Thursday, November 28, 2019

Analysis Of One Perfect Rose Essays - Poetic Form, British Poetry

Analysis Of One Perfect Rose In her poem ?One Perfect Rose,? Dorothy Parker misleads the reader throughout the first and second stanzas into believing this poem is a romantic tribute to a tender moment from her past through her word choice and style of writing. However, the tone of the entire poem dramatically changes upon reading the third and final stanza when Parker allows the reader to understand her true intention of the poem, which is a cynical and perhaps bewildered view of the memory. And, with this shift in the tone in the third stanza, there is a shift in the meaning of the entire poem, leading the reader to believe that the first two stanzas were not, in fact, sweet but instead a sarcastic and bitter account of this past moment. In the first stanza, Dorothy Parker uses specific words to create a double meaning. She uses words like ?tenderly,? ?pure,? and ?perfect? to describe both the rose and it's sender. The words directly influence the reader's initial reaction to the poem, as does the way in which she writes the poem. The stanza has four lines with every other line rhyming (ABAB format). It is short and sweet with a melodic quality in it's reading. This musical quality definitely helps to lull the reader into the belief that the poem's intention is to come across as a romantic recollection. However, in reading the poem through a second time, equipped with the knowledge of it's true bitter notions, the reader sees what is purposely hidden but directly affects the overall tone. Parker mentions first and foremost the fact that this gentleman sent her ?a single flow'r? and ends the stanza with the phrase ?one perfect rose.? There is a repetition here that at first the reader passes off as her noting the delicacy of the solitary flower. Upon reading the last stanza, it is realized that she is actually pointing out the fact that the only thing she received was one flower-that's it. And, although there is a melodic quality to the rhythm to this poem, this rhythm accentuates the abruptness of her speech. She cuts lines off and speaks in short fragmented sentences. This, again, is something that is not noticed in the first read-through, but it does stand out after this initial reading. It almost seems as if Parker could not be bothered to spend too much time on the poem: it's as if it was not worth the time or the effort. The second stanza is similar in content to the first. There are words Parker uses to deceive the reader at first- ?fragile,? ?heart,? ?love,? and ?perfect.? There are again four lines to the stanza with the odd and the even lines rhyming. And, of course, there are those words that the reader misses the first time reading it through. Her use of the word ?floweret? is a perfect example of this. She cunningly makes a show of the fact that this is one, single flower by itself, but because the word rhymes with the word ?amulet? two lines down, this mocking goes unnoticed. As does her the true meaning of the line ?Love long has taken for his amulet?. Using this rose as the unknown gentleman's call sign at first seems cute. Superman has his ?S,? this gentleman has his ?One perfect rose.? The reader comes to realize that this symbol is not an honorable one. In the third and final stanza, Parker really shines the light on her true intention for this poem. She continues with the same format as the previous two stanzas, four lines with every other line rhyming and short, fragmented lines. However, her real feelings come out loud and clear in this stanza where they did not in the first two. She did not want that one, singe rose. She wanted more, perhaps ?one perfect limousine.? Here not only does she inform us what she wanted; she mocks what she did receive. Each line ends with the line ?One perfect rose,? including the last stanza. And. In using the phrase ?one perfect limousine? she makes her feeling completely obvious. The rose was unnecessary and unwanted. Using it three time over in the same phrase

Sunday, November 24, 2019

Critique of the Article To Twitter or not to Twitter

Critique of the Article To Twitter or not to Twitter Robert W. Lucky’s article titled â€Å"To Twitter or not to Twitter† discusses the dilemma that older internet users find themselves. Lucky (2010) seeks to share his dilemma on whether or not to join the social networking site. The main argument is that age is the key factor in determining the use of Twitter. Lucky (2010) targets a broad audience but has a bias for the older generation. Advertising We will write a custom critical writing sample on Critique of the Article â€Å"To Twitter or not to Twitter† specifically for you for only $16.05 $11/page Learn More The article appeals to his contemporaries since the discussion relates to issues they are struggling with, while the younger generation will find some historical value in it and a feel of the perspective the older generation has on their use of Twitter. The author succeeds in sharing his dilemma with his audience. The article starts by defining Twitter and describing how it works , based on the author’s perspective. This part informs the sections of the audience who may not have interacted with Twitter, thereby putting them on the same page as the rest. The author then delineates between the younger and the older generation. He refers to the younger generation as â€Å"digital natives† (Lucky, 2010, p. 245). This means that they grew up with technology as part of their daily experience. On the other hand, he refers to the older generation as â€Å"digital immigrants† who have adapted to the technological changes in the recent years (Lucky, 2010, p. 245). The author then goes on to share personal experiences with younger persons in meetings. He provides a narrative on how they affected his thinking. The paper concludes by questioning the relevance of Twitter to the older generation in rational terms, but leaves room for the audience to arrive at their own conclusions regarding the use of Twitter. The article had two distinct strengths. T he first one is that the author succeeds in communicating to a broad audience. The distinction between the digital natives and digital immigrants invites both age groups to the discussion. While the article relates the struggles of the digital immigrants, it gives stories that digital natives are familiar. The use of technical terms comes with special care. At the introduction, there is a full description of what Twitter is, and how it works. Inside the body, there are descriptions for the terms â€Å"digital native† and â€Å"digital immigrant† (Lucky, 2010, p. 245). This makes the article informative for the older generation, while it makes it entertaining for the younger generation who may find it amusing that there is need to describe how Twitter works. The second key strength of the article is that it succeeds in demonstrating the role of age in the use of Twitter. In the latter sections, the discussion on whether to use Twitter in a forthcoming industry meeting provides an interesting look at the purpose Twitter serves for the two generations. The digital natives use it for social networking while the older one seems to try to find a way to use it for professional applications. Advertising Looking for critical writing on social sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More The author does not see the point in someone posting on Twitter that they are now awake. It does not seem to add any value to the audience viewing that Tweet. However, the story of the authors’ acquaintance who says that after using Twitter for a week he felt â€Å"a sense of connectedness† illustrates the author point, which is that Twitter serves a social purpose (Lucky, 2010, p. 246). In addition, the author demonstrates that there is a cultural dimension to technology since the digital natives are part of an online culture and find expression in it by â€Å"inhabiting multiple identities, living a culture of sharing and by peer collaboration† (Lucky, 2010, p. 245). The effort to sustain the interest of a wide audience creates one of the fundamental flaws of the article. After the introductory sections, the author struggles to maintain a voice fitting for the entire audience. The details of the author’s personal disagreement with a young conference speaker alienate digital natives. The speaker, as a representative of the digital natives in the context of the article, comes off as preposterous when he calls the digital immigrants, â€Å"pencil pushers† (Lucky, 2010, p. 246). The author also makes the young speaker who tweets every morning appear petty. These sections have the potential of alienating the younger sections of the author’s audience. While the author makes a good point of showing that, Twitter works differently for the different generations the choice of examples for the article paints younger users as irrational and implicates them in â€Å"pointless, incessant barking† (Lucky, 2010, p. 246). This article is successful in bringing out the main point, which is that Twitter use varies on a generational level. The tone is not patronizing. This attracts both the young and the old readers to engage. Its reflective disposition and its undecided conclusion leave the readers thinking about how they use Twitter. The author is successful in attracting the interest of a wide audience and in communicating the different ways that the generational divide influences the use of Twitter. The choice of illustrations though risks alienating the younger readers. In conclusion, the work is informative and stimulating.Advertising We will write a custom critical writing sample on Critique of the Article â€Å"To Twitter or not to Twitter† specifically for you for only $16.05 $11/page Learn More Reference Lucky, R. W. (2010). To Twitter Or Not to Twitter? In L. G. Kirszner, S. R. Mandell , The Blair Reader: Exploring Issues and Ideas (pp. 244-246). Canada: Pearson Education.

Thursday, November 21, 2019

Information Technology Research Paper Example | Topics and Well Written Essays - 1000 words - 2

Information Technology - Research Paper Example However, the same cloud computing program has some weaknesses. First, possible data loss may occur when the chosen cloud computing site malfunctions. Second, confidential data may be leaked by cloud computing hackers (Dhanjani, 2009). Third, Cloud computing site employees or management personnel will retrieve and/or use the uploaded cloud computing information for profit or other illegal purposes. Vodafone educational technology Vodafone came up with a new technology during 2014. The new technology aims to bridge the information technology gap between parents and their children (Bateman, 2015). With the parents falling behind in terms of information technology I.Q., Vodafone offers free information technology lessons to parents of enrolled children. Pilot studies were conducted in some selected North London and South London elementary schools during 2014. Specifically, the school in London’s Wiltshire and Rugby communities were included in Vodafone’s child and parent joint information technology programs. Further, the program has its strengths. First, parents will learn to keep abreast with continually changing information technology. Second, the Vodafone program creates a stronger bond between parents and their elementary children. Third, the parent’s new information technology capability will enhance the parents’ communication-based work outputs at home and at work (Bateman, 2015). However, the same program some weaknesses. First, uninterested parents cannot be forced to learn the new technology.

Wednesday, November 20, 2019

Atmosphere Essay Example | Topics and Well Written Essays - 1250 words

Atmosphere - Essay Example Earth’s atmosphere consists of troposphere, stratosphere, mesosphere and thermosphere. Thermosphere contains ionosphere and exosphere. Troposphere- The atmospheric layer is closer to the Earth and comprise of around 75% of mass of gasses in the atmosphere. Troposphere is 0 to 12 km above the earth’s surface (Barry and Chorley, 2010, p.17). The height of troposphere depends upon the seasons which are lowest in the winter and highest in the summer season. 99% of the water vapours in the earth’s atmosphere contained in the troposphere layer. Stratosphere- stratosphere ranges from 12 to 45 km above the earth’s surface. Stratosphere is the second major atmosphere layer in the atmosphere. Stratosphere contains ozone layer which acts as a shield to absorb harmful ultraviolet radiation from the sun protecting earth’s surface. Ozone layer absorbs ultraviolet radiation which leads to increase in temperature with height. Mesosphere- mesosphere ranges for 50 to 85 km above the earth’s surface. Mesosphere and stratosphere both referred as middle part of the atmosphere. Temperature of mesosphere can drop about -100 degree Celsius. This atmospheric layer of the atmosphere helps to protect earth from meteoroids. Thermosphere- Thermosphere layer ranges above 85 km. Harmful ultraviolet radiation turns in to heat which causes temperature of thermosphere to be high (Park, 2001, p.81). Temperature of stratosphere can go above 200 degree Celsius. Thermosphere contains ionosphere and exosphere. Ionosphere ranges from 80 to 550 km. Exosphere ranges more than 550 km. This is the area of atmosphere where satellite orbits round the earth. Discussion Earth’s atmosphere is primarily composed of oxygen and nitrogen and argon. Nitrogen, oxygen and argon comprises of about 99.97% of gas in the atmosphere. Earth’s atmosphere also composed of trace amounts of xenon, ozone, neon, helium, methane, krypton, ammonia, hydrogen and carbon monoxi de. Lower part of earth’s altitude also contains water vapour. Earth’s atmosphere also consists of particulate matters which are rain, snow, dust and volcanic ash. Particulate matters are less persistent and highly variable than that of gases (Bradbury, Boyle and Morse, 2002, p.94). Particulate can often remain in the atmosphere for longer period. Importance of Photosynthesis Photosynthesis is the process of producing large amount of organic matter which helps life to sustain on earth. Without photosynthesis there would be no life on earth. Photosynthesis process is formed when plants absorb carbon dioxide (CO2). Carbon dioxide cannot be inhaled by human beings. Plants break down carbon dioxide to oxygen (O2). The main product of photosynthesis is oxygen. Oxygen gas is inhaled by human beings and it is very much essential to life. The large content of carbon dioxide is harmful and toxic. The lower concentration of oxygen is harmful to sustain life. Plants produce aroun d 30% of oxygen. Remaining 70 % of oxygen is produced by marine plants and single-celled algae. Marine plants and single-celled algae can also form photosynthesis. Photosynthesis process is vital in regulating life cycle process on earth. The production of food and deriving energy is only done by plants. Plants with the help of energy can produce and supple necessary energy and nutrient to other living creature. Photosynthesis is the only way to produce energy. Therefore, photosynthesis is vital to life and life without photosynthesis is impossible. Importance of Respiration Respiration

Sunday, November 17, 2019

Eating disorders -- causes Society's portrayal of woman Research Paper

Eating disorders -- causes Society's portrayal of woman - Research Paper Example Social and genetic factors can produce eating disorder problems. Genetics can be blamed when there are hormonal imbalances and other biological problems. Family factors and culture can shape beliefs and attitudes that make some women and girls prone to eating disorders. Cover Letter Name Address 9 January 2013 Eating disorders are serious problems that have social and cultural implications. Because of the media and other factors, young girls and women are developing body image problems that make them vulnerable to self-esteem and confidence issues, thereby contributing to eating disorder problems. This paper determines the causes of eating disorders, predominantly the role of media and society in shaping body image issues. The main purpose is to educate the public about the causes of eating disorders, so that they can resist the impact of some of these factors on their body image and eating attitudes and practices. To attain this research goal, current studies and reports from valid academic sources are used. This research showed that media is a risk, if not a strong causative, factor that can promote negative body images and body dissatisfaction, thereby promoting disordered eating practices. It uses very thin women who become negative role models to women and can result to women developing body image anxiety and low self-esteem. ... Society, as a whole, must work together in developing the kind of media and civilization that respect and celebrate different body images and promote beauty that is not physical, but inside individuals. Introduction Anorexia and bulimia nervosa are two eating disorders that have serious physical and psychological effects, sometimes even leading to death. These disorders have also increased in prevalence for the past few decades, thereby generating protests from concerned families and organizations about the kind of society that they live in, when very young girls and adult women grow up having negative body images. The media and its portrayal of extremely thin women as the ultimate beauty standard have been blamed as one of the most influential causes of eating disorders (Derenne & Beresin, 2006; Spettigue & Henderson, 2004). By media, this includes fashion and beauty magazines, TV shows, and movies. The toy industry does not help too, when it sells toys with unrealistic body types, such as Barbie and other dolls. Moreover, society promotes definitions of and pressures to beauty that girls grow up to (Makino, Tsuboi, and Dennerstein, 2004). This paper determines the causes of eating disorders, particularly the role of media and society in shaping body image issues. This research showed that media is a risk factor that can promote negative body images and body dissatisfaction, thereby promoting disordered eating practices. Social and genetic factors can produce eating disorder problems. Causes of Eating Disorders The causes of eating disorders are varied and may depend on genetics and family factors. This paper divides the causes into genetic, family, the

Friday, November 15, 2019

Drug Addiction In Pakistan Youths

Drug Addiction In Pakistan Youths Drug addiction is a state of periodic or constant intoxication produced by the repeated consumption of a drug. Its characteristics include Uncontrollable desire to continue taking the drugs, a tendency to increase the dose after interval of time, a psychological and physical dependence on drugs, effects of drugs on individual and society. Drug addiction is an abnormal condition which arises due to frequent drug use. The disorder of addiction involves the progression of sensitive drug use to the development of drug-seeking behavior, the openness to decline and the decreased, slowed ability to respond to naturally rewarding stimuli. Drug addiction is basically a chronic disease affecting the brain, heart and other parts of body. Youngster start taking drugs at their teen ages and the first step of addiction to drugs is smoking. Drugs affect different people in different ways. One person can take and abuse drugs, yet never become addicted, while another merely has one experience and is immediately hooked. It can be said that dugs addiction is just a state of mind. Drug addiction is often overshadowed by many of the countrys other human development problems, such as poverty, illiteracy, and lack of awareness and basic health care center. But the fact is that drug addiction is rapidly growing among the youth of Pakistan. Drug addiction is a complex brain disease. It is characterized by compulsive, at time uncontrollable, drug craving, seeking and use that persist even in the face of extremely negative consequences. Drug seeking becomes compulsive, in large part as a result of the effect of prolonged drug use on brain functioning and also on behavior. For many people, drugs addiction becomes chronic, with relapses possible even after long period of abstinence. I chose this topic because I think it is necessary for todays society which is taken over by the curse of drugs, mostly High School and university students are involved in it. It the main reason, today youth is distracted from their ambitions, and due to it today Pakistan, even after 63 years of independence, is 3rd world country. One of the reasons is that some people who want to quit but due to the lack of health care centre, they are unable to quit. Some people also involve in illegal activities to take drugs because they are not financially strong. This study will help us analyze the effects of drug addiction and will help us find better alternatives. Drug addiction is a state in which the body feel relax and comfortable. Drug addiction among youngsters is increasing day by day, which have a very negative effect on our society. Review of Literature This study help us to examine that individual who are addicted to drugs are viewed negatively overall in the society. This research indicate that negative attitude are clear among young generation and it gradually increase with the age, so that the literature review indicate that level and accuracy of knowledge about mental illness increase from childhood through adolescence, negative attitude in youth also raise with the passage of time. On the other hand, adolescence is often accompanied by peer pressure or by other recourses. According to the study, it is also found that current users Marijuana says that it is less dangerous than other drugs. The study show that drug addiction is found in males as well as females and this trend is gradually increasing especially in females, and it is also shown in the study that trend of drugs among adolescent is also increasing in urban and rural schools. Results show that age-stigma association is quite independent of sex and residence. It also shows one of a factor that who are addicted to drugs are due to their close friends or you can say due to bad company. This study shows the reasons and causes by which teenagers are motivated toward drugs. It show that who use drugs on a regular or occasionally are strongly supportive by personal choice due to lack of concentration from their parents and for enjoyment with their friends to eliminate their boredom. The reasons which are not using drugs in this study include lack of interest and fear from drugs and also from their parents and opposite reaction of their elders. The main purpose of this study is to emphasize the significance of parents in this regard. This research show the fact that increasing majority of children reported using drugs because they enjoyed them or they were bored and they want themselves to remain busy in some other alternative activities. The use of illegal drugs in children and teenagers are gradually increasing day by day. Result of this study showed that the main reason by which youth is motivating toward drugs is due to the peer pressure and their friends which were involved in such illegal activities. The other aspect to conduct this research was to finds the reasons that why some children do not use drugs. The first reason was lack of interest in the effects of drugs. Other main reasons included fear of immediate effect of substance, fear of physical and psychological harm and fear of becoming addicted to drugs. The finding and conclusion of this study is to get the reasons behind drug related decision especially in children and teenagers. Both who use drugs and who do not give lot of explanation and reasons. Children who do not use drugs reported that they are not involved in drugs are due to lack of interest in this activity, worries about the cost of getting caught by police or their parents. As we all know the health hazards of smoking. Everyone is familiar from this fact but this curse is rapidly increasing among youngster. The main objective of this study is to investigate the signs of tobacco use, smoking as well as snuffing, at the age when most of the young generation is diverted toward this curse. In this study, it is found that now a day, smoking is becoming very common in girls as well. Sweden has the highest frequency of smoking all over the world. It is found in the study that frequency of snuffing among teenagers has amplified since the early 1970s, whereas the graph of smoking has reduced slightly during last decade. The purpose of this research is to explore teenagers thinking of tobacco use, their shared ideas and images, how these design are reflected in their report about their own and other people tobacco use and also the ways understandings of tobacco use are related to the teenagers development of a gender identity. It is found in the study that smokin g cigarette offered males as well as females a short break from their daily routine and strains of family life. According to teenagers, smoking will ultimately lead to the break-down of the whole body. They also explain that invisible process inside the body, when smoking, will gradually be visible on the outside of the body. This research shows that youngsters think that snuffing has a positive effect as they increase their sports performance. But the fact is something else. Smoking and snuffing is just a mind satisfaction activity, as it affects lung and heart. On the other hand, it also affect externally like u see that the color of lip and teethes and even the color of face of smokers are also changed after a period of time. Some people are attracted to danger, and want to face risk, which is one of the reasons for them to start smoking. In addition, it is examined in the study that tobacco use is basically based on human nature. Smoking is a part of teenage lifestyle, such as b eing together with friends for hangout, parties etc. It is concluded from the analysis that now a days, new generation is well aware from all illegal activities such as, smoking, snuffing, drinking etc. This research paper shows the planned use of prescription drugs of intoxicating properties other than physicians description of specific drugs for intoxicating means or for bona fide medical condition, which is dangerous for human health. Research shows the rapidly increasing rate of abuse of such drug among youth, especially teenager. Such type of abuse of drugs is one of the biggest and main sources of drug addiction. In 2003, approximately 15 million US citizens were involved in using of prescription drugs for its intoxicating quality. For minimizing the rate of prescription drug misuse, government is making strategies to identify the early signs and effective clinical practices to prevent people from getting into it to avoid from massive problems in future. The most abundantly used drug in UK is Alcohol and teenagers use it more than the limit described for health which 21 and 14 units per week for males and female respectively. Those who are new to alcohol must use bellow the limit for the safe side. This study is about the relationship between excessive use of alcohol and its affect on human memory. It is identified from surveys among excessive use and low-dose user that those who use alcohol in excess amount face everyday memory errors than low-dose. Excessive use of alcohol has a direct relation on memory errors and neuropsychological deficits. Alcohol is very harmful for heart, liver and other sensitive parts of human body. The finding of this study is that use of substance is highly common among homeless and street-involved young people. Study confirmed that variables measuring psychological dysfunction and homeless culture predicted alcohol addiction, while institutional disaffiliation and homeless culture predicted drug addiction. Findings affirm distinct patterns of division related to alcohol compared to drug addiction. As homeless, street-involved young people continue to use drugs and alcohol as a strategy to cope with the various detrimental experiences associated with living on the streets, the result is often further societal estrangement. This study also show that engaging in criminal behaviors has been identified as an indicator of disaffiliation, especially among homeless population. Seeking drug-using friends and involvement in social networks that reinforce drug-related choices, attitudes and behaviors increases youths assimilation into homelessness culture. The purpose of this study was to determine whether domains of social estrangement are associated with homeless youths alcohol and drug addiction. Results show that specific domains of social estrangement do predict addiction, while others prevent from this activity. Purpose to conduct this study is to estimate the incidence rate of initiation into drug injection and to identify predictors of initiation into drug injection separately among street girls and boys. This research show that that injected drugs are rapidly increasing day by day in street youth of Northern America and Canada. This situation represents a significant public health issue as young injection drug users are known to be the population at highest risk for HIV and HCV infections. This is the first study to measure incidence rates of initiation into drug injection by gender among youth at risk. Observed incidence rates are similar for boys and girls, results found having no association between gender and having ever injected drugs. In a study of young Canadian offenders, more girls aged 16-19 injected than their male counterparts of the same age. In this study, it is noticeable that girls were more likely to report having started injection using heroin while more boys reported ha ving used cocaine as their first drug of injection. Results show that recent heroin use and recent cocaine use respectively tripled and doubled the risk of initiation for both girls and boys. Objective of this study is to observe social contexts and processes influencing evolution to drug injection among street youth. This study show that some combinations of street life and drug use trajectories seem to contribute to injection among street youth. This study clearly shows the pertinence of examining how drug use practices are influenced by the individuals relations with their social environments. This study is the first qualitative investigation of the social processes that lead street youth to adopt drug injection. One of main finding is that the manner in which drug injection inserts itself into a youths life trajectory varies depending on when youth come into contact with the street, as well as their relations with the street scene and drug use. In this respect, it should be pointed out how diverse the trajectories of street youth are. While it is not possible to state with certainty that a youth will never inject drugs, it appears that certain youth have trajectories that are more prone to injection drug use than others. This study is conducted on street youth on adolescent and young adults who spend their most time living and working on the streets. This socially and economically disadvantaged population is marked by perilous living conditions, including poverty, homelessness, and drug use. In study of homeless youth, the odds of an earlier suicide attempt were nearly four times greater among youth with an active diagnosis of depression, and nearly two times greater among youth who reported symptoms of hopelessness. In addition, depression is associated with high-risk behaviors, such as injection drug use and unprotected sexual intercourse that predispose youth to human immunodeficiency virus (HIV) infection. HIV infection is itself a well recognized risk factor for mortality among street youth. We observed a very high frequency of depressive symptoms among street youth, with more than four in 10 street youth reporting CES-D score _22. The greatest number of depressive symptoms was observed among we ekly heroin users, followed by weekly crystal methamphetamine users, then weekly cocaine/crack users, and finally, daily marijuana users. The research paper was on the impact of maternal alcohol and illicit drug use on childrens behavior problem and the objective of this study is to use a large, national sampling of mothers and children to test for evidence of casual relationship between maternal alcohol, marijuana and cocaine use and its effects on childrens health problem. This study provides some evidence that maternal substance use may be linked causally to childrens behavior problems. Although TSLS results are challenging due to the poor performance of the identifying instruments, OLS models, family fixed-effects models, and mother-child fixed-effects models all suggest that maternal marijuana and cocaine use are associated with increases in 4-15-year-old childrens BPI scores. Maternal alcohol use, as measured by the number of days the mother used alcohol in the past month, appears to affect behavior problems. This result is sensitive, however, to the addition of maternal depression and smoking measures. Moreover, the magnitude of this effect is very small, and maternal indulge drinking had no constant impact on childrens behavior problem. This study is about the depression and participation of youth in selling and use of illicit drugs. The argument starts with the theory that drug selling and drug use augment each other, both at the individual level and at the aggregate level. For example, someone who sells drugs has relatively cheap access to drugs. And, someone who uses drugs may sell to help finance his/her use. The conceptual framework postulates that a recession would have direct positive effects on the prevalence of youth drug selling but ambiguous direct effects on youth drug use. The conceptual framework also postulates that drug selling and drug use are inter-connected at the individual level and the cumulative level. Thus, any effect of a recession on one would likely affect the other in the same direction. The limited empirical evidence indicates that both drug selling and drug use among youth is higher when the economy is weaker. The current economic crisis will likely increase both youth drug selling and drug use relative to what they would have otherwise been. As we all are familiar that humans are routinely exposed to a vast array of environmental neurotoxicants, including pesticides, endocrine disrupters, and heavy metals. The long term consequences of exposure have become a major human health concern as research has indicated strong associations between neurotoxicants and a variety of dopamine-related neurological disorders. This study was conducted to know the effects of environmental neurotoxicants on the dopaminergic system and the possible role in drug addiction. A large variety of studies have demonstrated that a vast assortment of environmental neurotoxicants have deleterious effects on the dopaminergic system, consequently enhancing or impairing DA neurotransmission and disrupting DA-associated behaviors including motor control, motivation and attention, and potentially, vulnerability to drug addiction. Pesticides and insecticides, such as dihedron, parquet, and rotenone, tend to decrease DA activity and can lead to diseases such as PD, which are characterized by dopaminergic neurodegeneration. Studies appear to express a link between environmental neurotoxicity exposure and drug addiction although much work needs to be done to further identify and characterize the underlying mechanism involved. Bupropion is an effective medication in smoking cessation and has a good safety and side effect profile. The effects of bupropion on extracellular dopamine levels in the striatum were investigated using raclopride positron emission tomography (PET) imaging in rats administered saline, bupropion and in healthy human volunteers administered. A cognitive task was used to stimulate dopamine release in the human study. In rats, bupropion significantly decreased raclopride specific binding in the striatum, consistent with increases in extracellular dopamine concentrations. In man, no significant decreases in striatal raclopride specific binding were observed. Levels of dopamine transporter occupancy in the rat at bupropion were higher than predicted to occur in man at the dose used. Thus, these data indicate that, at the low levels of dopamine transporter occupancy achieved in man at clinical doses, bupropion does not increase extracellular dopamine levels. These findings have important im plications for understanding the mechanism of action underlying bupropions therapeutic efficacy and for the development of novel treatments for addiction and depression. For a long period of time, China implemented restraining drug policies to cope with drug-related problems but on the other hand, the situation of drug addiction has rapidly worsened since the early 1990s. For example, the number of registered illicit drug users in the country increased from approximately 70,000 in 1990 to 1.16 million by the end of 2005. This paper is projected to intricate on the general principles of Chinas latest Drug Control Law from the point of view of scholars who are involved in the field of drug addiction research and treatment in China. This paper also discussed the challenges we are currently facing, based on the observations and practical experiences the authors have obtained in China. It is hoped that by addressing these issues, we will be able to implement the new Drug Control Law more successfully and ensure that we deal more effectively with drug addiction in China. Methodology: This drug addiction survey is based on questionnaire from age (12 to 19) years, which is derived from 2005 cycle of Ontario student drug use survey. This research is conducted through questionnaire as mentioned above and the items of questionnaire are (1) Would you be afraid to talk or interact someone who is addicted to drugs. (2) Would you make friend someone who is addicted to drugs? (3) Would you feel embarrassed or ashamed if your friend knew that someone in your family was addicted to drugs? In this research, Ordinary least square regression is used to oversee and examine the relationship between age, sex, urban city, individuals and peer groups. Quadratic and linear age terms are included in this model. In this methodology, age variables were centered in order to reduce the correlation between the linear and quadratic term and interaction term. The data on which this study is based was collected under large study of pre-teenagers and schoolchildrens attitude and behavior toward illegal drugs and their experience. This research had both quantitative and qualitative components Data is basically collected by the survey which depends on questionnaire. Data is also gathered by interviews of individual to understand the thoughts and perception about drugs in children. Basically, the sample of this study is school in Glasgow and Newcastle. The quantitative element consisted of a survey of 2382 between ten to twelve year old children in 47 schools of Glasgow. To capture teenagers concepts of tobacco use, a qualitative approach with focused group interview was conducted for this research. Group discussion is the most useful and helpful way of sampling. The sample on which the research is conducted with 43 ninth grade students having age between 14 to 15 years old at two schools in inner Stockholm. Interviews are based on eight themes those are; (1) health and tobacco use, (2) the age limit of tobacco purchase, (3) school and tobacco use, (4) media and tobacco use, (5) the aesthetics of tobacco use (6) the pointless tobacco use, (7) presentation of self, peers and adults as tobacco-users, (8) presentation of self and peers who do not use tobacco. The majority of the 25 non-tobacco-users had tried smoking earlier, 12 boys and one girl had tried snuffing. Among the 18 tobacco users more girls than boys use tobacco on a daily basis. This research is conducted with the help of scientific questions. In this study, group discussion and interview are also conducted to read the state of minds of drug user that how these drugs affect their health and brain. Scientific questions highlights the need for research into the effects of prescription drugs on the developing brain, using both vitro and vivo models. Sample of this research is teenagers of United States. In this study, existing -groups design was adopted to compare existing groups of excessive alcohol users and low dose user. The sample on which this research is conducted is the students of colleges and universities of North-East of England and each participant was tested individually at their respective college and university. Forty-five participants were identified as excessive alcohol users having 28 females, 17 males, mean age of the participants is 17 years. Sixty-three were identified as low-dose/no-alcohol users having 41 females, 22 males and mean age is 16 years. Alcohol and other drug use were assessed using Recreational Drug Use Questionnaire. Prospective memory Questionnaire (PMQ) was administered first, followed by the drug-use questionnaire and the whole testing time per participant was approximately 25 minutes. Sample selected to conduct this research is three U.S. cities are Los Angeles, CA; Austin, TX and St. Louis, MO. Participate in the study, had to be 18-24 years old, have spent at least 2 weeks away from home in the month before the interview, and provide written informed consent. The dependent variable for the current study reflected alcohol or drug addiction as measured by the Mini International Neuropsychiatry Interview. Addiction to alcohol and various substances was measured by participant responses to a series of yes/no questions that identified those meeting criteria for abuse or dependence. Analyses were performed using SPSS, version 16 with statistical significance. In this study, chi-square, t-test and regression model is also used as a methodology. Data were collected using semi-annual interviewer-administered questionnaires. Variables from the following domains were considered in Cox regression models: socio-demographic characteristics, early and current substance abuse, marginalization, childhood traumatic sexual events and injection exposure. The sample on which this research is conducted is some specific areas of North America, Canada, Baltimore and Thailand. In this 95% confidence intervals were based on the Poisson distribution. Unvaried and multivariate Cox regression models with time-varying covariates were used to examine predictors of initiation into drug injection. The sample for this study is 42 street youth who participated in in-depth interviews. A typology of experiences was built founded on youths street life and drug use trajectories. The transition to drug injection was examined through these experiences. This research is conducted by a qualitative study grounded in symbolic interactions, a theoretical perspective through which, to understand the evolution of human behaviors, subjects are considered as creative social actors in their world. The study sample was composed of 42 street youth aged 15-25 years. 16 participants were girls, and 26 were boys. At the time of the interview, 17 of them had never injected drugs. Of the remaining 25 who had injected drugs, 8 had tried injection without pursuing it further, 8 had stopped after having injected regularly, and 9 were actively injecting, 1 of whom had been doing so for less than a year. Semi-structured, in-depth interviews were conducted in this research plan. This study was conducted between October 2005 and November 2007, data were collected from a cohort of street recruited youth aged 14-26 residing in Vancouver, Canada, for the At-Risk Youth Study. Active drug users were classified by predominant substance of use: daily marijuana use, weekly cocaine/crack use, weekly crystal methamphetamine use, or weekly heroin use. Adjusted mean number of depressive symptoms (measured by the Center for Epidemiological Studies Depression [CES-D] scale) was compared among the four groups using multiple linear regressions. Logistic regression was also used to assess adjusted odds of CES-D score _22. In this research paper, the child mental health production function is represented empirically by Equation. BP Iijt = ÃŽ ±0 + ÃŽ ±1Ajt + ÃŽ ±2Xit + ÃŽ ±3Xjt + ÃŽ ±4ui + ÃŽ ±5uj + ÃŽ µijt. The other equation for maternal demand for substances like alochal is: Ajt = ÃŽ ²0 + ÃŽ ²1Pt + ÃŽ ²2Yjt + ÃŽ ²3uj + ωjt. Bupropion administration was calculated as: Occupancy  ¼ SBRvehicle−SBRbupropion h I =SBRvehicle 100 Ten healthy participants were recruited by public advertisement (80% male; 90% right handed; average age: 47 ±6.7 years; age range 37-58 years). Nine of the 10 subjects were nonsmokers; the single participant who smoked consumed ∠¼10 cigarettes/day. None of the participants were currently taking any prescribed medication. All participants gave their written, informed consent to be included in the study.

Wednesday, November 13, 2019

Grapes of Wrath Essay -- essays research papers

Because of the devastating disaster of the dust bowl, the Joad family was forced to leave their long-time home and find work and a new life elsewhere. They, like many other families, moved to California. "The land of milk and honey". The people in the dust bowl imagined California as a haven of jobs where they would have a nice little white house and as much fruit as they could eat. This dream was far from the reality the migrant farmers faced once in California. The dreams, hopes, and expectations the Joads had of California were crushed by the reality of the actual situation in this land of hate and prejudice. The Joads dream of owning a nice white house and being overwhelmed with fruit was quickly put to end after their first night in California. Ma says, "But I like to think how nice it's gonna be, maybe, in California. Never cold. An' fruite ever'place, an' people just bein' in the nicest places, little white houses in among the orange trees." They had been lied to by the handbills and other propaganda that was circulating in the dust bowl region. The growers in California knew that the people of the dust bowl would have to leave their houses because of the crisis. They also knew the more pickers they had the lower they could make their prices. The number of handbills sent out far out numbered the number of jobs available. Many people in the dust bowl were constructing a view of California that was devastatingly false. However most of the people had to go somewhere, and all they knew was agriculture, so the natural thing was to go to the only place in the country at that time that was in peak agricultural condition. This was all true in the case of the Joads. They had no experience with any other kind of lifestyle. They were farmers and they thought that was what they would remain. What they became was job hunters, starving and hungry people, and homeless vagrants. California was no dream land, but the exact opposite. A promised heaven that was revealed to be a very real hell. During the long journey to California the Joads, and other migrant travelers, encountered many warnings of what California was going to be like from migrants who were returning home, mostly destroyed by the true reality of California. They got a warning in the camp they stayed at on the side of the road while Tom, Al, and Casey were fixing the car. There was... ...t at the end of the tunnel because if they stayed where they were they would surely have not survived. The Joads couldn't stay where they were and without a goal to reach, something to look forward to, one just wanders around life aimlessly and hopelessly. They kept the dream alive throughout the journey. Even through the harsh rumors they heard along the road. They still kept that fragment of hope in the back of their heads that California would be everything they hoped it would be. Even in their worst times in California they would still look forward to earning enough money and getting a little white house to live in. Their lives really were destroyed when the dust bowl hit but no one can except those facts so they must tell themselves it will be all right. We will go to California and everything will be even better there than it was here. Unfortunately that wasn't the reality of the situation and the Joads were forced to deal with that harsh reality once in California and on t he hard long journey there. California was no dream land, but rather a sealed fate to a life of fighting for food and watching loved ones die. California was the pain of the migrants summed up in one word.

Sunday, November 10, 2019

Human Profile

Chapter 5 Human Factors in Aviation Security Contents Page INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Background on Human Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 FAA AND HUMAN FACTORS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 FAA Policy and Plans for Human Factors and Aviation Security . . . . . . . . . . . . . . . . . . 80 FAA Requirements for Aviation Security: Human-Factors Implications . . . . . . . . . . . . . 82 Other Issues for Human Factors and Profiling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Policy Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Box Box Page 5-A. UAL Hi-Tech Screening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Chapter 5 Human Factors in Aviation Security factors in these cases can greatly improve the utilization of technology for airline security. Dramatic accidents caused by human errors in the nuclear power, chemical, and transportation industries have increased public attention to human performance issues during the past decade. Additional training requirements, revised operating procedures, warning devices, and expanded government oversight are typical recommendations following accident investigations.However, these stopgap measures address only the surface of problems that are rooted in the complex interactions of people and equipment within the larger system and the institutional and organizational structures and procedures that drive the planning, design, and management of these systems. Following the ground collision of two jetliners in Detroit in December 1990, Dr. John Lauber, a member of the National Tr ansportation Board, said that â€Å"basically the [aviation] system, the way we’re operating it, almost demands nearly error-free [human] performance. Similar concerns can be echoed for the aviation security system—a number of successful airline terrorist events have been traced to a human failure. 2 â€Å"The challenge is to design a system. . which is tolerant of those errors when they do occur and which detects and traps them before we have [a catastrophe]. †3 Multilayered defenses are employed at many commercial airports and airline terminals, and security managers and government authorities are turning to new technologies to buttress these systems. Heretofore, Federal requirements and industry use of security technologies have usually been with specific functions in mind.As long as the technical goals could be met effectively, the equipment was considered satisfactory and human performance problems related to the technology were resolved through revised tr aining and procedures. Technology use in counterterrorism will likely increase dramatically over the next decade, but if early and INTRODUCTION Human resources are critical to aviation security. Security personnel—passenger and baggage screeners, guards and law enforcement officers, and airport and airline employees in general-are important elements of a system that prevents and deters hostile acts against air carriers.Technology can enhance, but cannot replace, the capabilities of these people and the many services they provide. Moreover, management practices based on behavioral research findings can further improve human performance. This chapter considers the function of screeners in weapons and explosives detection, and the role of guards, officers, and other aviation employees in discovering (and deterring) suspicious individuals or situations. Within the past 20 years, technology has greatly increased the capability and productivity of these security people.Metal detect ors and x-ray devices are faster, more accurate, and more socially acceptable tools for screening passengers and baggage than manual searches. Remote television and other monitoring devices, computer-controlled access to restricted areas, and communication and data systems allow comprehensive surveillance and threat assessment. While these technologies raise the capabilities of a security system to new levels, their ultimate success and actual performance depend on the people who design, operate, and maintain them.Many security assignments require repetitive tasks and close monitoring for rare events— functions that humans perform poorly. Selecting well-suited individuals, training them properly, designing their work environment and rotation schedule to elicit the best possible performance, and providing motivating incentives are fundamental requirements for successful operations, regardless of the type of technology in place. These functions involve human performance; applic ation of human p. A17. IJohn Lauber quoted by John H. Cushmau Jr. , â€Å"Test for Aviation: Coping with Human Shortcomings,†The New York Times, Dec. 0, 1990, ~ne example was the destruction of a Korean Air Lines flight over the Andaman Sea by a bomb planted by North Korean agents. The device, in a carry-on bag, was ahnost detected at a security checkpoint in Baghdad at an earlier stop. When a security guard wished to remove the batteries from a radio, one terrorist turned the radio on, proving it operated, and then raised a hue and cry, yelling and complaining. Instead of using this as a reason to stop the two suspect individuals and to examine their belongings minutely, the security forces decided to avoid trouble by allowing them to proceed. Lau~r, op. cit. , footnote 1. –79– 80 q Technology Against Terrorism: Structuring Security methodic attention is not given to human performance issues, we may expect that system efficiency and effectiveness will be substa ntially impaired. Background on Human Error The human role in a security system is complex; thus the nature of human errors, from mental to physical, varies widely. Mental or cognitive errors can include improper judgment or decisionmaking, while physical errors may stem from motor skill deficiencies or faulty equipment design.A combination of physical and mental processes may influence other kinds of errors, such as those involving communication, perception, or alertness. Human factors, a discipline combining behavioral sciences and engineering, focuses on improving the performance of complex systems of people and machines. Designing and operating a system so that it does not induce human error (in fact, designing it so that human error may be minimized) is one critical component of human factors and limiting the impact of a human error once it occurs is another aspect.Many types of human error are systematic, following certain predictable patterns; once these patterns are identifi ed, countermeasures can be developed. For example, poor location of switches or dials can induce manual or perceptual errors. For those types of human error that do not follow predictable patterns, mitigation techniques are difficult to develop. Some examples of mitigation techniques include automatic monitoring and warning devices. These subsystems, when properly designed and implemented, can be invaluable tools for negating human error.Employee selection—allowing into the system only those people least likely to make mistakes— and continued quality control maintained through training and monitoring are basic steps for minimizing human errors. Potential errors can be forestalled by the use of standard procedures and checklists for routine and emergency tasks, planning work shifts and assignments so as not to induce inattention and 4EM1 L. hlC. , fatigue, and properly designing the work environment. â€Å"If human factors engineering is done properly at the conceptual and design stage, the cost is high, but paid only once.If tranin g must compensate for poor design, the price is paid every day. † 4 According to one expert, there does not appear to be a strong need for new basic research in human factors related spectifically to security-behavioral science findings in general and experience with human performance problems in other industries are probably sufficient to enhance current security operations. 5 For example, such knowledge is being used to upgrade security screener selection by airlines, and to improve training standards.However, the mechanisms to identify early on and to address effectively the human performance issues stemming from new security technologies, such as explosives detection systems, are not yet in place in industry or the Federal Government. Shifting boring and repetitive tasks that people perform poorly to machines is an approach that can reduce errors. However, automated devices (or any new technology) may create new sources of human error. 6 Excessive false alarms unnecessarily distract operators and may lead to the device being ignored or disabled.During unusual or emergency circumstances, the lack of flexibility in many automated systems can be a serious limitation and the human backup may not be mentally or physically prepared (or possibly even capable) to take over. Consequently, a full system approach is required for reducing total human errors. FAA AND HUMAN FACTORS FAA Policy and Plans for Human Factors and Aviation Security In a report released in July 1988, OTA concluded that FAA attention to the spectrum of human performance problems in commercial aviation fell far short of the level warranted, since human error is the leading cause of aviation accidents. Later that same year, Congress passed the Aviation Safety Nagel wiener, $~cw~it Automation’ Hu~n ~ac~or~ in Aviation, Eu1 L. wiener and David c. (eds. ) (Sm Diego, CA: Academic PESS, 1988) p. 454. SH. c~fion FoUShee, c~ef scien~lc and Tec~~ Advi,qor for Human FaCto~, FAA p~so~ wmmunimtio~ 1991. 6see wiener, op. cit. , f~~ote 4, Ch. 13 for a discussion of new and subtle types of human error that have resulted from the introduction of automation into aircraft cockpits. W. S. Congress, OffIce of Technology Assessment Safe Skies for Tomorrow: Aviation Safefy in a Competitive Environnzent, O’E4-SET-381 (Washington, DC: U.S. Government Printing Offke, July 1988). Chapter 5-Hurnun Factors in Aviation Security q 81 Research Act, which directed the FAA to expand its research efforts on human performance in aviation and authorized funds specifically for that purpose. 8 The FAA responded by creating the position of Chief Scientific and Technical Advisor for Human Factors, responsible for coordinating for the FAA various human-factors research efforts within the FAA NASA, and the DOD and for opening lines of communication within the FAA and industry.Communication among Federal agencies is critical, since decisions made by the aviation industry and the operational and regulatory sections of the FAA often drive the need for new human-factors research and could benefit from an understanding of humanfactors research findings and products. The FAA has made progress in addressing the earlier criticism of its human-factors programs and understanding in aircraft and air traffic control (ATC) equipment and operations.However, the key shortcomings in FAA human-factors efforts that OTA cited in its 1988 study-insufficient agency expertise, uncoordinated research efforts, and regulations and certification standards that do not reflect human-factors principles-still exist within FAA civil aviation security programs. During the course of its study, OTA examined closely many of the technology development programs and regulatory efforts underway in the security sections of FAA and found a general lack of awareness and understanding of the human-factors issues involved with possible new security te chnologies.An exception to this situation, however, and a hopeful indicator of a new trend, has been the hiring of a human-factors expert at the FAA Technical Center to oversee human-factors research as it relates to airline security. However, at present, it appears that the FAA is ill-prepared to identify and address possible human-factors concerns with the increasingly complex and diverse security technologies now under development. The dearth of trained humanfactors specialists in areas of the FAA responsible for civil aviation security is a serious deficiency.Until recently, the Aviation Security R&D Service of the Technical Center would have merited similar concerns, but this shortcoming is being redressed, at least in part. Some of the expertise that the FAA is developing on human factors for other uses could also be applied to security issues. One potential vehicle for bringing human-factors knowledge into aviation security efforts is the National Plan for Aviation Human Fact ors (HF Plan), the first major product of the heightened FAA attention to human performance issues following the enactment of the Aviation Safety Research Act.The HF Plan identifies significant human performance issues and lays out a 10-year blueprint for establishing and coordinating research programs and conveying the results across Federal agencies and industry. The HF Plan’s development depended strongly on advisory committees composed of a cross-section of research, operational, and regulatory representatives from government and industry and approximately 50 of the nation’s leading human-factors researchers. The good news for aviation security is that the Plan appears to provide a strong foundation for multi- and cross-disciplinary efforts and understanding in human factors and has begun to institutionalize and focus consideration of human-factors issues in FAA decisionmaking. The bad news is that nowhere in the Plan is security mentioned—the Plan addresses the following five aviation environments only: aircraft flight deck, air traffic control, aircraft maintenance, airway facilities maintenance, and flight deck/ATC integration.This should not be construed as criticism of the general thrust of the HF Plan—the human-factors categories considered have historically been more critical to aviation safety and are considerably more complex than human performance issues in security-and it is beyond the scope of this study to analyze in detail the specifics of the HF Plan. However, some objectives and products of the HF Plan maybe directly transferable to aviation security, provided that lines of communication are established and security experts are included in committee structures.The Plan has eight objectives, all of which can apply to aviation security, but the following two are especially pertinent, given the present attention to technologies for countering terrorism: . to encourage the development of principles of ‘human-ce ntered’ automation and the design of SAviation Stieu Research [email  protected] I%blic bW 100-591. %J. S. Department of Transportation Fedeml Aviation Administratio~ â€Å"The National Plan For Aviation Human Factors,† vol. I, draf~ November 1990. 82 q Technology Against Terrorism: Structuring Security dvanced technology that will capitalize on the relative strengths of humans and machines; . to develop human factors-oriented validation and certification standards for aviation system hardware and personnel that will enhance both safety and efficiency . 10 The HF Plan is designed to be reexamined and revised periodically and aviation security could be added explicitly as a focus area if need and resources warrant. Crucial to the development and future success of the HF pian is the Human Factors Coordinating Committee (HFCC), formed by the FAA administra11 tor in September 1989.HFCC has representatives from each major division of FAA and serves as ‘‘an adv isory body for senior management of FAA in all matters involving human performance and [is] intended to assure that human factors issues are represented in all FAA activities. ’ ’12 Until very recently, the Assistant Administrator for Civil Aviation Security was not represented on this committee. However, this omission has since been recti13 critical-flight safety is at risk only when security performance fails at the same time that a threat occurs.Moreover, FAA staff and the agency â€Å"cul- ture† are predominantly interested in aviation technology and operations and protecting facilities and countering terrorism are not an inherent part of aviation, l4 However, the increasing Complexity of screening technologies and the continuing (possibly increasing) terrorist threat make the performance of aviation security systems more critical to flight safety. fied. Aviation terrorist events in the 1980s made apparent the shortcomings of the minimum Federal security req uirements.The FAA and the airlines both focused attention on screener selection and training, detection and screening technologies, and airline management of security programs and systems. The FAA has increased requirements and oversight of security personnel (selection, training, and management) and equipment (weapons and explosives detectors), but has not yet addressed how security personnel and equipment perform as components of a system. Screener Selection and Training For years, the people who screened airline passengers and baggage for domestic flights generally received little training, low wages, and few benefits.Consequently, alarmin g numbers of domestic 15 FAA Requirements for Aviation Security: Human-Factors Implications Aviation security personnel and equipment have received (and have not needed) the same level of regulatory and certification attention that the FAA places on flightcrew, air-traffic controllers, and ground support personnel and their respective aviation equipment. The FAA has focused its regulatory efforts on elements of the aviation system essential to flight safety. For example, the performance of pilots and aircraft systems are continuously critical for maintaining safety-a failure could cause an accident.On the other hand, the performance of the security system (other than as a deterrent) is rarely not screeners failed unannounced FAA tests (22 percent failure rate in 1988). 16 Since there has not been a severe domestic terrorist threat against aviation in the United States, these shortcomings have not resulted in life or property losses. 17 In light of public pressure following the Lockerbie disaster and costly fines stermming from FAA inspections, the Air Transport Association (ATA) developed an extensive set of screener selection, training, and compensation standards.ATA pro- 1%id. , p. 3. lllbid. , p. 28. l%id. , p. 28. lsundm tie FAA ~rga~tio~ s~c~e fi plaW in 1988 [email  protected] 1990, tie Office of Aviation Security wu represented @ the Executive Director for Regulatory Standards and Compliance, to whom it reported. 14fiowl~ge of aviation tw~olow ~d Operatiom i5 impo~t to fic~t ad @ofi s~ty. For e~ple, spec~ characteristics of aviatio~ Such as large volumes of people and luggage that must be screened quickly, drive the security system design and functions.IsHowever, ~~es ~ustom~y ~ve ~gher s~n~ds for security personuel working h ktWtEitiOlld OpelZitiOllS. 16Lpe Osmus, office of Aviation Security, FW, personal COllMIluIlktitiOIL Feb. 22, 1991. [email  protected] on tie deffitio~ he des~ction of a PSA ftight in 1987, caused by a disgruntled ex-emPIOYW Who Shot tie flying Crew in [email  protected] @@t aircraft be considered a terroris4 as well as criminal, act. In this case, theex-employee had an identifkation card with which he gained access to the so screener training was not an issue. Chapter 5-Human Factors in Aviation Security 83 posed that airlines (or their security contractors) 18 co nsider education and health criteria, the ability to speak English, and aptitude test results before hiring screeners, and that they offer competitive wages, benefits, and incentives and follow a comprehensive training curriculum. In March 1990, the ATA asked the FAA to adopt its proposal as requirements for all airlines. Based on this cooperative industry effort, the FAA has required some of these suggested upgrades in training measures for screeners. (Most U. S. irlines have adopted at least some of the ATA recommendations; the failure rate on random checks has since dropped significantly. )19 The FAA decided not to include selection and wage standards because such a change would require public comment (i. e. , through the Federal Register), thereby calling attention to perceived or actual security weaknesses. rewards to those who detect test weapons and explosives (and even higher rewards to those who find the real thing); and increasing wages to at least the â€Å"local prevail ing rate. For comparison, in Israel, screeners are paid at a level considered a â€Å"good† salary, far higher than minimum wage. In Switzerland, they are paid at the rate of about $lOper hour. In the United States, rates are often near minimum wage. Management Practices and Human Performance The FAA mandates certain positions in an airline’s organizational structure, such as a security director for the airline and security coordinators at each airport, but airline management practices and philosophy usually fall outside the scope of FAA 20 regulatory authority.In Safe Skies for Tomorrow, OTA found that the effect of airline operating or management practices on airline safety, and changes in those practices, were rarely addressed in FAA safety analyses. 21 The FAA's Human Factors plan cites the influence of management â€Å"culture† on human performance as one area where basic research is needed. 22 If the organizational â€Å"climate† (i. e. , working co nditions, wages, management, organizational culture, etc. ) does not allow an individual to perform at his or her peak, it may not matter how well he or she is trained or how well designed the technology is. 3 The ATA proposal for upgrading screener standards suggests giving screeners employee benefits common in many industries (vacation, holiday, medical) that contractors often don’t receive); offering to contractors the advantages of airline employment (e. g. , low-cost travel) and career opportunities to top performers; providing monetary The United Airlines’ approach to improving screener performance on all flights from selected airports delineates one set of management techniques (box 5-A). Another approach has been undertaken by American Airlines, lthough only for its international flights. 24 American treats its international screeners as part of the American team. They are hired as full-fledged airline employees, not employees of a contracted security agency, a nd enjoy the same salary levels and benefits that ticketing agents do. The educational level of entrants appears relatively high, with a few individuals having advanced degrees. There appears also to be a real opportunity for advancement within American Airlines, and not just in the security division.Before starting work, the entrants are brought to Dallas (from across the world; many screeners are hired from the countries in which they will be working) for 2 weeks of training at American’s headquarters. The training includes emphasis on the screening questions as well as on what to look for on the x-ray screens. The screeners ask the standard questions as to who packed the baggage and whether anyone could have placed contraband in it. But they also ask general questions regarding destination and travel plans, somewhat akin to the lines of questioning performed by El Al.Indeed, American has used Israeli security consultants in designing their security system. The screeners lo ok for a number of specific characteristics, which remain proprietary to the company. If too many of the characteristics match a passenger, the individual’s baggage will receive much closer inspection. Screeners are ro- 18Most scree~g for domestic flights in the United States is conducted by security Contractors, nOtairhe employC%S. l~we Osmus, op. cit. , footnote 16. ~u. s. Conwss, OffIce of Technology Assessment, op. it. ,fOOtiOte 7. 211bid. , p. 88. 22U. S. Department of Transportatio~ Federal Aviation Administration op. Cit. , fOOtnOte 9, p. 15. ‘Ibid. 24s0~~: Site visit t. D* [email  protected]% December 1$)90, and Homer [email  protected] Chief of Sedty, American Airlines, perSOIlal COmm~CatiO~ December 1990. 84 q Technology Against Terrorism: Structuring Security tated between looking at x-ray screens and interviewing passengers. Periodically, security systems are tested by contractors, who choose an American employee to play a terrorist.A specific scenario i s given to this impostor, and the reaction of the security personnel is noted. If they do not perform their functions, they may be subject to severe discipline, including termination. The result of the overall approach, using incentives and threat of discipline for negligence, appears to be a well-motivated and alert force. Box 5-A—UAL Hi-Tech Screening United Airlines is focusing on management practices in its program, called Hi-Tech Screening, to improve the quality of pre-departure screening and the public perception of this highly visible function.Begun in 1987 at Chicago O’Hare and San Francisco Airports, the program incorporated many of the selection and incentive steps later recommended in the ATA proposal, and also attempted to integrate technology and people by reconfiguring the screening environment to make it more pleasant for screeners and passengers as well as to improve operations. Although wages are still low, successful workers have the opportunity to j oin the UAL organization, instead of working as contract security personnel.Improvements include direct communication links to supervisors for oversight and advice to screeners, layout designed to minimize passenger delays, and multiple cues to passengers that security measures are being taken in a professional reamer (security supervisor in an elevated booth, passengers see themselves on video monitors as they go through metal detectors, signs describing procedures are clear and concise). United believes that the program has been successful to date in increasing public awareness and employee morale and competence.At Chicago, the employee attrition rate dropped by half and weapon detections and FAA test scores increased significantly (79 percent detection rate on FAA weapons tests prior to Hi-Tech and 92 percent subsequently). United has also installed Hi-Tech Screening systems in Denver, LOS Angeles, Seattle, and Washington Dunes, with plans for additional implementation in the fut ure. SOURCE: Site visit to O’Hare, April 1990, and Richard Davis, Operational Security, United Airlines, Jan. 3,1991.Security Equipment Currently, the FAA requires airlines to employ relatively few types of security equipment— primarily x-ray devices and metal detectors. The FAA established minimum performance standards for detecting weapons and explosives, and since these technologies are radiation-based, the FAA also requires that they meet Federal health and safety standards . 25 There are no standards governing operator interaction with the equipment, such as the layout of controls and display symbology options. At the time the FAA established x-ray and metal detector requirements (early 1970s), it had little expertise in human factors.Moreover, these technologies were relatively simple compared with aircraft cockpit and ATC consoles that the FAA had to certify without objective human-factors criteria, making humanfactors standards for security a relatively low pri ority. However, many behavioral experts argue that properly developed human-factors standards could improve system performance for aviation security as well as safety. In recent years, the FAA has issued regulations for security technologies-computer-controlled access at airports and explosive detection systems—that are considerably more complex and have wider system implications than x rays and metal detectors.As has is evidenced in the explosive detection system (EDS) regulations published in September 1989 26 and the subsequent performance of TNA, the only device to date that could meet the FAA standards. Beyond setting detection criteria, which are critical to the security system performance, the FAA also included requirements for throughput of the device (which is primarily an economics issue—see ch. 4) and a requirement for 100-percent automated detection decisionmaking. Several lines of reasoning could lead to a design goal of total automation, including lower o perating costs over the long run een commonly the case whenever new technology is used to solve a problem, attention is focused on the positive aspects of the technology—how effective it is—without giving full consideration to possible new human-factors problems caused by the technology. The lack of attention to man/ machine human-factors and system operating issues ~F~r ~xmple, ~. ray ~y~tms ~~~ P-Y for cW. on baggage must meet tie s~n~ds set by the Food and Drug Administration. x54 Federal Register 36938 (Sept. 5, 1989). Chapter 5-Human Factors in Aviation Security q 85 nd possibly removing human error from the operating loop. However, it maybe useful, and sometimes vital, to keep the human in the operating/decisionmaking loop, especially if he or she must respond during emergency or unusual conditions. As has been shown so far in TNA tests, the false alarm rate is well above earlier goals and human intervention is required quite often. While automation, in the conte xt of an EDS, is a useful tool, and total automation may be an understandable goal, requiring 100 percent automated functions in an EDS is not justified at this time.The E D S regulations provide an example of where input from a group such as the FAA’s Human Factors Coordinating Committee could help flag potentially troublesome human-factors aspects of security regulations. Airline passenger profiling, in most cases, must be fast (and consequently cursory) enough so as not to impose excessive delays. In other security contexts, such as screening for the â€Å"insider threat† profile within an organization where time is not so critical, much more detailed background data and questioning is possible.A different, although overlapping, form of profiling is used by law enforcement and investigatory agencies. Given pertinent data and evidence from a crime scene or threat, experts compile a profile of likely social, psychological, and physical characteristics of the criminal. However, much of the work and methodology could be transferred from one of the broad profiling regimes to the other. FAA Requirements for Profiling-Under Federal regulations, U. S. airlines must apply a relatively simple form of passenger profiling for international flights (e. g. questions regarding electronic devices), although airlines are not prohibited by FAA/DOT from conducting any form of profiling at any time. Whether or not a passenger is selected for closer scrutiny, such as a manual baggage search, depends on where his passport was issued (a factor that varies based on threat intelligence) and on responses to a series of questions aimed at identifying potential terrorist â€Å"dupes. † Additionally, airlines must conduct random baggage inspections on a small percentage of otherwise unselected passengers for each flight.These requirements do not apply to domestic flights or to foreign airlines, which results in an obvious gap in protection for Americans. The fact P assenger Profiling In-depth questioning of all airline passengers and detailed examin ation of each of their personal belongings and baggage is impossible in a modern transportation system. Since most of the millions of passengers that fly on U. S. airlines each year pose no security risk, targeting security resources on the small number of passengers who exhibit some elements of the threat â€Å"profile† is one way to increase security without clogging transportation flows. rofiling can be a valuable component of a transportation security system, providing an independent complement to hardware-based (and often more expensive) explosives and weapons detection technologies. Successful profiling depends on a large support system including comprehensive intelligence networks and threat analyses, information system technology to process large databases, behavioral research and analysis, and trained and motivated screening personnel.There are two general approaches to operational profiling. One compares passenger demographic and other background data (age, sex, nationality, travel itinerary, etc. ) to historic or recent intelligencederived â€Å"threat profiles. † The other is based on the examiner’s psychological assessment of the passenger, taking into account nervousness, hostility, or other suspicious characteristics. Most profiling systems currently use elements of both approaches to varying degrees. that foreign airlines that compete with U.S. airlines on international routes do not have to satisfy these requirements imposes an economic penalty on domestic carriers and weakens their ability to compete successfully with foreign carriers, which, in addition, are usually statesubsidized. Domestic airlines complain, with justification, that a â€Å"level playing field† should be established to avoid this unfair disadvantage. An option would be to compensate U. S. airlines for the additional costs, either from Federal subsidies or from the Airport Trust Fund. 7 Alternatively, foreign carriers could be required to apply similar security measures on flights landing in the United States to those demanded of U. S. carriers. The United States has forced better security practices in foreign 2% l$)7(j, Congress estiblishedaprecedent for compensating U. S. air carriers forsecuritymeasures incurred in international operatiombyautioritig nearly $10 million for fiscal years 1976-78 (Public Law 94-353, sec. 24). In 1982, Congress extended the authorized limit to $15 million (Public Law 97-248, sec. 24(d). Nearly this much was actually disbursed to four U. S. carriers. 84 q Technology Against Terrorism: Structuring Security revocation of landing rights of carriers from those countries in the absence of improvements. airports by threatening coordinating security management decisions and for providing a conduit for a detailed database. 30 The FAA is considering making CPSP mandatory, but a number of carriers oppose it, citing se curity officer vigilance problems caused by distraction by computer keyboard and display.Knowledgeable FAA and airline personnel claim that airline opposition stems mainly from the increased oversight capabilities that such a system would give the FAA CPSP would provide a detailed record of all airline profiling actions (and errors or failures) that could be used for civil penalty proceedings. Presently, the FAA oversees airline profiling procedures through random or scheduled field visits. The FAA counters that if a would-be malefactor sneaks through, CPSP also can provide documented proof that the airline followed FAA-required procedures, shifting some liability for a profiling failure to the FAA. 1 Additionally, there is substantial U. S. airlines operating on European routes have been permitted to substitute their own profiling programs for FAA requirements. 28 Most U. S. airlines and many foreign carriers conduct more extensive profile screening than minimum FAA requirements at foreign airports and some U. S. international gateways. Some airlines train their international employees in profiling techniques while others hire contractors to handle security for their international flights.Proprietary profiling procedures used by these airlines are modeled generally on the Israeli El Al method of profiling which is more comprehensive (and intrusive) than FAA requirements and reportedly includes psychological, social, and political factors. Complaints by certain groups, such as Arab-Americans, claiming harassment, stem from carrier-initiated profiling, not Federal requirements. 29 During the past 5 years, the FAA has developed and tested a computer-based profiling tool aimed at potential terrorist hijackers and saboteurs.The Comprehensive Passenger Screening Profile (CPSP) is both a checklist and decision aid for field officers and a data collection system to support profiling enhancements. It encompasses the current FAA required profiling procedures plus addit ional factors based on a data profile of terrorists, using historical and intelligence sources. The decision process for selecting a passenger for further examination is automated through a series of mathematically weighted yes/no questions (some of which do not require passenger interviews), that the security officer responds to via a keyboard.CPSP is designed for easy modication if intelligence or data analysis indicates a need. In early 1990, the FAA offered CPSP as an option for airlines to meet profiling requirements. Continental Airlines and United Airlines have tested versions of CPSP at a few locations, and have been generally pleased with its performance, especially as a tool for centrally ~ho [email  protected] FAA htelligence, personal communication Oct. 1*, 1990%llid. analytic value to the large data set that would come from CPSP.As discovered during TNA testing, little is known about the baseline average passenger and baggage; therefore, general background data, regar dless of how well CPSP works operationally, would be valuable for security planning. No names of passengers are (or legally can be) included in such a data set maintained by the Federal Government. 32 However, as private entities, airlines can and do maintain such lists. Other Issues for Human Factors and Profiling Research and Development Due to security and proprietary concerns, profiling systems in place today are shrouded in secrecy.The technical aspects of their development and quantitative measures of their performance are difficult to obtain, although the widespread use at airports across the world attest to airline confidence in profiling Given industry acceptance of profiling technology, the unregulated environment in which profiling systems were developed, and the potential enhanced capabilities and future needs, there is a ~JO~Be~~l~q Director, Comorate s~~~, COntinenM fi~es, ~rson~ commtication, od. 15, 1990 and Glen W- Director, @XtitiOI. Ud Security, United Airlines, p ersonal communication, Oct. 6, 1990. 31c)P. cit. , footnote 27. qzfiid. Chapter 5-Human Factors in Aviation Security q 87 role for a concerted Federal (DOT) effort in profiling R. The primary research fields of interest are in the behavioral sciences and in large database collection and analysis. A useful but neglected approach would be to investigate the role of cultural differences in establishing profiles. Since patterns of behavior considered anomalous in one culture are normal in others, understanding cultural effects better could lead to more effective and, possibly, less discriminatory use of profiles. 3 Relevant behavioral research with applications for profiling is being conducted by a number of Federal agencies, although they generally do not coordinate these research efforts. There is a need to coordinate research and experience in developing terrorist profiles among concerned agencies. Also, some work is going on to establish databases of past incidents and known terrori sts in order to help develop profiles. The FAA conducts a modest profiling research effort that produced the CPSP and is analyzing profiling field tests.However, this effort is housed in the in aviation security. It has worked with in-house experts, with other agencies, and with behavioral scientists under contract. There should be steps taken to guarantee that this institutional knowledge is not lost, due to needed secrecy or personnel turnover. There should also be an effort to bring together knowledge on profiling from the Intelligence Community, from the Federal Bureau of Investigation, from the Immigration and Naturalization Service, and from the FAA, so that all agencies may profitably pool their knowledge.One way of helping assure such interagency communication would be the institution of annual interagency conferences on the topic (see ch. 3). Profiling techniques and related technologies are being added to current security R plans at the FAA Technical Center. The operationa l aspects of using automated profiling systems, such as data entry and human/computer interaction, are similar to those of many other technologies, and could benefit from further research and development. intelligence section under the Assistant Administrator for Civil Aviation Security with no direct link to FAA’s R division.Historically, the FAA pioneered the use of profiles in aviation in the late 1960s and early 1970s during the upsurge of hijackings to Cuba. A team of experts under the leadership of the FAA Office of Aviation Medicine was involved in the development of the initial profiles. Limited use of profiles was made during the early 1970s and again in 1980, when immigrants from the Mariel Boatlift began hijacking aircraft to Cuba. [Profiles were employed on a limited basis to help stem the wave of hijackings to Cuba by some â€Å"Marielitos†. In the 1970s, the FAA also developed a profile for domestic use to identify persons who might be carrying explosives or incendiary devices in checked baggage. This â€Å"checked bag† profile included several objective elements and was intended for use by airline personnel at ticket counters. This profile was never applied rigorously, although some of its elements were automated by at least one U. S. air carrier. Thus, the FAA has had substantial experience with developing and implementing profiles for useA near-term research need is how best to combine profiling systems with the new security technologies now in the pipeline. In fact, arguments have been made that the TNA device can only function effectively when combined with profilebased selection of baggage to inspect, since false alarm rates are high. This is, in fact, being done at the Gatwick tests. Presently, the profiling process results in binary decisions—let the passenger pass into the normal security process (more than 95 percent of passengers) or conduct a manual search of the passenger and his baggage. One possibility w ould e to expand and refine the decision outcome from profiling to provide multiple screening paths for passengers depending on the level of threat and the availability of advanced detection equipment (see ch. 4). A longer term research option is to investigate new technologies to enhance profiling. Rapid access in the field to Federal, international, and, possibly, private databases (i. e. , hotel, credit card) could greatly enhance capabilities. Remote sensing of respiration and heart rates and other biological parameters, combined with large population databases, automated facial-recognition systems, andSsCustom offici& in the Northern ~ Islands, a U. S. -flag territory, incorporate cultural characteristics in looking for anomalies for profding. â€Å"a 88 q Technology Against Terrorism: Structuring Security biometric passports, all offer new possibilities for on-the-spot psychological and physiological assessments. From past experience, cultural factors particular to the countr y where the event is taking place frequently influence decisionmaking by local authorities. Some observers report that U. S. fficials who were involved would, on occasion, have benefited by a more detailed knowledge of the dynamics of local social systems. For example, in some cases, although crisis management officials were supposed to be in charge of handling an incident, local cultural or political factors have resulted in the crisis being directed instead by senior office holders, who are untrained for the purpose and unable to provide the rapid decisionmaking that is often required. Some research into systematizing knowledge of relevant aspects of different social systems would be useful.In this area, as in profiling, the construction of appropriate databases would be of use to U. S. officials who may be called on to participate in resolving a crisis. At present, there appears to be little coordination among agencies in understanding behavioral aspects of incident management. T his lack provides another argument for strengthening interagency coordination in counterterrorism (see ch. 3). Civil Liberties Security systems in general, and profiling methods in particular, trade certain freedoms (e. g. privacy) for safety. profiling methods, based on specific individual characteristics, may be derived from historical experience (e. g. , the large number of Cuban refugees who hijacked aircraft to Cuba in the early 1970s or the examples of hijacking engaged in by members of various Middle Eastern terrorist groups). These characteristics sometimes include physical and cultural features, since these traits are the easiest indicators to verify. Often such subjects belong to readily distinguishable minority groups.Therefore, people who possess the characteristics in question but who have no ill intentions (obviously, the great majority) could be subjected to scrutiny that could be considered to encroach on individual freedoms. This study describes measures to meet com pelling public safety interests. It is, however, beyond the scope of this study to discuss the many legal and societal civil liberties issues involved (e. g. , how much intrusiveness on privacy is countenanced by a compelling interest of the state? ).It is certain that the technical ability to investigate and record personal histories and characteristics and the demand for the use of such ability will greatly expand, thereby increasing the potential for crossing the fine line protecting constitutionally guaranteed individual liberties. Legislative attention will have to address the tradeoff between public safety and welfare and civil liberties. Policy Options The following policy options address human factors and aviation security. 1. Enhance FAA attention to human factors in security: 34 qExplicitly address aviation security in agencywide human-factors planning. The FAA has taken measures to move in this direction. Bolster human-factors expertise under the Assistant Administrator f or Civil Aviation Security and the Aviation Security Research and Development Service at the FAA Technical Center by adding professionals to their respective staffs, especially in light of plans to increase staff levels of both sections significantly during the next few years. One such professional has already been added. Incident Management Human factors also play a role in managing incidents abroad.When U. S. citizens are held hostage in a foreign country, the United States often plays a role in resolving the incident. Some foreign security officials are trained in the United States under assistance programs. But the United States also may participate actively, as it did in responding to a number of airline hijackings in the 1980s. q ~~e follo~ r=omenhtiom included in earlier drafts of this repofi has already been implemented by tie FAA q Add a designee of the Assistant Administrator for Civil Aviation Security to the FAA’s Human Factors Coordinating Committee.Chapter 5-Hum an Factors in Aviation Security q 89 2. Consider conducting R on combining passenger profiling techniques with other security technologies. 3. Give consideration to methods for â€Å"leveling the playing field† when imposing requirements on U. S. carriers but not on competing foreign ones. 4. Give consideration to civil liberties issues 5. stemming from Federal aviation security requirements. Coordinate behavioral research into profiling and incident management being conducted in the Federal Government. Arrange periodic interagency conferences on related topics.

Friday, November 8, 2019

Single parent Essay Example

Single parent Essay Example Single parent Essay Single parent Essay My name is Melissa and Im a single parent to a wonderful little boy. I call my son my miracle baby because I had half an ovary removed and a bunch of other problems and was told I may never have children. My son meaner everything to me and I would do anything for him. I decided to go back to school to make a better life for my son and show him that if you put your mind to it, anything is possible no matter what your age is. When I first seen my son on the monitor I know my life would never be the same. I watched my son grow from a peanut into a baby in my arms and nothing can beat that feeling. Hearing his little heart beat for the first time and knowing that he was safe and healthy is the only thing I could have asked for. I knew there were going to be ups and downs and there was going to be bumps in the way, but nothing prepared me for doing it alone. Going from being Just yourself and single, able to go out and have fun and party all night, to being responsible for someone else. I become someone elses protector and caregiver and it can be scary perpetually when its a surprise. I could prepare yeses for a lot of things in life but parenthood is something no one could teach me or prepare me for. Its a day-by-day learning experience. Not only is my child learning new things but so am l. As a single parent I get to be the one who teaches my son how to crawl and walk. I get to teach him right and wrong and how things work. I teach him to talk and learn new words, and how to use manners. As he get older I get to teach him how to ride bikes, ride horses, play sports, swim, hunt and fish. There are some downsides to being a single parent too. When being a single parent I have to rely on family and friends a little more for help and support. I know without mine I dont know where my son and I would be. As a single parent I dont just get to think about what is best for me but now I have to think about what is best for both of us. My choose affects him more than it does me cause he relies on me to make his chooses. As a single parent I dont get to go out and party or clubbing like other people my age. I dont get to stay out late cause my late nights have now turned onto bottles and changing diapers and rocking my child to sleep. As a single parent I have to be the good guy and the bad all at the same time. I have to discipline and punish while also cuddling and chasing monsters away, which can be tricky because at times my son will use that against me and while youre doing the punishing he is giving me the puppy dog eyes. Being a single parent has its rewards and its hard times, but I wouldnt give it up for anything on earth. After my sons father left and I was on my own with a newborn, I never felt more scared in my life. I had no clue what I was doing or how I was going to make it. Even through all of this my son makes everything possible and everyday worth living. Being a single parent takes education and hard work. At the end of the day when Im rocking my son or putting him into bed and he hug and kiss me good night and tells me night-night I love you it makes it all worth it. Watching him grow up into the toddler he has become and then to still get to watch him turn into a teen future and I get to do my absolute best to make all his dreams reality.

Glass Ceiling Essay Example for Free

Unattainable rank Essay Unattainable rank is a term that portrays the fake level, past which ladies and different minorities are denied t...