Wednesday, July 31, 2019
Cultural assessment Essay
A consideration of culture is essential in the process of the interview, case formulation, diagnosis, and treatment of culturally diverse indià viduals. The evaluation of these individuals raises many issues that clinicians need to address to formulate an accurate diagnosis and treatment plan that will be acceptable to the patient. A consideration of culture is essential in the process of the interview, case formulation, diagnosis, and treatment of culturally diverse indià viduals. The evaluation of these individuals raises many issues that clinicians need to address to formulate an accurate diagnosis and treatment plan that will be acceptable to the patient The American Psychological Association (1993) guidelines acknowledge the necessity of assessing individuals in the context of their ethnicity and culture, respecting their indigenous beliefs and practices (including those involving religion and spirituality), assessing the patientsââ¬â¢ support systems, evaluating the pati ents in their primary language, and taking a history that accounts for immigration and acculturation stresses. In summary, the consideration of cultural factors in the assessment, diagnosis, and treatment of culturally diverse individuals has gained recognition in a variety of disciplines in the last decade.In this chapter, we present a brief history of psychiatric case formulation; define culture, ethnicity, and race; and focus on an explication and elaboration of the DSM-IV outline for cultural formulation. Aspects of cultural formulation include assessing a patientââ¬â¢s cultural identity and understanding how culture affects the explanation of the individualââ¬â¢s illness, support system, and the clinician-patient relationà ship as well as understanding how culture affects the assessment and diagnosis of culturally diverse individuals From a clinical point of view, understanding the patientââ¬â¢s view of his or her illness helps determine our assessment and our treatment plan. Different cultures express their symptoms differently (Kleinman 1988), and concepts of illness also vary with culture. For example, for the Chinese in Hong Kong, Cheung (1987) found that patients had three explanatory models for mental disorders. They could explain their illness as based on psychological, somatic, or mixed factors. Their explanaà tion of the illness influenced how they went about getting help. The patients who had purely psychological explanations were the least likely to seek help. Because of this, Cheung recommended that clinicians specifically inquire about psychological symptoms, because these patients were not likely to volunteer them. Special Issues in Assessment Professionals working in systems that link treatment and corrections must be aware of a broad range of special issues in assessment related to clientsââ¬â¢ gender, culture, ethnicity, sexual orientation, educational level, religious affiliation or spirituality, and other such sociocultural characteristics. Issues related to a number of these characteristics are discussed below. Language It may be necessary to perform the assessment in the primary language of the individual, which may not be English. Assessors should avoid the assumption that a speaker of any given language can also read that language. The client may not be functionally literate in any language. Another part of the staff memberââ¬â¢s sensitivity to language should be an awareness that the client may need to communicate in ââ¬Å"street language.â⬠The assessor should be attentive to the kind of vocabulary that the individual client feels most comfortable using. To the extent possible, concepts should be stated in lay language, even street language, if appropriate, but not professional or clinical jargon. Using appropriate language is an essential part of making a true connection with the individual, so that he or she becomes engaged in the assessment process. While good assessment may be largely an intuitive process, specific assessment skills can be taught. Training can be provided in nonjudgmental interviewing techniques, rapport building, sensitive probing, and multicultural sensitivity. Cultural Identity and Ethnicity For appropriate assessment, it is critical that culturally and linguistically competent staff are available. The assessor must be aware of the importance of the clientââ¬â¢s cultural identity and the extent of his or her acculturation into the dominant culture. Some programs attempt to draw on traditional cultural http://www.wikihow.com/Write-a-Mental-Health-Assessment strengths of the individual in specific ways; these may be appropriate for the individual who has a strong identification with his or her culture of origin, but it may be inappropriate for other individuals of the same group. It is necessary to gain some sense of the meaning that the individualââ¬â¢s culture holds for him or her personally, rather than relying on presuppositions. The clientââ¬â¢s culture has many potential implications for the process of the assessment. Some cultures view direct questioning as inappropriate. Therefore, individuals from this type of culture may view the assessment process as highly intrusive. A goal of the assessment process is to understand the clientââ¬â¢s world from his or her o wn cultural perspective. The importance of making appropriate inferences from information about an individualââ¬â¢s culture makes it imperative that programs involved in assessment exert a strong effort in good faith to hire assessors representative of the populations they serve. When qualified professionals from these cultural groups are not on staff, treatment programs can seek to employ counselors or support staff from these groups, in order to create a diverse multicultural program environment. For effective assessment and placement, it is necessary to recognize that institutional and individual discrimination may exist in the criminal justice system and other institutions, and that bias can negatively affect classification, screening, and assessment.
Tuesday, July 30, 2019
Maturity in the Catcher in the Rye
Maturity in the Catcher in the Rye Maturity is a process in life that usually no one can run away from. The novel the Catcher in the Rye, by J. D Salinger, tries to disprove that lesson through its protagonist. Holden often behaves like a prophet or a saint, pointing out the ââ¬Å"phoniesâ⬠around him because he believes they are not as mature as he is, but as the novel progresses, Holden makes choices that prevents him from maturing rather than enabling him to mature. Holdenââ¬â¢s mail goal is to resist the process of growing up. Holden also mocks the adults around him to make him feel better.To cope with society, Holden alienates himself from the people he considers ââ¬Å"phoniesâ⬠. Usually, novels such as The Catcher in the Rye tell the story of a young protagonistââ¬â¢s growth to maturity; ironically, Holdenââ¬â¢s main goal is to resist the process of maturity. Holden does not want to mature because he fears change and is overwhelmed by complexity. On page 20 1 of the novel, Holden says ââ¬Å"Somebodyââ¬â¢d written ââ¬Ëfuck youââ¬â¢ on the wall. It drove me damn near crazy. I thought how Phoebe and all the other little kids would see it, and finally some dirty kid would tell themâ⬠.This quotation shows that Holden is scared and worried about Phoebe growing up. Eventually, Phoebe will learn what the word means just like Holden did. There is no stopping the process but Holden erases the sign anyways to symbolize his determination. He does eventually realize that he cannot stop the process when he tries to erase another sign that does not come off. Not only is Holden afraid of change, but he refuses to acknowledge this fear so whenever he is forced to, he invents a fantasy that adulthood is a world of ââ¬Å"phoniesâ⬠. Holden shows this when he says ââ¬Å"Sex is something I just donââ¬â¢t understand.I swear to God I donââ¬â¢tâ⬠on page 93. Instead of acknowledging that having sex scares and mystifies him, Hol den invents a fantasy that adulthood is a world of superficiality and hypocrisy by telling the readers horrible things about sex. The first step to solving a problem is admitting that there is one. Holden does not even know he has a problem let alone admitting it. At the end of the novel, Holden does however find out that he has a problem but he still does not want to admit it which suggests that he is still trying to achieve is goal and believes that one day he will achieve it.Holdenââ¬â¢s view of society shows that Holden only points out the phonies around him to make him feel better, yet he does not realize that he is flawed. Through out the novel, Holden criticize adults behind his smiles because it makes him feel superior without having the sense of guilt since the adults does not know. This is shown when Holden vents his feelings about Spencerââ¬â¢s advice. On page 8 he says ââ¬Å"Game, my ass. Some game. If you get on the side where all the hot-shots are, then itââ¬â ¢s a game, all rightââ¬âIââ¬â¢ll admit that. But if you get on the other side, where there arenââ¬â¢t any hot-shots, then whatââ¬â¢s a game about it?Nothing. No game.. â⬠. Hiding behind Holdenââ¬â¢s nodding and smiling is himself cursing and mocking Spencer. While Spencer is trying to tell Holden the importance of playing by the rules, Holden mocks his analogy instead of looking at the main point which shows that he doesnââ¬â¢t really care about what Spencer has to say even though it has been established that Holden thinks about Spencer quite a lot. Every time Holden criticises the ââ¬Å"phoniesâ⬠around him, he criticises them in a way that convinces the reader that he is right to build up his self esteem.This is shown when Holden says ââ¬Å"Then I tried to get them in a little intelligent conversation, but it was practically impossible. You had to twist their arms. You could hardly tell which one was the stupidest of the three of them. Then the thre e of them of them kept looking all around the goddam room, like as if they expect a flock of goddam movie stars to come in any minute. â⬠On page 73. Holden believes that the three women were looking around the room because they are stupid, but he does not consider the fact that the three women were looking around the room because they were bored of him and wanted him to go away.Holden makes a statement that can be easily argued into a true fact that is written in stone and cannot be erased by using slang and the unique tone of voice he has. It makes everything he criticises seem true which makes himself feel better. Holden needs to realize that his view of society is wrong and that children will have to grow up and that there is no way to stop it. Holden says on page 119 ââ¬Å"God, I love it when a kid's nice and polite when you tighten their skate for them or something. Most kids are. They really areâ⬠because he loves children. Throughout the novel, Holden has never cr iticised, offend or cursed at children.He always says nice things about them. This is because he likes children and he does not want children to mature into young adults. On the contrary, Holdenââ¬â¢s view of a perfect childhood is as incorrect as his view of the adult world as entirely ââ¬Å"phoney,â⬠and just helps Holden hide from the fact that the complex issues he will have to face in growing up terrify him. This form of delusional craziness can only last so long. Holden will eventually grow up, whether he likes it or not. Mr. Antolini and Phoebe both make it clear that unless he learns to accept the complexities of adulthood, he will end up, at best, bitter and alone.To cope with society and the adult world, Holden alienates himself from the people he considers ââ¬Å"phoniesâ⬠so that he will be able to resist growing up. Throughout the novel it is seen that Holdenââ¬â¢s alienation is the cause of most of his pain but it is also a source of Holdenââ¬â¢s st rength. This is shown when His loneliness gets him into his date with Sally Hayes, but his need for isolation causes him to insult her and drive her away. As the novel progresses it shows that Holden desperately needs human contact but his protective wall of bitterness prevents him from having interactions with other humans for too long.He wants to have a relationship but he does not want to commit to it because he knows that when he does commit to a relationship, he will turn into an adult and live an adult life. That is why he tells Sally Hayes to run away with him. Holden does not want to deal with the complexities of the world around him so he tries to escape it to resist the process of growing up. Holden tries to escape the adult world by not thinking about it and dreaming of a world where nothing changes.But when Holden goes to the Museum of Natural History, it gives him something to think about. He says ââ¬Å"The best thing, though, in that museum was that everything always stayed right where it was. Nobodyââ¬â¢d move. . . . Nobodyââ¬â¢d be different. The only thing that would be different would be you. â⬠(page212) The Eskimos are silent, and always the same. Holden can think about and judge the Eskimo in the display case, but the Eskimo will never judge him back. It troubles him that he has changed each time he returns, while the museumââ¬â¢s displays never changes.They represent the simple and manageable vision of the perfect life that Holden wishes he could live and stay in forever. After reading the novel, readers learn that although Holden goal is crazy, in the end he has great determination. Readers notice that at the end of the novel, Holden has not changed. He still tries to resist growing up, he still mocks the people he considers phonies, and he still alienates himself from the people he considers ââ¬Å"phoniesâ⬠. Holdenââ¬â¢s character is very unusual but it teaches readers about maturity and how hard it is to not gro w up.
Monday, July 29, 2019
Commercial law Case Study Example | Topics and Well Written Essays - 2250 words
Commercial law - Case Study Example States and the UK are different, and nowhere is this more exemplified than by the respective responses by these two Government following major incidents of corporate fraud. This Case review compares some of the differences between the corporate environments operating in each of these jurisdictions, and explains how they may have contributed to such divergent responses. One can characterise these responses as legislative and/or regulatory. Legislative responses refer to legal changes that are made, which force businesses to change their practice if they are to remain compliant. In this instance, legislation is an externally enforced means of changing corporate behaviour. Regulations on the other hand can be externally or internally generated, and can promote a desired change of behaviour through legislature or through Codes of practice developed by industry bodies such as the group representing licensed auditors. Whether the regulations are internally or externally generated, one important aspect in which they differ from legislative regimes is the higher degree of importance placed on monitoring of entities within regulatory regimes. Legislative regimes primarily depend on the sanctions to foster compliance. Immediately, following the corporate governance crisis that occurred in the United States in 2002, the federal government implemented far reaching legislature, to protect investors from such levels of corporate fraud. On the other hand, when the U.K experienced a similar crisis in its corporate governance system in 1991, the response was much different. What followed was over a decade of Commission reviews which each provided best Codes of Practices for agents within the corporate governance regime. Eventually legislature on corporate fraud was only enacted in the Fraud Act of 2006. The analysis in this review points to some of the reasons that these government undertook such different responses. Firstly, prior to the crises, there was significant
Sunday, July 28, 2019
Network Environment Management Essay Example | Topics and Well Written Essays - 5000 words
Network Environment Management - Essay Example For instance, finance data must be protected and only be accessible to the finance staff. For this purpose, an authentication mechanism i.e. Microsoft Active Directory is implemented. Microsoft Active directory will enable West Products to centralize data in one location and facilitate in audit functions. Moreover, for protecting unauthorized access, audit trails, user account logs are generated. For security aspect, active directory restricts the user from windows components, data sources, and the Internet. To add extra layer for protecting unauthorized access by the internal as well as external employees, Virtual LAN is implemented. The VLAN will divide the departments logically by separate addresses. For instance, Finance department data will not be intermixed with Sales data. For redundant Internet connections, Service Level Agreement (SLA) is established with Internet Service Provider. 2 Introduction The computer networks involved thousands of elements, a variety of devices and protocols, including interactions and relationships between components therefore enhanced network management for large scale systems has developed. In addition, the network has to fully informative and must contain effective management tools in order to make sure efficient and trouble free operations. Now days, non-integrated tools are used for the usual enterprise wide network management. These tools provides incomplete and limited outlook of the network and the management necessities. For this reason, significant problems arise that effect the management techniques. There is a requirement for a Network Management, Analysis and Testing Environment for achieving unified and inclusive software environment that helps to supervise and orchestrate the operations of the devices and protocols within the network management systems. The network management environment management represents the tools that provide knowledge regarding the management techniques. Moreover, effective deployment of the model resolves various network difficulties. The functional behavior of the network objects are confined and distributed equally. For instance, the distribution process and maintenance of data structures via multiple switches and network controls are involved in a virtual-circuit X.25 network. These distributed objects are significantly examined by the individual devices. Therefore, essential data must be handled by this model facility. Likewise, in a multi layered protocol, the behaviors of the network objects and the behavior of an individual layer are extremely correlated. For instance, a telnet session highly depends on the transport-layer (TCP) and network-layer (IP) functions in TCP/IP protocol suite. As a result, the network level connections failure may lead to the failure in the upper layers. This is represented by the network model as the interpretation of correlated behaviors. On the contrary, the statically configurations do not capture all the correlated behavior c hanges as, much correlation are the result of the vibrant interactions between the objects. 3 Proposed Solution for West Products The proposed solution for West products requires a synchronized active directory services along with all the 3 branches including the head office. As shown in fig 1.1, the branches are equipped with an active directory site that is synchronized with all the other sites and the domain
Saturday, July 27, 2019
Media Ethics (Philosophy) Essay Example | Topics and Well Written Essays - 1250 words
Media Ethics (Philosophy) - Essay Example And with this haunting oneââ¬â¢s mind, there is basically nowhere to better start looking for the answer but in the very institution that is created for these dynamic exchanges ââ¬â media. Recognizing the vast influence and the major role that mass media plays in he lives of people, Noam Chomskyââ¬â¢s definition of mass media strikes at the very heart of what it is all about. He claims that ââ¬Å"the mass media serve as the system for communicating messages and symbols to the general populace. It is their function to amuse, entertain, and inform, and to inculcate individuals with the values, beliefs and codes of behavior that will integrate them into the institutional structures of the larger society.â⬠1 If the very nature of mass media is what Chomsky describes it to be, it is but fitting for us to reevaluate the value of mass media, as we now know it. Edward S. Herman and Noam Chomsky in their book Manufacturing Consent: The Political Economy of the Mass Media claim that mass media is never really objective and fair in its account of what is happening around us, around the world. Rather, mass media since the start of the late modern period and made more significant after the end of World War II has been an institution that caters to the demands and whims of the capitalists owners and major stock holders in the field. Thus, tainting the noble start of media ââ¬â to inform people. Chomsky is in fact claiming that media is in effect a tool that is being used for propaganda by the superstructure that dominates the society. And this is made possible because the ââ¬Å"raw material of news must pass through successive filters, leaving only the cleansed residue fit to print. They fix the premises of discourse and interpretation, and the definition of what is newsworthy in the first place, and they explain the basis and operations of what amount to propaganda campaign.â⬠2 And one of these filters is ââ¬Å"anticommunismâ⬠as
Internet Technology, Marketing, and Security Essay - 2
Internet Technology, Marketing, and Security - Essay Example In today's era internet is used as a promotional tool by many global and international organizations. Organizations make use of internet to capture market in today's competitive environment. The Internet is useful for attracting customers by providing them a great variety of services and relevant information about the products or services. There are specific digital internet sources mostly used for the purpose including official websites, social networking sites, blogs, etc (Silverstein, 2001). Marketing, customer dealing, promotion, and other operational management procedures have become much easier within past few years due to remarkable advent and advancements of internet technology. With the advancements of internet, communication modes have become very fast, diverse, and smart (Silverstein, 2001). The World Wide Web has brought tremendous change in the way businesses are run in multinational corporations. For successful business progress, advertising and marketing are two most important tools and with the revolutionized modern technology internet has become exceedingly popular among businesses of all sizes. Mainly because internet has pull out all businesses from tissue-thin, pages of directory for contact details and advices from friends and family members for establishing businesses (Silverstein, 2001). Now business professionals have an opportunity to learn business and marketing techniques from e-sources.
Friday, July 26, 2019
Do not need to divide it Coursework Example | Topics and Well Written Essays - 2000 words
Do not need to divide it - Coursework Example If it is used to store an account object, it is known as the domain container. In certain cases it is used to indicate the Windows structure by means of the concerned directory. (Schmidt 2008) The domain structure has gone through various changes and the environment and structure of Windows has changed when compared to the past. The domain structure depends on the operating system and hence the domain structure must be modified each time the operating system is changed. Windows domain is completely different from that of other operating systems. Initially domains had the ability to store the user accounts pertaining to a company. But this often led to problems related to data access, since the company in a different city was deprived of its chances to access the required data. (Tiensivu 2008) In this stage, Microsoft altered the usage of domains by introducing domain trusts that helped in the easy access of data. The domain trusts help the employees to access the data only if they ar e directed form a trusted domain source. In this case, the domain which allows the access is known as trusting domain. In the initial stages of development, domains were individual components that were isolated from each other. The changes in the Windows environment changed the entire structure of domain and created a separate structure for these domains. The Windows NT domain structure is completely different from that of Windows 2000, 2003 or 2008. (Posev 2007) The use of domains does not end with database account management; instead they are also used for resource management. The domain structure includes domain controllers and domain name spaces. Domain names are initialized by the Domain Name Servers (DNS) which acts as an intermediary between the systems in a network. The use of domains and their structure varies according to the operating system. (Comer 2006) Domain Structure The domain structure is composed of several domains where they are considered in a hierarchical patte rn. The domains are grouped into a single tree with a root domain. Even a single domain can be made into a tree by including the sub domains from other systems. If the numbers of domains are more, then they are treated as a forest where the first domain is known as forest root. The domain trusts also form a part of the domain structure. In simple terms domain trusts are described as the relationship between two different domains. (McNab 2007) The trust relationship might be either one way where one domain permits the users to access another domain, or two ways where users have the accessibility to both the domains involved in the trust relationship. Role of Domain Structure Windows 2008 allows both one way and two way trust relationship between the domains. In this way it is advantageous, since the users can have an access to both the databases. Cross link, transitive and explicit are the other types of trust relationships that can be established between the domains. The next import ant aspect of domain structure is the domain controller. The domain member of a tree can be made as a domain controller by specifying certain commands. This domain controller manages the other domains in the system. It ensures that the domains perform their operations in a proper manner. (McClure 2009) Windows operating system uses Primary Data Controller(PDC) (McNab, 2007) which controls the entire operations of the domains included in the system structure. Windows can
Thursday, July 25, 2019
Surrealism and Dada Essay Example | Topics and Well Written Essays - 1000 words
Surrealism and Dada - Essay Example The essay "Surrealism and Dada" explores such movements as surrealism and dada. To elaborate on how certain aspects inspire the emergence of an art movement, the following study essay will evaluate two art movements; Dada and surrealism, giving their inspiring factors, how they differ, and how they are similar to each other. This art movement emerged around the 20th century in Hannover, Berlin, Paris, New York and Zurich. History has it that the movement was born out of resistance, inspired by the war, World War I, that was going on. Dada art was about provocation and confrontation of the already established (ancient) values of art, going against all the set norms. There is evidence that Dadaists were against the colonialist and bourgeois nationalist interests who to them were the initiators of the war, and as such, resisted much of what society had been accustomed to, and art was not an exception. In short, it was the opposite of what art used to be, and there was no following of an y set rules. Under the wider Dadaism, there was graphic design, poetry, theatre, and most importantly visual arts. The main attribute of Dada art was that it was meant to provoke an emotional reaction from the audience, and particularly outrage or shock, and when any form of art intended to be Dada failed in achieving these attributes, it had to be taken back to the drawing board until it achieved its mandate. Art would only be attributed to as being Dada if it resisted the societal norms, or rather, the type of art that people.
Wednesday, July 24, 2019
Project finance deals usually require some form of Governmental Essay
Project finance deals usually require some form of Governmental support. What Governmental or Legislature actions create better - Essay Example It can be well depicted from the definition provided by Benjamin C. Esty, which states that ââ¬Å"Project finance involves the creation of a legally independent project company financed with equity from one or more sponsoring firms and non-recourse debt for the purpose of investing in a capital assetâ⬠3. Project financing include various features which in turn develops the entire process to be complex and multifaceted. Few of the major characteristics involved in project financing relates to the nature of the contract among the project company and the parties who are financially responsible for the completion of the project. Project financing also involves the legal agreement between the financially accountable parties and the project company, focussed on the availability of cash to assist the operational expenditures and fulfil the requirements of debt services in any circumstances. Another major attribute of project financing is that the process includes a legal consent from the involved parties which intends to secure the process of the project financially in case of any defaults arising even after the completion of the project. Thus, the process involves various risks in form of credit and commercial threats4. The basic features identifiable from the above provided description and definitions of project financing imply that it is a legal process and requires strong and effective regulatory interventions in its course to reduce the risks involved. This signifies the role of government to be quite significant in structuring the legislative actions concerned with minimisation of risks involved in project financing. However, in project financing, not only the regulatory frameworks, but other macro-economic factors also play crucial roles which can be controlled by governmental support. Based on this thought, the paper will intend to recognise and critically evaluate the governmental measures that can effectively support project financing in the modern day context. The Complex Structure of Project Finance With a general point of view, it can be stated that project finance intends to create an entity which is based on a special-purpose and aimed at the achievement of a particular goal, unlike any other commercial institution. For instance, an entity created with the aim to develop a power plant or a petrochemical unit or a toll road or even railways and operate it with the sole purpose for serving the state5. Thus, it is quite apparent that the purpose of project finances is predominantly broad which involves multiple facets and disciplines for its achievement. It is in this context that the structure of project finances are divided into two broad disciplines, i.e. the development of the project and finance. Both the disciplines are termed to be quite significant. The progress of the project deals with the functions performed by corporate players entitled to develop the project. Similarly, the finance discipline concentrates on the fu nding of the project representing the relationship between the financial lenders and the project development6. According to the experts, project financing is a complex process which involves mu
Tuesday, July 23, 2019
Advice on Advancing Funds against Military Retirees Pensions Case Study
Advice on Advancing Funds against Military Retirees Pensions - Case Study Example Unconscionability is a legal principle in contract law relating to conditions which are so much unfair or substantially skewed to benefit the party with greater bargaining power. As such, the contracts made therefrom negate the values of good conscience in the contract. Generally, an unconscionable agreement is considered to be invalid because the disadvantaged party would not have agreed to it under reasonable circumstances. As such, the party with greater bargaining power is not usually permitted by courts to enjoy the benefit(s) because the contract lacks sufficient consideration by the other party for a fair share of the risks and benefits. Unconscionable contracts are determined by assessing the conditions of the contractors when the agreement was made, such as each partyââ¬â¢s knowledge or mental competence, age, and bargaining power. Other equally vital factors are; lack of options and acts of inducement. Wasik noted that unconscionable behavior is also occasioned by misrepresentation of fact and fraud, especially where intentional distortion of fact results in the loss of a valuable asset. When an individual or party benefits from a contract to the detriment of another, the perpetrator may be liable for criminal fraud or deceit in a civil action. In Universal Grading Service v. eBay, Inc., 2009 U.S., eBayââ¬â¢s actions of influencing the value of the coin in its online auction processes were found to be conscionable because it was not fraudulent. In this case, the test for unconscionability will depend on whether the military retirees had the ability to match the Clientââ¬â¢s when they were forming the contract.Ã
Monday, July 22, 2019
Paper Analysis on the Poem Dulce Et Decorum Est Essay Example for Free
Paper Analysis on the Poem Dulce Et Decorum Est Essay Wilfred Edward Salter Owen born 8 March 1893, died on 4 November 1918. Were an English soldier and poet (one of the leading poet in World War 1). Wilfred Owen was born at Plas Wilmot, a house in Weston Lane, near Oswestry in Shropshire, on 18 March 1893, of mixed English and Welsh ancestry. He was the eldest of four children, his siblings being Harold, Colin, and Mary Millard Owen. Line By Line Interpretation Lines 1-2 Beggars used to put everything they owned in some sort of sack which would then carry over their shoulder. The soldier, like the beggar is bent over in pain. The solider could also from the gas attack. ââ¬Å"Knock- kneed,â⬠suggest that the soldier is trying to keep his knees together and his feet wide apart as a way to keep him steady so that he can continue to walk. Owen compares to ââ¬Å"old beggarsâ⬠and ââ¬Å"hagsâ⬠as a way to say that the soldiers have lost their youthfulness due to fighting in this war. The symptoms listed here is due to a mustard gas attack; the solider experienced blisters, sore eyes, and vomiting. Line 3-8 The solider try to go back to camp to recover from the effects from the mustard gas attack. ââ¬Å"Haunting flaresâ⬠are the flashes of life that accompany artillery shell. ââ¬Å"Distant restâ⬠can be interpreted in two ways: first, when the soldier reaches camp they would be able rest and recovered from the attacks; the second interpretation could be death. It could take a while for a solider to die from exposure to mustard gas. ââ¬Å"Limped on blood shots furthers the opinion that this was a mustard gas attack, because men would get sores over their bodies from being exposed to this gas. Of course, itââ¬â¢s also possible that they were just hit with artillery fire but in keeping with the context of this poem it makes more sense that this would be an effect of some sort of gassing. ââ¬Å"All blindâ⬠was another symptom of the attack; they eyes would become very inflamed and puffed up so that it would make it hard for them to see. ââ¬Å"Five-ninesâ⬠are the five point nine calibre shells that were fired on the British soldiers in this particular instant. When the shells were fired they made high pitched sound, described by Owen as hooting. Line9-14 This is the part of the poem that describes a chlorine gas attack. ââ¬Å"An ecstasy of fumblingâ⬠can be interpreted as the soldier so overwhelmed with being scared and nervousness that they are fumbling with their helmets while they were trying to put them on. The helmets here are referred to as mask gas. There were many varieties of gas mask during WWI; with each new development in gas war fare the helmets had to be adapted to protect the soldier. In the early days of chlorine gas attack, men would put damp cloths over their mouths and noses, which would reduce the effects of the gas on the men. Gas masks were later produced to protect soldiers from this gas. Line 15-16 This section can be read as nightmare. This scene of death haunts the narrator of this poem these men saw death every day and with the introduction war fare one could argue that death took on a whole new significance for them. The drawn out death of men expose to the gases will leave more of an impression of the mind of that of a quick death. More and more men had to be treated for post-traumatic stress disorder due to them not being able to deal with everything that they saw while they were enlisted the solider described here a slowly dying. (Line16) Lists all the actions that a person would do if their air supply was cut-off. Line 17-24 This section of the poem describes a soldier with post-traumatic stress would think. The narrator describes this dream as smothering like he is the one that is suffocating rather than the soldier. There was little that cloud be done for the soldiers once they were expose through this gas and that made that people feel really uneasy. ââ¬Å"Like a devilââ¬â¢s sick of sinâ⬠could mean that the soldier was as tired as the devil of the sin that he and others took part in. ââ¬Å"The bloods come gargling from the froth- corrupted lungsâ⬠is a very descriptive image that would probably make anyone sick to their stomach if they actually had to see it first-hand. This is an image that would stick with someone for a long time, haunting their memories. It is these kinds of memories that can cause post-traumatic stress disorder. Lines 25-28 Owen is referring to Jessie Pope when he says ââ¬Å"My friend.â⬠He is telling her that is she knew the reality of the war she would not be propagandizing it to young men. Pope prays on the young mens desire to be glorious heroes without telling them the ramifications of enlisting Significance of the Title The title is significant because e it highlights the horror and reality of war especially on the first war. The war is reflected in the Latin word ââ¬Å"DULCE ET DECORUM EST PRO PATRIA MORIâ⬠. This phrase can be translated as it is sweet and rite to die for your country. Owen states as an ââ¬Å"Old Lieâ⬠and he illustrates this in the poem. His illustration of the reality war is that an incident of exhausted soldier studded through the mud of the soldiers. They are leaved the front line in order to rest for a few days in a safer place. However the group is attacked by mustard gas. One soldier was last in putting his mask. Owen describes the symptoms shown by7 the man as the poison slowly kills him. Tone of the Poem The tone of the poem is harsh due to the diction. ââ¬Å"Coughing like hagsâ⬠, ââ¬Å"Curse through sludgeâ⬠Poetic Devices ââ¬Å"Bent doubleâ⬠is an example of an hyperbole it conveys the feeling of exhaustion felt by the soldiers, were carrying heavy packs and being sleepless in the trenches. Metaphor: ââ¬Å"Drunk with fatigueâ⬠the feeling the soldier were having due to mustard gas effect Alliteration: ââ¬Å"Knock-kneed coughing like hags, we cursed through sludge.â⬠create and impression of panic an urgencies. Simile: ââ¬Å"Like a man in fire or limeâ⬠to express the burning and blistering of the pain caused by the mustard when it came into contact with their skin. Rhyme: ââ¬Å"Sacks ââ¬âbacks, sludge- trudge, boots-hootsââ¬
Creation of the CIA Essay Example for Free
Creation of the CIA Essay Despite the popular perceptions generated by Tom Clancy novels and James Bond movies, American intelligence gathering was not a Cold War invention: it has existed since the Republics founding. George Washington organized his own intelligence unit during the Revolutionary War, sending spies behind enemy lines and overseeing counterespionage operations. In 1790, just three years after the Constitutional Convention, Congress acknowledged executive prerogative to conduct intelligence operations and gave then-President Washington a secret unvouchered fund for spies, if the gentleman so pleases. [1] Intelligence has been a component of American foreign policy ever since. More important for our purposes, Americas growing involvement in world affairs during the late nineteenth and early twentieth centuries led to the establishment of several permanent intelligence organizations. In 1882, the Office of Naval Intelligence (ONI) was created and charged with collecting technical data about foreign navy ships and weapons. Three years later, the Department of War established its own intelligence unit the Military Intelligence Division (MID). In 1908, the Federal Bureau of Investigation opened its doors. By the 1930s, the FBI had become the nations preeminent counterespionage agency and had branched into running intelligence activities in Latin America.[2] The State Department, meanwhile, had developed an expertise and a mission, which focused on overt information collection. Finally, several critical events sparked the creation of a new wartime central intelligence agency under the Joint Chiefs of Staff, the Office of Strategic Services (OSS), which collected information, analyzed raw intelligence, and carried out a range of covert, subversive operations abroad ââ¬â from propaganda, to sabotage, to paramilitary operations. By the end of World War II, these five bureaucratic actors were vying for their own place in the postwar intelligence arena.[3] This was hardly the same straightforward War versus Navy Department environment that gave rise to the National Security Council system or the Joint Chiefs of Staff. It is frequently cited that former President Truman never thought that when he created the CIA it would ever be involved in peacetime covert operations. In 1964 Allen Dulles, one of the most influential Directors of Central Intelligence in CIA history, challenged Trumans remarks, saying that although Truman did not care for dirty Gestapo tactics, the CIA had certainly performed them during his presidency.[4] This paper will chronicle the transformation of the Office of Strategic Services (OSS) into the Central Intelligence Agency. It also will examine how and why the peacetime Central Intelligence Agency came to possess many of the same powers as its wartime predecessor.à In particular this paper will focus on the OSS legacy of covert operations and how the CIA inherited that legacy. The Creation of CIA During World War II, the OSS wielded broad powers, including clandestine intelligence gathering and covert political warfare. William Donovan, Director of the OSS, exhorted the United States to maintain the OSS or a close facsimile of it in the post-war period. The end of the war and the reminder of another secret organization that waged covert political warfare, the Nazi Gestapo, influenced President Truman to dissolve the OSS. However, as the United States gradually entered the Cold War with the Soviet Union, the necessity of a peacetime intelligence agency became apparent. To meet the need, Truman created the Central Intelligence Group (CIG) in 1946.[5] In 1947 Congress transformed the CIG into the Central Intelligence Agency (CIA). The powers of the CIA increased dramatically as U.S. policymakers began to perceive an increasing threat of Soviet-Communists bent on world domination. By 1952 the CIA closely resembled the wartime OSS, having the same authority and capabilities. At the same time the War Crimes Trials were being conducted at Nuremberg, American intelligence officers were secretly interviewing high-ranking German officers to determine their potential usefulness in supplying intelligence on the Soviet Union. Three critical events were significant influences on the Truman Administration officials who founded and built the CIA. The first was the Japanese surprise attack on Pearl Harbor, which demonstrated that the United States was unprepared, not for want of information, but because no apparatus existed to filter and analyze the large volume of available information in a way that could produce accurate intelligence. This infamous intelligence failure clearly demonstrated that the security of the United States would be greatly compromised until it developed a peacetime centralized intelligence agency.[6] The second significant event was Stalins seizure of political and military control of most of Eastern Europe in violation of his wartime understanding with the Allied Powers. The fighting in Europe had only recently ended when American and foreign reports on Soviet activities in the occupied territories began to distress leaders in Washington, London, and other capitals. The third event concerned the sponsorship by Soviet and Chinese Communists of the North Korean invasion of South Korea. This sponsorship heightened Cold War tensions and strengthened the conviction of policy makers to buttress the CIAs power to fight communism. Pearl Harbor illustrated the need for a peacetime central intelligence service and the Cold War struggle with the Soviet Union galvanized the Truman Administration to create a peacetime intelligence organization with quasi-wartime powers. During World War II, the United States created the first American centralized intelligence agency, the Office of Strategic Services (OSS). On June 13, 1942, a Military Order issued by President Roosevelt created the OSS and granted it broad powers that included intelligence analysis, clandestine collection, and paramilitary, psychological and political warfare.[7] The agency operated under the authority of the Joint Chiefs of Staff. It was devoted to the business of sabotage, espionage, counterespionage, and covert action, hallmarks that would be passed on to its successor, the CIA. The OSS was involved in both intelligence gathering and clandestine political warfare. To combine both of these capabilities in one agency, Donovan assigned different functions to separate branches of the OSS. Three of the main branches of the OSS were Special Operations (SO), Secret Intelligence (SI), and Counterintelligence (X-2).[8] The OSS was extremely successful in carrying out covert operations. The first important OSS covert operation was conducted in North Africa. Several assassinations, allegedly including that of Vichy French Admiral Darlan, were carried out by the Morale and Special Operation departments of the Psychological Warfare Division of the OSS. The success of the operation earned the burgeoning agency great respect and notoriety, especially in regards to covert action.à à The CIA would soon inherit the OSSs wartime experience and assassination methods.[9]à The OSS was also remarkably successful in setting up and maintaining clandestine agents in Thailand. The OSS established a solid foundation for future CIA activities in the Southeast Asia.[10] Even early in World War II, paramilitary and political covert operations gained support of high-level figures, such as Roosevelt and Eisenhower, and began to eclipse the accomplishments of intelligence collection.à à The OSS emphasis on covert paramilitary operations would be one of the primary legacies passed on to the CIA As historian John Ranelagh noted, The benefits of covert paramilitary action in peacetime tended to be favorably regarded on the basis of a romantic recollection of these wartime experiences of the OSS.[11]à Perhaps the most important legacy the OSS bestowed upon the CIA was that of former OSS personnel who filled the ranks of the fledgling CIA with experienced intelligence officers. Four OSS veterans, Allen Dulles, Richard Helms, William Colby, and William Casey, went on to become Directors of the Central Intelligence Agency. Throughout the war, the OSS proved to be invaluable in both intelligence collection and covert operations, clearly illustrating the advantages of combining these two capabilities in one agency. In 1944 President Franklin Roosevelt requested a secret memorandum on the subject of a postwar intelligence service from General Donovan, OSS chief. Donovan exhorted President Roosevelt to create a permanent, worldwide intelligence service after the wars end. Donovan anticipated the Cold War struggle: When our enemies are defeated the demand will be equally pressing for information that will aid us in solving the problems of peace.[12]à Donovan went on to argue that the OSS had the trained and specialized personnel needed for the task. This talent should not be dispersed.[13] Donovans proposal was foiled by the Director of the Federal Bureau of Investigation (FBI), J. Edgar Hoover, who wanted the FBI to have the exclusive right to collect and analyze intelligence on a global level. Hoover obtained a copy of Donovans proposal for a postwar intelligence service and leaked the top-secret document to the Chicago Tribune. The newspaper printed a number of inflammatory stories about Donovans plan to create a super-spy network. Congressional uproar, no doubt spurred by the bad press, caused the peacetime central intelligence agency proposal to be shelved.[14] The cautious Roosevelt was optimistic about Donovans plan, but offered no guarantees. After Roosevelts death and the close of the war, President Truman stated in a letter to Donovan that said he would liquidate those wartime activities of the Office of Strategic Services which will not be needed in time of peace.[15] Truman feared Donovans proposed centralized peacetime intelligence agency might one day be used to spy on Americans.[16] However, the reminders of Pearl Harbor and the intensifying Soviet aggressions made Truman realize that the United States could no longer deny its role as a world leader and, as such, it would require a formidable centralized intelligence agency. Even before Truman abolished the OSS, he recognized the necessity and requested proposals for the creation of an organization to collate and coordinate intelligence.[17] Upon learning of Trumans plan to disband the OSS and transfer functions to separate agencies, Donovan sent a memorandum to President Truman, on September 13, 1945, pleading that in the national interest, and in your own interest as the Chief Executive, that you will not permit this to be done.[18] President Truman, ignoring Donovans objections, issued Executive Order 9621 on September 20, 1945, titled Termination of the Office of Strategic Services and Disposition of Its Functions.[19] According to the Order, the State Department took over the OSS Research and Analysis Branch, while the War Department adopted the remnants of the OSS clandestine collection and counterintelligence branches, which it named the Strategic Services Unit (SSU). The capability that the wartime OSS had developed to perform subversive operations abroad was officially abandoned.[20] In December 1945 Truman deliberated proposals from both the State Department and the Joint Chiefs for a new centralized intelligence agency. Truman ultimately opted for a diluted version of the more simplistic and workable Joint Chiefs proposal.[21] The result was the creation of the Central Intelligence Group (CIG) on January 22, 1946. Naval Reserve Rear Admiral Sidney Souers was selected to be the first Director of Central Intelligence (DCI). President Truman invited Souers to the White House two days after creating the CIG to award him a black cloak and dagger as symbols of his new office.[22] The CIG was drastically understaffed, consisting primarily of officers borrowed from the State Department and the military services. The new agency was only a shadow of the wartime OSS. The CIG had no authorization to collect clandestine foreign information from agents in the field or to form a consensus based on information gathered from other intelligence agencies. The primary function of the agency was to coordinate the flow of intelligence to policymakers. Truman attempted to keep covert action, a prominent part of the OSS, out of this peacetime agency.[23] In reference to the directive creating the CIG, Truman stated, No police, law enforcement or internal security functions shall be exercised under this directive.[24] Compromises in the Joint Chiefs plan to appease the State Department and the Bureau of the Budget had made the CIG an interdepartmental body that lacked its own budget and personnel.[25] However, President Truman greatly appreciated the Daily Summary produced by the CIG. The Daily Summary was prepared according to Trumans own specifications, and when complete satisfied his requirements, it saved him the time of having to search through the hundreds of intelligence reports that normally flooded into the White House.[26] Rear Admiral Sidney Souers, after five months as DCI, was replaced with U.S. Army Air Forces Lieutenant General Hoyt S. Vandenberg. DCI Vandenberg had an impressive military record and had the clout and ambition necessary to build the CIG into an agency that wielded great power. In just one year as Director, Vandenberg broadened the CIGs power to incorporate an independent budget and work force and won the authority to collect and analyze, as well as collate, intelligence. The CIG expanded in importance as the United States attempted to contain the Soviet Union in Europe.[27] At this point, all sides thought the intelligence battle was over. Donovan and OSS were out of the picture, the State Department had come back into the fold, and the president had created a Central Intelligence Group, which left each department to run its own intelligence affairs. As Truman and his warring military services now turned to drafting a compromise military unification bill, the intelligence consensus was clear: any legislation should include provisions codifying the presidents CIG directive. Doing so would freeze the existing intelligence system into law, insulating it from the whims or desires of future political players. On this much, at least, the War and Navy departments agreed.[28] The Central Intelligence Group did not. Ink on the CIG directive had hardly dried before the agency began taking on a life ââ¬â and agenda of its own. CIGs problems were apparent from the start. During the early months of 1946, departmental intelligence services readily bypassed the central agency, sending their information and taking their case directly to the president They provided CIG with a small budget and a meager, mediocre staff. They refused to share raw intelligence and ignored the agencys efforts to reconcile or synthesize conflicting information. As Anne Karalekas writes, the intelligence units jealously guarded both their information and what they believed were their prerogatives in providing policy guidance to the President, making CIGs primary mission an exercise in futility.[29] The problem was simple: CIGs success hinged on the generosity of those who wanted it to fail. Trumans directive appeared to be working too well. Frustrated with their agencys impotence, CIG officials soon began pressing for substantial changes. In their capacity as National Intelligence Authority members, the Secretaries of War, Navy and State granted some significant concessions. But these were not enough. In July of 1946, CIG General Counsel Lawrence R. Houston sent a draft Bill for the Establishment of a Central Intelligence Agency to the White House which sought to transform CIG from a small planning staff to a legally established, fairly sizable, operating agency.[30] This move came as an alarming surprise to the White House, which was now deeply embroiled in the unification conflict. As Troy writes, In this perspective, where the White House had the difficult problem of getting generals and admirals to agree on a fundamental reorganization of their services, the legislative problem of the CIG must have seemedan unwelcome detail.[31] As the War and Navy Departments moved towards compromise, the president and his legislative drafting team hardened toward CIG. By January, when the military finally agreed to a comprehensive unification bill, the White House was in no mood to humor CIGs demands that the legislation specifically outline CIA functions, make the Director of Central Intelligence a statutory nonvoting member of the NSC, provide procurement authorities, or grant the CIA power to coordinate foreign intelligence activities and operate centrally where appropriate. Such controversial measures threatened to reignite military opposition and reope n the entire unification conflict.[32] Thus, as CIG pressed for more, the White House responded with less. On 26 February, the President submitted his draft National Security Act to Congress. It included only the barest mention of the CIA ââ¬â enough to transform the CIG directive into statutory law, and nothing more. In just 30 lines, the CIA section established the agency, placed it under the National Security Council, gave it a director appointed from civilian or military life by the president (with the Senates consent), and authorized it to inherit the functions, personnel, property, and records of the Central Intelligence Group.[33] On March 12, 1947, President Truman announced the Truman Doctrine, which was instrumental in determining the eventual shape of the CIA. Historian Harry Ransom stated, So, while Pearl Harbor may be considered the father of the CIA, the Truman Doctrine certainly was the mother; the OSS was the hero model.[34] Britain had announced that it would withdraw from Greece, allowing it to fall to the Communists. Truman decided that the United States would take on the role of a world policeman to protect all people from communist insurgency. In Trumans famous statement to Congress, he said, The peoples of a number of countries of the world have recently had totalitarian regimes forced upon them against their will. He went on to state, I believe that it must be the policy of the United States to support free peoples who are resisting attempted subjugation by armed minorities or by outside pressures.[35] These words would later justify the creation of a permanent intelligence agency with the powe r to wage political warfare in a time of peace. CIA provisions of the National Security Act went relatively unnoticed and unaltered in Congress. Instead, legislators concentrated on the more hotly contested aspects of merging the two military departments ââ¬â issues like the power of the new Secretary of Defense and the protection of the Navys Marine Corps and aviation units. In the Senate, Armed Services Committee deliberations resulted in only two relatively minor changes to the proposed CIA, neither of which dealt with CIA functions or jurisdiction.[36] In fact, the committees final report specifically noted that the Agency would continue to perform the duties outlined in Trumans CIG directive until Congress could pass permanent legislation at a later date.[37] The CIA which arose from the National Security Act of 1947 closely resembled its CIG predecessor. Like CIG, the CIA was supposed to correlate, evaluate and disseminate intelligence from other services, but was given no specific authority to collect intelligence on its own or to engage in any covert subversive operations. Like CIG, the CIA operated under the watchful eyes of other intelligence producers; where CIG reported to a National Intelligence Authority, the CIA operated under the National Security Council ââ¬â a committee including the Secretaries of War, Navy, State, Defense and the President. Mimicking the CIG directive, The National Security Act protected existing intelligence components with explicit guarantees. In deference to the FBI, the law barred the CIA from exercising any police, subpoena [sic], law-enforcement powers, or internal-security functions. It also provided that the departments and other agencies of the Government shall continue to collect, evaluate, co rrelate, and disseminate departmental intelligence.[38] Finally, the Act borrowed two broad clauses from Trumans directive, which were to have a profound impact on the CIAs subsequent development.à The new agency was charged with conducting such additional services of common concern as the National Security Council determines and with performing such other functions and duties related to intelligence affecting the national security as the National Security Council may from time to time direct.[39] Taken together, these CIA provisions created an agency, which suited War and Navy department interests to a tee. If CIG were any guide, the CIA would pose no threat to departmental intelligence agencies. Conclusions Here, too, it appears that a major national security agency was forged without much Congressional input and without much consideration of broad national concerns. Like the National Security Council system and the Joint Chiefs of Staff, the Central Intelligence Agency took shape almost exclusively within the executive branch, where bureaucratic players cared first and foremost about their own institutional interests. The CIA was clearly a product of executive branch discussions and decisions. All three rounds of the postwar intelligence battle were fought among bureaucratic actors and were ultimately decided by the president. Round one, which pitted OSS chief Donovan against the State/Justice/Navy/War department coalition, ended with an executive order disbanding OSS and transferring its functions to the Departments of State and War. Round two featured internecine warfare between top State Department officials and the military. It, too, ended with unilateral presidential action: an executive directive which implemented the militarys recommendations for a weak Central Intelligence Group. In round three, it was CIG against the White House. With the entire unification bill hanging in the balance, and with military preferences about postwar intelligence well known, Truman and his legislative drafting team took decisive action. Rebuffing CIGs advances, they introduced a National Security Act bill which included brief, vague CIA provisions. Their aim was to continue CIG under new, statutory authority while generating as little controversy as possible.[40] Truman succeeded, thanks in large part to Congressional indifference. Legislators in both chambers accepted CIA provisions with little comment or debate. Though a few Members raised alarms about the Agencys potential police power and broad jurisdiction, these voices were whispers against the wind. Average legislators had little incentive to probe deeply into CIA design, while national security intellectuals had bigger fish to fry in the unification bill. Tellingly, even those who pressed for a more specific CIA mandate ended up simply copying from Trumans CIG directive of 1946. It seems that even here, legislators were content to defer to the executive. The QA which emerged bore an uncanny resemblance to the Central Intelligence Group. Truman himself writes that the National Security Act succeeded in renaming the Central Intelligence Group ââ¬â implying the Act made no substantive changes to CIGs design or operations at all.[41] There can also be little doubt that the Central Intelligence Agency was forged out of parochial, rather than national, interests. Creating any kind of postwar central intelligence apparatus inevitably benefited some bureaucratic actors and threatened others. While OSS and CIG had much to gain by a strongly centralized system, the Departments of State, Justice, War and Navy all stood to lose. For these big four departments, promoting U.S. national security was never a paramount concern. Instead, these departments sought a central intelligence system which, above all, insulated their own intelligence services from outside interference. Paradoxically, their vision of an effective central intelligence agency was one without strong central control or coordination. The ideal CIA was a weak CIA. But why did these departments succeed? Why did the president so readily accept their vision of postwar intelligence organization? The short answer is that Harry Truman needed the military services more than they needed him. Propelled by national interest, the president had placed military consolidation at the top of his political agenda. To him, no issue was more vital to American postwar security than unifying the War and Navy Departments into a single Department of Defense, and no price was too great to achieve success. In this context, Donovans vision of a powerful statutory CIA never had a chance. From day one, War and Navy leaders strenuously opposed such a scheme. With no political capital to spare, the president went along. His executive actions and legislative recommendations all sought to create a central intelligence apparatus, which protected departmental intelligence units, rather than ensuring the new central agency would function well. Bibliography Ambrose, Stephen E. Ikes Spies: Eisenhower and the Espionage Establishment. New York: Doubleday, 1981. Andrew, Christopher. For the presidents eyes only: Secret intelligence and the American presidency from Washington to Bush. New York: HarperCollins, 1995. Cline, Ray S. The CIA Under Reagan, Bush, and Casey: The Evolution of the Agency from Roosevelt to Reagan. Washington, D.C.: Acropolis Books, 1981. Caraley, Demetrios. The politics of military unification: A study of conflict and the policy process. New York: Columbia University Press, 1966. Dunlop, Richard. Donovan: Americas Master Spy. Chicago: Rand McNally, 1982. Lowenthal, Mark. U.S. Intelligence: Evolution and anatomy. 2d ed. Westport: Praeger,à 1992. Donovan, Robert. Conflict and Crisis: The Presidency of Harry S. Truman 1945-1948. New York: Norton, 1977. Karalekas, Anne. History of the Central Intelligence Agency. In The Central Intelligence Agency: History and documents, edited by William M. Leary. University, A.L.: University of Alabama Press, 1984. Ransom, Harry Howe. The Intelligence Establishment. Cambridge, MA: Harvard University Press, 1970. Sayle, Edward F. 1986. The historical underpinning of the U.S. intelligence community. International Journal of Intelligence and Counterintelligence 1, no. 1. Smith, R. Harris. OSS: The Secret History of America. First Central Intelligence Agency. Berkeley. University of California Press, 1972. Truman, Harry S. Memoirs: Years of Trial and Hope. New York: Doubleday, 1956. Troy, Thomas F. Donovan and the CIA: A History of the Establishment of the Central Intelligence Agency. Washington, D.C: Central Intelligence Agency, 1981. [1]à Andrew, Christopher. For the presidents eyes only: Secret intelligence and the American presidency from Washington to Bush. (New York: HarperCollins, 1995),à 11 [2]à Sayle, Edward F. The historical underpinning of the U.S. intelligence community. International Journal of Intelligence and Counterintelligence 1, no. 1. 1986. [3]à Andrew [4]à Stephen E. Ambrose, Ikes Spies: Eisenhower and the Espionage Establishment (New York: Doubleday, 1981), 178. [5]à John Ranelagh, The Agency: The Rise and Decline of the CIA (New York: Simon and Schuster, 1986), 28-30. [6]à Ibid., 33-5 [7]à Ray S. Cline, The CM Under Reagan, Bush and Casey: The Evolution of the Agency from Roosevelt to Reagan (Washington, D.C.: Acropolis Books, 1981), 71. [8] à Ibid. [9] à Ranelagh, 88 [10] à Ibid., 94. [11] à Ibid., 96. [12]à Quoted in R. Harris Smith, OSS: The Secret History of Americas First Central Intelligence Agency (Berkeley: University of California Press, 1972), 383. [13] à Ibid. [14] à Ambrose, 162-64. [15]à Truman to Donovan, 20 September 1945, United States, Central Intelligence Agency, CIA Cold War Records: The CIA under Harry Truman, (Washington, DC: U.S. Government Printing Office, 1994), 15. Here on cited as CIA Cold War Records. [16]à Richard Dunlop, Donovan: Americas Master Spy (Chicago: Rand McNally, 1982), 467-68. [17]à Harry S. Truman, Memoirs: Years of Trial and Hope (New York: Doubleday, 1956), 73-76. [18]à William J. Donovan, Memorandum for the President, 13 September 1945, CIA Cold War Records, 3 [19] à Ranelagh, 99 [20]à Cline [21]à Sidney W. Souers, Memorandum for Commander Clifford, 27 December 1945, CIA Cold War Records, 17-19. [22] à Ambrose, 127. [23]à Cline [24]à CIA Cold War Records, 30. [25]à Thomas F. Troy, Donovan and the CIA: A History of the Establishment of the Central Intelligence Agency (Washington, D.C.: Central Intelligence Agency, 1981), 346. [26] à Ibid. [27] à Ibid. [28]à Mark Lowenthal, U.S. intelligence: Evolution and anatomy. 2d ed. (Westport: Praeger, 1992), 167-9 [29]à Anne Karalekas, History of the Central Intelligence Agency. In The Central Intelligence Agency: History and documents, edited by William M. Leary.à (University, A.L.: University of Alabama Press, 1984). 24 [30]à Elsey, George M, Papers. Harry S. Truman Library. Quoted in Demetrios Caraley, The politics of military unification: A study of conflict and the policy process (New York: Columbia University Press, 1966), 56. [31]à Troy, 371 [32]à Ibid, 378-9 [33]à Lowenthal, 191-5. [34]à Harry Ransom, The Intelligence Establishment (Cambridge, M.A.: Harvard University Press, 1970), 83. [35]à Quoted in Robert J. Donovan, Conflict and Crisis: The Presidency of Harry S. Truman 1945-1948 (New York: Norton, 1977), 284. [36]à First, the committee voted to make the president a statutory National Security Council member. Since the CIA reported to the NSC, this move theoretically gave the CIA greater presidential access than originally planned. However, it still fell far short of granting the agency a private channel to the president, especially since the president was not required to attend NSC meetings. Second, the Committee made clear that civilians, as well as military, were eligible for appointment as Director of Central Intelligence; the presidents bill did not rule out civilian appointments, but did not specifically mention them (Troy 1981: 380-90). [37]à Troy, 395 [38]à Cold War Records, 131-5. [39]à CIA Cold War Records, 177-8. [40]à Lowenthal, 176 [41] à Truman, 56-7
Sunday, July 21, 2019
Dependent On Their Cell Phones English Language Essay
Dependent On Their Cell Phones English Language Essay Cell phones are a must have in the modern society. They have become so central to the daily life that most people find it really hard to do without them. Just by a swipe, everything from banking services to online shopping to payment of bills are done right there on the small gadget (Brown et al. 381-394). You can listen to music and also create cyber friendship. Yes these devices are reliable, yes they are convenient and yes they simplify life. But too much of something is unhealthy. People have become too dependent on them. In as much as they provide wide and far reaching advantages, they also have their downsides. People who are addicted to the cell phones are more likely to suffer from brain cancer, physical and psychological symptoms, have broken relationships and literally be isolated from the community life (Sellman 74-76). The purpose of this paper is to take this discussion in detail by answering the question why people have become too dependent on their cell phones. In doin g so, this paper begins with a brief history of cell phone origins and proceeds to tackle the advantages and drawbacks of the small gadgets in todays culture. It concludes with a brief summary of the entire contents discussed. History of Cell Phones The history of cell phones is somewhat long and not so certain, though many argue that it could have started around 1843 with the small research of Michael Farady. He had hoped to find a space through which electricity could be conducted. His findings were later to become the reference points of the 19th century scientists. In 1865, Dr. Mahlon developed what is believed to be the first wireless communication technology. He is also thought to have transmitted the first telegraphic message in 1866 through Earths atmosphere. In the 1940s, new devices were created based on radio technology. They were primarily a two-way radio communication. For instance, this was the time when police officers communicated with each other via a central base. In 1946, the Swedish police officers were able to use cell phones that were connected to the car battery. But these devices could only make (utmost) six calls before draining up the car-battery. In 1947, D.H. Ring developed hexagonal cells, though they were too a two-way technology. Soon after, another engineer came up with the cell towers technology, which enabled the devices to collect and convey signals in a three-way direction rather than two. Like the previous technologies, they heavily consumed battery and had to be connected to car battery. For example, the Swedish police cell phones weighed about eighty pounds. By 1967, cell phones were already in use in different places; however, the users could only make their calls from fixed cell areas. Besides, these cell phones could only handle a set range. Later on, Amos Edward Joel developed another technology that enabled users to make longer calls, but still from fixed cell locations. Proper cell phones first featured in the early 1970s. Dr. Martin Cooper is thought to have been the first inventor of these portable phones. Interestingly, he equally became the first man to make a call through a portable device. He also established the first portable cell phone station, and named it Motorola. This technology was approved by the U.S government (FCC) in 1983. The DynaTAC 800X only weighed twenty eight pounds compared to the previous devices, and was exceptionally small for its time (Rainer Cegielski 243). Since then, hand-held phones have been in constant improvements with new applications and models created almost every other time. In the 1990s, the 2G technology boomed the cell phone market. The hand-held devices were small and had an advance battery. What is available in the market today is the third generation cell phones. These phones are based on a 3G technology. Their innovations are extremely advanced (Rainer Cegielski 236-266). It was not until recently, however, that they became an integral part of human life. Like many other technologies that boost the superiority of social status, the small devices began as a class symbol of the selected few (affluent in particular). In 1983, for example, the Motorola model was sold in the market for 100 million U.S dollars. You can imagine how many people could afford that. Then somewhere out of the blue, the reserved affluent privilege changed when the devices became reasonably priced and accessible to everyone. Better still; the advancement in technology also saw the devices move from two-way radios to world coverage towers. People are now talking about the extremely advanced 3G technology (Brans 61-72). Why do People Rely on Cell Phones in todays Culture? People depend on cell phones in todays culture for a number of reasons. Essentially, the devises provide reliable advantages with few downsides. Never in human history, has a device influenced and transformed the means of communication as seen today. Cell phones have done it. They are inevitably intertwined into the human social life for good reasons. The cell phone technology has facilitated rapid communications and has made it possible to communicate with everyone from anywhere. Apart from the vocal communication, the technology has also enabled its subscribers to send multiple text messages to millions of people every single day if they so wish (Brans 61-72). What holds the society together and what supports its structures is communication. Without it, everything else is down. Accordingly, there is no device (at least not for now) in the modern world that facilitates communication better than the cell phone. For instance, just before cell phones boomed into the market, people relied majorly on landlines to communicate with their loved ones and also for official purposes. But the communication had to be on fixed locations because landlines were established on fixed areas. As a result, people on the move could not communicate over landlines. Cell phones, on the other hand, have made it possible to communicate with the loved ones and make official arrangements from anywhere even while on the move (Kavoori Arceneaux 85). The device has also brought revolution in the telecommunication sector. Statistical data in America, for example, reveals that over 74 percent of its citizens have used the hand-held technology to respond to emergencies. They widely use it to alert the police, call a doctor, report a car-crash or seek other forms of emergency responses. In addition, while parents could not initially keep in touch with their children while away from home, they can now check on them from wherever they are. Apart from calls and text messages, modern cell phones also facilitate data sharing. They can be used to transmit convenient and reliable information, but can also be used to store a great deal of data. With the large cell phone memory, people do not need to spend the whole day in book-keeping or having to deal with the computer drawbacks. Everything is right there in the pocket. Just a swipe and the information will be there. The cell phone technology has also enhanced the quality of life. It is no longer a luxury like many other technologies; it has become part of life. It is strongly woven into the social structures of the society. People need them for the quality life. Of course this is not to say people cannot do without them. They can if they so decide. Overall, the positive sides of cell phones are wide and far reaching. The e-mail messages, text messages, phone calls, cell-phone internet, data-sharing cards, music, phonebook, cameras etc., are brought together by the cell phone technology. Besides, the devices have also entirely transformed the telecommunication industry and brought the world more closer to the people. People are talking about cell phone banking services, shopping, paying of bills and fees, security devices and easy transfer of money, all because of the technology. The convenience, reliability and functionality perhaps explain the reasons behind the booming cell phone market (Rainer Cegielski 236-266). Drawbacks of Cell phones In as much as the cell phones have united the world, enhanced quality life and made life simpler, the devises have also had their dark sides. Most people have become too dependent on them. Cell phones are the first things they see when they wake up, and last things they touch before they sleep. People run for them in the market, but do not really pay attention to their side effects on ones social life or health (Makker et al. 148-157). In America, for instance, it is really hard sit together as a committee or family to deliberate on important issues for even an hour without having one or two people excusing themselves for other important calls. It is not true that those calls are urgent; it is all about obsession with the devises. Even scarier, nobody thinks about the impacts of the electromagnetic microwaves from the small devises. Well, according to the medical reports, they hinder ones ability to communicate, analyze or concentrate on complex activities. People who use cell phones while driving, for instance, have caused several accidents (Farmer 466-470). It is also true that people who rely too much on cell phones cannot solve problems that need prompt solutions. Everything for them is about swiping, and when they cannot then they cant do anything (Schlehofer et al. 1107-1112). Studies also show that children whose mothers were addicted to the small device during pregnancy have high chances (over 70 percent) of developing behavioral predicaments. The ADD and ADHD are typical behavior problems of such children. They also have problems socializing with their peers and extremely display emotional weaknesses. Further, the National Cancer Institute of America has revealed that there is a connection between brain cancer and mobile phone radiations (Sue 62-70). There is also a possibility that these devices, which were essentially made to enhance the quality of life and unite the world, could consequently destroy the very things they were supposed to construct. People are getting so obsessed with reaching out to those who are far away forgetting that there are people right in front of them that they can talk to. Even problems that can easily be resolved from within are simply taken far because one finds it rather easy to pick a phone and seek help elsewhere. It is also a major concern that children are increasingly withdrawing from their families because they have to main their cyber friendships (Sanchez-Martinez Otero 131-137). Cell phones have also been used to break relationships. If you are upset with your lover you just text and tell the person its over. Many people have also been caught up in cheating just by a simple phone call. Many marriages are also breaking up because spouses are too busy with the outside world than with their families. The devices have made people not to appreciate those they stay with. Ass a result of the mobile technology, people no longer communicate with each other in full sentences. No longer, for example, is simply text as lol. In effect, the medium has created a huge gap between the younger generation (dotcoms) and the older generation. To say it all, these gadgets have become an integral part of the daily life, but at a great expense (Kavoori Arceneaux 61-84). Are People too Dependent on their Cell Phones? Essentially, the purpose of cell phones is to make life easier and productive. If one wants to connect/contact a group of people, one simply goes to phonebook or opens email, then selects everyone he wants to share the information with, and right away clicks the send button. Within no minute, they are already on the same with the sender. This is the beauty of having a cell phone. It is true that people have become too dependent on cell phones. In as much as they have improved the quality of life, they have also become an epidemic in the modern society. But the problem is not with the cell phones. It is people who have taken the devices too seriously. Others depend on it too much. It is ridiculous to see how some people react, for instance, when they lose their cell phones. Its like they have lost the rest of their lives, or the world has come to an end. Others seriously get pissed off, while others its like they have lost a limb or an equivalent. These are the kind of people that cell phones not only play an integral part in their lives, but also central to their whole being (South 100/93). It is quite easy to identify those who are too dependent on the technology. Generally, this category of people will display serious mental and physical symptoms. Apart from distress, they will also employ the rhetoric of addiction and dependence when trying to demonstrate their experiences of going without a phone. Others talk about how scared they were when they lost their cell phones. Of course it is normal to be frustrated when one loses a property, let alone an important device like a cell phone. But it is total madness to literally shed tears, be lonely, call off life, or suffer from the major psychological effects. Nothing would make somebody panic or shiver if it is not an obsession (Sanchez-Martinez Otero 131-137). According to The World Unplugged Project, students who seriously depend on their phones cannot afford to stay away from their phones for more than 24 hours. At the end of day 1 of the research, all the student participants claimed to have developed psychological symptoms, while others literally displayed physical symptoms (Silk et al. 241-257). Another method of identifying those who are too dependent on the hand-held device is to withdraw the phones from them for a while and wait to see how they react. Obviously, they are those who would be imagining phone vibrations in their pockets even though they do not have them. Others would be receiving non-existent text messages when they do not even have the phones. The last group will make several attempts to pick their phones from pocket even when they were taken with their full knowledge. This is how much this category can be addicted to the small device (South 100/93). People have become so acclimatized to mobile phones that when they leave them behind they openly become frustrated. Walk into an examination room and hear how many phones go on and off when they are not even supposed to be there in the first place (Schlehofer et al. 1107-1112). Walk into an office and you will be rudely shocked into how much people are buried on their cell phones. Visit homes and you will see how people are isolated by the cell phones. It is all about obsession with cell phones. Conclusion Yes these devices are reliable, yes they are convenient and yes they simplify life. But too much of something is unhealthy. People have become too dependent on them to the extent that they can not do without them. It should indeed, be a great concern to everyone that these devices which were essentially made to enhance the quality of life and unite the world, could consequently destroy the very things they were supposed to construct. They have destroyed the community life, have destroyed relationships and have created problems that would have otherwise been avoided if they were not in use. In reality, people have seriously become too dependent on their cell phones. People cannot spend a day without them without showing negative physical and psychological symptoms. The reactions when people lose their phones perhaps tell it all. They will display patterns of frustrations, anxiousness, irritability, bitterness, insecurity, depression, restlessness, nervousness, loneliness, stressfulnes s, withdrawal and confusion. Others will be pissed off, while others will see no more meaning in their continued existence. But it is not just about the physical and psychological effects, dependency on the phone increases chances of getting brain cancer, behavioral problems and communication disabilities.
Saturday, July 20, 2019
What is the main contribution made by the chorus in The Burial at Thebe
Heaneyââ¬â¢s play The Burial at Thebes is a version of the Greek tragedy Antigone by the Athenian dramatist Sophocles (c496-406 BCE). According to Heaney it is not a translation but a version as he was ââ¬Å"looking for meaning not languageâ⬠(Heaney, 2009, CDA5937, The Burial at Thebes - Interviews). This is in keeping with the commissioning of the play to celebrate 100 years of the Abbey theatre in 2004 as the founders, W.B Yeats and Lady Gregory, were Irish ââ¬Å"cultural nationalistsâ⬠(Hardwick, 2008, p193) . The change in title from the traditional Antigone to The Burial at Thebes moves the emphasis away from the characters to the ââ¬Å"controversial question of the burial of a prince, who was regarded as a turncoatâ⬠(Theocharis, 2009, CDA5937, The Burial at Thebes - Interviews) enabling Heaney to intertwine the tradition Greek ideology with Irish nationalism. The chorus in Greek tragedy is defined as a group of people who often participate in and comment on the dramatic action, emphasising traditional moral and social attitudes and providing commentary (Moohan, 2008). In Greek theatre they also provided a more practical role, entertaining the audience during the play with songs and dance and allowing the performers to change. Most performers performed two or more roles known as doubling. In The Burial at Thebes the director, John Theocharis (2009), states that the chorus also adds dramatic tension and suspense whilst creating subjective and objective voices that underpin the context of the play. In looking at the contribution that the chorus makes this essay will look at the various functions of the chorus - their role as a commentator, participating in and commenting on the dramatic action and how they present traditional moral and soci... ...ture of the play, mainly based on the Greek, outlines these values in poetical format in the Choral Odes. The chorusââ¬â¢ commentary on the characters and drama and its subsequent participation pushes the plot towards traditional ideas with the encapsulation in their ending summation. Works Cited Hardwick, L. (2008), ââ¬ËSeamus Heaneyââ¬â¢s The Burial at Thebesââ¬â¢, in Brown, R (ed.), Cultural Encounters (AA100 Book3), Milton Keynes, The Open University, pp.192-235 Heaney, S. (2004), The Burial at Thebes, London, Faber and Faber Ltd Heaney, S. (2009), CDA5937 The Burial at Thebes ââ¬â Interviews (AA100 Audio CD), Milton Keynes, The Open University Moohan, E (2008), ââ¬ËGlossaryââ¬â¢, in Moohan E (ed.), Reputations (AA100 Book1), The Open University, pp.231-238 Theocharis, J (2009), CDA5937 The Burial at Thebes ââ¬â Interviews (AA100 Audio CD), Milton Keynes, The Open University
Friday, July 19, 2019
Shakespeare And Anti-Semitism In The Merchant Of Venice Essay -- Merch
Anti-Semitism and the desecration of the Jewish population have been in existence for nearly five thousand years. In the Elizabethan era, a question of anti-Semitism invariably arises. In William Shakespeare's The Merchant of Venice, we find that one of the characters is the embodiment and expression of anti-Semitic attitude that is pervasive in Elizabethan society. "Anti-Semitism was an intricate part in Shakespeare's years. Jews were considered vile and scorned upon. Shakespeare presents Judaism as an 'unchangeable trait'" (Bloom 37). Shakespeare's age based their anti-Semitism on religious grounds because the Elizabethans inherited the fiction, fabricated by the early Church, that the Jews murdered Christ and were therefore in league with the devil and were actively working to subvert spread of Christianity. The religious grounds of this anti-Semitism means that if a Jew converted to Christianity, as Shylock is forced to do in The Merchant of Venice, then all will be forgiven as the repentant Jew is embraced by the arms of the all merciful Christian God of love. In fact, some Christian believed--as do some fundamentalist sects today--that the coming of the Kingdom of God was aided by converting the Jews to Christianity. Anti-Semitism in Shakespeare's time is portrayed in his masterpiece The Merchant of Venice. "Shylock the Jew, one of William Shakespeare's profoundly ambivalent villains, is strangely isolated" (Bloom 24). He is portrayed as a usurer: A leader of money on interest rather than a receiver of stolen goods. This concept will prove to the audience that the Jews are in fact "cheap" and have a frugal sense for possessions. It is an intriguing idea to think that even in Shakespeare's time, stereotyping was a mundane part of their lives. Shakespeare's anti-Semitism seems harsh, but shows that not all Jews are vile like most people believed in his time. Shylock is shown to be hard working (Goddard 5). Believe it or not, there is some compassion for the desecration of the Jews in Shakespeare's play. Antonio recognizes the futility of opposing Shylock's passion with reason. "He seems the depository of the vengeance of his race" (Goddard 11). Antonio consequently appears as a charitable Christian who lends money freely, in contrast to the miserly an... ...an something like Marlowe's Barabas. But at the same time, it seems clear (to me, at least) that Shakespeare creates Shylock against an historical and cultural backdrop that was intensely hostile to Jews. Given this social context and historical tradition, it should come as no surprise if some of this hostility against Jews should infiltrate Shakespeare's work. Shakespeare was, after all, a commercial dramatist and many commercial dramatists make their livings by pandering to, rather than working against, conventional social mores. To make the claim that Shakespeare creates Shylock within an anti-Semitic culture, and therefore invests Shylock with biased anti-Semitic attributes, does not impugn the artistry of the drama. Nor does such a claim implicate Shakespeare himself as a monstrous anti-Semite. All this claim suggests is that Shakespeare, like most of the rest of his society, was hostile toward Jewry for religious and cultural reasons, and that hostility is revealed most clearly in Shylock. What these pages have tried to trace is the possible, or perhaps the probable, relationship between what was happening in Shakespeare's day and what is happening in Shakespeare's play.
The Metamorphosis of Grendel :: Grendel Essays
The Metamorphosis of Grendel The majority of John Gardner's Grendel revolves around a monster-like character named Grendel. The reader is allowed access to Grendel's subconscious and inner monologue, giving one the sense of a very close relationship with the main character. This tends to beguile one into sympathizing with him and thinking of him as a protagonist because historically in literature the main character of a novel has always been the "good guy." However, he proves himself to be very much the anti-hero in the novel many times over. Grendel's social contact with the world is extremely limited, but his persona is greatly influenced by each brief encounter with another character. The first major influential character Grendel encounters is The Shaper, a blind old wise man. The first mention of him is in Chapter 1 when Grendel is attacking Herorot. While all the town's men, women and children are frozen in awe and horror, The Shaper is able to think quickly and jump out the window of the building he was in and run away. Grendel admires him for his ability to think and act quickly, as well as for possessing vast knowledge he can only dream of ever acquiring. Grendel wishes he had the mind of the Shaper and begins to feel jealous, so he subconsciously tries to become more like him. The Shaper's songs teach Grendel a lot about the humans in the surrounding regions and how they think and live. Everyone loves and respects him, which makes Grendel want to be like him even more. As he realizes the Shaper's popularity and goodness, he begins to realize why people don't like him. Grendel spends a lot of time thinking and realizes the flaws in his ch aracter, subconsciously deciding that he doesn't really care if the humans hate him because he isn't a human and doesn't have to live by the same standards or expectations as they do. He was born a monster, and as a monster he has a job to do: to "frustrate all established order" and terrorize the humans. In Chapter 5, we meet the Dragon for the first time. Prior to seeing the Dragon, Grendel's mother was the only thing he had seen that was more powerful than him.
Thursday, July 18, 2019
Design and Procedure
The study entitled ââ¬Å"The level of Knowledge of Cigarette Smoker tricycle drivers of STOD (Pembo-Blueboz route) on sintax law and its relation to their Attitude towards Smokingâ⬠will use a quantitative approach. In which, according to Hammersley (1992), quantitative approach is taken when people are trying to analyze information, collect survey data and perform analyses and many other functions and since the researchers will use survey questionnaires as instrument. It is mainly helpful for strategic planning and implementation. This design was adapted by the researchers to find out the level of knowledge of cigarette smokers on Sin tax Law and its relation to their attitude towards smoking, as stated on Hopkinââ¬â¢s article, quantitative research aims to determine the relationship between one thing and another. The principle of quantitative research will be applied in this study for it will help them in studying the abstract things such as level of knowledge and attitude of the smoking tricycle drivers. Hence, the researchers will be able to identify the variables: age, monthly income and education to be utilized for the purpose of the study and analysis and also to know the relationship of their attitude towards smoking and their knowledge on Sintax Law. The researchers will also use Descriptive type of research. Descriptive research is used when the purpose of the research is to determine the characteristics of certain groups or a subject and it is much applicable in their goal in the study to present the details and social setting of the selected smoking tricycle drivers on their level of knowledge on Sintax Law and their attitude on smoking. This study will describe the real situation of the researcherââ¬â¢s study and will further explain the data that will be gathered. Research Method The researchers will use the survey methodology for it is considered as the faster and cheapest way among others. Hence, survey is effective in producing information on opinions, attitudes, belief, presumption, and or socio-economic characteristics. Also, data will be reliable and could avoid or lessen its inconsistency. In addition to that, survey is simpler to analyze and easier to associate the gathered data. The survey will serve as their medium to gather data by asking questions. The researchers will use the survey method for they believed that it will be suitable on their study. Since a population can be quite large of a number, researchers will question only a sample. The sample respondents will be asked questions on their demographic profile along with the respective set of questionnaires regarding the data needed. By this survey, the respondents may give just to their freedom by voicing out their opinion or ideas prior to the research conducted. Through survey, the reliability of information collected from cigarette smoker respondents will maintain. Also, surveying will enable to help the researchers to gain a great deal of information at one time and will provide quantitative data. The researchers believed that this method remains as the most widely used method in gaining quantifiable data. Instrumentation The self-executed questionnaires by the researchers are the instrument they will use for their survey. It will serve as the medium to garner the necessary information for the research. This device aims to distinguish the level of knowledge of the cigarette smokers on the newly passed Sintax law and its relation to the smokersââ¬â¢ attitude towards smoking. The researchers will use closed questions, multiple-choice format, checklist format and the likert scale. The set of questions will be categorized based on the problem and objectives of this study. Closed question is considered as the simplest way whereas it is being nswerable by a yes or a no. By close ended questions, the researchers can avoid the unessential responses from the chosen respondents. To review the validity, the researchers made 2 page survey questionnaires. As a process, validation involves gathering and analyzing data to figure the accuracy of the instrument used. This survey is divided into 4 se ctions: profile, awareness, knowledge, and attitude. First part is where the respondents are being asked about their demographic profile. Second part of the instrument will measure the awareness of the respondents. Third is where the cigarette smokersââ¬â¢ knowledge unto the law will be measured. And last, the attitude of the respondents towards smoking will be asked. The purpose of this questionnaire is to fully determine if the tricycle drivers are aware or knowledgeable about the sintax law. By this instrument, the researchers will identify the cigarette smokersââ¬â¢ attitude on the said law. As a clarification, this study is only a fulfillment of requirement, for academic purposes only. Sample and Sampling Technique Usually, researchers arenââ¬â¢t capable of observing directly in every individual in a population they are studying. Rather, they gather information from a subset of individuals, called sample. Sample is a group of people that can be described as the sub-collection drawn from the population. In order for the sample to truly reflect the population, you need to have a sample that will represent the population. So in this study, the researchers selected tricycle drivers of STOD (Pembo-Blueboz route) who smoke to be the respondents. They will be selected through Simple Random sampling or SRS which is the one of the most commonly used probability method. Each respondent will be chosen randomly and entirely by chance. A simple random sample is an unbiased surveying technique. With the help of fishbowl draw, all the corresponding numbers of each correspondent will be place in it and will mixed thoroughly. In that case, all of them will have the chance to be the respondents. By this sample, the research study will be carried out. Sample random sampling is common and just simple. Its simplicity makes it relatively easy to interpret data collected via SRS. And for this reason, simple random sampling best suits situations where not much information is available about the population and data collection can be efficiently conducted on randomly distributed items. Data Collection Procedure The researchers will conduct survey for five days. The questionnaires will personally administer to the selected cigarette smokers according to the number of sample that will be computed. The researchers decided to survey 50% only of the total population of tricycle drivers, for not all the drivers smoke cigars. The respondents will participate in the study. Thus, ethical issues will be considered to make sure that everything will be confidential, especially the responses and will remain private as well as the safety of the respondents. All important details of the study, including its aim and purpose will relay by the researchers. And through this, the respondents will be able to understand the importance of their role in the completion of the research study. The respondents will not be forced to participate in the said research. The confidentiality of the participants will be ensured also by not disclosing their names or personal information in the research. Those significant details that can help in answering the research questions will be included. The completely filled-up questionnaires will be returned to the researchers for the evaluation and analysis of data. Statistical Formula The researchers will choose Likert survey for the questionnaire type as this will enable the respondents to answer the survey without difficulty. It will measure the extinct to which a person finds a question effective or ineffective. A Likert item is simply a statement which the respondent is asked to evaluate according to any kind of subjective or objective criteria; generally the level of agreement or disagreement is measured. It usually has four choices: strongly agree, agree, disagree, strongly disagree, but there are cases that it will go up to ten and sometimes, more than ten. And some times, instead of using the level of agreement, likert can also consists of options with assigned values (excellent, very good, average, below average poor; always, seldom, frequently, sometimes and never). A numerical value will be assigned to each potential choice and a mean figure for all the responses will be computed at the end of the evaluation. The final average score will represent the overall level of accomplishment or attitude of the respondents toward the subject matter. The researcher will then exclude irrelevant questions and will change difficult or unclear terminologies into simpler ones in order to ensure understanding. The researcher used the 4-point likert in order to have a concrete answers from the respondents because likert scale implied that the number of alternatives are open for manipulation, and this study will employ a manipulated likert scale by allowing only four choices and in so doing, will eliminate a default median response. Many techniques can be involved in statistics that treat data in required manner. Statistical treatment is one, and the result is dependent on the experiment used and the desired output. Describing the data is also involved in statistical treatment. And the best way is to undergo the measure of central tendencies- the mean. Through these, the researchers could easily explain how the data are concentrated. To fulfill the process of Statistical Treatment, the gathered data will be processed by the use of the software program called SPSS/PC+. Same principles will be followed in this program to compute for frequency distribution, percentage and weighted mean. To identify the awareness and to describe the profile of the respondents, the frequency distribution and percentage will be applied. And to describe the attitude of the selected smoking tricycle drivers of STOD (Pembo-Blueboz route) by each selected attitudinal area, the weighted mean will be utilized. The weighted mean which describe the attitude of the respondents will verbally interpret as follows:
Subscribe to:
Posts (Atom)