...is developing an identity” and that a healthy identity is developed when they try on alternate identities and reflect on these experiences (Pressley &ump; McCormick, 2007, p.147). Michael Nakkula says “identity is not the culmination of a key event or series of events, although key events can play an important role in the larger process. It is rather, the lived experience of an ongoing process-the process of integrating successes, failures, routines, habits, rituals, novelties, thrills, threats, violations, gratifications, and frustrations into a coherent and evolving interpretation of who we are. Identity is the embodiment of self-understanding” (Nakkula, 2008, p.11). The experience that adolescents go through daily and over time influences the identity they eventually form. Adolescence is a time when children start to reflect on what they are good at,...
Words: 1510 - Pages: 7
...is developing an identity” and that a healthy identity is developed when they try on alternate identities and reflect on these experiences (Pressley &ump; McCormick, 2007, p.147). Michael Nakkula says “identity is not the culmination of a key event or series of events, although key events can play an important role in the larger process. It is rather, the lived experience of an ongoing process-the process of integrating successes, failures, routines, habits, rituals, novelties, thrills, threats, violations, gratifications, and frustrations into a coherent and evolving interpretation of who we are. Identity is the embodiment of self-understanding” (Nakkula, 2008, p.11). The experience that adolescents go through daily and over time influences the identity they eventually form. Adolescence is a time when children start to reflect on what they are good at,...
Words: 1510 - Pages: 7
...ISSUES AND CHALLENGES IN CYBER ETHICS INTRODUCTION According to Barquin (1992), cyber ethic guidelines consist of Ten Commandments which are: (1) Thou shall not use a computer to harm others, (2) Thou shall not interfere with others computer work (3) Thou shall not snoop around in others computers files, (4) Thou shall not use computer to steal, (5) Thou shall not to bare fall witness, (6) Thou shall not copy or use proprietary software you have not paid for, (7) Thou shall not use others computers resources without authorization or proper compensation, (8) Thou shall not appropriate other people’s intellectual property, (9) Thou shall think about the social consequences of the program you are writing or the system you are designing (10) Thou shall use a computer in ways that ensure consideration and respect for your fellow humans. These commandments or rules need to be obeyed by everyone who utilizes the cyber space facility in order to maintain the tranquility of cyber world. However, not everyone concern about these rules as we seen nowadays. In order to prevent plague from spreading and become worse in future, we have to identified the root cause of the problem and define how to solve it. The first commandment explained that it is not ethical to harm another user by using computer and it is not limited to physical injuries but also harming or damaging other user data or files. It is unethical to create a programmed that deliberately allows someone to steal, copy...
Words: 3045 - Pages: 13