Thursday, November 28, 2019

Life in Silence free essay sample

Nothing in the room moved. I looked up, stared at my friends, and looked back down at my knees. In a matter of seconds something in the room had changed. We had gone from laughing and joking to sitting in complete and utter silence. I looked up again. A quick furtive glance and then it was back to my knees. Two of my friends sat talking quietly to each other. They stopped, paused, and with surprising ease, broke the silence with â€Å"Hey, take my iPod. I really want to hear†¦Ã¢â‚¬  but were cut off before the end of the sentence. The response that bounced back was â€Å"Shhh, I want to hear the rest of this song first.† Song? I thought to myself. What song? The silence that draped over us was music, but how could it be? All it was was, well, silence. For a short time no one moved again. We will write a custom essay sample on Life in Silence or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page And then the room’s atmosphere changed and swirled around me once again. Someone mindlessly grabbed the cord hanging from the stereo, plugged in their mp3 player, and pushed play. Secluded in the silence of my thoughts, I made myself comfortable on couch I was sitting on, leaned back, and started to think. I thought back to when I used to play the cello and asked my instructor why there were rest notes in the piece were learning. At the time, only the first half of her response resonated with me. She told me rest notes were there so I could take a break and then jump back into the music. That made sense to me. My fingers were tired and I could have used a break. But she was not finished talking. She went on to tell me that the silence was just as musical as the rest of the piece. She told me that I should play the rest notes with as much energy and vigor as I would any other note. At the time, I shrugged off her words as I pushed my eight-year-old frame as far away from my cello as my seat would allow me. I had forgotten my conversation with my cello instructor until that moment and, once I remembered, was mystified. The song we were listening to, which I later found out was entitled â€Å"Two Minutes of Silence,† had been comprised entirely of notes. John Lennon had made a conscious choice to eliminate all sound from the piece of music. He was making a point. Too often my life has been filled silence with unnecessary sound. Given the commotion and bustle of daily life, there are times in which I forget to slow down and think. We must rest but we must not cease thinking. As I leaned back in my seat on the couch, I learned to sit back and start to rationalize the flurry of notes that came before. It is during these moments that thoughts crystallize and become clear.

Monday, November 25, 2019

Virtual Private Network

Virtual Private Network Virtual Private Network Introduction The sharing of information amongst departments within corporations has become an integral part of ensuring efficiency and decision making hence yielding in productivity. In order to bolster the communication channel within our corporation, it becomes necessary to adopt new technology such as the Virtual Private Network (VPN). The VPN can be defined as a private network that operates through the use of a public network such as the Internet in order to connect multiple locations, which are remote. The VPN facilitates interconnectivity of networks over long distances and, therefore, forms a wide network area (Stairs et al., 2009). In technical terms, the VPN is Wide Area Network across the Internet that creates links between sites even though it appears to users as a private network link (Wouters Bantof, 2006). The VPN also supports secure connections between an organizations private network and that of the remote users through a third party service provider. The network is normally encrypted, and telecommuters have vouched for the reliability, safety and low-cost of VPN in a bid to connect an organization's intranet (Shinder Shinder, 2004; Stairs et al., 2009). It is, however, important to note that there are basically two types of VPN namely: the remote access VPN and the site-to-site VPN. I highly recom mend a site-to-site VPN, otherwise referred to as the router-to-router VPN connection. Summary of Technology/Problem Solution The Site-to-Site VPN Connection The Site-to-Site VPN connection is a network that enables an organization to have routed connections between its varied separate offices and/or with other affiliate organizations through a public network without compromising the security of the network (Morimoto et al., 2008, Schnider, 2011). In essence, a routed VPN across the routed VPN connection through the use of the internet operates logically as a Wide Area Network link. Whenever the network is connected through the use of the Internet, a router effectively sends forward packets into another router along the VPN connection. In terms of the routers, the VPN connection serves as data layer link (Lewis and Lewis, 2006; Morimoto et al., 2008, Schnider, 2011). Besides, the Site-to-Site VPN connection can be used to link two disparate portions of a private network. In this case, the VPN server plays the role of providing a routed connection to the network that is attached to the VPN server. Therefore, the calling router- also referred to as the VPN client- automatically authenticates itself to the VPN server which is otherwise termed as the answering router. It should be noted that for the purpose of mutual authentication, the answering router does authenticate itself in response to the calling router. Therefore, in a Site-to-Site VPN connections the packets sent from either of the routers across the VPN connection do not typically originate from the router (Morimoto, 2004; Bendell, 2006; Morimoto et al., 2008). In essence, the site-to-site VPN connects two networks that are dispersed by linking them with a leased line, a WAN circuit or through a public network such as the Internet. The actual underlying infrastructure for the network is inconsequential, provided that the sites can be linked to each other through the IP (Khan, 2005; Matei, 2012). The sites can operate using the pre-shared keys: the key can be shared between the sites to enable mutual authentication and to help establish the encryption of initials that can be exchanged IPsec tunnel parameters. On the other hand, the site-to-site VPN may operate using digital certificates, which belong to each particular site. This is provided by a central CA for the facilitation of authentication and encryption of the earlier exchanges between the sites (Khan, 2005; Matei, 2012). The use of a site-to-site VPN connection provides substantial constant savings when compared to the other network that uses dedicated Wide Area Network link. Whatever is required to use a site-to-site VPN is a VPN gateway and a working Internet connection that is relatively inexpensive. After the VPN connection has established connections between sites, the site-to-site VPN link is invariably established (Shinder Shinder, 2004; Schinder, 2011). The users on each end can then communicate with the other networks through the site-to-site VPN link as it would be the case with the routed connection on their very own networks. In this case, the gateways serve as routers and, therefore, route the packets to the designated networks. In a typical context, the site-to-site VPN connections are established between the offices of an organization either between departments, the main office and the myriad branch offices (Schinder, 2011). This is considered as an approach to social theory that is agent based. The theory bears its origin from social studies and regards objects as being part and parcel of a social network. The theory puts much emphasis on the agency of non-humans in a communication channel and helps in mapping the simultaneous relationships between the semiotics or the concepts and the material within a communication network (Fenwick et al., 2010). Therefore, the ANT provides the means through which the relational ties in a particular network can be explored but does not shed additional light on the reason and the form of the network. In a nut shell, this theory provides the explanation of how the material and semiotic networks are built up so that they function as a whole. Therefore, the clusters of actors who are involved in the creation of meaning can be described as being both material and semiotic. This explicitly relates the various elements that are found within a network, thereby coming up with the coherent whole. Such networks are invariably transient, and as a result, they exist in a constant re-making and making process. Subsequently, the relations are repeatedly performed without which the network is subject to dissolution. The theory also makes the assumption that the networks of relations are by no means intrinsically coherent (Fenwick et al., 2010). The actors in this theory include both human and non-humans and in the context of the network they relate with one another. This theory assumes that there is nothing that lies outside this network of relations; implying that there are no distinct differences in the abilities of the technology, human and non-human to act. Therefore, as soon as the actor engages with the actor-network, it is invariably involved in the web of relations, thereby becoming part of the entelechy (Fenwick et al., 2010). This theory is imperative in the quest to install the site-to-site VPN as it helps in understanding the position and interaction of various players (human and non-human) within the network. The understanding of this relation is critical in ensuring that the network is exploited to the maximum. Structuration Theory The structuration theory talks about the duality of structures of communication. This duality involves the relationship between structure and agency. In essence, the theory attempts to look at how agents relate to the structural elements of the society. The theory perceives structure as that which gives form to the social life without necessarily being the form itself. Therefore, structures come into being through the activities of the agents (human). On the other hand, agency refers to the patterns of peoples actions and not their intentions for doing their activities (Stones, 2005). In general term, the structuration theory is considered as a theoretical approach towards sociological phenomenon. Initially, during its formulation the theory did not address the technological aspect of human relations. However, as technology began to take a critical and almost central place in human relations, especially in the organizational setups the theory was extended to include the information technology dimension (Stones, 2005). This theory will be instrumental in the implementation of this set-to-set VPN as it will help to understand the position of the corporations staff as agents; and how their interactions across the network is a dual nature. Therefore, this gives the interactions a form that either displays the success or failure of the communication system. Systems Theory The systems theory has been considered as a study that rather cuts across all disciplines. This study delves into the abstract organization of various phenomena bearing in mind the independence of their types, substances and/or spatial scales of existence. The theory investigates the principles that are found in all complex entities and models that can be used to lend their understanding. According to this theory, a system consists of four main components. The first components can be defined as objects: they involve variables, elements and parts within the system. They can either be abstract, physical or both in accordance to the systems nature. The second component includes the attributes: these are qualities or properties that the objects and system exhibit. The third component is the internal relationship between the objects in the system, and the final component is the environment in which the system exists (Dwivedi, 2012). Therefore, according to the theory, the system is a set of things that impact on each other within a particular environment, forming a larger pattern that is disparate from any other parts. In the analysis of the organizations, the important systems interactive paradigm consists of looking at the continual stages such as the input, processing and the output. These stages reveal the concept of openness and/or closeness. The closed system does not interact with the environment in which the system is set up: such a system does not take in new information and can, therefore, wither and die away. On the other hand, an open system takes in new information since it interacts with the environment in which it is based. The open system, therefore, increases the possibilities of survival and prosperity (Dwivedi, 2012). This theory is critical in helping shape that kind of system that will be effective for the corporation. The theory proposes that we open our soon to be implemented site-to-site VPN connection to new information as this will not only enable our sustainability, but this appreciation of our environment will make our communication channel efficient and productive. Social Construction of Technology Theory Also referred to as SCOT, this theory posits that technology does not determine the actions of humans within a communication channel but rather it is the human actions that shape the technology. The theory also posits that the ways in which technology is used, can hardly be understood whereby a full comprehension of the ways in which that technology is ingrained in the social context. This theory is referred to by some scholars as technological constructivism, especially those who consider it a response to technological determinism (Bijker, 2012). According to the theory, the study of the social world is critical in understanding the criteria that people use to determine whether to accept or reject a particular technology. The theory is, therefore, a methodology as it helps in the formalization of the principles and steps that need to be followed when analyzing the failures and success of a particular technology (Bijker, 2012). This theory is fundamental in these initial stages of implementing the site-to-site VPN connection in our corporation. The theory proposes that we understand the effectiveness of this system by taking a critical look at the social milieu in which it is going to be set. This is because; the social environment will determine the form and productivity of the system. The Activity Theory This theory principally aids in understanding the mental capabilities of an individual. The theory, however, goes ahead to confirm that isolated individuals are sufficient to conduct the analysis of a unit, the analysis of the technical and cultural aspects of the interactions between human beings. Therefore, the theory is mostly used in the description of socio-technical system based on six interrelated elements. These elements include the objective of the system; the actors that are engaged in the system (Kaptelinin and Nardi, 2009). The other elements also include the tools that are used by the actors in the communication system; the social context within which the system is based; the division of labor or rather the hierarchical structure of the actors in the system and finally the conventions, rules and guidelines put in place to regulate the various activities of the system (Kaptelinin and Nardi, 2009). This theory is invaluable in the implementation of the site-to-site VPN connection in the company. The theory helps in understanding the various actors in the system and more so the role that they play in the conception and effectiveness of the system. Understanding the individuals is crucial in further understanding the general social context within which the system is based, thereby making it possible for the prediction of its suitability and potential. The Technical Specification of the Site-to-Site Virtual Private Network The system will use an OpenVPN, which is an open source SSLVPN client server that will enable the setting up of the corporations encrypted VPN. The OpenVPN is crucial in securing the sharing and access of information between offices irrespective of their distances. The system will require a central office that will be linked to a handful of computers across the various departmental offices. These computers will be connected by routers. This will require access to both the client and server side routers (Teska, 2008). Therefore, the client network and the server network will be separated into disparate broadcast domains - a process that will require a WINS server in order to route the Windows file-share information between the two or various sub-nets. The required hardware will, therefore, include the Linksy WRT54G (for the client router); the D-Link DLG-4300 (for the server router). The server OpenVPN Machine will have the following specifications: Processor AMD Athlon 1600+, RAM 768 Mb and Operating System Slackware 10.2. The client OpenVPN Machine will have the following specifications: Processor AMD Athlon X2 3800+, RAM 2 GB and Operating System Slackware 12 (Teska, 2008). Feasibility Study The installation of the site-to-site Virtual Private Network is not just feasible for the organization but also an inevitable measure. Notably, the installation of this system can be completed within the next six months as reflected in the operation plan, given the commitment of the corporation to prioritize its implementation. The installation will not be an added financial burden to the corporations already scheduled financial budget. This is because some of the equipment required for successful installation of the system is already in place, including cable networks and computers and other installation materials. While an upgrade of some of the computers is called for, they can still be used for the installation purpose and be replaced at a later stage, at the corporations convenience. Arguably, the only new dimension that the site-to-site VPN connection introduces to the already existing communication system is the Internet aspect, which will be able to bridge the offices that ha ve not been able to communicate due to geographical distances. It is worth noting that the Internet is affordable, and the necessary measures have been put in place to ensure that the corporations information will be secured. Due to the magnitude of the corporation, especially with offices scattered across the country, there is a need for swift up-to-the-minute communication between these various departments. The site-to-site VPN connection is the apt solution that can help bridge this information gap due to its cost effectiveness and information safety. Operation Plan The implementation dates of the various aspects of installation of the site-to-site VPN is indicated chronologically in the table below. Time Line Activity January 25 to February 15, 2013 Review and Approval of the Site to Site VPN Proposal Report February 16 to March 30, 2013 Examination of the Existing System across the Countrywide Offices April to June 15, 2013 Setting Up the New Infrastructure between the Main Office and the Remote Offices June 16 to July 31, 2013 Testing the installed system. August 1, 2013 Launching the system. Recommendations After intensive discussion in this report on the merits of the site-to-site VPN connection and the provision of the reasons as to why the corporation should adopt the system, I would recommend that the implementation of the same be given prominence to enable timely communication between the various departments in the corporation. In this case, time is of the essence as information is considered today as one of the determinants of profitability and efficiency in organizations. Therefore, the corporation should promptly consider the merits of the proposed communication system and embark on its implementation. In the installation process, the proposed installation price should be duly followed to avoid the omission of the key elements of the proposed system. Conclusion In this discussion, it is proposed the site-to-site Virtual Private Network is befitting for the upgrade of the communication system of the corporation. This proposed VPN model will use the Internet to facilitate communication between different offices within the corporation. The security of the information and the affordability of the Internet are some of the merits that we have pinpointed as being inherent with this system. We have also discussed its pertinent requirements and how they enable the efficiency and security of the system. Besides, we have discussed how the five telecommunication technology theories are applied in the proposed system and revealed the theories that help in understanding the various components of the system. In summary, the recommendation of the site-to-site VPN connection is in recognition of the corporations communication needs and financial constraints. This system will help the corporations effective sharing and access of information, which is critical in timely decision making and hence productivity.

Thursday, November 21, 2019

Substance Absue Relapse Amung Women Essay Example | Topics and Well Written Essays - 3750 words

Substance Absue Relapse Amung Women - Essay Example Relapse is a situation of 'converting back' from a condition after a short or long abstinences. In drug addiction and substance abuse, it can be defined as "the resumption of the use of drugs after leaving it for some time" (Harris, J., Anderson, J. and Sharon, W, 1998). For substance abuse relapse among women, the issue of resumption of females to substance abuse after they have recovered. The World Health Organization (WHO) defines substance abuse as "the harmful or hazardous use of psychoactive substances which include illicit drugs and alcohol". A prolonged or repeated use of such substances can lead to addiction which is usually evident with continued use of the substances despite the fact that physical and mental deterioration is being noticed. In fact, various researchers in the world have come up with different conclusions and suggestions regarding the causes, effects, solutions and recommendations on how to deal with substance abuse and relapse not only among women but also in all genders (Laws, D. & Ward, T. 2000). Substance abuse is a global issue. ... "In some producing areas, in Iran, between 4 and 6 percent of the population are opium addicts. The country has an estimated 1.2 million opiate addicts, including 150,000 heroin users. In the producing areas of Laos and Thailand, the addiction rate is as high as 10 percent. Fully 80 percent of the heroin consumed in Europe comes via the Balkans. Of the opium that comes from Southeast Asia, as much as 50% is sent to China. In the United States and Canada, in 1991 there were 360,000 heroin addicts; in 2000 there were 600,000 heroin addicts." (Cherry, Dillon, & Rugh, 2002) "Indeed, on the average, the federal government has spent well over $10 billion a year on drug control for at least the last ten years. Currently, fifty-two federal agencies have a stake in drug control, and each must justify its budget." (Cherry, Dillon, & Rugh, 2002) The U.S. has a lengthy history of legal and social measures aimed at thwarting substance abuse. The first legal measures against substance abuse came in 1875 when opium dens were outlawed in San Francisco in 1875. (Cherry, Dillon, & Rugh, 2002) "The first national drug law, the Pure Food and Drug Act of 1906, required accurate labelling of patent medicines containing opium and certain other drugs."(Cherry, Dillon, & Rugh, 2002) "The spirit of temperance led to the prohibition of alcohol by the Eighteenth Amendment to the U.S. Constitution in 1919." (Cherry, Dillon, & Rugh, 2002) Narrowing the substance abuse view down, the literature shows that in 2003 there were 56, 671 treatment admissions in the state of New Jersey. (New Jersey Department of Human Services, 2004) Of those admissions 56, 671 treatment admissions in the state of New Jersey, Essex county recorded

Wednesday, November 20, 2019

How do you measure political corruption, and what are the difficulties Assignment

How do you measure political corruption, and what are the difficulties involved - Assignment Example Another important form of this type of corruption is extortion. Here the political persons get involves in various criminal offences for acquiring property, money etc from an individual or institution through illegal means. Political corruption depends on the jurisdiction and country. The practice of political funding differs from places to places. In some places considered as legal and in some places are considered as illegal. In many places government officials have indefinite powers. There the distinction between illegal and legal power is difficult. Institutional corruption is also included in political corruption. The problem of corruption in institute which is associated with the economic support from the government officials who have different interest related with the institution. Political corruption has a negative effect on the good governance and democracy of the country. It reduces the accountability in legislature and election. Corruption in politics hampers the represen tation process in policy making. Political corruption also leads in the compromising the rule of laws. This type of corruption often occurs at the higher levels of the state which a strong impact on politics. Political corruption leads to the improper use and resources misallocation. It influences the political system and government institutions. As a result institutional decay is a common phenomenon in this type of corruption. It is a deviation from ethical code of conduct and written legal norms by the ruling political party. The ruler systematically abuses the rules and regulations of the state to fulfil their personal gains. It is also perceived as an ignorance of principles and rational legal values of the state. The legal base of many authoritarian countries is weak. This helps to grow political corruptions and subjects to the downfall of their political system. Moral, ethical and normative standard are the necessary benchmarks to differentiate legitimacy from legality in

Monday, November 18, 2019

Conflict Resolution-Mediation Essay Example | Topics and Well Written Essays - 2500 words

Conflict Resolution-Mediation - Essay Example A working agreement which spells out the rules of engagement and conduct during the negotiations is essential in the process. The mediation process involves acceptable third party intervention and confidential caucuses which enable the disputants become the decision makers in ending the conflict. The caucus stage entails making confidential meetings with each of the disputants whereby each party is allowed to reveal his or her grievances to the dispute. Party-directed mediation process can be summed up in to five stages which include the opening statement, the education phase, and the alternatives generation phase, the actual negotiation phase and the final closing phase. There are two pillars of the party-directed mediation that is the preliminary meetings which comprises of the pre-caucus and pre-mediation. Mediation process saves the parties to the dispute money while managing conflicts. Mediation is applicable in a wide variety of situations thus its effective in resolving disput es. Unlike arbitration where a third party makes a decision for the disputants, mediation is neutral process that accords the disputants the opportunity to solve their dispute with the support of a third party. The objectives of the pre-caucus are to enable the parties to the mediation to reduce the negative emotions to mediation and enable the negotiators to mediate more effectively. The initial aim of the pre-caucus is to facilitate empathic listening and develop an active listening approach as developed by Carl Rogers in the client-centered therapy. The initial joint session enables each party to confront the other through interpersonal negotiation while avoiding all the dysfunctional behaviors. Workplace mediation is always different since the parties address the working relationships which are part of the job and as a legal obligation. Party-directed mediation is useful in particular when mediating ethnic clashes or deep-seated interpersonal disputes between two individuals. Me diation process helps the parties to the dispute to develop tools which are critical in examining their disagreement. I agree with the book that the third party acts as a quasi arbitrator to the dispute. The pre-caucus affords the parties to the dispute an opportunity to vent their emotions, discover the blind spots and increase their commitment to resolving the dispute. The individuals at this stage will learn on how to listen to each other, and understand the issues of confidentiality to the mediation process. I have learned that empathic listening is an essential skill to effective mediation process since it encompasses attentive listening, asking questions about the mediation process as well as suggesting solutions to the dispute. The diagnostic stage of effective listening motivates the parties to speak without feelings of fear of being judged due to self-understanding and confidence. I personally believe that opening statement of the mediation process is aimed at ensuring conf identiality to the negotiations and setting the rules of engagement. The education phase provides an ample opportunity for all the parties to share their perspectives of the dispute and relive any negative emotions. The parties should aim at building cordial and close working relationships at this stage. The options generation phase entails brainstorming on all possible alternatives of resolving the conflict. In

Friday, November 15, 2019

Evolutionary Roots of Deception: Book Review

Evolutionary Roots of Deception: Book Review Loredana Lenghel Deception – Evolution’s Hidden Agenda â€Å"Deceit is the Cinderella of human nature† (2004, p.2) says David Livingstone Smith in his book â€Å"Why We Lie, The Evolutionary Roots of Deception and the Unconscious Mind†. The author tries to show, through several examples and intriguing connections, that lying is an evolutionary adaptation which allowed the human species to thrive. He argues that â€Å"Deceit () is essential to humanity but disowned by perpetrators at every turn† (2004, p.2). The book proves to be an ambitious try at showing that deception is an intrinsic part of cognition; that it comes naturally to all humans. Even more spectacular is his try to convince us that deception is controlled by the unconscious mind, thus allowing for self-manipulation. For this purpose, Smith uses The Machiavellian Mind Theory arguing that humans’ extra Intelligence allows them to overcome primal needs, thus being advantageous for social manipulation. The author’s aim is to convince the reader that manipulation plays a central role in the evolution of humans. He argues that in order for our ancestors to thrive in the ever developing social context and increase their fitness, they were required to come up with ways to mediate social encounters. He starts by showing that everyone is a â€Å"natural-born liar†. From baby monkeys to human infants, from religious myths to children stories, lying is ubiquitous and a part of all cultures. Smith argues that lying does not resume to just words, people also lie with their bodies and actions. Even more intriguing, lying is not always aimed at someone else. He proposes that â€Å"we are equally adept at deceiving ourselves† (2004, p.21). The unconscious is actively trying to conceal information from us through the process of self-deception; an idea not unique to Smith (Chance et al., 2011; Hippel Trivers, 2001). He continues to show that not only humans are â€Å"manipu lators and mind readers†. He gives examples of deception from the animal sphere, from camouflage and mimicry to more sophisticated ways of deception, such as language, he argues that these are proof that deception is an evolutionary advantage. Mind reading, an organism’s ability to predict another’s behaviour, increases its chances of survival, thus acting as an adaptation. It is the driving force behind evolution because â€Å"Mind reading facilitates deception, and deception encourages mind reading† (2004, p.35). In â€Å"The Evolution of Machiavelli† he elaborates on the roots of deception and self-deception. He argues that deception was used by our ancestors to conceal their true intentions. The ones that were superior in this aspect had an edge over others. He presents Nick Humphrey’s papers in which he argues that the race between the best deceiver and the best mind-reader was what gave birth to human intelligence, allowing them to manage the increasing social complexity. This hypothesis is supported by others, who, by looking at the neocortex’s size, brain part involved in relationship mediation, found evidence in support for the social intellect theory (Dunbar, 1992). They argued that the ratio of the neocortex volume is the best predictor of group size. Moreover, Orbell et al. argued that Machiavellian intelligence could have evolved alongside cooperation (Orbell et al., 2004). This idea raises the question whether, as Smith said, unconscious deception would be eve n more beneficial for cooperation and the increase of the human species. His next chapter builds on the idea that self-deception is possible due human mind’s division into unconscious and conscious regions. He argues that the time between the unconscious awareness and conscious perception is what allows the Machiavellian module to act and distort the information. He supports Freud’s idea that â€Å"consciousness had no role in mental processing† (2004, p.97). To portray this intriguing proposition of self-deception being an adaptation, Smith used a creative analogy. He argued that humans are constantly part of a game of â€Å"social poker†. In order to win it, one needs to anticipate the other player’s move by using the mechanisms of deception and mind-reading. To improve their own strategy and avoid being foreseeable, the mechanism of self-deception became an adaptive advantage. By believing the lie themselves, other players could not predict their moves. This analogy shows the benefits of self-deception. That being sai d, some argue that even though there might be short-term psychological benefits, self-deception can come with long-term costs, such as an inaccurate prediction of future performance (Chance et al., 2011) or loss of information integrity which can result in inappropriate action (Hippel Trivers, 2011). The device that allowed for this to happen, he says, was the evolution of language, which ushered the struggle between deception and detection. Language offered an advantage in the social poker game, giving more chances of success to those with this skill. In his view, social exchanges are monitored by the unconscious Machiavellian mind. This module is sensitive to both the conscious and unconscious cues of others because it is the Machiavellian module itself who communicates through unconscious verbal insinuations. He argues that this idea is â€Å"less bizarre than it might at appear† (2004, p.121). Coded communication might have evolved due to the language’s initial purpose, gossip. Concealing information from third parties and exchanging confidences through cheap gossip allowed for secret alliances and a favoured position in the social circle. He affirms that â€Å"For our species, all roads lead to self-deception and thus to unconscious communication† (2004, p.147). At a first look online, it is noticeable that only with the title this book has stirred some controversy. Commentaries stating that the book â€Å"got them hooked† from the beginning were prevailing. The book was generally regarded as an interesting read, but not a piece of strong evidence for its propositions. Pinker (2010) did not view it as an attempt to persuade readers, but rather, as an attempt to recruit researchers into conducting studies to test the theory’s value. Others regarded the book as highly speculative without even considering the â€Å"obvious counterarguments† (Sager, 2004). Sager argued that not even the speculations seem plausible, thus begging the question whether they could even lead to anything more. Dickins (2005), although being less critical, agrees with the general argument that the connection made between the unconscious and deception is questionable. In conclusion, Smith’s book presented itself as a worthwhile read. First catching my attention by not completely disregarding Freud’s theories, and then using it to stir controversy upon human integrity, it undoubtedly offered some food for thought. Even though converting readers into believers of its cause is improbable, the book will make them critically analyse their interactions and looks for the smallest hints of (self)deception. The style of writing and creativity in portraying ideas were an additional bonus to the book’s appeal, raising interest in Smith’s other works. Bibliography Chance, Z., Norton, M. I., Gino, F., Ariely, D. (2011). Temporal View of the Costs and Benefits of Self-Deception. PNAS, 15655-15659. Dickins, T. E. (2005). A Necessary Pain in the Heart. Retrieved March 02, 2014, from Human Nature. Dunbar, R. I. (1992). Neocortex Size as Constraint on Group Size in Primates. Journal of Human Evolution, 469-493. Hippel, W. v., Trivers, R. (2011). The Evolution and Psychology of Self-Deception. Behavioral and Brain Sciences, 1-56. Orbell, J., Morikawa, T., Hartwig, J., Hanley, J., Allen, N. (2004). Machiavellian Intelligence as a Basis for the Evolution of Cooperative Dispositions. American Political Science Review, 1-15. Pinker, S. (2010). The Cognitive Niche: Coeolution of intelligence, sociality, and language. PNAS, 8993-8999. Sager, A. (2004). Review Why We Lie The Evolutionary Roots of Deception and the Unconscious Mind . Retrieved March 02, 2014, from Metapsychology: http://metapsychology.mentalhelp.net/poc/view doc.php?type=bookid=2262 Smith, D. L. (2004). Why We Lie The Evolutionary Roots of Deception and the Unconscious Mind. New York: St. Martins Griffin.

Wednesday, November 13, 2019

Essay --

A very common nutritional disease is anemia. Anemia is a condition that can develop when a person’s body lacks healthy red blood cells or hemoglobin. Hemoglobin is the way red blood cells receive oxygen. Four percent of the children in the United States between three and five years old are anemic. Anemia can run in families and it can be passed down through generations and it can affect your whole life. On a positive note anemia can be treated and those with this nutritional disease can live regular lives. Cause of Anemia Anemia has three main causes. The most common cause of anemia is blood loss. Anemic women usually lose a large amount of blood with heavy menstrual cycles. When blood is coming from the digestive or urinary tract blood can also be lost. Surgeries and caner also can cause blood loss. If a large amount of blood is lost the body may lose a lot of red blood cells causing anemia. Another cause is when red blood cells can’t be produced. You can inherit having a small amount of red blood cells, meaning your parents passed the disease to you. Or having few red blood cells can be acquired, which means you weren’t born with the disease. You can acquire anemia by having a poor diet, having off balance hormone levels, having an ongoing diseases, or pregnancy. Lastly if a person has a red blood cell destruction can cause anemia. If too many red blood cells are destroyed you are still losing red bloods cells. This can happen if someone has an enlarged or diseased spleen. The spleen removes old red blood cells out of the body. If the spleen is enlarged or diseased, it could remove more red blood cells than necessary which would lead to having anemia. Also if too many red blood cells are destroyed that can lead to sickle cell ... ...ies which will decrease their amount of physical activity Conclusion Anemia is a condition that can develop in anyone of any age. It can range from being minor or warning signs of something more serious. When a person lacks enough healthy red blood cells anemia can occur. Anemia can be treated with medication and changes in one’s diet. References Nordqvist, C. (2009). What Is Anemia? What Causes Anemia? .MedicalNewsToday.com. Retrieved December 14, 2013, from http://www.medicalnewstoday.com/articles/ 158800.php Edmundson, A. (2013, May 13). Understanding Anemia - the Basics. WebMD.com. Retrieved December14, 2013, from http://www.webmd.com/a-to-z-guides/understanding-anemia basics (N.A.). (2012, May 18). What Causes Anemia?. nhlbi.nih.gov. Retrieved December14, 2013, from http://www.nhlbi.nih.gov/health/health-topics/topics/anemia/causes.html