test user to discover readily questions relating to each measure. The total score indicates the general adjustment status. Table 3.2 Dimensions, Item of Number of Childs Adjustment Inventory S.No. Dimensions Item Numbers 1 Emotional 1,4,7,10,13,16,19,22,25,28,31,34,37,40,43,46,49,52,55,58 2 Social 2,5,8,11,14,17,20,23,26,29,32,35,38,41,44,47,50,53,56,59 3 Educational 3,6,9,12,15,18,21,24,27,30,33,36,39.42,45,48,51,54,57,60 3.10 PILOT STUDY As pilot study was conducted to determine the suitability of the tools used in the present investigation, Random samples of 240 students were selected for the pilot study comparing 80 from Government school, Government-Aided 80 and 80 from Private school, out of which 120 were boys and 120 girls and the reliability and validity were computed. 3.11 ESTABLISHING RELIABILITY AND VALIDITY: The reliability of the parent-child relationship was found out by correlation method and the obtained suitability co-efficient of 0.91 (N = 240) suggest that the parent-child relationship are valuable for using the standardized tools. Table 3.3 CORRELATION: S.No. Dimensions Father Mother Boys Girls Boys Girls 1 Protecting 2 Symbolic Punishment 3 Rejecting 4 Object Punishment 5 Demanding 6 Indifferent 7 Symbolic Reward 8 Loving 9 Object Reward 10 Neglecting 3.12 MAIN STUDY: The validated tool was used for the main study to collect the necessary data; the study was carried out in six schools in Chennai, Kanchipuram and Thiruvallur Districts in Tamil Nadu. In this investigation, the main aim is to study the effects of parent-child relationship on the childs adjustment and academic achievement of high school students. 3.13.01 SELECTION OF THE SAMPLE Random sampling technique has been adopted to choose the samples. Random samples of 1129 students from Standard IX were selected from Chennai, Kanchipuram and Thiruvallur Districts in Tamil Nadu. Table 3.4 Distribution of Sample S.No. Name of the School Government/ Aided/ Private Boys Girls Total 1 2 3 4 5 6 3.13.02 SAMPLE DISTRIBUTION: Table 3.5 TYPES OF SCHOOL BOYS GIRLS TOTAL GOVERNMENT AIDED PRIVATE TOTAL The investigator obtained necessary permission from the principals of the school of education, for collection of data. The willingness and co-operation of the teachers from those institutions was also sought to administer the parent-child relationship, childs adjustment inventory and academic achievement marks. Thus the necessary data were collected during the academic year 2008 2010 from 1129 students of high school covering the whole taluk of Chennai, Kanchipuram and Thiruvallur Districts in Tamil Nadu. 3.15 STATISTICAL TECHNIQUES: Suitable statistical techniques were used to interpret the data to draw out a more meaningful result in the present study in the following statistical measures were used. Descriptive (Mean, Standard Deviation) Differential Analysis (t-test) Relational Analysis (Correlation) Chi-Square 3.16 DELIMITATIONS: The study is confined to high school children (i.e) children between the age group of 13 to 15. The boundary of the sample area is restricted to the Taluk of Chennai, Kanchipuram and Thiruvallur Districts not covering the whole Tamil Nadu. The study is confined to the effects of parent- child relationship. The size of the sample of high school children is restricted to 1129 for the study. 3.17 CONCLUSION: Parent-child relationships undergo important transitions during adolescence, including a decrease in time spent with parents and a shift from dependency to mutual reciprocity. Parents play a significant role in supporting their child with providing secure attachment during these transitions. Adolescents benefit from parental support that encourages autonomy development yet ensures continued monitoring and emotional connectedness. Specific parenting skills that promote attachment security and autonomy development include psychological availability, warmth, active listening, Behaviour monitoring, limit setting, acceptance of individuality, and negotiation rules and responsibilities. Parental support during stressful periods of transition e.g., entry to high school) predicts positive adolescent adjustment Children who have experienced chaotic and inconsistent parenting do not have the experience of regulation to guide their own efforts, nor the confidence in the caregiver (and consequently in themselves) required for self-regulation. Additionally, children who have been pushed to independence at too early age because of their parents emotionally unavailable condition or too strict to tend or to adopt rigid regular strategies, which they attempt to use on their own. They do not learn to turn to parents or others to help them with regulation.

Thursday, September 19, 2019

Fight Club and Our Consumer Identity Essay -- Fight Club Essays

Fight Club and Our Consumer Identity The narrator in the film Fight Club is questioned about his devastated condo and declares, "That condo was my life, okay? I loved every stick of furniture in that place. That was not just a bunch of stuff that got destroyed, that was me!" This attitude of defining self-identity through a consumer culture has become institutionalized in the American society. The film Fight Club addresses the excessive consumerism as a sign of emotional emptiness and as a form of self-distinction. While the title suggests that it is just another clichà © action movie, it is not so shallow or narrowly focused. It instead provides the viewer with a provocative view on American society and it raises valid questions about the values embraced by that society. As the film American Beauty dubbed, "...look closer." The film begins with a nameless narrator (Edward Norton), a corporate pencil-pusher who suffers from insomnia. A doctor tells Norton to quit complaining and stop by a support group for prostate cancer victims. He begins to attend this and other support groups, which helps Norton regain his ability to sleep and act as an outlet to release his emotions through crying. However, when Marla Singer (Helen Bonhem-Carter), another "faker," begins attending his support groups purely for the entertainment value, Norton once again cannot sleep. This is the least of his cares because when he comes back from a business trip he finds that his condo has exploded. Fortunately, on his flight home he had met the charismatic Tyler Durden (Brad Pitt), who sells soap and has a very unconventional view of life. Tyler offers his "dilapidated house in a toxic waste part of town" to the narrator and he takes a room... ... Man Alive" contest. So should we all give up all our material possessions and join an urban terrorism cult? Of course not. Nor am I suggesting that either Tyler or Jack are role models that should be emulated. However, it does seem that some Americans care more about their riches defining their identity than life defining it. Tyler’s message opens the door to a variety of questions surrounding what defines you as a person. Is it defined by your Nike shirt and VW Jetta? Or is it your personality, relationships, and experiences? Do you find someone attractive purely for his or her looks and Porsche? Or do you love someone because they’re kind, have a great smile, and are insanely funny? Through the media and advertisement we are fed the consumer identity. Fight Club just shows another way of looking at self-identity that is aside from the mainstream.