Premium Essay

On Dumpster Diving Analysis

Submitted By
Words 1311
Pages 6
The dictionary defines excess as “more than or above what is necessary, usual, specified; extra” (Dictionary). Americans, as a whole, deserve a prize for the amount of paraphernalia they hold. According to CBS News, three-fourths of middle-class American families cannot park their cars in the garage because of the vast amount of clutter hidden in every nook and cranny (Vanderkam). Additionally, the families had enough food to survive every natural disaster and 47% of families had a second fridge, cluttering the house with material excess of the house (Vanderkam). A similar study done by Becoming Minimalist found that the average American home had 300,000 items, and threw away sixty-five pounds of clothing a year (Becker). The amount of material goods is what Lars Eighner described as the “gaudy bauble” by the “rat-race millions” in the conclusion of his essay “On Dumpster Diving” (151). After reading Eighner’s “On Dumpster Diving,” I found myself reflecting on the amount of material goods I hoard in my dorm room and how I throw away items without thinking about it. I grew up in a house full of hoarders, where it was normal to have the basement, garage, and attic filled to the brim with material goods, which causes me to hold onto an excess ammount of material goods. My need to collect …show more content…
In my dorm there are ten girls and one giant trashcan, which we fill up everyday with boxes, food scraps, paper, gum wrappers, and tissues. Often times I throw away items that are still good, like cheese, yogurt, cereal, candy, left overs, and peanut butter; I even throw away objects, such as pencils and coins. If I see mold on my cheese, I throw it away instead of cutting off the mold. Meanwhile, I try to convince myself that I’m going on a diet so I throw away my stash of candy and Cocoa Puffs and let it go into the dumpster. I am one of the college students Eighner writes about, as he

Similar Documents

Premium Essay

Analysis Of Lars Eighner's On Dumpster Diving

...They may not reach their goals or dreams because other people's opinions are holding them back. Everyone knows what is good for them. Sometimes caring about other people's opinions can even affect a person’s health. In the story “On Dumpster Diving” Lars Eighner writes about how people who scavenge through the trash go through phases. He states that at first the scavenger is typically full of self-loath and disgust. He also points out that they typically hide behind things or try dumpster diving at night, which is a real struggle. This is because they are scared of what society is going to think of them. They have probably grown up knowing what is socially acceptable and maybe even judged people for digging through trash themselves. They are embarrassed of themselves and they do not want people to judge them. Nevertheless this is what they need to do to survive. They soon realize that they need to do it and they get used to dumpster...

Words: 320 - Pages: 2

Premium Essay

Rhetorical Analysis Essay On Dumpster Diving

...Not once does Eighner antagonize dumpster diving, nor does he suggest his audience should pity for the homeless. Never does Eighner offend or degrade dumpster diving, nor does he wish pity upon the homeless — as a matter of fact, he correlates what he’s learned as a dumpster diver to the attitudes of “the very wealthy.” What he’s learned while scavenging left him to his one-of-a-kind attitude towards wealth. To interpret this belief, Eighner begins by explaining that his “desire to grab for the gaudy bauble has been sated.” By definition, “the gaudy bauble” refers to glamorous things; making it reasonable to deduce that Eighner’s “desire” for flashy materials has been satisfied by the lessons he’s learned as a dumpster diver. He reaches the nitty-gritty of his perspective towards wealth by stating “we [him and the wealthy] both know there is plenty more where what we have came from. Eighner has come...

Words: 376 - Pages: 2

Premium Essay

Dumpster Diving

...Calvin Johnson English 111x f16 10 October 2015 On Dumpster Diving Analysis Paper The essay on “On Dumpster Diving” written by Lars Eighner is about a homeless man, accompanied by his dog. In the article, he explains the strategies and guidelines of surviving from dumpsters thereby exemplifying the wasteful nature of Americans while also explaining the etiquette involved in the process. The author began dumpster diving about a year before he became homeless. He used all of his infrequent income for rent, consequently having to derive all of life’s necessities from dumpsters. He goes on to share the valuable information he has learned as a human scavenger. Eighner starts by outlining the guidelines of what is safe to eat. The main principles involved are: 1) using senses and common sense to evaluate the condition of food; 2) knowing the dumpsters in a particular area; and 3) checking them frequently. He also wonders why the food was discarded. He is convinced that a lot of perfectly good food is discarded daily. Canned goods turn up fairly often in dumpsters and are among the safest foods; however, some canned foods can cause fatal diseases like botulism. Dried foods such as crackers, cookies, cereal, chips, and pasta are usually safe to eat once they are free from visible contaminates. Raw fruits and vegetables are usually safe except for the rotten ones. Confectionery like chocolate and other hard candies are also safe since candying is a method of food preservation...

Words: 803 - Pages: 4

Free Essay

Dumpster Diving

...Name Professor Course name Date On Dumpster Diving Quite by accident, I found the essay On Dumpster Diving by Lars Eighner on the pages of Seagull magazine. The first lines of it captured my interest considerably, for as I had never read about dumpster diving or scavenging before. On Dumpster Diving is a piece of large Eighner’s work called Travels with Lizbeth (1993), which was based on his own experience of homelessness. The author engages me by telling the origin and meaning of the term Dumpster Diver, presenting his survival guide with specified rules and regulations. Dumpster is a trademark of garbage loading onto trucks system. Dumpster diving involves persons voluntarily climbing into rubbish bins (dumpsters) to find valuables or simply useful items, including food and used clothing. Eighner writes that the life of a beggar traveling without any money opened his eyes to the fact that all those containers with waste are real “supermarkets” for the poor, and they are not only a source of survival, but also a depositary of high-quality and diverse food. Anyhow, there is a risk in eating such findings. According to Eighner’s experience, taking food out of dumpsters should involve three simple principles: “using the senses and common sense to evaluate the condition of the found materials, knowing the Dumpsters of a given area and checking them regularly, and seeking always to answer the question, “Why was this discarded?” Narrator advises to avoid such foods as...

Words: 1021 - Pages: 5

Premium Essay

Biased and Prejudice

...Quite by accident, I found the essay On Dumpster Diving by Lars Eighner on the pages of Seagull magazine. The first lines of it captured my interest considerably, for as I hadnever read about dumpster diving or scavenging before. On Dumpster Diving is a piece of large Eighner’s work called Travels with Lizbeth (1993), which was based on his ownexperience of homelessness.The author engages me by telling the origin and meaning of the term Dumpster Diver , presenting his survival guide with specified rules and regulations. Dumpster is a trademark of garbage loading onto trucks system. Dumpster diving involves persons voluntarily climbinginto rubbish bins (dumpsters) to find valuables or simply useful items, including food andused clothing. Eighner writes that the life of a beggar traveling without any money opened hiseyes to the fact that all those containers with waste are real “supermarkets” for the poor, andthey are not only a source of survival, but also a depositary of high-quality and diverse food.Anyhow, there is a risk in eating such findings. According to Eighner’s experience, takingfood out of dumpsters should involve three simple principles: “using the senses and commonsense to evaluate the condition of the found materials, knowing the Dumpsters of a given areaand checking them regularly, and seeking always to answer the question, “Why was thisdiscarded?” Narrator advises to avoid such foods as game, poultry, pork, and egg-basedmeals. Soft drinks...

Words: 974 - Pages: 4

Free Essay

Ja Jestem

...English 093 Professor Miller mmiller@mcc.commnet.edu Essay Topic #2 In light of reading the essays “Dumpster Diving” or “Serving in Florida” analyze your own understanding of homelessness, poverty and making a living with minimum wage in the U.S. You might consider whether the essay(s) changed preconceived notions that you had? Compare these preconceived notions to what you learned through the experiences of either Eighner or Ehrenreich. The following are topics and thesis statements on “Dumpster Diving” or “Serving in Florida.” Please feel free to use these topics and/or the accompanying thesis statements “as is” or with your own modifications: • How Eighner discussed such an informal topic in a formal way: Lars Eighner's discussion of dumpster diving is very methodical, intelligent and polished in contrast to the subject matter of digging through the trash. • Eighner’s attitude toward his lifestyle: Lars Eighner's account of dumpster diving was surprisingly positive given the fact that he is homeless.   • The common problems of an employee: Although Barbara Ehrenreich set out to discuss the life of a minimum wage worker specifically, her experience was universal to most working class people.   • Problems specific to minimum wage workers: Barbara Ehrenreich's essay "Serving in Florida" revealed the daily struggle of a minimum wage worker in America. General Essay Reminders: Essays are to be submitted via hard copy and electronically...

Words: 997 - Pages: 4

Premium Essay

Social Engineering

...class, Professor ???? talked about one particular example of social engineering dating back to ancient times, the Trojan Horse. It is considered one the most well-known examples of social engineering in history; a hollow statue built by the Greeks to allow them access to the city of Troy. This seemingly harmless wood statue was not apparent to be a threat by the Trojans and unfortunately resulted in the fall of the city of Troy to the Greeks. Social engineering works in somewhat the same way. In modern times it is a way for criminals to access your computer, office or confidential information for illegal purposes. In this paper, I will discuss 3 of the most common types of social engineering attacks; phishing, snooping and dumpster diving. Issues Analysis Firs I want to talk about one of the most common types of social engineering, phishing. Phishing is a computer criminal activity that uses a special engineering as a disguise on a website in order to acquire credit card information, social security, and other important information about the user. The first use of phishing started...

Words: 1031 - Pages: 5

Premium Essay

Vulnerability Assessment

...deception performed against human capital. System penetrators and ‘crackers’ know that people, and their desire to be helpful, or their ability to emote, are the weakest links in any program designed to protect information systems. Attackers can trick or persuade their way into systems in any number of ways via remote and physical means, and convince users to reveal information of interest that can cause harm to an organization. A typical social engineering attack can be segmented into physical and psychological stages. The physical segment of the social engineering operation could include phone calls, or returned phone calls from employees back to the attacker (an example of reverse social engineering) that volunteer information, ‘dumpster diving’ for company specific information that can be used to simulate a rapport or relationship with the company if questioned by an employee or security, emails with surreptitious links requesting unique information such as PIN’s or user names, or physical proximity and entry by impersonating an authorized person. The psychological stage of a social engineering attack takes place after the physical foot printing of the organization by using the bona fides that were learned while gathering physical intelligence to manufacture relationships with persons or the company, or by asserting false authority by impersonating persons or departments within the company. Employees are lulled into complying because they assume that the person is who they...

Words: 1868 - Pages: 8

Free Essay

Proctor & Gamble Competitive Intelligence Case

...corporate intelligence. While this tool is helpful in making solid business decisions effort needs to go into monitoring of the gathering process. Intelligence gathered by unethical means does more harm to an organization then good. The financial repercussions of involvement in corporate spying are steep, and the damage it does to an organizations reputation can take years to repair. Management teams must continually monitor how intelligence is gathered to make corporate intelligence work for their benefit. Proctor & Gamble Competitive Intelligence Case In spring of 2001 John Pepper, then chair of Procter and Gamble was faced with a dilemma (Tuck School). It had been brought to light that P&G’s competitive analysis department had engaged in corporate spying (CNN). An outside firm hired by P&G had engaged in spying on Unilever, P&G’s main competitor in the hair care industry. According to Jordan and Finkelstein “the spying operation gathered about eighty documents detailing Unilever’s plans for its U.S. hair care business over the next three years, including information on its launch-plans, prices, and margins (Tuck School, p. 1).” In April 1999 John Pepper was the keynote speaker at an SCIP CEO Roundtable, held in Montreal. In his address Mr. Pepper honed in on the growing importance of Corporate Intelligence, or “Business Intelligence” as he referred to it, in the shaping of corporate strategy (speech). Competitive Intelligence...

Words: 926 - Pages: 4

Premium Essay

Business Ethics

...Contents Assignment of monetary value 3 Whistle-blowing 9 Competitor Intelligence 13 Business Ethics 16 Is business ethics important, if so why? 16 Assignment of monetary value Utilitarianism and cost-benefit analysis are indispensable tools, in the situations where people have to make decisions. In a free society, individuals, or voluntary associations of individuals (whether corporations, nonprofits, households, or informal gatherings) often need to make decisions. Looking at the costs and benefits of individual decisions is important. The important thing to note here is, though, that different decision-makers may assign different costs and benefits to the same things, and thus come up with different courses of action. This is because different people have different preferences, different bases of experience, and different goals. Thus, there is no one-size-fits-all cost-benefit analysis, but the tools and principles of cost-benefit an analysis are useful to all. Some people are uncomfortable with the idea of applying cost-benefit analyses to things that are not usually measured in tangible monetary terms. There are two kinds of objections. One is the objection to any “apples to oranges” comparison. Second is the fact that some things get debased when valued in monetary or utilitarian terms. Both of these are valid criticisms, but in situations where we do need to make decisions, we really have no choice but to weigh different forms of cost and...

Words: 4461 - Pages: 18

Free Essay

Crime

...Crime One of the best theories best known for methodological approaches would be a rational choice. Individuals are a unit of analysis at which to study society. Society is not made up of a large number of individuals; it can contain organizations and groups. Any general sociological theory is able to tell how the social structure can come into being as well as how they can be maintained. The rational choice theory will explain how the human race behaves for the most part. There are some limits to the theory. Rational choice theory is based on the idea that individuals act for a particular purpose, that is to maximize their utility. In the simplest way, rational choice theory will say the given number of different options that people will do, because they believe that it will have the best outcome. The field of political science rational choice theory is usually used. Rational choice theorists argue that the study of political analysis need not necessarily include every detail of political information, such as dates, names and places, but that an alternative view can offer a distinctive insight into the nature of political life. An assumption made by rational choice theorists is, every human is motivated by self-interest and will figure out their own moves so that they can maximize their own interests. The rational choice theories are more likely to deter property crimes than to violence crimes if increased sanctions are put in play. The increased sanctions will...

Words: 795 - Pages: 4

Premium Essay

We Have a Problem

...And why it is an ethical issue? Corporate Intelligence issue relates to ethics by being a purposeful and coordinating monitoring of your competitors within a specific marketplace. It also has to do with determining what your business rivals will do before they do it. It is to gain foreknowledge of your competitor's plans and to plan your business strategy to countervail their plans. As you might expect, this will involve many methods at the tactical collection level, but it will also require integration into your existing information infrastructure, analysis and distribution of the information, and finally, the calculation of business decisions on the grounds of that information and the analysis of same. With a lack of security and training allows other to use techniques to gain access to an organization’s information. The techniques are removing the hard drive and copying the information to another machine, hacking, dumpster diving, social engineering, bribery, and hiring away key...

Words: 546 - Pages: 3

Premium Essay

Information Systems of Sterling Urgent Care

...Information Systems Concepts 7 Types of Communication 7 SUC’s Communication Technology 8 SUC’s Virtual Private Network 9 Section 3: Business Information Systems 11 Data Systems 11 TPS (Transaction processing system) 11 MIS (Management information system) 11 DSS (Decision support system) 12 KMS (Knowledge management system) 12 AI (Artificial intelligence) 12 Information Systems within SUC 14 Section 4: System Development 16 Prototype Model 16 Waterfall model 17 Implementation of the Waterfall model 17 Waterfall Phases 18 System Investigation 18 System Design 19 System Implementation 19 System Verification 19 System Maintenance 19 Section 5: Information Systems and Society 20 Types of Hacking 20 Social Engineering 20 Dumpster Diving 21 Identity Theft 23 Illegal Access and Use 23 References 25   Section 1: Information Systems Overview What is Sterling Urgent Care? Sterling Urgent Care (SUC) is a non-existent urgent care facility located in the small town of Sterling Colorado. This is a private-owed walk in clinic that will provide health care ranging from routine doctor visits to emergent care. This organization will require internal users from several different departments, as well as outside healthcare and insurance companies, to have access to patients Electronic Health Records. There will be several internal departments that will require constant communication between each other. Some of the departments consist of Registration, Main Clinic,...

Words: 5668 - Pages: 23

Premium Essay

Abcd

...noise) 9. OMISSION LYING is intentionally not informing the channel member of any differences, problems, safety warnings, or negative issues relating to the product, service, or company that significantly affects awareness, intention, or behavior 10. CONFLICT OF INTEREST when an individual must choose whether to advance his or her own interests, those of the organization, or those of some other group 11. BRIBERY is the practice of offering something (usually money) in order to gain an elicit advantage 12. ACTIVE BRIBERY the person who promises or gives the bribery commits the offense 13. PASSIVE BRIBERY is an offense committed by the official who receives the bribe 14. CORPORATE INTELLIGENCE is the collection and analysis of information on markets, technologies, customers, competitors, as well as on socioeconomic and external political trends. 15. SYSTEM HACKING assumes that the attacker already has access to a low level, privileged account...

Words: 712 - Pages: 3

Free Essay

Vishing

...emerging threat vector which combines social engineering and technology. Utilizing Voice over Internet Protocol (VoIP) convenience combined with electronic mail phishing techniques, Vishing has the potential to be a highly successful threat vector. Vishing victims face identity theft and/or financial fraud. An increased awareness about these attacks will provide an effective means for overcoming the security issues. INDEX 1. Introduction 1 2. What is Vishing? 1 3. How Vishing works? 2 4. The Problem of Trust 4 5. Vishing Characteristics 5 5.1. Type of data prone to attack 5 5.2. Data usage by the attacker 6 6. Other Attacks 6 6.1. Dumpster diving 6 6.2. Card Owner Validation 7 6.3. Handset Blackmail 7 6.4. Exploit payloads 7 7. Overcoming Vishing 7 8. Conclusion 8 References 9 1. Introduction: Many of today’s widespread threats rely heavily on social engineering techniques, which are used to manipulate people into performing actions or divulging confidential information to leverage and exploit technology weaknesses. Phishing is the most commonly exploited threat currently plaguing the Internet and its users. At one point, phishing referred exclusively to the use of e-mail to deliver messages whose purpose was to persuade recipients to visit a fake website designed to steal...

Words: 2502 - Pages: 11