...point lack some skills for effective communication. We need to interact with others in schools, business meetings, with relatives during family get together. (Day, 1990) As per my first assessment I got very good feedback in my communication simulation when I played the role of a nurse which gave me motivation and increased my level of confidence. But after recording my ten days interaction, I realized that I need bit more improvement on my communication skills to become a good nurse. Interactions In my Professional Identity class, we had to do some case studies and give our opinions. For most of the case studies we need to be in group and make discussions on scenarios given by our Tutor. We were eight people in our group. Then tutor came and group discussion starts everyone starts giving their opinion and...
Words: 693 - Pages: 3
...This situation only gets worse with children. Children are known for their ability to absorb copious information, which in this cause increases their vulnerability to developing PTSD. If a child experiences trauma, memories that could have been long term aren't connected and get lost(Howard & Crandall, 2007). They lose their childhood memories and do not develop concrete personalities. They remain this way and most children that experience traumatic events develop PTSD. If they don't develop PTSD, they develop dissociative identity disorder(DID). Cases of DID rarely develop. Often times, PTSD is seen. These children have harsh futures. They are unable to understand situations properly and are often confused in life. Misunderstandings occur a lot yet they don't know why. Nothing makes much sense to them because they believe...
Words: 496 - Pages: 2
...The Curious Case of Gender Identities in Films Assignment No. 2B by Justin Wie Mao Sheng (S8927155Z) Group No. 1 (G1) Academic Writing WRIT001/Term 2 – 2010/2011 I declare that this Assignment is my original work and all information obtained from other sources has been cited accordingly. Turnitin Similarity Index _______________________ Signature and Date Course Instructor: Shirley James % Literature Review “Eroticized as a woman and masculinized as action heroine” (Smelik, 2009) – this seems to be inevitable for any woman who ventures into the world of cinema, occupying nontraditional roles particularly in the action-genre because such films have become synonymous with a cardinal male figure. What then is left for females in this male-dominated genre? Can a female action-heroine, considered unconventional and non-traditional, exist without ultimately emphasizing a more dominant male, hence re-articulating gender stereotypes? I will, by discussing how gender patterns in films affect gender identities, argue that this is not likely, simply because of hegemonic masculinity. Eschholz & Bufkin (2001) established the difference between (biological) sex and gender and how they were linked to criminal violence in films, concluding that film depictions of a “structural hierarchy” emphasizes women (femininity) being physically and emotionally subject to their masculine counterparts. Gilpatric (2010) however, focuses on violent female action characters (VFACs), claiming...
Words: 2353 - Pages: 10
...POSITIONING STRATEGY WITH A NEW IDENTITY: A case study of VIETNAM AIRLINES by Le Hong Dac A research study submitted in partial fulfillment of the requirements for the degree of Master in Business Administration Examination Committee: Dr. Truong Quang (Chairman) Dr. Clemens Bechter Dr. Lalit.M.Johri Nationality: Vietnamese Previous Degree: Bachelor of Economics University of Agriculture and Forestry HoChiMinh City, Vietnam Scholarship Donor: The Government of Switzerland Asian Institute of Technology School of Management Bangkok, Thailand August 1999 Acknowledgement I wish to express my profound gratitude and great appreciation to my advisor Dr. Truong Quang for his valuable guidance, advice and encouragement throughout the research study. Special thanks are extended to the other members of the Examination Committee, Dr. Clemens Bechter and Dr.Lalit.M.Johri for taking interests and giving valuable suggestions to improve the content of this study. Deep appreciation and thanks are also extended to Mr. Luong Hoai Nam, Mr. Trinh Ngoc Thanh, Mr. Duong Tri Thanh, Mr. Mai Quoc Tuan, Mr. Nguyen Thuong Hai, Mrs. Nguyen Thi Minh Yen and Mr. Le Dinh Tuan of Vietnam Airlines Corporation for providing me the desired information and data for this research study. I fall short of words...
Words: 27680 - Pages: 111
...IDENTITY THEFT PENALTY ENHANCEMENT ACT Name Course School Date Introduction The Identity Theft Penalty Enhancement Act is an amendment to Title 18 of the United States Code. The Act was brought in to define and establish penalties for aggravated identity theft. It is also an enhancement of the definitions of identity theft found in the provisions of Title 18 (Congress.gov, 2004) (Finklea, 2014). Identity theft is an issue that has affected the nation for many years. Advances in technology have made it possible for many people to have access to the tools and resources needed to forge documents which are a critical part of identity theft. The most common form of identity theft is associated with credit card fraud. Credit card fraud on the internet has substantially increased due to the opportunities present in the Internet environment. However, this represents some of the simplest forms of identity fraud. Such is the case since it is very easy to discover credit card fraud by both the credit card company and the victim as well. However, according to the Federal Trade Commission (2002), other forms of identity theft are more severe since they take a longer time to materialize (Federal Trade Commission, 2002) This view is also by Finklea (2014) in his article where he points out the issues and trends of identity theft. The Identity Theft Penalty Enhancement Act comes in the context of increased awareness of the difficulties posed by emergent technologies. So far, identity...
Words: 5460 - Pages: 22
...1.0 Identity Theft Identity theft is when someone uses other person personal information without the permission and also has intention to do the fraud or other crime and put the victim under police suspicion. The victims also faced the difficulty to prove themselves not involve or not fault. According to Margaret Rouse (2009), identity theft is the biggest crime that related which the steal of the personal data or information. The criminal also can use the information that seem like harmless such as date of birth or identification number to commit the identity theft. The information that the stealer gets can be used to buy a car and then services in the name of the victim or the criminal use the victim’s identity to load the money and then...
Words: 1696 - Pages: 7
...Notes on Parfit’s “Personal Identity” in Reading Metaphysics Introduction, p. 13 He’s going to be discussing two beliefs: 1. That questions about personal identity must (always) have an answer. a. E.g., “Is A=B?” or “Am I identical to this future person?” Parfit will argue that there are cases where, presumably, there is no answer, i.e., “yes” and “no” are both incorrect. (Later, however, on p. 17, he suggests that he means to say that we can’t at all tell or identify the answer; this epistemological skepticism is less radical than the claim above). b. He can only give a case to make this assumption above “implausible” (p. 14). c. If this – a – is so, then the principle of self-interest isn’t so important. And aging and death...
Words: 701 - Pages: 3
...personal identity comes into picture as a radical solution to the duplication problem (assuming that we accept the psychological continuity theory), wherein a personal identity in terms of its psychological continuity could branch into two (or more) successors, each of which is continuous of the previous personal identity before branching and is hence identical to each other, thereby we would seem to have two (or more) persons (or agents) having one and the same identity, thus violating the rule of numerical sameness upon which we build our previous accounts of personal identity. Instead of simply adding the clause such as “this psychological continuity does not take a branching form” as a way to tackle this duplication problem, Parfit has otherwise suggested his reductionism view. This account entails two major arguments, as that 1) the thing as we call “personal identity” is indeterminate and consequently we should see how 2) (the issue of) personal identity might not be as important as it seems to be. These two arguments would be in order discussed to explain his argument for reductionism. First, to say that the personal identity is indeterminate is to say that personal identity is not numerical identity, implying that every bit of changes of the either person’s material constitution (in terms of the spatiotemporal continuity) or of his psychological states (in terms of the psychological continuity) does change the person into a different one; this is the strongest case where...
Words: 1302 - Pages: 6
...Abstract The Federal Trade Commission considers identity theft to be the fastest growing crime in the country. The Internet has become a hot zone for attracting identity theft thieves to steal personal information. Identity theft is divided into four basic areas – financial identity theft, criminal identity theft, identity cloning and business and commercial identity theft. Criminals obtain our personal information through methods such as using an insider, dumpster diving, computer hacking, war driving, phishing and pre-texting. The Department of Justice prosecutes identity theft under federal statutes. Congress passed the Identity Theft and Assumption Deterrence Act, Title 18 United States Code 1028 in 1998. One of the most noted identity theft cases was USA v. Cummings. The largest hacking and identity theft case ever prosecuted by the Department of Justice involved eleven people who stole more than forty million credit and debit card numbers. To severely curtail on identity theft, President Bush mandated Executive Order 13402 called the Identity Theft Task Force. Identity theft causes immeasurable damage to peoples’ names and reputations. Greater awareness and education will help us to combat identity theft. Identity Theft It’s a nightmare that can leave an unsuspecting person feeling violated and vulnerable. It doesn’t care who you are or where you live. Gender, race and age are totally irrelevant. In this modern technological age, it is a crime that can realistically...
Words: 2466 - Pages: 10
...Gender Identity Psy/340 Gender Identity Introduction The endocrine system is made up of several glands that secrete different hormones. These glands are the: Pituitary, Pineal, Thyroid, Parathyroid, Thymus, Pancreas, and Adrenal Glands as well as the ovaries and testes. All of these glands have a hand in generating hormones responsible for different behaviors either directly or indirectly. “Gender identity is how we feel about and express our gender and gender roles — clothing, behavior, and personal appearance. It is a feeling that we have as early as age two or three” ("Gender And Gender Identity", 2001). While there is much to say about the brain and its relationship to personal gender identity it is also very evident that the interaction between hormones and behavior is a deciding factor as well. Biological Factors & Gender Identity Our personal biology is what we are born with, things that are distinctive to us. Whether someone has red or blonde hair, brown or blue eyes, or light or dark skin is part of their biology. More specifically our sexual organs are perhaps the most distinctive parts of our biology because they set the groundwork for how we will be viewed by society, whether we personally feel that way or not. I say this because our sexual organs will inevitably determine our appearance. Having male organs causes boys/men secrete more androgens or male hormones (testosterone) than girls. Because they secrete a larger amount of these hormones they will...
Words: 1842 - Pages: 8
...Dissociative Identity Disorder was formerly known as Multiple Personality Disorder. This was changed in the year 1994 because of further understanding of the disorder, and realizing that the disorder was a result of early childhood trauma. Dissociative Identity Disorder is when a person possesses two or more personalities, which take control of the body and mind at different times. A person who suffers from Dissociative Identity Disorder forgets and often blacks out at times in which a different personality takes over. This forgetfulness is often described as “beyond ordinary forgetting”. During these times of “blacking-out” is when a secondary personality takes over, and that is the reason for the forgetting. The main identity is called the host identity and often is unaware of the secondary personality or personalities. Before the 1980’s Dissociative Identity Disorder was a rare disorder that did not seem to have much attention. Dissociative Identity Disorder was not mentioned by more then a sentence in the DSM that was under the category of “hysterical neurosis”. There was no separate listing for Dissociative Identity Disorder until 1980 where a group of interested therapists lobbied to have Dissociative Identity Disorder become a full part of the DSM. (Acocella 6) As defined in the DSM-IV TR Dissociative Identity Disorder is “the presence of two or more distinct identities or personality states that recurrently take control of behavior.” (526) Dissociative Identity Disorder...
Words: 2657 - Pages: 11
...Dissociative Identity Disorder: Abstract: The aim of this paper is to elucidate an in depth understanding of the phenomena of dissociative identity disorder. This piece was written while I was pursuing my certification in counseling and volunteering with social organizations dealing with specially abled individuals. The explanation delineated below seeks to bring out my understanding and perception of the subject. Meaning: Dissociative identity disorder is a psychiatric diagnosis explaining a condition whereby a person subconsciously exhibits multiple identities i.e. alter egos each distinct from the other behaving in its own manner independently from the others. It is necessary for atleast two personalities to take over a person for this disorder to occur. A person also has memory loss while he/she exhibits some other personality. This clearly means that a person is subconsciously getting a person into different personalities. Dissociative Identity Disorder is less common when compared to other dissociative disorders and occurs in about 1% of the dissociative cases. There have been many instances where the existence of dissociative identity disorder has been questioned. It is pertinent to note that dissociative identity disorder is diagnosed more commonly in North America in comparison to other areas of the world. Signs and symptoms: Patients who have been diagnosed with this disorder exhibit a lot of fluctuation in behavior and at times also show strange mannerisms. The main...
Words: 872 - Pages: 4
...Identity theft is the biggest crime in the world today. For over ten years, identity theft (in all forms) has been the number one consumer complaint. In 2012 identity, theft affected more than 16.6 million Americans alone. With the 16.6 million people affected, there was a financial loss of 21 billion dollars. That number only went up in 2013 to 24.7 billion dollars and so far, for 2014 we beat that number by over one billion dollars. Finklea, Kristin 2014) With this growing epidemic, we need to educate ourselves on what identity theft is, how it affects us and how to protect ourselves in this new cyber world. Types of Identity Theft It may surprise people to know that there are many different types of identity theft. The most common and often the first thing people think of when they hear identity theft is financial identity theft. This is when a person’s credit cards and/or bank accounts are accessed and used without the owner’s permission or knowledge. The thief can do this by withdrawing money from the victims back account or by maxing out their credit cards. Another way a criminal could commit financial identity theft is by opening new accounts in the victim’s name; such as credit card and even loans. This type of financial identity theft could take the victim years and thousands of dollars to correct. One of the first cases that received the attention of national headlines of financial identity theft was from 1992. In one notorious case of identity theft...
Words: 1896 - Pages: 8
...NATIONAL CENTER FOR CASE STUDY TEACHING IN SCIENCE Nature or Nurture: The Case of the Boy Who Became a Girl by Keith K. Schillo Biology Department SUNY College at Oneonta Part I – A Tragic Error In 1965, Janet Reimer of Winnepeg gave birth to twin boys named Bruce and Brian (Colapinto, 2004; CBC, 2004). Both infants were normal and healthy, but because they had difficulty urinating doctors recommended that they undergo circumcision (i.e., surgical removal of the foreskin of the penis) at six months of age. Although this is a routine operation, the doctors who performed this procedure used an unconventional method that resulted in the destruction of Bruce’s penis. Mr. and Mrs. Reimer sought the advice of numerous specialists, but all agreed that Bruce would have to live without a penis. At the time that the Reimers were coping with the mutilation of their son’s genitalia, a Johns Hopkins University psychologist was receiving considerable attention for his ideas on the biology of gender and sexuality. He promoted the theory that a child’s gender identity (i.e., the identification of the self as male or female) was determined by environmental variables such as the social conditions in which the child is raised. This idea is a form of the “nurture theory” of development. A competing view is the so-called “nature theory”; that is, the idea that a person’s innate qualities are determined solely by biological mechanisms. The psychologist was essentially advocating...
Words: 1884 - Pages: 8
...Identity Theft David Arcila Professor Jim Manning White Collar Crime 08/14/13 “But he that filches from me my good name, robs me of that which not enriches him, and makes me poor indeed.” – Shakespeare, Othello, act III. Sc. 3. “Once in a time before identity theft was a federal crime, there was a particular case where a convicted felon stole more than $100,000 of credit card debt, motorcycles, federal home loans, houses, and handguns in the victim’s name.” (Knox, Jeffrey) “He also called his victim to taunt him and let him know that he could do this as long as he wanted to because identity theft was not a federal offense yet.” (Knox, Jeffrey) “Both the victim and his wife spent more than four years and more than $15,000 trying to repair their reputation and credit.” (Knox, Jeffrey) “As for the criminal, the offender served a small prison sentence for trying to buy the firearm but other than that made no repayments to the couple for the damage he caused.” (Knox, Jeffrey) “This was one of the many cases that made Congress decide to implement a new federal law in 1998 against identity theft.” (Knox, Jeffrey) Identity theft is a type of crime where someone’s identity is stolen in order to pretend to be the victim’s identity. “Many times the offender obtains valuable resources such as credit card and debit card information or social security numbers in order to gain economic through deception or fraud...
Words: 2364 - Pages: 10