Monday, September 30, 2019

Philosophy Of Education In Early Childhood Education Essay

My â€Å"Philosophy of Education† in Early Childhood Education Pre-primary institutions mark the beginning of schooling for early childhood on their critical stage of growth. Teachers of kindergarten are going on a mission to promote the whole-person development of the early childhood. During the teaching process, both experiences and theory are embraced in order to provide early childhood a good quality of education. â€Å"Cerebration is the foundation of action and theory is the controller of practice. Educator wants to achieve the improvements on education need to sure that the improvement can endure the time and trials. It needs to assist with philosophy of education† (Lin, 2011, P. 3). Teachers should have their own philosophy of education in order to achieve a good performance on education. For me, Topic: Write an essay to express your own â€Å"Philosophy of Education† in Early Childhood Education â€Å"encourage†, â€Å"children-centered curriculum† and â€Å"promote critical-thinking† are the three main philosophies. For â€Å"encourage†, it implies two indications. They are providing an encouraging environments and giving children encouragements. The definition of the former one is to ask teacher to decorate a pleasurable and welcoming environment previously. For example, to decorate the classroom with colorful flowers like a garden. It can make children relieve without any fear. My idea is supported by Reggio Emilia’s approach. He recognized environment is a teacher. In addition, teacher should reset the environment while celebrating festival or teaching new unit in order to allow children to learn under a harmonious environment and boost the learning efficiency. Alternatively, if the classroom is lacking of entertaining decoration, it will give children the feeling of solemn and create stress which make them can not behave well. The definition of the later one is to give children encouragements by appreciating what they have done. When children finish the task or answer question, say â€Å"good†, â€Å"well-done† to them. Even they get the wrong the answers, teacher can still give them a smile and ask them to try again. Children may feel confident after getting the encouragements from teacher. As children want to get teacher’s praise, they may present on their best way and will be more participative. As a result,children can learn peacefully during school days. Besides ‘encourage’, I promote curriculum to be children-centered. That is to teach what children prefer. â€Å"Children’s aspirations are their free will. That is inborn, but unluckily being destroyed† (Montessori, 1972, P. 56). This philosophy is affected by Reggio Emilia as well. He promoted child-centered which was to plane according to children’s interest. Children in early childhood are full of curiosity. As a teacher, we should satisfy their learning desires and plan curriculum based on their interests. Teacher may ask children what they want to know during circle time, or though daily contact and observation. By planning corresponding curriculum of what children  desired, it can prove that children will be interested on it. On the other hand, children may feel that their views are being understood and accepted. A better relationship will be built between children and teacher. Furthermore, I would also like to promote critical thinking in my philosophy. By implementing the 334 new academic structure on 2009, liberal study became an obligatory subject. It implies that Hong Kong highlights critical thinking on our next generation nowadays. There are no doubts that skills of reading, writing, listening and speaking are in the key learning area. However, it is reminded that critical thinking should not be absent in early childhood. â€Å"Children are initiative inborn, to develop children’s initiative is an important mission for teacher† (Lin, 2011, P. 165). For children in early childhood, teacher may arrange experiment for children to do and guide them to record down the result. Besides, small project can be hold frequently in order to give chances for children to learn from themselves. It is vital that teacher guide children to respond on certain unit but not by teaching though spoon-fed education blindly. â€Å"The major premise of the educational innovation is student, based on assisting everyone to achieve whole-person development though lifelong learning† (Kennedy, 2011, P. 53). The cultivation of critical thinking can help children on problem solving and learn more efficiently in their study. As result, achieve and support the goal of lifelong learning. I ASSENT MONTESSORI AND MY PHILOSOPHY ARE GREATLY A? ECTED BY IT. IT highlights the importance of providing environments and giving freedom to children. Well-prepared learning materials can attract children to learn, environment is the first  element to be drive learning. Moreover, I insist that freedom should be given to student for what they want to learn. Creativity and problem solving talent can cultivate in the meanwhile for children. Besides the above discussed philosophy, here are other thoughts about my opinion on ‘philosophy of education’. One of my secondary school teachers said that education isdistinct with other career as teachers are constructing â€Å"heart to heart† relationship with students. That is so true since teacher need to work with their sincere mind. For me, I do think that passion is one of the main elements of being a teacher. Without the passion, teacher may feel dull and fatigue of the job easily. Yet, a teacher work with enthusiasm may review and alter the measurement all the time depending on the needs of children. Teacher is having a role of educating and socializing children, what teacher did will have positive effect on children’s personal growth. To sum up, â€Å"encourage†, â€Å"children-centered curriculum† and â€Å"promote critical- thinking† are the elements for teaching in the early childhood education. Since children may cause psychological and emotion frustration on adapting a new  ecological environment from homes. So, teacher should provide encouraging environments and give children encouragements. Curriculum should be plan accord to the interests, developmental characteristics and learning needs of children but not the teacher. Also, critical thinking is necessary to be trained in children’s early age. References Lin, Y. T. (2011). Philosophy of Early Childhood Education TW: WU-NAN. Montessori, Maria. (1972). The Secret of Childhood NY: Ballantine Books. Kennedy K. J. (2011) Interpret the new trend of HK’s education HK: The Chinese University Press.

Sunday, September 29, 2019

Agriculture and Environment Essay

INTRODUCTION The word rag – means torn clothes. Due to some or other reasons, we have cultivated an environment, where some students believe that they are seniors and therefore they have the right to be respected. There is a false sense of hierarchy, particularly in Indian mindset. There are false notions of superiority. It is a fact that this kind of ego or hierarchy is destructive at all levels. A person today wont respect his teacher or his parents, if he/ she is tortured by that – so what to talk about ragging. Respect and human dignity is a fundamental right of every person. The false notions of hierarchy and self importance, creates a spirit of ragging – where some people force others to respect them and play at their desires. RAGGING IN INSTITUTIONS When a person joins a new institution, the person is already afraid, nervous and disturbed. In such a position, the person needs mental support – and this person is vulnerable at this stage – because he / she is in a stage of transition. He must get support from teachers and all concerned. I am against the use of senior or junior words – in an academic environment, where we wish to promote equality, fraternity – every one is equal – so this kind of spirit – the spirit of junior or senior will kill this equality which is required for true academic ambiance. True academic environment develops, where there is complete fraternity – and even teachers and directors treat others as mature human beings and give them due dignity. For cultivating mutual respect, mutual understanding – we need an environment – where people try to offer space to every person and extend a willing helping hand. True understanding develops out of close interaction and collective efforts in some focused directions. We can create a true group environment by cultivating a goal orientation and by forming groups –where people join together across different disciplines and different backgrounds. RAGGING TO AVOID FEAR Ragging is a very heinous practice – in the name of introduction. Introduction must be there- but it must start from the seniors. The junior shave to get love from seniors – then only we will find equality and fraternity. It is like giving love to a new bride in a home – where everyone surrounds the new bride and gives her due care – so that she feels at home. A new student also needs similar love and care and we can create a truly friendly entombment. The heads of the institutions must take positive initiatives for creating introduction between different students and must form voluntary groups. If the heads of the institutions – don’t care for all these – the students create evil practices like ragging – therefore truly the heads of the institutions are responsible for not cultivating the right environment of mutual collaboration, trust, and openness among the academic fraternity and for creating an ambiance for proper inductio n of a new student . SHOULD THERE BE RAGGING OR NOT a marginal level of introduction may be there – but it should not hurt any persons’ feelings. It is just for enjoyment it should be light. In a professional institution every person should be able to interact with each other it is possible if they introduce each other if they introduce each other they are able to interact better. If there is no ragging the interaction will be less ,ragging will foster interaction, seniors will be able to help their juniors the students will be able to help each others. It is a positive activity for promoting interaction among students it will create a family environment. But now a days in some institutions, anti-social elements are using ragging as a cheap activity. RAGGING A RIVALRY There are many ways to promote interaction. The word rag means use of force when you are using forcing a person to interact it will not work. Ragging must be completely eliminated from institutions it is destruction of a goodculture. It creates gap between seniors and juniors – people want equality and friendly environment – ragging only creates levels and gaps. A person will get depressed and frustrated if that person finds a very depressing environment like ragging. Some students don’t go to college in fear of their seniors. Ragging is completely against the juniors. The seniors force their juniors to do many things in the name of entertainment. When these juniors are able to get united, they start fighting with their seniors and there is rivalry. If we are talking about professional institutions, we should create a helping environment – there are many ways the students can interact with each others and help them in their development. If seniors want, th ey can help their juniors in their development – without ragging. RAGGING IN THE WRONG PATH Ragging is fear causing. The world is full of risks and fear and we have to get prepared to face the world. We have to face the real world. We have to face these challenges and we have to accept these challenges. We are saying that ragging must be removed – but how will you remove fear from the world. Ragging prepares you to face the real world. Introduction is different from ragging how will a junior remember a senior in positive terms if he remembers that he was tortured by the senior. If one want to learn professional manners he can use positive manners and friendly environment. We can tell them in a friendly environment , ragging is not useful for this purpose. It creates mental tensions. CONCLUSION Ragging has completely changed due to ragging there are cases of deaths even and so ragging must change , many institutions have completely banned ragging. AICTE and government have also banned ragging.

Saturday, September 28, 2019

Strategic Process for Recruiting Employees

Employee planning, recruiting, selecting, staffing and hiring is often a very difficult, timely and expensive task for any organization wishing to survive in today’s economy. In order for any organization to be successful they must attract and hire the most talented employees that fit the culture of the organization. It is the employees that make up an organization, so to be successful they must have a strict strategic process in place to recruit the right people for their organization. There are many strategies that organizations use to recruit employees which include, the pipeline approach, competitiveness, employment branding, sourcing, diversity and technology to name a few. (ere. net, 2008, 4) At Patton –Fuller Community Hospital many of these strategies are used effectively by their Human Resource department. The pipeline approach is a strategy that seems to be one of the most important recruiting strategies because the approach builds a steady stream of applicants, and allows for resumes and applications to come in, and get sorted into areas of expertise that may be needed down the road. It is very important for organizations to plan for a need that may develop as time goes on. It is also extremely important to note that in every industry there lies a competitor. Organizations must take note of what the competitor is doing at all times when it comes to recruitment strategies. This strategy is one that could be adopted by Patton-Fuller Community Hospital in the case of losing an employee; it is always a good idea to have back-ups that may be available or recruited from the competition. Employment branding is extremely important in the recruiting process for any organization, especially in the medical field. The employees are attracted to a hospital’s external image as being a leader in the health care profession. Potential employees need to believe in where they work, and hospitals and other organizations can achieve this by painting this external image of what the organization is all about, attracting many talented applicants. Sourcing is a critical ecruitment strategy for Patton-Fuller Community Hospital. â€Å"If you don’t utilize sources that attract a high percentage of top performers, it is unlikely you will make a quality hire. † (ere. net, 2008, 8) Patton-Fuller relies upon their top-performing employees’ referrals, and recruiters that can screen potential applicants to ensure that they don’t end up with a weak hire. Diversity is becoming extremely important in all industries, but especially in the hospital setting. By hiring diverse people, the needs of the diverse patients that come into the hospital can be treated by a diverse group of individuals with different talents for different positions. Diversity for Patton-Fuller will allow for this hospital to succeed, so it is very important that they take this into consideration for every hire. Technology is the key for many hospitals wishing to survive in today’s economy. With new technologies on the rise Patton-Fuller can continue to advertise their needs on the web, which will save the company time and money by increasing the hiring speed and improve screening. In the medical field it is extremely important to have the most talented, dedicated team of professionals on staff to care for the needs of patients. The employees must be trusted not only by the patients, but also the staff. In order to ensure that the top notch employees are chosen, Patten-Fuller Community Hospital will have to continue to use the recruiting strategies that they currently use and try others as the future of technology is constantly changing.

Friday, September 27, 2019

The Great Awakening Essay Example | Topics and Well Written Essays - 1000 words

The Great Awakening - Essay Example The appealing of the vast awakening to the Americans colonialist particularly none-elites was because they wanted to change some of the practices. The practices had been brought into the mindsets of some individuals with a view of bringing a change like never before. The non-elites had an objective towards the great awakening, but they lacked the necessary support from both the colonies and the old ministers. In my opinion, the legacies of the great revival did not contribute to the breaking with Great Britain. Instead, it strengthened the relationship through the influencing not only the British churches but also the Dutch and the Germans. The Great Awakening document addresses particular problems. The major challenge was the focus on the American identity. Due to the differences in the character and races, the rivalry in the colonies emerged. The rivalry being addressed is through the visitation of the preachers. The challenge of competition is not only a colonial issue but compris ed both the churches that dominated during colonial time. The document, on the other hand, delves into preserving of culture. Social norms and the courtesy of governing individual are set to be a priority despite the rivalry that is witnessed. Great Awakening had a positive effect on the social impact of the congregation. The new denominations considered both the fracturing of the existing policies and the new colonial rules. Great Awakening had effects on the entire unity of the nation.

Thursday, September 26, 2019

Investment Essay Example | Topics and Well Written Essays - 1000 words

Investment - Essay Example 99.03 98.98 98.65 Technology SPDR (ETF) 34.82 34.58 34.69 34.66 34.58 SPDR S&P 500 ETF Trust 180.94 178.94 179.73 179.75 180.53 GE 26.94 26.45 26.64 26.56 26.66 eBay 52.01 51.41 51.09 51.93 51.35 AAPL 560.02 567.9 565 566.32 551.23 Cimarex shrank in value from $98.65 per share on Monday to $95.95 by week’s end. But if the investment game had commenced at the recent low of $64.99 in June 28, capital gain would have been a very satisfying +47.6% before transaction charges and taxes. SPY (SPDR S&P 500 ETF Trust) was moribund that week as market sentiment held back the ETF to trade between $178.94 and $180.94. Hence, devoting the lion’s share of the training investment in SPY did little good at all as the stock closed the week a measly 0.2% up for the week. Nonetheless, its beta of 0.92 at last count suggested that the ETF is not as volatile as the market as a whole. Apple is a long-term hold, beloved of institutional buyers and pension fund managers. The closing price of $ 560.68 when the simulation game ended on Friday, Dec. 6, corresponded to a market cap of $503.871 billion. This despite founder Steve Jobs having passed away in late 2011, two years now, and no seriously new breakthrough products in the same timespan (Thomson Reuters 1). Chairman/CEO Tim Cook is not the visionary that Steve Jobs was. Even as he languished in his deathbed, the latter had engineered a long-term run-up in the stock price with the cash cow iPod line, energized the world with the launch of the iPhone, and brought down the moribund desktop PC industry with the iPad tablet PC. Anyone holding the stock in late 2004 (the aforementioned pension funds that are loathe to sell AAPL) would have ridden the dizzying rise of the stock from $11.36 in February 2004 to $560.02 (a 48-fold gain) on the... The paper tells that during the gaming period in question, Apple and eBay did in fact record the best capital gains of 1.6% and 1.3%, respectively. Apple was once again on a roll this week. It approves that Apple is a long-term hold, beloved of institutional buyers and pension fund managers. The closing price of $560.68 when the simulation game ended on Friday, Dec. 6, corresponded to a market cap of $503.871 billion. This despite founder Steve Jobs having passed away in late 2011, two years now, and no seriously new breakthrough products in the same timespan. According to the paper at the end of week, loading the portfolio with SPY. GE, eBay and Cimarex turned out to be too conservative and defensive a strategy. In retrospect, SPY was too cautious in approximating the performance of the S&P 500. Though ETF’s have much lower expense ratios, no investment minimums, are taxed less and grant option and short-selling opportunities, the lesson learned is that minimizing risk with diversification works but rewards the patient investor over a long bull market. On the other hand, AAPL contributed tremendously to portfolio gains because management was clearly bent on continuing its 18-month run of unleashing quarterly dividends as never before in the last ten years. The object lesson: the intrinsic value of a market leader that has had a two-generation love affair with its upscale markets beats ETF’s and industrials when market sentiment is mixed, as it has been since mid-2007, the start of the Great Recession.

Teaching versus Control a Parenting Challenge Article

Teaching versus Control a Parenting Challenge - Article Example sociology and education are some of the areas that have shown immense interest in parenting styles and child behavior and have come up with empirical reports, analysis, surveys and suggestions. Parental approaches and techniques help the child evolve into a person, and therefore are very critical in their developmental process. It guides their psychological, social behavior and attitudes (Skinner, Johnson & Snyder, 2005). According to these, teaching involves educating a child the difference between right and wrong, acceptable and unacceptable behaviors. A well-taught child knows how to control impulses and takes responsibility for his actions. Parents cannot teach children everything, but can always inculcate the sense of responsibility of one’s own actions and self-control (Barber, Stolz, & Olsen, 2005). Teaching plays a crucial role in child development during the 4-8 years of age. On the other hand, parental control aims more at placing boundaries and setting rules than explaining why and how the children can avoid unacceptable behavior, or what will be the consequences (Skinner, Johnson & Snyder, 2005). The children is not taken into consideration to a great extent as they are kept in the dark of the why’s, how’s, and what’s of it. They are punished if they violate the rules, as discipline is not possible, without teaching. However, this is only an aspect of control, as empirical research brings out multiple layers of meaning to the word ‘control’. For example, Grolnick (2005) being in control and controlling the behavior of a child can be different. To be in control of child’s behavior is to protect them from dangers and equally assure civil behavior. This might at times be restrictive and sometimes allowing autonomy, but under supervision. As a technical term, ‘control’ is more narrow and precise. It interferes with the human need to feel autonomous and competent. In this case, the children are bound without choices and the actions

Wednesday, September 25, 2019

Open Term Paper Example | Topics and Well Written Essays - 3750 words

Open - Term Paper Example Investors are always looking for strategies through which they can generate higher return on their investment whether that particular strategy falls within the domain of any particular theory or not. Through this paper a unique method of increasing the investor’s return is analyzed, i.e. by following the transaction pattern of a director of the corporation. The directors in corporations all around the globe are actively involved in insider trading of their shares, and being on a strategic position they are well aware of the future outlook of their company. It is a general notion that the directors of the company are able to generate profits by selling the shares of the company and this paper tries to provide empirical evidence for it. The paper has two primary objectives: (1) Whether directors are able to generate abnormal gain through insider trading of the shares, as suggested by various economists and financial analyst (based on American Stock Market) (2) Can individual and corporate shareholder can also earn good return by following in the footsteps of the directors. In the world of economics and finance, when it comes to financial malpractices, insider trading tops the list. Insider trading is one of the most notorious financial crimes being practiced by managers, directors and other employees all around the globe. Insider trading can be defined as the buying and selling of a security by an individual who has direct and reliable access to the non-public information about the security. Insider trading is not always considered as a malpractice or illegal and is subjective to the underlying intention to the transaction. The statement can be further elaborated by considering the fact that if the trader is reaping profits on the basis of such information which is not being public yet, then the insider trading transaction is illegal. In addition, insider trading does not always mean that buying and selling of security is taking place. Providing confidenti al information to a third party, in exchange of monetary or any other form of consideration, is also illegal. The practice of insider trading is not confined to Directors of any corporation but the practice also prevails among brokers and even the family members of the directors. Although, once the information is public, the inside transaction is not illegal as the parties involved does not derive any unfair advantage over the general public. Media has made the masses at general knowledgeable with the passage of time and they have also equipped themselves with the technicalities of insider trading especially after the cases of Enron and Martha Stewart. The Securities and Exchange Commission of USA has adopted the practice of enforcing strict and practical guidelines which distinguishes legal and illegal trading of the shares by the inside people. Insider trading is not a recent or a latest money making gimmick which has been exploited by the directors and managers to earn higher ret urn. The history of insider trading dates back to the great depression as well. The securities and exchange commission of the United State has made it compulsory for the key management personnel and other officers of the company. Insider trading creates impact on the share price of the corporation to which the transaction

Tuesday, September 24, 2019

Lockheed Martin vs Boeing Essay Example | Topics and Well Written Essays - 4250 words

Lockheed Martin vs Boeing - Essay Example Over the last few decades, the aviation industry has witnessed significant changes in its overall operating business environment. This change has resulted in creating both favorable as well as unfavorable circumstances. Nonetheless, these changes fundamentally impose challenges within an aviation industry to sustain the business efficiently by relying on the old business model (Office of Inspector General, 2012). At the same time, the current aviation industry can be regarded as highly competitive, high-technology and safety sensitive. Contextually, the effective human resource management (HRM) has emerged as one of the primary options among the airline companies in the aviation industry to establish their competitive advantages over their competitors. Due to the increasing customer awareness and expectation along with intense competition flourishing in the industry, the performance of an airline company is largely being determined by the efficiency and competencies of its human reso urces. Additionally, in order to survive in the global aviation industry, it is often being argued that a company must have skilled and dedicated employees who contribute their best for transforming the company’s mission and vision into reality. ... of human resource management (HRM) on the aviation industry and compares and contrasts the HRM practices of two major companies currently operating around the world which include Lockheed Martin and Boeing. Impact of Human Resource Management on the Aviation Industry Role of HRM in Aviation Industry Human resource management (HRM) is firmly related with the management of human assets within the internal context of an organization. The HRM deals with certain specific activities and practices that are being related with planning, developing, and retaining the most appropriate number of skilled and competent staffs within an organization which in turn facilitates in gaining competitive advantages and attaining the organization’s goals and objectives. Additionally, the role of HRM has dramatically expanded almost in all the sectors of business. Consequently, aviation industry is one where the dimensions of HRM are often being perceived as the crucial factors for attaining competit ive advantages in the highly competitive industry. Thus, the airline companies in the global aviation industry are primarily engaged in framing and implementing their own human resource strategies in order to seek the advantages of their efficient HRM over their major competitors in the current as well as future aspects. The aviation industry is also engulfed by several challenges from various sources such as recession, changes in technology and privatization. In order to warmly respond to such circumstances the global aviation industry has undertaken numerous measures to effectively tackle these problems arising from the aforesaid issues. A few major measures that have been widely implemented in the aviation industry include cost control strategies, positioning strategies and most importantly

Monday, September 23, 2019

Equity and Trusts Essay Example | Topics and Well Written Essays - 750 words

Equity and Trusts - Essay Example This is because, it is expected that for a transfer to be effective, the share transfer form should be filled in, and then submitted to the company, for the completion of the share transfer process in the name of the new shareholder3. However, the ruling in the case Penningon v Waine EWCA CIV 227 [2002] ignored this maxim, and instead pitched the ruling on the intended actions of the transferor. This makes the principle of unconscionability vague in that; as the ruling provided in the case Tunkl v. Regents of the University of California, [1963], it is not possible to effectively establish the intentions of the transferor at the time of his/her death. The principle of unconscionability operates on the basis of three concepts, which are exploitation of weakness, duress and undue influence4. The holds that if any transfer is effected on the basis of any of the three concepts, where the transferor was forced to undertake the action out of severe pressure being exerted on him/her, then t he law, as was provided in the case Williams v. Walker-Thomas Furniture Co. [1965], considers such a transfer as unconscionable, since it was undertaken contrary to the good conscious of the transferor, thus making such a transfer ineffective5. In such a case, the ruling considers the exertion of pressure that arises from the beneficiary of the contract, and thus nullifies the agreement on the basis of the transferor having been forced to undertake an action that was against his or her conscious will. However, the law is silent regarding the exertion of pressure on a transferor by circumstances which are entirely outside the defendant’s control, and thus the pressure arising from a non-beneficiary is not provided a remedy6. Therefore, owing to the silent nature of the law regarding the action to be undertaken in case of the exertion of pressure by a third party, the law becomes vague and unspecific, which then renders the judgment made in application of the principle of uncon scionability not a good law. The principle of unconscionability was established in the Re Rose [1952], where the court observed that if everything had been done to transfer the title from the transferor to the transferee, but a delay has be caused by the operation of the law, then the gift of transfer still remains effective, as long as the transfer is not affected by the contrary conscious will of the transferor7. This provision pitches the validity of the delay on the routine operation of the law8. However, in the case Penningon v Waine EWCA CIV 227 [2002], the delay was caused by the failure of Mr. Pennington to submit the transfer form to the company, and thus the delay in this case does not fit into the routine operation of the law9. Therefore, the ruling under the case Penningon v Waine EWCA CIV 227 [2002], was not undertaken on the basis of the legal delay, but out of a mistake that emanated from the representative of the company’s auditors. However, the explanation gi ven by Lord Justice Arden in this case was that it would have been unconscionable for Ada, the transferor in this case, to change her

Sunday, September 22, 2019

Physiological Changes Essay Example for Free

Physiological Changes Essay In order to compensate, more salt is added to the diet. This can contribute to, or exacerbate, a pre existing high blood pressure condition. Changes to the gastrointestinal system can seriously affect the overall body of an older adult. Reduced saliva and imbalanced stomach acid contribute to dehydration and bowel problems. Ulcers can result from the imbalanced stomach acid and limited movement. Sometimes these can become bad enough that surgery is necessary. Then, the person is exposed to a higher susceptibility of alternate infections and secondary problems. Decreased muscle mass causes a lack of physical strength and endurance. Overall body composition begins to change in the older adult. Fat in the body increases as muscle mass decreases. Joints stiffen as glucosamine is lost. Ligaments between bones loosen. When an older person tries to walk, just as they did before, they can likely have a fall. This can lead to broken bones. Within the body’s organ system, plaque begins to build up in arterial walls. Increased blood pressure causes the heart to work harder. This is one explanation for the decreased energy and stamina in older adults. With decreased circulation comes a lack of oxygen throughout the entire body system. Dry skin and general forgetfulness becomes common in the older adult. Cognitive decline begins to happen along with the physical changes occurring with age. Illness, disease, memory loss, and changes in a person’s environment can all contribute to physiological decline. Due to lack of physical exercise, proper hydration, and lack of oxygen, emotional stress becomes a serious issue. As stress levels increase, physical stress increases. This cycle becomes reciprocal in nature. Hormonal changes occur simultaneously. This can be detrimental to body’s ability to process vital nutrients in the dietary intake. The imbalance in hormone levels causes issues with insulin and glucose levels. Lack of hormonal balance and dehydration contributes to poorly maintained nerves. Stress is both a result of these changes and a contributor to them. Hearing loss impacts a person’s social abilities and can lead to isolation. Some older adults may be embarrassed at their lack of ability to hear or understand everyday conversation. They tend to withdraw from social opportunities and become susceptible to depression. Along with hearing loss, comes lack of vision. Cataracts, lack of sensitivity to light, and decreased blood supply to the retina all contribute to the inability to correctly see in one’s environment. This can lead to accidents within the living space. The last factor to consider is socioeconomic status. During retirement, income may decrease and medical costs increase. One of the first areas impacted is the affordability of food containing proper nutrition. Social events are not always accessible. These environmental changes coupled with the physiological changes can accelerate physical and mental decline. Supportive services do help to increase both longevity and the quality of life.

Saturday, September 21, 2019

Attack Tree Model Analysis of Security Breaches

Attack Tree Model Analysis of Security Breaches THE SUCCESS MISUSES of computer systems security breaches increased slightly in 2005, according to the FBI and the Computer Security Institute (CSI). Many security issues that apply to large enterprises definitely apply to SMBs, especially as SMBs become more technologically sophisticated, according to Andrew Kellett, senior research analyst with U.K.-based Butler Group. You dont have to be a particular large organization to have some pretty complex supporting systems in place, he says. (Fred Sandsmark, p11) The above-mentioned stated that there was slightly increase in computers attack in 2005. As technology evolving, companies willingly to spend more money on computer systems to do business activities with their associate and partners. This will increase more and more security breaches on the computer systems. The purpose of this analysis report is to examine the various possible attack methods to compromise the availability of the computers, information and associated resources of a small firm. Research for this report includes an attack tree diagram, showing how the hacker can compromise the availability of the systems services, associated resources and to access sensitive information through different attack techniques. Each technique is the subset of the different type of attack methods, with possible assumptions attach to each methods, the attack tree will be discussed in greater details. INTRODUCTION The manager of the Raylee Pte Ltd has recently heard through the media and newspaper publications that there are numerous threats which could compromise the availability of the computers, information and associated resources. Management of Raylee Pte Ltd has decided to hire the security consultant firm Red Alert Security Pte Ltd to undertake a details analysis of its current computer and network state in order to prevent the hackers to compromise the availability of the computers services, information and resources. The under-mentions are the network and desktop environments of the Raylee Pte Ltd. There are six computers and one internal server (for processing orders) within the firm. Each computer encompasses Microsoft Windows 7 and Microsoft 2007 Each workstation has been patched with all updates as of March 25th, 2010. The company shares an ADSL 2+ connection amongst all computers. Server backups are done fortnightly and stored on a DVD spindle name backup1 Workstation backups are done bi-monthly and stored on a DVD spindle name backup2 Employees have email addresses provided by the Internet Service Provider. Documents are shared amongst employees through a D-Link DNS-323 NAS The router is utilising a default settings and consists of a D-Link DSL G604t. Each workstation is utilising Microsoft Windows Malicious Software Removal Tool. SCOPE Security consultant of Red Alert Security Pte Ltd will analyse of the company current computer system, network state and desktop environment in order to prevent the hackers to compromise the availability of the computers services, information and resources. Then the consultant will submit a detail analysis report to the Management of Raylee Pte Ltd for recommendations METHODOGLY The security consultant uses a technique known as attack tree to identify the best possible options to compromise the availability of the system services, information and resource in the quickest time. Below is the attack tree he comes up with. Compromise The Availability Of Computers, Information And Associated Resources 1. Remote Access Router: D-Link DSL G604t 2. Access NAS: D-Link DNS-323 3. 3. Gain Access Internal Server (Processing Orders) Orders) 4. Steal Password: Workstations METHODOLOGY From the attack tree in the previous page, each of the sub attack tree will be discussed in more detail. Figure 1 1. Remote Access Router : D-Link DSL G604t 1.1 Determine the password 1.1.1 Learn password 1.1.2 Use widely know password 1.1.3 Dictionary attacks 1.1. Determine password Hacker and cyber criminal will try to determine the password of the router in order to access the network environment and do whatever they want. We will briefly explain the methods as follows 1.1.1 Learn password If the user has not set new password and is using the default which is normally blank. Hackers can easily search online for the manual of the particular wireless router and know the password. Hackers login the wireless router configuration page to change the setting and sabotage the network. For instance, hacker can surf this link http://www.routerpasswords.com/index.asp to get the default password for all the routers. 1.1.2 Use widely know password The common used passwords are admin, password, [emailprotected], 123456, 666666, qwerty, 00000000 and etc. These widely used passwords allow hackers to easily access the router. 1.1.3 Dictionary attacks As the word dictionary it implies that it is one of the attack techniques use by the hackers to determine its decryption key, password or passphrase by searching the all the words which are usually seven characters or lesser chosen by the user in the dictionary. METHODOLOGY Figure 2 2. Access NAS : D-Link DNS-323 2.1 FTP server 2.2 Folder File Permission 2.3 P2P distribution 2.1.1 Bounce Attack 2.1.2 Misconfigure 2.3.1 File poisoning 2.3.2 Sybil attack 2.1 FTP server Most of the Network Attach Storage device comes with the feature of the FTP server which allows user to download or upload file remotely anywhere. However, this service creates a loophole for attacker to retrieve sensitive information and data. The various attack methods on FTP server are discussed as follows 2.1.1 Bounce Attack FTP bounce attack is another attacking technique use by the hacker to exploit the ftp protocol so that he can use the PORT command to send request access to the ftp port indirectly to another victim machine which acts as third party for such request to access the ftp. 2.1.2 Misconfigure One of the common problems is to misconfigure the ftp server which allows users to download and upload the files in the same directory (global/tmp directory) for people to share data with each other. It will create an opportunity for attacker or theft to steal the data or upload virus program to the directory. Hence employee will accidentally install the virus program and infect to the computer systems and network. 2.2 Folder File Permission Proper folder and file permission must be set according to the employee roles and responsibilities. If there is no permission setting on the files and folder and gives everyone permission to read, write and execute it. Then it will be easily for attacker to retrieve information upon hacking into the company network. 2.3 P2P Distribution It is a peer-to-peer file transfer protocol to allow users each download different pieces of the broken file from the original uploader (seed). Users exchange the pieces with their peers to obtain the broken ones which are missing. IT savvy employees can make use of the P2P to download their favourite movies, videos, music and software. Hacker will make use of the P2P attacks to gain access into the network. There are two types of attacks which are file poisoning and Sybil attack. 2.3.1 File Poisoning File poisoning attacks operate on the data plane and have become extremely commonplace in P2P networks. The purpose of this attack is to replace a file in the network by a fake one and this file will be corrupted and no longer in use. 2.3.2 Sybil Attack The idea behind this attack is that a single malicious identity can present multiple identities, and thus gain control over part of the network. Once the attacker gains the control, he can abuse the protocol in any way he likes. METHODOLOGY Figure 3 3. Gain Access Internal Server (Processing Orders) 3.1 Steal sensitive information from the database 3.1.1 Gain access by internet 3.1.2 Physical access to the server 3.1.3 Access server from workstation OR OR 3.1.1.1 Monitor network traffic 3.1.1.2 Use remote exploit 3.1 Steal sensitive information from the database Sometimes hackers are hired by the competitor to create chaos in the company network and to steal confidential information such as customer data, vendor data, pricing information, new product launch information from the computer systems. There are various methods to steal information from the database and there are as follows: 3.1.1 Gain Access By Internet Attack corporate network by using internet is becoming more sophisticated as technologies evolving. There is an increase of internet attacks orchestrate by the hackers to strike highly protected targets, to coordinate waves of scripted exploits and/or to conceal the true origin of an attack. 3.1.1 .1 Monitor Network Traffic Cyber criminal use network monitor tools to monitor the local area networks or wide area networks. Some of the network monitoring tools such as Microsoft Network Monitor, Ettercap, TCP Dump and DSniff can be download freely from the internet. This program can intercept and log the traffic passing over the network or part of the network. Once the information is captured by the program, hacker will decodes and analyse its content according to the appropriate RFC or other specifications. 3.1.1 .2 Use Remote Exploit The server is connected to the internet and the operating system is not updated the latest patches, then the cyber attacker will use remote exploit the vulnerability of the system to infiltrated the system to steal the information and sabotage the server by destroy the database and hard disk. Since the server backups are done fortnightly, management will be facing difficulties in recover the data. 3.1.2 Physical Access To The Server Due to the space constraint, sometime the server share space with someones cubicle or office. This creates an opportunity for an attacker who able to access files and other data by removes the hard disk, and then attaches it to another computer. He can also use third-party operating system CD to start the computer and steal corporate data or insert USB drive to inject virus into the system. 3.1.3 Access Server From Workstation Cyber attacker is not limited to hack into the server. Workstation is the often the first target the hacker will try to access because from there, he can learn about the network environment and security loopholes to attack the server. He will use the workstation as the stepping-stone to server-level break-in by stealing administrator passwords. METHODOLOGY Figure 4 4. Steal Password: Workstations 4.1 Users Login password 4.1.2 Obtain password illegally 4.1.1 Social Engineering 4.1.1.1 Share password 4.1.1.2 Phishing 4.1.2.2 Find written password 4.1.2.1 Steal password 4.1.2.1.2 Install keyboard sniffer 4.1.2.1.1 Obtain sniffer output file AND 4.1 Users Login Password Companies must know that hackers not only interested in the corporate data, they are also interested in the employees personal data such as bank account, credit card, email address and others. To break into the workstation, hackers will need to know the users login password. 4.1.1 Social Engineering Social engineering is the method of non technical hacking into the system by manipulating people through social interaction via email or phone to reveal their password. 4.1.1.1 Shared Password It is very common for employees to share computer password with their colleagues. Sometimes in their absence in the office, they will usually call one another to help them login to the computer to retrieve some information. 4.1.1.2 Phishing Hacker can create an email or instant messaging with attach fake website link which looks almost the same as the real one to lure the user enters their personal details such as username, password, credit card details and banking credential. All these information will be sending to the hacker. 4.1.2 Obtain Password Illegally Weak password makes hacker to obtain password illegally and faster. Cyber attackers will steal the password by infect the workstation with trojan. Basically there are three types of trojan attackers can use to steal the password namely: keyboard sniffer, login spoofing and password stealer. When attacker install the keyboard sniffer program which will monitor each keystroke the user has entered and this program generate the sniffer output file which send to the attacker. Sometimes hacker can pose as companys guest to access the premises. Upon entering the office, he will look for password which the employee written on a piece of paper and paste it around the working cubicle. CONCLUSION Companies are constantly at risk of losing sensitive corporate data. In this report,  we have use the attack tree model to analyse various attacks method the attackers use to steal sensitive information on the server, network attach storage device, router and workstations. The most common and easier method is to obtain the users password by learn the password, use widely common password, dictionary attack, shared password, phishing, find written password and steal passwords. Cyber attackers and novice hackers are usual like to steal the passwords by downloading keyboard loggers, passwords cracking software, keyboard sniffers and others which are available on the website to test on their skill. Management should implement counter measures to prevent hackers to attack their system and security breaches. We recommend antivirus program to be installed on  the workstation and server as they are utilising Microsoft Windows Malicious Software Removal Tool which is not enough for the prevention of the cyber attacks. Local group policy of the password needs to enforce on the networking devices, workstation and server so that the password is not being easily crack by the hackers. Lastly, passwords should be set minimum 8 characters and contain alphanumeric and symbols for complexity. In conclusion, steal password is the easiest method for hackers to attack the computer system because local authorities might face difficulties in tracking them down if they are distant hackers. GLOSSARY Attack tree Attack trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes. (Source : http://www.schneier.com/paper-attacktrees-ddj-ft.html ) Social Engineering In computer security, social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. (Source : http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci531120,00.html ) 3. Phishing Phishing is a technique of fraudulently obtaining private information. (Source : http://en.wikipedia.org/wiki/Social_engineering_(security)#Pretexting ) 4. Keyboard Sniffer A program which reads the keystrokes made by a user and transmits them to someone else. Such programs are usually used by intruders into computer systems in order to capture important information such as passwords. (Source : http://www.encyclopedia.com/doc/1O12-keyboardsniffer.html ) 5. RFC Short for Request for Comments, a series of notes about the Internet, started in 1969 (when the Internet was the ARPANET). An Internet Document can be submitted to the IETF by anyone, but the IETF decides if the document becomes an RFC. Eventually, if it gains enough interest, it may evolve into an Internet standard. Each RFC is designated by an RFC number. Once published, an RFC never changes. Modifications to an original RFC are assigned a new RFC number. (Source : http://www.webopedia.com/TERM/R/RFC.html )

Friday, September 20, 2019

The Graying Shades Of Media A Corrupt Conundrum Media Essay

The Graying Shades Of Media A Corrupt Conundrum Media Essay Since the days of the freedom movement Indian media has been recognised as patriotic and nationalist tool to provide unbiased news and build positive public debates. Mahatma Gandhi, The father of the Indian nation juggled his movement with the moral power of active journalism. Today, India with its over a billion population supports nearly 70,000 registered newspapers and over 450 Television channels. In the sphere of journalism, there are eminent Journalists in the country who are honoured and accepted as the moral guide in the Indian society. While the newspapers in Europe and America are losing their readership annually, the Indian print media is still going from strength to strength with huge circulations and greater marketing opportunities. The media is still considered to be the fourth important pillar after the judiciary, parliament and bureaucratic set-up in democratic India. Media is considered to be a repository of public trust for conveying information to public honestly. With the advent of technology the new dimension of internet has changed the way the news is shared and views are exchanged. The speed of travel of information has grown logarithmically and media has become more powerful than any time before to shape the minds and generation of opinions of the masses. Social media is developing as a pervasive tool to connect the society laterally which is affecting marketing strategies of the business houses and structuring political influences by the people in power or seeking power. Historically media has always taken the flak for favoring the more influential sections of society and has also been blamed to shade the news and views to suit the economic viability of the publishing houses. Political leanings and corporate influences on the editorials and selectivity in coverage of news is not hidden from the public but in recent years, malpractices in the Indian media has gone way beyond the corruption of individual journalists and media organizations. Unfortunately the information is planted and views are on sale for favors received in cash or kind in institutionalized and organized forms of corruption. Newspapers publishers and television channels owners do not shy away from receiving funds for publishing or broadcasting information in favor of particular individuals or corporate entities that is disguised as news. The plague of unethical commercial activities and market interests of media institutions disfigure the role they play in the shaping of public opinio n and in upholding principles and norms of democracy. II Understanding certain terms related to media Paid media is the most traditional advertising in which a company pays for space or for a third party to promote its products. This form is thriving with emergence of more targeted cable TV, online-display placement, and other channels options for marketers expanding exponentially .Online video and search marketing is attracting greater interest .Paid media has too much of clutter with declining response rates and declining credibility. Owned Media Owned media, consists of catalogues, web sites, retail stores, alert programs and e-mail notifications of special offers etc on properties or channels owned by the company that uses them for marketing purposes. Owned Media do not offer guarantees and consumers have limited trust in this media. Earned Media Earned media (or free media) refers to favorable publicity gained through promotional efforts other than advertising, as opposed to paid media, which refers to publicity gained through advertising.[1] Earned media often refers specifically to publicity gained through editorial influence, whereas social media refers to publicity gained through grassroots action, particularly on the Internet. The media may include any mass media outlets, such as newspaper, television, radio, and the Internet, and may include a variety of formats, such as news articles or shows, letters to the editor, editorials, and polls on television and the Internet.  [1]  Earned media is an old PR term that essentially meant getting your brand into free media rather than having to pay for it through advertising. Social media Social media employ web- and mobile-based technologies to support interactive dialogue and introduce substantial and pervasive changes to communication between organizations, communities, and individuals. [1] Andreas Kaplan and Michael Haenlein define social media as a group of Internet-based applications that build on the ideological multi faceted and technological foundations of Web 2.0, and that allow the creation and exchange of user-generated content.[2] I.e. Social media are social software which mediates human communication. When the technologies are in place, social media is ubiquitously accessible, and enabled by scalable communication techniques. In the year 2012, social media became one of the most powerful sources for news updates through platforms like Twitter and Face book.  [2]   Sold Media Paid and owned media are controlled by marketers touting their own products. For earned media, such marketers act as the initial catalyst for users responses. But in some cases, one marketers owned media become another marketers paid media-for instance, when an e-commerce retailer sells ad space on its Web site. This is termed as sold media on an owned media whose traffic is so strong that other organizations place their content or e-commerce engines within that environment.  [3]  This is gaining more popularity as a promotional media on the web based sites as it gives eye ball attention to the interested clientele only as it is projected on the related web pages which the potential client of the product is visiting. Hijacked Media The same dramatic technological changes that have provided marketers with more (and more diverse) communications choices have also increased the risk that passionate consumers will voice their opinions in quicker, more visible, and much more damaging ways. Such hijacked media are the opposite of earned media: an asset or campaign becomes hostage to consumers, other stakeholders, or activists who make negative allegations about a brand or product e.g. a prank online video of two employees contaminating sandwiches in Dominos Pizza kitchen appeared on YouTube. Advertorial An advertorial is an advertisement in the form of an editorial. The term advertorial is a portmanteau of advertisement and editorial. Merriam-Webster dates the origin of the word to 1946.[1]In printed publications, the advertisement is usually written in the form of an objective article and designed to look like a legitimate and independent news story. In television, the advertisement is similar to a short infomercial presentation of products or services. These can either be in the form of a television commercial or as a segment on a talk show or variety show. In radio, these can take the form of a radio commercial or a discussion between the announcer and representative.  [4]   Paid News Paid news or paid content are those articles in newspapers, magazines and the electronic media, which indicate favourable conditions for the institution that has paid for it. The news is much like an advertisement, but without the ad tag. This kind of news has been considered a serious malpractice since it deceives the citizens, not letting them know that the news is, in fact an advertisement. Secondly, the payment modes usually violate tax laws and election spending laws. More seriously, it has raised electoral concerns because the media has a direct influence on voters.  [5]   The dynamic media jargon has its vocabulary changing every moment which in turn is not only changing the way consumers perceive and absorb marketing messages but will also force marketers to change their thinking about the way they allocate spending and organize operations. Different kinds of media are becoming more integrated. The sold media can catapult a marketer into a stream of contacts with users and members through owned-media hubs, where marketing companies can offer a more engaging experience, get consumers interested in products. New publishing models are finding their way in modern media as marketers are leaning on media providers for help by partnering with media publishers to create deeper marketing experiences for consumers and to obtain content and ad sales support. Computer maker Dell and automobile manufacturer Nissan, for example, worked with the Sundance Channel in United States to create a television talk show hosted by Elvis Costello to attract their target demog raphic with ads that seamlessly blended into the shows content. Applications created on mobile phones are initiating tools that provide useful information. For example, eBays Red Laser generates a list of prices for products by merely scanning the barcode on mobile phone. Twitter and other blogging platforms are social media platforms to promote new products and promotions by leveraging its huge fan base. III Accountability and responsibility in journalism Good journalism flourishes where society respects and enforces the rule of law. International standards supply guarantees of free expression. But these standards also typically acknowledge certain legitimate grounds for the states restriction of free expression.  [6]  The Universal Declaration of Human Rights, proclaimed by the United Nations General Assembly in 1948, pronounces in Article 19 that: Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek,receive and impart information and ideas through any media and regardless of frontiers. Article 29 then qualifies this right as: In the exercise of his rights and freedoms, everyone shall be subject only to such limitations as are determined by law solely for the purpose of securing due recognition and respect for the rights and freedom of others and of meeting the just requirements of morality, public order and the general welfare in a democratic society .  [7]   The right to free expression often goes loggerheads with other competing interests. Sometimes there is no legal remedy for types of journalistic misconduct that can disappoint readers and viewers. A courtroom is often not the best place to resolve disputes about balance, fairness, and accuracy and there is always the risk that harsh judicial remedies, even those imposed when the underlying case involves journalistic misconduct, will inhibit the future free and open publication of controversial views. In such a scenario self-regulatory mechanisms offer a valuable alternative.  [8]  Most associations of journalists, and many individual news organizations, have adopted codes of ethics. Terms vary. Some codes are binding, and violation of a provision can lead to dismissal by an employer or expulsion from a professional journalism society. But most codes of ethics, instead, offer voluntary guidelines to help journalists make morally and professionally sound decisions. Codes thus encou rage greater accountability to readers and viewers. A good example is the Code of Ethics for the Society of Professional Journalists (SPJ)  [9]  , the largest voluntary association of U.S. news reporters and editors. Its code encourages journalists to abide by four core principles: Seek truth and report it: Journalists should be honest, fair and courageous in gathering, reporting and interpreting information. Minimize harm: Ethical journalists treat sources, subjects and colleagues as human beings deserving of respect. Act independently: Journalists should be free of obligation to any interest other than the publics right to know Be accountable: Journalists are accountable to their readers, listeners, viewers and each other. By its own terms, the SPJ code is a voluntary guide to ethical behavior. It states:The code is intended not as a set of rules but as a guide for ethical decision-making.  [10]  Similarly the Press Council of India, an autonomous body was set up under the Press Council Act, 1978. The Press Council of India has developed norms of journalistic conduct that cover the principles and ethics regarding journalism. The Press Council of India has also laid down guidelines on reporting of specific issues of public and national importance. In 1996, it drew up a set of guidelines that are particularly applicable to financial journalism. The Press Council of India has also issued guidelines on reporting of elections.  [11]  Mint  [12]  has laid down a code of journalistic conduct for guiding its journalists in so much of details that these can be expanded in scope to be followed by the entire media to safeguard and uphold the values of journalism in the country. Journalists have to be honest fair and courageous in gathering, reporting and interpreting information; ensuring accuracy, objectivity, balance and fairness. A Journalist should be free of any obligations, whether political or corporate. Speaking of corporations, there is no denying that Journalism and reporting like most other professions need significant capital inputs and sound business sense to survive. But, this is a profession where the stakes are much higher because it is a profession which has the power to create opinions and to shape a nations present and its future. Journalists must maintain dignity in expression and be sensitive while reporting on critical issues. IV Mass media bias: Can it be avoided? Media bias is the bias of journalists and news producers within the mass media in the selection of events and stories that are reported and how they are covered. The term media bias implies a pervasive or widespread bias contravening the standards of journalism, rather than the perspective of an individual journalist or article. The direction and degree of media bias in various countries is widely disputed.  [13]  The phenomenon of political bias has been founded in the media along with the invention of printing press and historically media has always favored the more powerful social groups. Like newspapers, the broadcast media (radio and television) have been used as a mechanism for propaganda from their earliest days, a tendency made more pronounced by the initial ownership of broadcast spectrum by national governments. Although a process of media deregulation has placed the majority of the broadcast media in private hands, there still exists a strong government presence, or ev en monopoly, in the broadcast media of many countries across the globe. At the same time, the concentration of media in private hands, and frequently amongst a comparatively small number of individuals, has also led to accusations of media bias.  [14]   There are primarily three categories of bias in reporting of a news viz. gate keeping bias which stops a news from appearing at all, coverage bias which gives the various degrees of prominence to the news and statement bias which gives color to a news through opinionated coverage.  [15]  The following are the most commonly talked about biases:- Support or attack a particular political party, candidate, or ideology. Advertising bias, when stories are selected or slanted to please advertisers. Corporate bias, when stories are selected or slanted to please corporate owners of media. Mainstream bias, a tendency to report what everyone else is reporting, and to avoid stories that will offend anyone. Sensationalism, bias in favor of the exceptional over the ordinary, giving the impression that rare events, such as airplane crashes, are more common than common events, such as automobile crashes. Favors or attacks on a particular race, religion, gender, age, sexual orientation, or ethnic group.  [16]   The bias of the mass media may be sited due to its economic structural views which get a leaning to a political view and in turn takes the form of propaganda. The corporate ownership of media houses is bound to have biases in the areas where their profitability is affected. There is another demand-driven theory of mass media bias. If readers and viewers have prior views on the current state of affairs and are uncertain about the quality of the information about it being provided by media outlets, then the latter have an incentive to slant stories towards their customers prior beliefs, in order to build and keep a reputation for high-quality journalism. The reason for this is that rational agents would tend to believe that pieces of information that go against their prior beliefs in fact originate from low-quality news providers. According to a a behavioral model which is built around the assumption that readers and viewers hold beliefs that they would like to see confirmed by news pr oviders. When news customers share common beliefs, profit-maximizing media outlets find it optimal to select and/or frame stories in order to pander to those beliefs.  [17]  In another model media bias arises because the media cannot tell the whole truth but are restricted to simple messages, such as political endorsements. In this setting, media bias arises because biased media are more informative; people with a certain political bias prefer media with a similar bias because they can more trust their advice on what actions to take.  [18]   Not all accusations of bias are political. Science writers accuse the entertainment media of anti-science bias. Television programs such as The X-Files promote superstition.  [19]  In contrast, the Competitive Enterprise Institute, which is funded by businesses, accuses the media of being biased in favor of science and against business interests, and of credulously reporting science that purports to show that greenhouse gasses cause global warming.  [20]   There has been a number of suggestions and efforts to straighten the biases during media coverage. A technique used to avoid bias is the point/counterpoint or round table, an adversarial format in which representatives of opposing views comment on an issue. This approach theoretically allows diverse views to appear in the media. However, the person organizing the report still has the responsibility to choose people who really represent the breadth of opinion, to ask them non-prejudicial questions, and to edit or arbitrate their comments fairly.  [21]   Another technique used to avoid bias is disclosure of affiliations that may be considered a possible conflict of interest. This is especially apparent when a news organization is reporting a story with some relevancy to the news organization itself or to its ownership individuals or conglomerate. Often this disclosure is mandated by the laws or regulations pertaining to stocks and securities. Commentators on news stories involving stocks are often required to disclose any ownership interest in those corporations or in its competitors. Same holds good during reporting of run up to elections when media covers stories and opinions through news columns and editorials as well publish advertisements related to contesting candidates and propaganda of the political parties. V Paid news: Pernicious dimension of media Media bias has always been a detrimental phenomenon affecting all forms of media that plagues society due to financial selfishness and vested interests of the journalists and the corporate houses controlling the strings of various sections of media. But in the recent years this bias is falling in the vicious trap of corruption whereby the news has started to have a price tag and advertorials are passed as news to unsuspecting readers and viewers. It has become pervasive, structured and highly organized and in the process, is undermining democracy in India. Media has moral responsibility to keep the news objective, fair and neutral. A clear distinction between information and opinion from advertisements that are paid for by corporate entities, governments, organizations or individuals has to be maintained at all times. The reader should be able to distinguish between news reports and advertisements/advertorials and the boundary between the two should never blur. But recently the paid news is becoming a deep-seated ailment which has become organized and is not restricted to only journalists, managers and owners of media companies but also involve advertising agencies and public relations firms. Owners and editors of media companies ideally should erect a firewall between journalists or content creators/producers, on the one hand, and buyers and sellers of advertising space, on the other but in some newspapers, magazines and television channels, this wall has too many convenient orifices which leads to the most common problem of making an attempt to manipulate public debate through the purchase of favorable editorial space and the purchase of advertising space .Owners of media organizations compel themselves to give favorable information about certain advertisers and block unfavorable information against them due to their financial relationships, including share-holdings, with them. An outgoing chairperson of the Securities and Exchange Board of India, in his farewell speech, referred to the existence of the anchor investor. Therefore, this problem, in a different sense, though it cannot be termed as paid news, also existed in the sphere of business journalism. Such trends have been discernible in sections of the Indian media for some years now in spite of press council of India having drawn a set of guidelines in 1996 which are particularly applicable to financial journalists on the behest of the regulator of the countrys capital markets, the Securities and Exchange Board of India (SEBI).Disclosure of private treaties between media companies and other corporate entities need to be mandatory to safeguard the interests of investors. This practice(paid news) has started in media after India adopted free-economy policy. Corporates and media came closer and marketing managers became stronger than the editor of a media establishment. ..Media (the only hope for the common man) is supposed to be advocating for the deprived sections of society. But media itself has become an integral part of consumerism and corporate system.  [22]  The explosive growth in the media in the country had highlighted the fact that the Fourth Estate is the only one among the pillars of democracy that has an identifiable commercial and explicitly for-profit persona. While the primary professional duty of media organizations is to their readership to keep them informed and appraised with news, views and ideas, the commercial logic brings in a new set of stakeholders in the form of the shareholders of these companies.  [23]   The paid news has proliferated more due to diminution of the role and the status of editors in media organizations and the reduced freedom of journalists under the Working Journalists Act. Senior journalists prefer to work with their employers under fixed term contracts which erode their protection otherwise accorded to them under the provisions of the Act. Until the 1970s and the 1980s, many editors would not brook any interference from the management of the company they would be employed by the number of such editors started dwindling as more and more senior journalists started acceding to every whim of their managers and employers instead of their editors. With managers playing a more influential role in the selection and presentation of news, it was not surprising that the importance of the news started getting determined by the revenues that would be generated for the media company.  [24]  The journalist faces an ethical dilemma which begins with the inherent conflict betwe en the individuals role as a journalist providing independent information to the public and his or her employers quest for profit. The poor wages of journalists especially those who work in non-urban areas also force them to double up as advertising agents working on commissions to earn their livelihood. The paid news acquires a completely new complexity of staggering proportion with the corporatization of media houses and large media houses not only own print media but also own electronic media and radio waves. These media houses offer packages for the projection of certain individuals in all the forms of media that they own and control. This distorts parliamentary democracy in multiple ways: (a) (the) media ceases to be objective and, therefore, distorts public perception; (b) it distorts the electoral political choices of the people by providing undue advantage to those candidates/political parties who are able to afford these packages, (c) it manipulates democracy, negating it completely by denying or by not providing equal access to those who cannot afford to indulge in such malpractices thereby breaching the provisions of the Constitution of India, and (d) it demeans the idea and essence of journalism itself.  [25]   Paid news phenomenon represents a fatal combination of three Ms, namely, the media, money and mafia that has subverted free and fair elections. He said that earlier, politicians used to hire musclemen with huge amounts of money and train them in booth rigging. Nowà ¢Ã¢â€š ¬Ã‚ ¦candidates are training media pens instead of mafia guns to rig the minds of people with constant opinion bombarding.  [26]  The new aspect of this phenomenon of paid newsas seen in parliament elections in 2009 is that there was widespread participation by political parties in this process. The integration and assimilation of leading political parties and corporate public relations bodies in this racket is also unique to the elections of 2009.  [27]  The Election Commission noted during the election process that the more disturbing phenomenon recently emerging and which is causing serious concern to the commission is the latest complaint to the Commission that some of the newspapers have even offered p ackages at hefty sums, offering three types of services one, projecting the image of a political party or a candidate in a positive manner; two, giving negative publicity to the rival party or candidate. The rates of such packages vary, depending upon the standing and circulation of the newspaper in the area covered by the constituency.The regional media councils have been rising to address the problem by repeatedly urging the journalists to desist from the temptation of We strongly believe that the practice of putting out advertising as news is a grave journalistic malpractice. Moreover the trend threatens the foundation of journalism by eroding public faith in the credibility and impartiality of news reporting. It also vitiated the poll process and prevented a fair election, since richer candidates who could pay for their publicity had a clear advantage.  [28]  A prominent journalist took a poke shot on vernacular press, The vernacular media may be feeling cocky, having pulle d themselves out of physical poverty under their own steam, but they have yet to learn how to deal firmly and decisively with another kind of poverty that of the professional, ethical kind  [29]  . The society has woken up to the media malpractices and the reflection is seen in the films and documentaries. Film director Shri Ram Gopal Verma made a movie in Feb 2010 named Rann dealing with the topic of corruption in the media. Even a documentary titled Advertorial: Selling News or Products? was produced by an eminent media critic and academic Paranjoy Guha Thakurta for Indias national broadcaster, Doordarshan.Even in a survey conducted by the Readers Digest in March 2010, called the Trust Survey, 750 Indians were asked to rank the short-listed individuals belonging to different professions. Journalists were ranked 30 out of the 40 professionals listed and were placed next only to barbers and bus drivers.  [30]  Edelman, an independent public relations firm, in its 2010 Trust Barometer Survey (conducted in 22 countries worldwide, including India and six other countries in the Asia-Pacific region) stated that the Indian media has been losing its credibility and trust among the people. The study, which sampled 1,575 people in the 25-64 age group and 200 opinion leaders in India, noticed a sharp drop in trust over the past two years in television news in India. However, newspapers are ranked higher than other media in terms of credible news with people trusting newspapers more than any other medium: 38 per cent of the Indians polled trusted radio and television, while

Thursday, September 19, 2019

Lord of the Rings :: essays research papers

It is easy for the reader who enters the enchanted realm of Tolkien's own work to be lost in the magic of the Middle-Earth and to forbear to ask questions. Surrounded by elves, hobbits, dragons and orcs, wandering the pristine fields and woods, described with such loving care they seem almost real, it is easy to forget there is another world outside, the world in which John Ronald Reuel Tolkien, an Oxford don, lived and wrote his monumental series of fantasy novels. It is, after all, natural to want to escape humdrum reality. Literature that offers a simple pleasure of a different time, a different place has nothing to be ashamed of. Tolkien in the same essay describes "escape and consolation" as one of the chief functions of the fairy-tale by which term he understands also what we would call "literary fantasy" today. "Escape and consolation" seem to be self-evident terms. What is there to discuss? Perhaps all that I have to do today is to praise Tolkie n's fertile imagination and to step modestly aside. But the sentence I just quoted suggests that asking questions about the fairy-tale realm is not so much unnecessary as dangerous. You risk not merely boredom and disenchantment but the actual expulsion from the Fairyland. Why? Is there, perhaps, more to the magic land than meets the eye? What if the "escape" it offers is fake; what if Middle-Earth lies not "in a galaxy long ago and far away", as Star Wars put it, but much closer to home, right on the border with Tolkien's war-stricken England of the 1940s and perhaps even not so far from our own turbulent Middle East. What if the further away we travel, the more inevitably we come home? These are the questions I want to discuss today.And if the result of this inquiry will be the loss of the key to the gates of Paradise, I'm willing to take this risk. Therefore the focus of this talk will be the question that Tolkien himself emphasized as central to our perception of works of fantasy: what is "the effect produced now by these old things in the stories as they are" (32); in other words, how are the elves, orcs, the Dark Lord and the magic ring relevant to the here and now? However, I do not believe that the answer to this question should be sought in the circumstances of the author's own life.

Wednesday, September 18, 2019

Factors That Influence Teen Violence :: essays research papers

In today's society, the teenage population has experienced an increase in violence. Teens face many situations that cause these problems. Several factors are mass media, peer pressure, and society's view on the "perfect" person. Television, radio, and news papers are all ways of transferring messages to people. One might see a violent movie and decide to re-enact the scenes thus causing harm to one's self or to others. Hidden meanings of racism and hate are put into music. Teens hear the words of their supposed role models and think it is OK to follow in their foot steps. When reading of such violent acts as the Oklahoma City bombing or the murders of Nicole Brown-Simpson and Ron Goldman, it is taken to most that anyone can get away with crime. Peer pressure is another big factor. Teenagers rely a great deal upon their peers for guidance and support. Sometimes this is the wrong path to take. Friendship is a word that is thrown around a little too loosely now days. Teens le t their "friends" talk them into doing things that they would not normally do. Drugs and theft are brought into these relationships also. Today's youth must learn to be leaders, not followers.Society can often be a harsh world to live in for a teen. To be considered "in" you must fit the role of the "perfect person." As young adults, teens are trying to find themselves. They look toward celebrities and leaders for a goal. They try to buy the right clothes, wear the nicest shoes, and be present at all the social events. To fit in, some are pushed to the edge. If you are caught in a dark alley at the wrong time, you might be killed just for your name brand shoes.

Tuesday, September 17, 2019

Ethics Awareness Inventory Essay

The Ethics Awareness Inventory (EAI) is an instrument used to establish one’s different attitudes to different portions of ethical thought and behavior. According to The Williams Institute (2011), â€Å"Ethics Awareness Inventory is a powerful tool for developing ethical competency. Besides being an instructive personal ethics assessment instrument, the EAI is a practical and comprehensive ethics learning process composed of three sections: Ethical Awareness, Articulation and Application/Action†. (p. 1) The EAI establishes where one focus lies among the four categories regarding character, obligation, results, and equity. Depending on the answers of the questions given one’s ethical leanings are evaluated (Ethics Awareness Inventory, 2011). Below one will learn the importance of understanding one’s personal ethical perspective, the relationship between personal and professional ethics in psychology, how the APA decision-making process facilitates more ethical professional behavior, and how one’s ethical awareness inventory scores relate to the concept of aspirational and enforceable standards. Results of Inventory After taking the EAI, I found that my personal outcome regarding my personal ethics perspectives are evenly focused on character, obligation, and results (Ethics Awareness Inventory, 2012). The summary segment of the EAI states my results point out a personal ethical confliction or deep control from exterior sources (Ethics Awareness Inventory, 2012). My perspective on the assorted results are that my thought process, when making an ethical decision, takes numerous dimensions of ethical thought for deliberation. Prior to understanding my personal ethics, my ethical decision was directed by a combination of critical thinking and gut feeling. After reviewing the  philosophy of ethics, I looked back at why I made certain decisions. I now believe taking a methodical approach to ethical decisions permits an individual to cautiously think about the many possible outcomes of decisions made and actions taken. From job-related experiences, when I am placed into situations with individuals who have different ethics from me, I cautiously take steps to determine ethical dilemmas choices without violating the rights or opinions of all involved. In addition, the experiences working with teams at work, have taught me to carefully view the opinions of others before entering into open disagreement over a given course of action. I strongly believe, apart from the ethical position,. an individual has his or her individual right to express their opinion. The results of my EAI, combined with my experiences throughout school and work, have educated me that all ethical decisions require cautious thought. I firmly believe, in order to achieve the best results, one needs to take numerous factors including but limited to culture, into consideration while also allowing for future implications of any action dictated by ethical decisions I make. Ethical Professional Behavior The EAI indicates that ethical guidelines have changed from individual character to organizational ethics (Ethics Awareness Inventory, 2011). The prime focus of this change are client-patient relationships in psychological counseling and clinical practice (Fisher, (2013). Psychological counseling and clinical practice are both constructed on ethical guidelines with the possibility for misuse of power and negligence to discretion (Fisher, (2013). My Results-centered approach to psychology would deem that the actions of the clinician must be in formation with ethical guidelines of the clinician. Furthermore, my ethical perspective shows that the ethical guidelines that lie beneath the practice of psychology should try to find the best good for the greatest part of society (Ethics Awareness Inventory, 2012). One issue in ethics are that ethics cease from a philosophical outlook to a practical discipline once personal ethics are fully developed (Barker, 1997). Many times personal ethics are articulated through words and action impacting daily routines (Barker, 1997).Many individuals are focused on producing solutions when faces with a issue and discouraged from complaining or disregarding the issue at hand. Personal ethics establish  individual virtues and defend individuals from external based vices like power or money (Barker, 1997). The code in ethical standards stresses more on ethical aspects on the connection connecting a psychologist’s personal and professional, or occupational life. Personal ethical standards determine how psychologists understand the relationship between what takes place at their work work-related and nonworking-related lives (Ethics Awareness Inventory, 2011). In case of personal troubles, the psychologists commonly evades starting an activity if there is substantial proof that his or her personal tribulations will obstruct them from competently performing and accomplishing his or her job-related duties (Ethics Awareness Inventory, 2011) Because of previous knowledge on negative influence that dilemmas may create, psychologists adjust fitting measures to boost his or her success (Barker, 1997). There are many strategies to help one’s goal achievement. For example, receiving professional consultation, choosing whether to limit or adjust the behavior, suspend or cease his or her job- related responsibilities (Barker, 1997). Moreover, ethical standards require the minimum standard of behavior and is positioned to ensure affected individuals evade initiating his or her activity by reason of personal issues, obstructing personal competence, and performance in professional correlated activities (Barker, 1997). Aspirational And Enforceable Standards There is a dramatic relationship linking ethical awareness inventory scores and the idea of aspiration and enforceable standards (Miller, & Salkind, 2003). While ethical standards aim for implementing acceptable behavior within all fields of life, EAI scores determine there existing various challenges to its implementation (Miller, & Salkind, 2003). An individual faces many different frustrations in the course of addressing ethical dilemmas. The choice assumed to be correct in most cases is never the best choice for the supported organization; therefore, it does not benefit the individual making the decision. In addition, A cost benefit analysis instrument is said to be unsuitable in addressing issues; however, it is the most fitting instrument in various organizations (Barker, 1997). Believing in a moral responsibility of doing what is said to be correct and recommended leaves not enough room for negotiations upon violation of ethical duties (Barker, 1997). Regardless of of the different beliefs, it is  vital each individual has an obligation and responsibility. Conclusion With the above information one can see the importance of understanding personal ethical perspectives, the relationship between personal and professional ethics in psychology, how the APA decision-making process facilitates more ethical professional behavior, and how one’s ethical awareness inventory scores relate to the concept of aspirational and enforceable standards. Personal ethics are essential in understanding the source of a dilemma. personal ethics can help everyone involved to develop and find the best solution and instruments needed. When one understands one’s personal ethical perspective it can help gaining ones trust by describing what is wrong and right. Unsuccessful guidance can start from one not able to understand personal ethics. Ethics can provide a sense of truth and offer the guidelines to follow; which in turn can, can create good leadership and management that can help in development of better companies and society. References Barker, R. A. (1997). How can we train leaders if we do not know what leadership is? Human Relations, 50(4), 343-362. Retrieved from http://search.proquest.com/docview/231429531?accountid=458 Ethics Awareness Inventory, 2011. For Ethics and Management. Retrieved from http://www.ethics-twi.org/Public/Home/index.cfm Ethics Awareness Inventory, 2012. A Guide to Personal Awareness of Your Ethical Perspective and Style. Retrieved from https://ecampus.phoenix.edu/secure/aapd/Vendors/TWI/EAI/ Ethics: What Is Right? Films On Demand. Films Media Group, 2004. Retrieved from . Fisher, C.B. (2013). Decoding the ethics code: A practical guide for psychologists (3rd ed.). Thousand Oaks, CA: Sage Joyce, N. R., & Rankin, T. J. (2010). The Lessons of the Development of the First APA Ethics Code: Blending Science, Practice, and Politics. Ethics & Behavior, 20(6), 466-481. Miller, D. C., & Salkind, N. J. (2003). ETHICAL PRACTICES IN RESEARCH. In , Handbook of Research Design & Social Measurement (pp. 1 00-141).

Monday, September 16, 2019

Innocence Betrayed: Critical Moments In The Life Of An Enslaved Girl Essay

The story of Harriet Jacobs is one of the most compelling works of literature published in the nineteenth-century. Hers is the narrative of physical torture and psychological abuse coupled with triumphs over adversity in a southern world where oppression was the norm. From the outset, Jacobs made it clear that her â€Å"narrative was no fiction ( 3). † Jacobs’s chronicling of her experiences, like that of so many other countless enslaved people, was cathartic. Remembering and writing made it possible for her to take responsibility for the events surrounding her life and, in so doing, begin the process of healing. One could argue that in publishing her critique she had led an insurrection, an act of defiance not easily thwarted in the safer haven of the north. Jacobs’s tale is distinct from other slave narratives of the period in that her analytical framework places gender at the center of the discussion. In her work, women, in general, black women, in particular, constitute what editor Nell Irvin Painter describes as a â€Å"self-consciously gendered and thoroughly feminist ( IX) story. † The Jacobs narrative is also an intriguing examination of the slave system. Jacobs’s project was to alert and recruit northern women in her effort to expose the â€Å"foul† system that indelibly harmed its victims white and black. According to her editor: this Peculiar phase of slavery has generally been kept veiled; but the public ought to be made acquainted with its monstrous features, and I willingly take the responsibility of presenting them with the veil withdrawn. ( 6) The significance of Jacobs’s work is that it raised consciousness. It forced northern white men to publicly oppose their southern white counterparts while the project itself relieved her of constantly being haunted by a life lived in shame and humiliation. The Jacobs narrative is a slave girl’s story embedded in a woman’s discussion about freedom. Harriet Ann Jacobs was born in Edenton, North Carolina on the Chowan River located near the Albemarle Sound in the eastern portion of the state. It was a region famous for its large planter class, many of whom owned huge plantations with numerous slaves. She, and her brother John, were the offspring of Elijah, a skilled carpenter, and Delilah. Elijah and Delilah Jacobs, the slaves of a white farmer, managed to keep the family together aided by Molly Horniblow, Delilah’s mother, a chef, and a respected and influential member of the Edenton community. At the age of six, after the death of her mother in 1819, Jacobs went to live with Margaret Horniblow, a white mistress who taught her to sew, read, and write. In 1825 Margaret died and, in 1826, Elijah passed away. She was then transferred to Margaret’s sister’s three year old daughter, and the niece of her nemesis, Dr. James Norcom. Dr. Norcom who appears as Dr. Flint in the story psychologically abused Jacobs when a young girl in the Norcom household. In protection of her life and reputation, she voluntarily became sexually involved with a prominent white lawyer in Edenton, Samuel Treadwell Sawyer. Together they produced two children, Joseph and Louisa Matilda. Because slavery was both a labor and social system, their children belonged to Norcom although Sawyer would later purchase them and Jacobs’s brother, John. But in a drastic attempt to protect her and her children from the wrath of both Mr. and Mrs. Norcom, Jacobs hid in the crawlspace of Grandmother Molly’s house for seven years during which time she perfected her reading and writing skills, and nurtured her children. In 1842 Harriet escaped the bondage of slavery by going to New York and later Boston. In the north she reunited with her children and, although technically free, she continued to live in fear of being captured by slave patrols following the mandates of the Fugitive Slave Act of 1850, a law that allowed southern masters to recapture their runaway â€Å"property† and re-enslave them. Luckily for Jacobs that, in 1852, her employer, Cornelia Grinnell Willis, purchased her freedom from the Norcoms and it was during this period that Amy Post, a Quaker and abolitionist, convinced her to tell the story of her slavery and freedom. Post, with whom Jacobs had confided, may have been successful because Harriet Beecher Stowe had refused her (Jacob’s) suggestion that she serve as an amanuensis. Later she met abolitionist, Lydia Maria Child, who aided Jacobs in completing what would be the single most important work in her career; Incidents in the Life of a Slave Girl, published pseudonymously as Linda Brent in 1861. The book brought Jacobs some measure of fame particularly with northern women concerned about the amoral activities associated with the south’s â€Å"Peculiar Institution. † Not distracted by her literary success, Jacobs continued to support the cause of freedom by assisting her daughter in aiding Union soldiers during the Civil War. She later established a Free School in Alexandria, Virginia, traveled south on numerous occasions, and made one note worthy trip to England. She ended her long life as a former slave girl by becoming a relief worker in Washington, D. C. where she died on March 7, 1897. It was only fitting that Jacobs’s life would end in the nation’s capitol where just miles away stood one of the largest slave auctioneers in the union. Much like the slaves who were sold, she undressed and exposed the events of her life for all to see. She was direct and deliberate in her delineation of the facts. She not only showed how she was used as a sexual object but also revealed how she used her sexuality to determine who would be her master in bed. Her story of family and motherhood highlighted the falsity in the notion that slaves were inhuman and therefore had no capacity to love or be loved. Jacobs’s essay is also about white women who lived and slept with masters who violated young female slaves. They also endured the public humiliation and hatred which stemmed from the children that resulted from these plantation liaisons. What an awful situation, she wrote, â€Å"to wake up in the dead of night and find a jealous woman bending over you (38). † Yet when Jacobs found a free black man whom she loved and who loved her, old Master Norcom, forty years her senior, refused to allow them to marry but, instead, offered to build Jacobs a hut. Plantation slavery was a world in which even an enslaved woman’s beauty could be a curse. According to Jacobs, â€Å"if God has bestowed beauty upon her it will prove her greatest curse (31). † Jacobs showed her audiences, north and south, what it meant to have alternatives and choices. The privilege of choosing a lover that met with her satisfaction, to run away or stay, to give birth, and the privilege of deciding to write a scathing indictment of the system that stole her innocence are themes that resonated with Jacobs’s readers. Her work reminds us that freedom is never free and that the greatest price may have been her memories of oppression. Works Cited Painter, Nell Irvin, ed. Incidents in the Life of a Slave Girl by Harriet Jacobs. New York: Penguin Books, 2000 [1861].