Saturday, August 31, 2019

Deena Shakir Essay

Richard Watts Jr. describes the striking similarity between the Salem witch trials and the McCarthy Era as a â€Å"struggle between the rights of freeman and the mass efforts to destroy them under the guise of defending decency. † All good writing conveys a strong message for the reader to take away, and effectively apply to his everyday life. In the novel The Crucible, author Arthur Miller uses 17th Puritan society, and the Salem witch trials as a vehicle to make a strong political statement about the nature of conformity in an overly hysterical society, and the fundamental struggle man faces to retain moral righteousness in the face of a cruel world. Written in the heart of the McCarthy Era, The Crucible makes sweeping statements about the nature of society during a crisis, and how people deal with the introduction of beliefs that differ from their traditional way of thought. Claiming the people of his society are just as intolerant as the Puritans, Miller desperately pleads with them to learn from their mistakes, and not persecute others based on the nature of their beliefs. Through the story of the Salem witch trials, Miller epitomizes the never-ending conflict between an individual and society as a continuous struggle to retain one’s moral righteous, and not give in to illogical societal demands. Through the actions of the court officials, the girls, and the Christ figures, Miller effectively points out the manner in which society persecutes those who refuse to conform in their ways of thinking, and the nature of the challenging test individuals are forced to make in such a conflict. The society in Salem also demands conformity from the court system, a place where those who dare to be different are tried. At least on face, it appears that the court simply wants those people who challenge society to be brought to justice. However, during the Salem witch trials, the court officials, who ironically are the one group in society who are single-handedly responsible for administering justice fairly, act simply out of self-interest, striving only to appease the community, and gain fame. Relaying on nothing more than spectral evidence, Danforth and the other court officials condemn those who refuse to conform to society’s beliefs. Under the guise of religious duty, Danforth strives solely to appease the community, and benefit his standing in society. He believes that â€Å"a person is either with the court or he must be counted against it. † When one does not conform to the norms of society and challenges it, he is condemned to die. For example, upon discovering that John Proctor does â€Å"not come to church† on Sundays, he automatically assumes that Proctor must be guilty, and must be hanged. He appears motivated solely by the desire to gain fame. For example, in the final act of the play right before the hanging, Reverend Hale tries to convince Danforth to postpone the hanging. Danforth knows that â€Å"the village expects to see them die this morning† and cannot postpone the event because â€Å"postponement now speaks a floundering on my [Danforth’s] part. † Danforth’s actions show that he not only acts out of self motivation and the desire to appease society, but also fails the to overcame his conflict with society. Reverend John Hale, on the other hand, also appointed to work with the court during the witch trials, makes his decisions based on his own morals instead of what society prefers. Hale, an expert on witch trials and a â€Å"stranger† in Salem finds â€Å"it difficult to draw a clear opinion on them that come accused before court. † Being a minister of the Lord, Hale judges others based on clear evidence and does not â€Å"dare [to] take a life without proof. † His morals prevent him from just simply doing what will appeal to society. Even though he desires to be â€Å"allied with the best minds in Europe- kings, philosophers, scientists, and ecclesiasts of all churches,† he, unlike Danforth and the court officials, refuses to let his personal ambition come in the way of administering justice fairly. He even rejects his religious doctrine in the name of justice, claiming that â€Å"life†¦ life is God’s most precious gift; no principle, however glorious, may justify the taking of it. † Unlike Danforth and his selfish motivation, Reverend Hale refuses to conform to what society dictates, clinging on to his own moral beliefs.

Friday, August 30, 2019

Social Reforms, India

The reform activities united people and the attack on institutions like caste which hampered social unity created a sense of oneness in the people. But most of these reform movements had certain limitations. The questions to which they gave primacy concerned only small sections of Indian society. Some of them failed to emphasize or even recognize that colonial rule was inimical to the interests of the Indian people. Most of them worked within the framework of their respective communities in a way tended to promote identities based on religion or caste.Many of these limitations were sought to be overcome during the course of the national movement with which many social and religious reformers were closely associated. Indian nationalism aimed at the regeneration of the entire Indian society irrespective of caste and community. It was no longer necessary to confine the movement of social reform to one’s own community. http://www. historytuition. com/indian_society_in_colonial_per iod/social_reforms/impact_of_the_reform_movements http://www. indianetzone. com/22/indian_socio-religious_reform_movements_19th_century. tm A reform movement is a kind of social movement that aims to make gradual change, or change in certain aspects of society rather than rapid or fundamental changes. A reform movement is distinguished from more radical social movements such as revolutionary movements. Reformists' ideas are often grounded in liberalism, although they may be rooted in utopian, socialist or religious concepts. Some rely on personal transformation; others rely on small collectives, such as Mahatma Gandhi's spinning wheel and the self sustaining village economy, as a mode of social change. 1. Raja Ram Mohan RoyRaja Ram Mohan Roy was popularly known as the ‘Father of Indian Renaissance ‘ was born on 22nd May 1772 in a Brahmin family in Bengal. He founded the Atmiya Sabha in 1815 and the Brahmo Samaj on 20th August 1828. Through these Institutions he fought ag ainst Orthodox Hindus and the fanatic Christian Missionaries. He was against of Sati system, Polygamy, Child marriage, Caste system and Untouchability. He was the great supporter of Inter-caste marriage, women education, Widow remarriages etc. Ram Mohan started publishing Newspapers and Magazines for which he was called the ‘Father of Indian Journalism'. . Mahatma Gandhi According to Gandhi † I would make the spinning-wheel, the foundation on which build a sound village life†. Gandhian way of education put emphasis on the development of body, mind, heart & soul. His scheme of education he called â€Å"Nai Talim† a beautiful blend of craft, art, health & education in one & covers the whole education of the individual till death. His education is more for girls than the boys. Gandhi ji was the first who Break the bridge between touchable & untouchable. He was the devotee of non-violence. 3. Gopabandhu DashGopabandhu Dash (1877–1928) known as Utkal Mani( Gems of Odisha) was a defining social worker who excelled in the field of politics as well as literature. Gopabandhu was a legend in the Indian culture. He served his people even at the cost of his family. During his study period, he started Kartavya Bodhini Samiti (Duty Awakening Society) to encourage his friends to do their duty as citizens and take on social, economic and political problems. He was leading a team to aid flood victims, when he heard of his son's serious illness but remained to serve the locals rather than return home to his son. e became the founder president of Congress in Odisha. 4. Swami Vivekananda Swami Vivekananda was another important Social Reformer who brought spiritual reawakening among the Indians in the 19th Century, popularly known as the ‘Intellectual Monk of India’ He was born in Calcutta on 12th, January, 1863. He began his life of wondering all over the country with his message of ‘Awakened India’ or ‘Prabhuda Bhara t’. He set-up ‘Ramakrishna Mission’ on 1st May, 1897. According to him, ‘Man is the maker of his own Destiny. The whole world has been made by the energy of man, by the power of faith’. 5. Swami Dayanada SaraswatiSwami Dayanada born in 1824 in a small town of Gujarat. Swami Dayananda Saraswati, the founder of the ‘Arya Samaj' was one of the maker of Modern India. His Arya Samaj gave emphasis on the liberation of the Hindu Society. He called people ‘Go back to the Veda’ created consciousness among the people. He strongly opposed Idol worship, ritualism, practice of animal sacrifice, the idea of Heaven etc. This movement also challenged the Christian Missionaries who tried to convert the uneducated, poor and depressed classes of the Hindus. 6. Annie Besant Annie Besant was of Irish origin and made India her second home.She fought for the rights of Indian and was the first woman president of Indian National Congress. In 1893, she left for India having been influenced by the Indian culture and civilization. She was famous as a social worker, educationalist, journalist, prominent Theosophist, social reformer, political leader, women's rights activist, writer and orator. She fought for the Human Rights of Indian women. 7. Dr. Bhimrao Ambedkar Dr. B. R. Ambedkar was born on April 14, 1891 in Mhow (presently in Madhya Pradesh). Dr. B. R. Ambedkar is viewed as messiah of dalits and downtrodden in India. He was the chairman of the drafting committee in 1947.Bhimrao Ambedkar experienced caste discrimination right from the childhood. he was the first who reduce the bridge between tribal & non-tribal. 8. Medha Patkar Medha Patkar was born in Mumbai. On 28 March 2006, Patkar started a hunger-strike to protest against the decision of the authorities to raise the height of the Narmada Dam. She ended her 20-day fast on 17 April 2006, after the Supreme Court of India refused the Narmada Bachao Andolan's appeal to stop the cons truction of the dam. She was held by the police at Singur on 2 December 2006 after protesting against the acquisition of farmland. She is a great social Reformer & social Activist. . Justice Mahadev Govind Ranade Justice Mahadev Govind Ranade was a distinguished judge, writer cum social reformer of India during the pre-independence era. Justice Mahadev Govind Ranade was a judge, politician, writer cum reformer of India. Politically, Ranade established the Poona Sarvajanik Sabha and was also among those who played a phenomenal role in setting up the Indian National Congress party. Justice Mahadev Govind Ranade was also an active reformer. He set up the Social Conference movement, which worked against infant marriages, widows remarriage, spending heavily in marriages and other social functions.Ranade advocated for widow remarriage and female education. 10. Bankim Chandra Chatterjee Bankim Chandra Chatterjee was a grat poet and novelist. In his famous book â€Å"Kamala Kanter Dafferâ €  pointed out the social evils and blind beliefs prevalent in Indian Soiety, which were pertaining to injustice to the poor and the downtrodden. He advocated remwedial measures for the eradication of all the evils. He wanrs to maintain equality between the rich and the poor. The famous song'Bande Mataram† was his creation. Most Hindus today still adhere to traditional teachings and practice passed down via the four main communities.What has been termed â€Å"modern Hinduism† has grown largely out of a number of quite radical reform movements of the nineteenth and early twentieth centuries. These movements had a relatively small number of followers and by no means replaced or superseded the major traditional forms of Hinduism. Some specific reform movements, like the Arya Samaj and the Ramakrishna Mission, still continue to be influential. The reform movements largely emerged from the growing contact that Hindu thinkers had with Western thought, culture and religion. Below are the four most important movements and the names associated with them. The Brahmo SamajThe Brahmo Sabha was founded in 1828 by Rama Mohan Roy (left) and in 1843 was restructured and renamed Brahmo Samaj by Devendranatha Tagore, father of the well-known poet, Rabindranatha Tagore. Rama Mohan was extremely learned and strongly influenced by Christianity. He disagreed with the doctrine of reincarnation and fought to abolish certain traditional practices, some of which had been grossly misused. These included caste, polygamy, image worship,  sati, and child marriage. His ideas of worship were drawn largely from Christianity. Devendranatha Tagore was greatly influenced by the western philosophy of Locke and Hume.He tried to reform the Brahmo Samaj but lacking support eventually left. Keshab Chandra Sen joined the Samaj in 1857 and initially worked with Tagore. But later disagreeing with Tagore's ideas, he left to establish his own movement. Today the Brahmo Samaj has but a fe w thousand members and little visible influence on the Hindu community. It failed to fulfil the hopes of those who saw the future religion of India as a blend of Christianity and Hindu metaphysics. The Arya Samaj The Arya Samaj was founded by Swami Dayananda Sarasvati (left) in 1875 as a radical reform movement.Dayananda wanted to halt the Christian missionary onslaught and to return to the ancient Vedic tradition. He therefore sought to purge Hinduism of what he considered later additions, such as image worship, pilgrimage and ritual bathing. Although emphasising the ancient Vedic tradition, Dayananda also sought to modernise Hinduism and to re-absorb Hindus who had converted to Islam or Christianity. His movement, with its concerns over the influence of other religions sowed the seeds for the many political parties that desired to re-establish Hindu rule in India.The Arya Samaj is still an active organisation, both world-wide and in the UK. Its members agree to follow its â€Å"T en Principles† and worship largely through  havan  (the sacred fire ceremony) and recitation of the Gayatri-mantra. The Ramakrishna Mission Ramakrishna (right) was born Gadadhar Chatterji in a poor but orthodox Bengali  brahmana  family. As a young man he became the priest at the Kali temple near Calcutta. He was later initiated as a  sannyasi  and experienced mystical visions, especially of Devi. He was profoundly influenced by Christianity and Islam and emphasised the universality of religion.He preached that â€Å"Jiva is Shiva† (the soul is God). He met many contemporary reformers and it was Keshab Chandra Sen who made him first known to the world. It was Vivekananda (1863–1902), however, who made Ramakrishna really famous. Born into the wealthy Dutt family, he was named Narendranath. He joined the Brahmo Samaj but later became Ramakrishna's favourite disciple, receiving the name Swami Vivekananda. He was expert in presenting Advaita Vedanta and g reatly impressed the Western world in his presentation to the World Parliament of Religions in Chicago in 1893.He travelled extensively, promoting wide reform, claiming that other reformers â€Å"played into the hands of Europeans. † He established the Ramakrishna Mission, today well known for its social and educational programmes. Gandhi's â€Å"Satyagraha† Mohandas Gandhi (1869–1947) is probably the best known Indian of the twentieth century He was primarily an educator and reformer. His ultimate aim was to re-establish Ramarajya, the reign of Lord Rama – or, in more Western terms, the â€Å"kingdom of God on Earth. † He, was opposed to British oppression and particularly the way Indian cotton was sent to Manchester and the clothes returned for sale in India.He tried to free his country from this unhealthy economic dependence and campaigned for India's independence from British Rule. His means to do this was  satyagraha  Ã¢â‚¬â€œ grasping the truth – based on  ahimsa  (non-violence), with an unswerving faith in God. He followed many orthodox practices and was particularly fond of the  Bhagavad-gita. He often referred to the â€Å"still small voice within. † He is most well known for his support of the untouchables. He died at the hands of an assassin, disappointed with the partition of his beloved India. Social religious reform movements in India By Ms.Seema Lal  Ã¢â‚¬â€ Presentation Transcript 1. Name- Seema Lal Subject- Social science Category- secondary classes (IX & X) Topic of e-lesson- Socio religious reform movements . Target group- VIII & X Classes. 2. Learning Objectives†¦.. 1. To teach students about rise of series of religious and social reform movements. 2. To make them understand conditions which led to the rise of these movements. 3. To tell students how these movements led to reform of both- society and religions. 4. To help them learn key role played by the reformists to uplif t the status of women. 3. Index Social religious reform movements – Information .Evils in Indian society Varna system / Caste system Raja Ram Mohan Roy Arya Samaj Ramakrishna mission Ishwar Chandra Vidyasagar Mahadev Govinda Ranade Annie Beasent &Theosophical society Sir Syeed Ahmed Khan Impact of movements / Limitations Test your Knowledge 4. SOCIO RELIGIOUS REFORM MOVEMENTS 5. VARIOUS SOCIAL AND RELIGIOUS REFORM MOVEMENTS AROSE AMONG ALL COMMUNITIES OF THE INDIAN PEOPLE . IN RELIGION ATTACKED BIGOTRY,SUPERSTITION&HOLD OF PRIESTLY CLASSES. IN SOCIAL LIFE AMIED AT ABOLITION OF CASTES,CHILD MARRIAGE & LEGAL & SOCIAL INEQUALITIES. 6. VARIOUS SOCIAL EVILS EXISTED DURING 18 TH CENTURY.SEVERAL EVIL CUSTOMS AND PRACTICES HAD BECOME PART OF HINDU SOCIAL SYSTEM. STATUS OF WOMEN DETERIORATED. LIFE OF HINDUS WAS GOVERENED BY CASTE SYSTEM . BACK TO INDEX 7. A SYSTEM IN WHICH WOMAN WAS BURNED ON THE PYRE OF HER HUSBAND. SATI SYSTEM 8. CHILD MARRIAGE 9. NO EDUCATION TO GIRLS ! 10. NO WIDO W REMARRIAGE 11. PARDHA SYSTEM BACK TO INDEX 12. VARNA SYSTEM KASHATRIYAS VAISYAS SUDRAS BRAHMANAS BACK TO IND 13. FOUND BRAHMO SAMAJ IN 1828 . ABOLISHED SATI AND CHILDMARRIAGE . ADVOCATED WIDOW REMARRIAGE. CONDEMNED POLYTHEISM. STOOD FOR MODERN EDUCATION FOR ALL. RAJA RAM MOHANROY 14. HE PERSUADED GOVT.TO ABOLISH SATI & CHILD MARRIAGE. STOOD FOR EQUAL RIGHTS FOR WOMEN AND THE RIGHT TO PROPERTY TO WOMEN. HE WAS AN INTERNATIONALIST & SUPPORTED CAUSE OF FREEDOM EVERY WHERE. HIS SAMAJ WAS THE FIRST ATTEMPT TO REFORM HINDU SOCIETY. BACK TO IND 15. ARYA SAMAJ SWAMI DAYANAND 16. THE ARYA SAMAJ –1875 DAYANAND SARASWATI FOUNDED ARYA SAMAJ. HE ATTACKED CHILD MARRIAGE. HE WAS AGAINST IDOL WORSHIP. BELIVED IN INFALLIBLITY OF VEDAS. HE OPPOSED CASTE SYSTEM. ADVOCATED EQUAL RIGHTS FOR MEN AND WOMEN. NUMBER OF D. A. V SCHOOLS & COLLEGES WERE STARTED BY THE SAMAJ ALL OVER INDIA. BACK TO IND 17.RAMAKRISHNA MISSION FOUNDED BY VIVEKANAND – DISCIPLE OF RAMAKRISHNA PARA- MHANSA. HE ESTABL ISHED THE MISSION & EDUCATIONAL INSTITUTIONS . UPLIFTED STATUS OF WOMEN . BACK TO IND 18. ISHWAR CHANDRA VIDYASAGAR-1820-91 WORKED FOR THE CAUSE OF EMANCIPATION OF WOMEN. DUE TO HIS EFFORTS LEGAL OBSTACLES TO WIDOW REMARRIAGE WERE REMOVED BY A LAW IN 1856. PROMOTED EDUCATION AMONG GIRLS & SET UP INSTITUTIONS FOR THEM . BACK TO IND 19. MAHADEV GOVINDA RANADE-1842-1901 WAS A SOUL OF THE INDIAN SOCIAL CONFERENCE-1887. CAMPAIGNED FOR ABOLITION OF CASTE,INTERCASTE MARRIAGES WIDOW REMARRIAGE,EDUCATION FOR WOMEN UPLIFTMENT OF LOWCASTES & HINDU MUSLIM- UNITY.BACK TO IND 20. ANNIE BESANT AND THEOSOPHICAL SOCIETY WORKED FOR REVIVAL OF HINDUISM -ITS PHILOSOPHY& MODES OF WORSHIP. HELPED IMPART INDIANS A SENSE OF PRIDE IN THEIR OWN COUNTRY. FOUNDED THE CENTRAL HINDU COLLEGE . ORGANISED HOMERULE MOVEMENT BACK TO IND 21. SYED AHMEDKHAN 22. .ESTABLISHED-MOHAMDEN – ANGLO- ORENTIAL COLLEGE. .INSISTED ON COOPERATION WITH BRITISHERS AND REFORMS AMONG MUSLIMS. .PERSUADED MUSLIMS TO RECEIVE MODERN EDUCATION. ALIGARH MOVEMENT SIR SYED AHMED KHAN BACK TO IND 23. Impact of reform movements. EMANCIPATATION OF WOMEN. WIDOW REMARRIAGE ACT IN 1856. SATI &INFANTICIDE WERE BANNED.MARRIAGEABLE AGE OF GIRLS WAS RAISED 1860. EDUCATION TO GIRLS BEGAN. BACK TO IND 24. LIMITATIONS OF REFORM MOVEMENTS 1. THEY CONCERNED ONLY SMALL SECTIONS OF SOCIETY. 2. WORKED FOR THEIR RESPECTIVE COMMUNITY. 3. FAILED TO EMPHASISE THAT COLONIAL RULE WAS INIMICAL TO THEIR INTEREST. 25. TESTING OF KNOWLEDGE Q1. WHEN WAS BRAHMO SAMAJ FOUNDED? Q2. WHO FOUNDED ARYA SAMAJ? Q3. WHAT WERE THE CONTRIBUTIONS OF SIR SYED AHMED KHAN? Q4. WHO STARTED HOMERULE MOVEMENT? Q5. LIST EVILS THAT EXISTED IN INDIAN SOCIETY? Q6. WHY REFORM MOVEMENTS DID NOT BECOME POPULAR? BACK TO IND From Social religious reform movements 19th centuryMany Indians realized that the reform of social institutions and religious outlook of people was a necessary pre-condition for the growth of national unity. Through successive movements they carried forward the pioneering work started by few enlightened Indians. This was a difficult task as orthodox elements formed large and strong groups in the country. During the second half of 19th century only two important laws were passed by the British government. One of these passed in 1872 sanctioned inter-caste and inter-communal marriages. The other passed in 1891 aimed to discourage child marriage.Brahmo Samaj Young Bengal Movement Ishwar Chandra Vidyasagar Veda Samaj and Prathana Samaj Rama Krishna and Vivekananda Arya Samaj Theosophical Society Sayyid Ahmad Khan and the Aligarh Movement Cultural awakening Seva Sada: It was founded in 1885 by Behramji Malabari (Parsi social reformer). It was a humanitarian organization that specialized in care of discarded and exploited women specially widows. It provided for education and welfare of women and encouraged widow remarriage. Servant of India Society founded by Gopal Krishan Gokhale in 1905 for social service. Indian National Social C onference:An offshoot of Prarthana Samaj, founded by Ranade and Raghunath Rao. Its conference was held in 1887 at Madras sharing the platform with the annual session of INC. It virtually became social reform cell of INC. Social Service League was founded in 1911 by N. M. Joshi to collect social facts, discuss them and build public opinion on question of social service. Seva Samiti: It was founded by Hridayanath Kunzru in 1914 at Allahabad to organise social service, to promote education and to reform the criminals and other fallen elements of society. Pandit Ishwar Chandra Vidyasagar:Pandit Ishwar Chandra was a great educator, humanist and social reformer. He was born in 1820 in a village in Midnapur, Bengal. He rose to be the Head Pandit of the Bengali Department of Fort William College. He firmly believed that reform in Indian society could only come about through educ ation. Vidyasagar founded many schools for girls. He helped J. D. Bethune to establish the Bethune School. He fou nded the Metropolitan Institution in Calcutta. He protested against child marriage and favoured widow remarriage which was legalized by the Widow Remarriage Act (1856).It was due to his great support for the spread of education that he was given the title of Vidyasagar. Jyotiba Phule: Jyotiba Phule belonged to a low caste family in Maharashtra. He waged a life-long struggle against upper caste domination and Brahmanical supremacy. In 1873 he founded the Satya Shodak Samaj to fight against the caste system. He pioneered the widow remarriage movement in Maharashtra and worked for the education for women. Jyotiba Phule and his wife established the first girls’ school at Poona in 1851. Saint Ramalinga: Saint Ramalinga was one of the foremost saints of Tamil Nadu in the nineteenth century.He was born on October 5, 1823 at Marudhur, near Chidambaram. He was the last son of his father, Ramayya Pillai and mother, Chinnammayar. Developing a deep interest in spiritual life, Ramalinga m oved to Karunguli in 1858, a place near Vadalur where the Saint later settled down. His divine powers came to be recognised at the early age of eleven. In 1865 he founded the Samarasa Suddha Sanmargha Sangha for the promotion of his ideals of establishing a casteless society. He preached love and compassion to the people. He composed Tiru Arutpa. His other literay works include Manu Murai Kanda Vasagam and Jeeva Karunyam.His language was so simple as to enable the illiterate people to understand his teachings. In 1870 he moved to Mettukuppam, a place three miles away from Vadalur. There he started constructing the Satya Gnana Sabai in 1872. He introduced the principle that God could be worshipped in the form of Light. Sri Vaikunda Swamigal: Sri Vaikunda Swamigal was born in 1809 at Swamithoppu in the Kanyakumari district of Tamil Nadu. His original name was Mudichoodum Perumal but he was called Muthukkutty. He preached against the caste system and untouchability. He also condemned r eligious ceremonies.Many came to his place to worship him and slowly his teachings came to be known as Ayyavazhi. By the midnineteenth century, Ayyavazhi came to be recognized as a separate religion and spread in the regions of South Travancore and South Tirunelveli. After his death, the religion was spread on the basis of his teachings and the religious books Akilattirattu Ammanai and Arul Nool. Hundreds of Nizhal Thangals (places of worship) were built across the country. Self-Respect Movement and Periyar E. V. R. : Periyar E. V. Ramaswamy was a great social reformer. In 1921, during the anti-liquor campaign he cut down 1000 coconut trees in his own farm.In 1924, he took an active part in the Vaikam Satyagraha. The objective of the Satyagraha was to secure for untouchables the right to use a road near a temple at Vaikom in Kerala. E. V. R. opposed the Varnashrama policy followed in the V. V. S. Iyer’s Seranmadevi Gurugulam. During 1920- 1925 being in the Congrees Party he s tressed that Congress should accept communal representation. Subsequently in 1925, he started the â€Å"Self-Respect Movement†. The aims of the ‘Self-Respect Movement’ were to uplift the Dravidians and to expose the Brahminical tyrany and deceptive methods by which they controlled all spheres of Hindu life.He denounced the caste system, child marriage and enforced widowhood. He encouraged inter-caste marriages. He himself conducted many marriages without any rituals. Such a marriage was known as â€Å"Self-Respect Marriage. † He gave secular names to new born babies. He attacked the laws of Manu, which he called the basis of the entire Hindu social fabric of caste. He founded the Tamil journals Kudiarasu, Puratchi and Viduthalai to propagate his ideals. In 1938 at Tamil Nadu Women’s Conference appreciate in the noble service rendered by E. V. R. he was given the title â€Å"Periyar†.On 27th June 1970 by the UNESCO organization praised and ado rned with the title â€Å"Socrates of South Asia†. Social Policies and Legislation  : Social Policies and Legislation-In the beginning, the British interest was limited to trade and earning profits from economic exploitation. Therefore, they did not evince any interest in taking the issue of social or religious reforms. They were apprehensive of interfering with the social and religious customs and institutions of the Indians because of the fear that they might lose trade advantage. Thus, they adopted the policy of extreme precaution nd indifference towards social issues in India. The one reason why they indulged in criticizing the customs and traditions of India was to generate a feeling of inferiority complex among the Indians. However, in the mid-19th century the social and religious movements, launched in India, attracted the attention of the Company’s administration towards the country’s social evils. The propaganda carried out by the Christian missionari es also stirred the minds of the educated Indians. Western thought and education and views expressed in different newspapers and magazines had their own impact.Some of the British administrators like Lord William Bentinck had evinced personal interest in the matter. There were primarily two areas in which laws were enacted, laws pertaining to women emancipation and the caste system. Social Laws Concerning Wome  : The condition of women, by the time the British established their rule, was not encouraging. Several evil practices such as the practice of Sati, the Purdah system, child marriage, female infanticide, bride price and polygamy had made their life quite miserable. The place of women had come to be confined to the four walls of her home.The doors of education had been shut for them. From economic point of view also her status was miserable. There was no social and economic equality between a man and woman. A Hindu woman was not entitled to inherit any property. Thus, by and large, she was completely dependent on men. During the 19th and 20th centuries some laws were enacted with the sincere efforts of social reformers, humanists and some British administrators to improve the condition of women in Indian society. The first effort in this direction was the enactment of law against the practice of Sati during the administration of Lord William Bentinck.Female Infanticide  : Female infanticide was another inhuman practice afflicting the 19th century Indian society. It was particularly in vogue in Rajputana, Punjab and the North Western Provinces. Colonel Todd, Johnson Duncan, Malcolm and other British administrators have discussed about this evil custom in detail. Factors such as family pride, the fear of not finding a suitable match for the girl child and the hesitation to bend before the prospective in-laws were some of the major reasons responsible for this practice. Therefore, mmediately after birth, the female infants were being killed either by fee ding them with opium or by strangulating or by purposely neglecting them. Some laws were enacted against this practice in 1795, 1802 and 1804 and then in 1870. However, the practice could not be completely eradicated only through legal measures. Gradually, this evil practice came to be done away through education and public opinion. Widow Remarriage: There are many historical evidences to suggest that widowremarriage enjoyed social sanction during ancient period in India.In course of time the practice ceased to prevail increasing the number of widows to lakhs during the 19th century. Therefore, it became incumbent on the part of the social reformers to make sincere efforts to popularize widow remarriage by writing in newspapers and contemporary journals. Prominent among these reformers was Raja Rammohan Roy and Iswar Chandra Vidyasagar. They carried out large scale campaigns in this regard mainly through books, pamphlets and petitions with scores of signatures. In July 1856, J. P.Gr ant, a member of the Governor-General’s Council finally tabled a bill in support of the widow remarriage, which was passed on 13 July 1856 and came to be called the Widow Remarriage Act, 1856. Child Marriage: The practice of child marriage was another social stigma for the women. In November 1870, the Indian Reforms Association was started with the efforts of Keshav Chandra Sen. A journal called Mahapap Bal Vivah (Child marriage: The Cardinal Sin) was also launched with the efforts of B. M. Malabari to fight against child marriage. In 1846, the minimum marriageable age for a girl was only 10 years.In 1891, through the enactment of the Age of Consent Act, this was raised to 12 years. In 1930, through the Sharda Act, the minimum age was raised to 14 years. After independence, the limit was raised to 18 years in 1978. Purdah System: Similarly, voices were raised against the practice of Purdah during the 19th and 20th century. The condition of women among the peasantry was relati vely better in this respect. Purdah was not so much prevalent in Southern India. Through the large scale participation of women in the national freedom movement, the system disappeared without any specific legislative measure taken against it.Struggle against the Caste System and the related Legislation: Next to the issue of women emancipation, the caste system became the second most important issue of social reforms. In fact, the system of caste had become the bane of Indian society. The caste system was primarily based on the fourfold division of society viz. Brahmins, Kshatriya, Vaishyas and Shudras. On account of their degradation in their social status, the Shudras were subjected to all kinds of social discrimination. In the beginning of the 19th century the castes of India had been split into innumerable subcastes on the basis of birth.In the meantime, a new social consciousness also dawned among the Indians. Abolition of untouchability became a major issue of the 19th century social and religious reform movements in the country. Mahatma Gandhi made the removal of untouchability a part of his constructive programme. He brought out a paper, The Harijan, and also organised the Harijan Sevak Sangh. Dr. Bhimrao Ambedkar dedicated his entire life for the welfare of the downtrodden. In Bombay, he formed a Bahiskrit Hitkarini Sabha in July 1924 for this purpose. Later, he also organised the Akhil Bharatiya Dalit Varg Sabha to fight against caste oppression.Jyotirao Phule in Western India and Shri Narayana Guru in Kerala respectively established the Satya Shodhak Samaj and the Shri Narayana Dharma Partipalana Yogam to include self-esteem among the downtrodden. In the Madras Presidency also the beginning of 20th century witnessed the rise of Self-respect Movement of Periyar E. V. R. In order to eradicate this evil practice many other individual and institutional efforts were also made. These movements were directed mainly in removing the disabilities suffered by Harijans in regard to drawing of water from public wells, getting entry into temples and admission into schools.

Thursday, August 29, 2019

Drugs and Alcohol on campus ( I DONT WANT ALCOHOL ON CAMPUS) Research Paper

Drugs and Alcohol on campus ( I DONT WANT ALCOHOL ON CAMPUS) - Research Paper Example Though seemingly obvious, it has caused havoc among institutions’ leadership, governments, and policy makers. Despite the enormous knowledge gained from campus on the great discoveries in the world, American history and quantum physics, most of them do not comprehend the looming health problems that are associated with alcohol and other drugs use. In fact, some students consider this behavior as a show of might and fame. As a campus student, I know the problem is wide spread in campuses, or at least in my campus, as close to 88% of my fellow students use alcohol and other drugs. It goes for other campuses across the country, and the globe at large. Applying simple arithmetic calculations, this estimate translates to 9 out of ten campus students being users of alcohol and other drugs. Now, these figures are shocking if we consider the risks involved with alcoholism and substance abuse like road accidents to social crime like rape, all resulting from intoxicated minds. In extreme circumstances, health conditions like cirrhosis and a variety of cancer may be the result. Adding pain to injury, most of the alcohol products and drugs are available within the campus environment! I have witnessed several colleagues of mine in campus publically drinking and smoking in their â€Å"hide zones† that are apparently not so hidden. From a personal sober point of view, alcohol and drugs use should be banned from campuses considering the fact that these are the institutions that the society has confidence in molding the future leaders. I envision walking inside campus environment without the somewhat ugly scenes of drunken students, or students getting high on drugs before attending lectures. I believe this is achievable with a well-organized plan, which would be to ban all the suppliers and cartels that avail these products within the campus environment. Campus administration should also design, implement, and enforce a set of

Wednesday, August 28, 2019

The Business Plan Essay Example | Topics and Well Written Essays - 4000 words

The Business Plan - Essay Example The website can also be further enabled to help the visitors to gain knowledge about the prices and service qualities of dentist clinics along other regions. (Mellor, Coulton & Chick, 2008, p.14). This would help the visitor to make subtle comparisons on the price and service dynamics of the dentist clinics available along their own region with that of others spread along regions. Herein lays the main catch while designing the business plan. Focusing on the marketing side the website creators must envisage a plan to market the web interface to the targeted community. Thus focus must be rendered on drawing the interests of the dentist community to render potential information stated along the above mentioned heads like prices, contact information and addresses. Focusing on the revenue paradigm of running the website special focus must be given so as to devise a method of making the dentists advertise their service offerings against a fee structure. In this regard, the business plan re lating to the preparation of the website can further draw attention of companies producing complementary products like toothbrushes and toothpastes to also advertise their products in the online sphere. This process would help the company to gain potential revenues to help run the business venture. Further enhancing on the service parameter the website can be further designed to help the consumers gain access to the dentists via the online sphere in regards to health problems and also make payments online. These issues reflect the potential challenges which should be kept in mind by the website company while designing the online site. Background to the Business Problem The profession and business practices of dentists and cosmetic surgeons are facing large amount of competition owing to the pricing and branding tactics involved in such. Dentists are trying to gain the attention of the people through large scale promotional and advertisement activities pertaining to their clinics and services offered. Furthermore the attention of the people is also being fetched through attractive pricing techniques. The dentists and cosmetic surgeons through the proper utilisation of the advertisement and promotional opportunities focus on enhancing the brand value of the services offered. Firstly the dentists should focus on the development of logo which would help in reflecting the quality and criteria of the services being offered. The logo development can be done by the dentists in close cooperation with the web designers in case of online advertisements and can use the same in case of billboard advertisements. Secondly the dentists in order to work on a successful business strategy must focus on dividing the entire market into several target areas based on which the products and service offerings can be designed. Targets group being defined would help the dentists in rightly devising the prices for the products and services and also on focusing on the creation of specific zones for clinics. Thirdly the dentists can now

Tuesday, August 27, 2019

Authoritarian Approach to Management Assignment

Authoritarian Approach to Management - Assignment Example The researcher states that the authoritarian approach to management builds high walls between management and employees which impedes development for the department. The old adage "two heads are better than one" certainly applies to such a management problem. It is necessary that management realizes the contributions of employees to the success of operations and their ideas or thoughts or opinions must not go unheard because suggestions coming from the men themselves doing the job are the most realistic ideas to be considered. Apart from the fact that an authoritarian management approach problematically impedes development, such a problem also raise the issue of growth on the part of the employees. Employment should contribute to the growth and maturity of an individual. However, when a problematic authoritarian management approach is used, employee development is difficult to achieve. When employee development is not promoted in a particular working environment, therefore there is no room for competitiveness. Such is an injustice towards employees and affects the total impression about the country's workers. When companies and/or government agencies/departments refuse to foster competitiveness towards its employees, the country will face problems in the fast pace of globalization. The alternative that exists to resolve the problem is to provide management training for directors and management teams to provide a wider perspective on management. Training for high ranking officials are quite unpopular however, it must be realized that management people are in most need for training to acknowledge a viewpoint outside of their own, to introduce a new practice to create a better environment, adopt an approach shared by other management trainees which have been a proven successful approach. All these and more are learned in training. Thus, with an authoritarian approach, training as an alternative to resolve the problem may open opportunities for change. Change that, will empower employees to open doors to success and develop competitiveness amongst employees. The likely consequence of the alternative which had been identified (training for high ranked officials/management) is adopting change as the training open doors of opportunities for fresh ideas, and leadership education. Chances for authoritarian management will open to change and accept suggestions, the language of "we" instead of "I". Training makes a difference to create a better and more accommodating environment due to the realization made by the officials and managers during the process of the training. The consequence to develop competitive employees, contributing to the growth and development of the department where they are assigned.

Monday, August 26, 2019

Representing Gender in FIlm Essay Example | Topics and Well Written Essays - 1250 words

Representing Gender in FIlm - Essay Example These oppressed people possess normal heterosexuality; they are not artificial but express unnaturalness due to a mixture in genders. Butler argues that this unnaturalness can be changed through performativity with the help of either psychologists or close family members. Performative acts are repetitive. They show the behavior of a person. The behavior of the gender a person is comfortable with. The person may represent a different biological gender while the actions performed by that person may be different from the behavior of that gender. Performativity is mostly experienced in children who lose a parent of the opposite sex. The lose hits their mental status and they are compelled to repeat the actions of that parent and they perform the actions they used to do out of love and devotion. Performativity The movie â€Å"Boys Don’t Cry† was directed by Kimberly Peirce in 1999. The story was scripted by Judith Butler. It is based on a true story of a girl who experiences gender transformation. She wants to change her physical appearance to that of a male but cannot afford to undergo a surgery. She then changes her looks to resemble a male which attracts Lana, a girl who herself is not very feminine. Teena/Brandon is shown to be a quiet and sensitive individual with a bit of masculine characteristics. Lana falls in love with Brandon and shares her secrets related to him with her friends which proves that she is fully convinced that Brandon is a male. Lana believed Brandon to be a male and was ready to accept him with whichever gender he wanted to follow when she started to suspect him of his gender. Later on in the movie Lana’s ex boyfriend John who is a psychopath and his friend Tom, suspect Brandon of being a female and inform Lana. Lana does not respond to them and tells Brandon that she would accept him even if he was a female. Brandon and Lana were forced to accept that they were lesbians but they refused to do so. Later on Brandon was s ent to jail and her identity was revealed there. As John was jealous of Teena/Brandon, he raped her and shot her. After analyzing the film â€Å"Boys Don’t Cry† one notices the performativity expressed by characters in the movie scripted by Judith Butler. At the very beginning of the movie, Teena Brandon who is born as a female but biologically has the gender of a female, expressed her wish to undergo surgery to change her gender but could not due to lack of financial support. Teena or Brandon is seen to play the role of a transgendered person. This movie expresses performativity of gender through the character of Teena/Brandon who wants to live life as a heterosexual male and believes himself to be one. Although being a female it was hard for her to act as one. Due to difficulty in have the sources for gender transfer, she decided to dress up and act like a male. It was easy for her to express her masculine characteristics as she inherited the male gender more than th e female one. When a person has a mixed gender, the person expresses that gender which is more prominent. Therefore, even though Teena had the organs of a female, her behavior was masculine and there was no reason for her not to be a male except for her misfortune of not being able to arrange for the gender transfer operation. From the very beginning, Teena/ Brandon’s assumption of being a male represents gender to be performative while on the other hand

Sunday, August 25, 2019

Wireless Security Research Paper Example | Topics and Well Written Essays - 3000 words

Wireless Security - Research Paper Example On the other hand, there are countless security and privacy issues also emerging in wireless networking environments. Though, the new technologies require more and more high level application of wireless communication networks, but such implementations are being established without giving significant concentration to privacy and security related issues. Consequently, the majority of wireless networks around the world are in danger regarding security and safety. Thus, there are a lot of chances that someone with appropriate equipment could be able to spy network traffic. In this scenario, they can get access to users’ passwords and other data (Gerkis, 2006; The State University of New Jersey, 2006). In addition, these security issues and attacks are not immediately theoretical. Additionally, techniques and tools to tap near wireless networks are extensively accessible, even for palmtop devices (Gerkis, 2006; The State University of New Jersey, 2006). In this situation there is vital need for implementing wireless security. Wireless security management has turned out to be a hot issue in literature. This paper presents a detailed analysis of wireless security related issues and their management. This research will analyze some of the important aspects of wireless security, main challenges and possible mitigation techniques. TECHNOLOGY INVOLVED IN WIRELESS NETWORKS Consider the fact that users of WLAN (wireless local area network) are able to travel along with their laptop computers and other devices from one location to another inside their offices or houses without breaking the link with the network. Thus, many corporations and general public at the present think that wireless communication based devices are very useful, efficient, and easy to operate. On the other hand, personal networks based on wireless technology help users receive and distribute data, as well as software applications, by making use of network systems and other users of the network with well-matched devices, without establishing a connection to printer cables and other secondary device links. In fact, with wireless networking users of small PDA, hand-held devices and cell phones can effectively coordinate data and information among PDAs and personal computers, as well as are able to effectively make use of internet based services l ike that web browsing, email and internet access. In addition, wireless communications can help individuals and business firms reduce their networking or wiring costs (Radack, 2011; Gerkis, 2006; css-security, 2010). In this scenario, Information Technology Laboratory established by NIST (National Institute of Standards and Technology), presents various standards and measures which can be adopted to enhance safety and security of wireless communication networks. Additionally, National Institute of Standards and Technology Special Publication (SP) 800-48,  Wireless Network Security, 802.11, Bluetooth, and Hand-held Devices, whose authors were Les Owens and Tom Karygiannis, outlines 3 main and fundamental aspects of wireless security: (Radack, 2011; Ge

Saturday, August 24, 2019

W 10 Employment Impact-Discussion- environmental Essay

W 10 Employment Impact-Discussion- environmental - Essay Example n that arises is whether environmental conservation will result in net loss or gain or no change in the total number of jobs creation in a given country, Environmental improvement deals with both technological as well as green environment. Therefore, when technological environment improvement, it proportionally lowers the chances of job creation as in; it does replace human manual work to machine era. As a result, this eliminates the possibility of providing a wide spectrum for human job environment. On the contrary, when green environment is improved, it in returns gives rise to jobs in any country. For instance, if high carbon economy is lowered to the low-carbon economy, this will alternatively increase the chances of having more jobs. Evidently, the research done by â€Å"national environmental program† has it that, if green environment is improved it will rise the number of jobs. Statistically,15 to 60n million of jobs will be created if green environment is emphasized, in the near future as says Juan Somavia. In conclusion, basing to the environment improvement (whether technological or green environment) leads to either net gain in a job or net loss. Technological improvement does replace human manual work to machine work hence discouraging net total job gain. On the other hand, green environment improvement encourages net total gain in job creation in any country. To curb it all, I do concur that gain, loss or stagnation of total jobs in a country and the job, is based on the specific environmental

Friday, August 23, 2019

The Plight of Urban Public Education Essay Example | Topics and Well Written Essays - 750 words

The Plight of Urban Public Education - Essay Example Public schools in the urban areas are grossly understaffed, and lack basic educational equipment that would put the quality of their education at par with other schools. Though deplorable conditions and poor educational standards exist throughout public schools, the predicament is most severe in inner-cities where the populations are mostly made up of minority ethnic groups.2 Urban public schools are allocated fewer resources than suburban schools and lack basic equipment such as laboratories, sanatoria and computers. As a result of this underfunding, urban schools are characterized by high frequencies of school dropouts, low numbers of students graduating, poor performance in standardized examinations, and low academic prospects from the students. Though a big portion of the problem in urban public schools can be blamed on underfunding, there are other societal factors that play a role in the degraded nature of urban public education.3 These problems include lack of jobs, lack of decent housing, lack of proper healthcare, and high crime rates and ethnic stereotypes. In addition, the levels of motivation among teachers and parents is often low in these public urban schools.4 The gravity of the problem is multiplied by the ethnic diversity in urban areas and, therefore, necessity for these schools to offer bilingual education. Changing demographic trends and an increasing number of migrants demand that the schools take the need of students who have trouble reading, writing and comprehending the English language. Urban public schools need urgent and sustainable help if the students are to compete favorably in the job market, and if the quality of their education is to improve. Christian principles recommend kindness and a Samaritan spirit towards those in need.5 In line with this Christian value, the Church must do all it can to ensure that not only do urban dwellers meet their basic human needs but that they

I can't believe that this was once a syllabus Assignment

I can't believe that this was once a syllabus - Assignment Example This particular curriculum design intended to evaluate the performance effectiveness in the educational system of America. Through his book, Ralph emphasized on the purpose of education in the life of children. Ralph focused on the factors such as what are the interests of the child, the problems he encountered in obtaining education through the traditional curriculum and the purpose of his study. Also to make the education system better, no particular source of information is adequate to provide a basis of wise and comprehensive decision. As Ralph suggested in his book, education system should be so formed that it would help to change the behavior of the people in the most righteous way. The feeling and thinking skills of the people influenced by the content derived from education was the key point highlighted in Ralph W Tyler’s principle. His basic principle was to understand learning of education and its effectiveness in the behavior of the people throughout the life (Tyler , 2013). Evaluation of Tyler’s Curriculum Tyler’s curriculum came into existence during his eight year study. The concentration point of the study was to understand whether students were actually getting educated through the learning delivered in the classes. While Ralph was working on his eight year study, he went to the Ohio State where the faculty wanted him to test the knowledge of the students. The instructor would give emphasis on taking tests, but Ralph suggested that tests would quantify the memorizing power of the student and not their understanding on the subject matter, which certainly became a major turning point in today’s contemporary education process. Ralph coined the term â€Å"Evaluation† to investigate the real leanings of the students through the education system (Tyler, 2013). The evaluation was to understand the effectiveness of education and learning on the people’s behavioral characteristics and their life in future. The une mployment rate in the organization was increasing due to the lack of learning in the specific subject matter. The curriculum theory of Ralph dealt with the real sense of understanding of education. The theory emphasized not on the dull sensing of meaning of the subject matter but focused on the inner meaning, emotions and continuous exploration of the study in the life of the student (Tyler, 2013). The curriculum theory also gave emphasis to few principles, which were required to be followed for a better education system. The principle of the curriculum was to explore the knowledge of the learning, the interest of the students in the given subject and most importantly, the purpose the child has in his mind regarding the study. It was observed through his curriculum theory that every student had different interests and hence, 30 schools were developed to try the new education system suggested by Ralph. The evaluation of students, were further suggested by Ralph, to be done by the rec ords of the performance of the students throughout. Appraisal system would be introduced every year to check the knowledge and to understand whether they are learning the expected skills, which would help them in future. The theory also stated that the evaluation of the people after completion of studies, which meant how the people are dealing in the real

Thursday, August 22, 2019

In Civil Peace, How Does War Affect Society Essay Example for Free

In Civil Peace, How Does War Affect Society Essay In human history, especially in the ninetieth century and the twentieth century, there were many civil wars in different countries because of political, economic, religious, ethnic, and cultural conflicts, for example, the American Civil War between the United States and several southern slaves states from 1861 to 1865; the Korean Civil War between the Republic of Korea and Democratic people Republic of Korea from 1950 to 1953; the Chinese Civil War between the Republic of China and the Communist Party of China from 1927 to 1950, and the Nigeria Civil War between the Hausas Party and the Igbo Party from 1967 to 1970. Civil wars cause serious poverty and starvation for the people, kill tens of thousands of soldiers and civilians, and bring tragedies to many families. For instance, in the Korean Civil war, more than one million soldiers and civilians were killed, including over 40,000 American soldiers, 511,493 South Korean soldiers and civilians, about 400,000 North Koreans, and over 148,000 Chinese soldiers. Therefore, civil wars affect societies severely. In â€Å"Civil Peace†, the war causes terrible casualties of civilians and soldiers, results in fearful society instability, and destroys tremendous infrastructures and houses. In human history, especially in the ninetieth century and the twentieth century, there were many civil wars in different countries because of political, economic, religious, ethnic, and cultural conflicts, for example, the American Civil War between the United States and several southern slaves states from 1861 to 1865;[1] the Korean Civil War between the Republic of Korea and Democratic people Republic of Korea from 1950 to 1953;[2] the Chinese Civil War between the Republic of China and the Communist Party of China from 1927 to 1950, and the Nigeria Civil War between the Hausas Party and the Igbo Party from 1967 to 1970. 3] Civil wars cause serious poverty and starvation for the people, kill tens of thousands of soldiers and civilians, and bring tragedies to many families. For instance, in the Korean Civil war, more than one million soldiers and civilians were killed, including over 40,000 American soldiers, 511,493 South Korean soldiers and civilians, about 400,000 North Koreans, and over 148,000 Chinese soldiers. [4] Therefore, civil wars affect societies severely. In â€Å"Civil Peace†, the war causes terrible casualties of civilians and soldiers, results in fearful society instability, and destroys tremendous infrastructures and houses. First, most Nigerian civilians live in hunger and malnutrition, but more miserably, tens of thousands soldiers and civilians are killed during the devastating civil war. It is estimated that about 180,000 soldiers and civilians were battle deaths and non-battle deaths. [5] Contrary to Jonathan’s luckiness, such as â€Å"He had come out of war with five inestimable blessing-his head, his wife Maria’s head and the heads of three out of their four children†(Achebe 20), many parents lost all of their children and many other children lost their parents. They all live in extreme grief and sorrow of losing their family members. Furthermore, those children whose parents are dead can hardly survive in the extreme postwar poverty. A lot of people suffer life poverty and spiritual grief. Most important, civil war brings tragedies to many families. These tragedies will affect survivors forever. Secondly, civil war not only results in lots of corporations being closed down and many employees being unemployed, but also brings social instability. For example, most of Jonathan’s fellow ex-miners cannot find jobs. They cook meals that they scrounge together in Bournvita tins. Moreover, because a large number civilian population lacks food and money and they are always in starvation; some civilians are forced to make a living through robbery. These robbers bring people serious fear and pain. In â€Å"Civil Peace†, after Jonathan brings his ex-gratia award back home, a gang of robbers comes and threatens that they will break into the house at night if he doesn’t give them one hundred pounds. â€Å"Jonathan and his family were now completely paralyzed by terror. Maria and the children sobbed inaudibly like lost souls. Jonathan groaned continuously† (Achebe 23). At last, the thieves rob Jonathan twenty pounds. Therefore, the Civil War causes serious social instability and brings civilians more sorrows. Thirdly, in addition to life hardships and spiritual grieves, tremendous infrastructures and houses are destroyed in the war. Many people become destitute and homeless. For example, when Jonathan comes back Enugu, he is astonished to find that â€Å"Only two houses away a huge concrete edifice some wealthy contractor had put up just before the war was a mountain of rubble† (Achebe 22). Some ex-miners are sleeping out of the offices because their houses are ruined in civil war. It is well known that roads, bridges, railways, and rban water and electricity facilities are always heavily destroyed during wars. Civilians suffer starvations during the days and endure cold during the nights because their houses are damaged. Indeed, it is inconceivable how tough conditions people live in during the war. Jonathan is an extra-ordinarily lucky man, but most civilians’ lives are tragic. Without food, houses, money, families and jobs, many people almost collapse into near-madness. Therefore, civil war results in numerous houses and infrastructures ruined. In addition, civil war will severely block postwar national economic development. The governments need to invest lots of money to rebuild ruined national infrastructures. â€Å"Nothing puzzles God† says Jonathan (Achebe 25), but civil wars puzzle everyone. Most Nigeria civilians undergo poverty, homelessness, cold and sadness. Civil wars not only bring extreme poverty and starvation, but also cause severe casualties of soldiers and civilians. Moreover, numerous houses and facilities are terribly ruined. In addition, a lot of factories and corporations are forced to close down. Above all, the civil war contributes to severe social instability, brings families tragedies, and causes people deep sorrows.

Wednesday, August 21, 2019

Analysis of Data Security in Wireless Networks

Analysis of Data Security in Wireless Networks Chapter 1: Introduction Research Method Research is defined as search for new knowledge or an art of scientific and careful investigation of new facts. Research method is referred as a systematic methodology of defining and re-defining the problems, suggest solutions, formulate hypothesis, evaluate the data, make deductions and then reach conclusions. At last, test the conclusions to determine whether they are suitable for the formulating hypothesis or not (KOTHARI, C. R., 2005). The research method chosen for the present study are case studies. Case study research is used because of its capability to bring a clear idea on any complicated issue and thereby strengthening the previously developed research works. A key characteristic of case study research method is its ability to provide multiple sources of evidence each with its strengths and weaknesses (Bill Gillham, 2000). The steps involved in case study research method are as follows: Getting Started The research work started with the collection of data on Wireless Sensor Networks. Sensor networks are referred as secured networks if they can provide end to end security with authenticity and confidentiality. The present research work emphasizes the importance of providing data security in sensor networks through Location-Aware End-to-end Data Security system. Selecting Cases Selection of cases is an important aspect of building theory from case studies. The earlier stages of the research work focused on various security systems and then identified Location-Aware End-to-end Data Security system for providing data security in sensor networks. Literature review section of this research work will explain all these aspects very clearly. Case study research method is quiet difficult as it provides multiple sources of evidence in its research. So to develop this research work, data was collected from various sources like books, journals, articles and online websites. Crafting Instruments and Protocols After the collection of data related to sensor networks and its importance in the field of providing security for networks it was analyzed that efficient steps must be followed by the organizations to provide security for sensor networks. In order to provide an efficient data security system for sensor networks, the research work was customized a number of times. All the design principles were considered for improving the security in sensor networks so to implement better communication networks. Entering the field After gathering the information related to wireless sensor networks from various sources like websites, journals, articles and books. The information gathered gave a better understanding on Location-Aware End-to-end Data Security system for providing data security in sensor networks. Analyzing data The case study research method primarily concentrated on Location-Aware End-to-end Data Security system for providing data security in sensor networks. The data collected for this research work was analyzed using various methods and techniques. This analysis helps to find the link between the research objects and outcomes with respect to the present study thereby providing an opportunity to strengthen the research findings and conclusions. Shaping hypotheses The task of shaping hypotheses is mainly applied for the alteration or modification of models applied for the research work previously. The new models applied in the research depend upon the data analysis. Enfolding literature After the analysis stage which was helpful in assessing the proposed solutions related to the problems occurred by disasters then a detailed critical analysis will be presented in literature review section that will evaluate the existing security designs so as to improve the performance of sensor networks. Reaching closure From the start of the research work to the analysis stage it was analyzed that providing efficient security for sensor networks is very important as it increases the life of networks and improves the efficiency of networks. Background study of Wireless Sensor Networks Wireless Sensor networks will fall under the category of modern networking systems. It has emerged in the past and caters the needs of real world applications. These networks are the preferred choice for the design and development of monitoring and control systems. In the year of 1940s and 50s wireless sensing technology was developed. To discover and chase enemy craft this was used by military (Shimmer, 2006). The technology formulated to let in radio frequency identification and real time location system but the real force behind wireless sensor network was the power to place detectors in remote or in the environment without wired lines. This allows in turn for capture and analysis of information to transmit warnings and to identify the approaching phenomenon. The quality of life by allowing real time information was developed by WSNs. WSNs supply real world information in a perceive manner rather than a virtual world (Shimmer, 2006). As the health of the people is becoming worse a nd the global population is getting older, with the ability to sense and perform direct measurements biometric solutions can be created which will improve the healthcare and improves the quality of life. As one of the key drivers for wireless sensor networks data will be captured and analyzed for detecting and predicting the phenomena like falls and warnings to develop intelligent solutions for industry. Chapter 2: Literature Review 2.1 Overview Providing security for data in Wireless Sensor Networks (WSNs) is a difficult task because of complexity in managing the critical resource. Data security in sensor networks can be achieved by Location-Aware End-to-end Data Security system. A sensor network can called as secured if it can provide end-to-end security through data confidentiality, authenticity and availability. Applications like wildlife monitoring, manufacturing performance monitoring and military operations use wireless sensor networks. Security is the most important requirement for all these WSNs applications. Providing security in wireless sensor networks is different from traditional approaches because of resource limitations and computation restrictions. Node compromise attacks, DoS attacks and resource consumption attacks are the most general attacks in the wireless sensor networks while providing security to the data. This research concentrates on wireless sensor networks, data security in sensor networks, Locat ion-Aware End-to-end Data Security (LEDS) systems and its performance in providing data security. 2.2 Wireless Sensor Network Wireless Sensor Network is a fast growing technology and has exciting research area. Military and civilian activities can be operated successfully using this network. Interconnection between thousands of sensor nodes in large sensor networks can create technical issues (LEWIS, F. L., 2004). To offer a high quality sensing in terms of space and time the sensing nodes are closely arranged and are made to work together. This technology is responsible for sensing and also for the first stages of the processing hierarchy. Computations, communication capacities, memory, low cost devices which have limited energy resources are included in the network. One of the major applications of sensor networks is actuators. This type of sensor networks is widely used in many sectors like military applications, environmental applications and commercial applications (RAGHAVENDRA, C. S., Krishna M. Sivalingam and Taieb F. Znati, 2004). Networks can be organized in multi-hop wireless paths and large lands capes in order to recognize the events of interest. Industries attain security and safety by making use of wireless sensor networks. This network uses sensors for the detection of toxic, harmful and unsafe materials and also provides a way for the identification of leakages which may cause dangerous results. These networks are best suitable for monitoring and help in controlling rotations in moving machinery (Edgar h. Callaway, 2003). Wide usage of sensor networks in large applications forces the network to provide security for data in order to operate the applications effectively. Security is the major issue faced by wireless sensor networks. The main reason for security problems in sensor networks is hold of data by attackers. If number of nodes increased in communication then there may be chance for tampering the data which may create the problem of data loss (CHAN, H. and PERRIG, A., 2003). This sensor network helps in expanding the internet into physical space. Compared to customary approaches wireless sensor networks provide many advantages. Information in sensors networks is available only at runtime. Sensors networking is done by contribution from signal processing, database and information management, embedded systems and architecture and distributed algorithms. Much number of sensors is already in use for monitoring the traffic in networks (Feng Zhao and leonidas J. Guibas, 2004) The organization growth reduces internally by loss of important data and due to false data introduced by hackers in network.However, the lack of end-to-end security guarantee makes the WSN weak due to the attacks. Functions in the networks are injured by internal attacks which lead to breakdown of mission-critical applianc es (Elaine Shi and PERRIG, A., 2004). Hence from the above discussion it can be understood that wireless networks leads to a new trend as the way of interchanging of data through internet service like e-mail and data file transfers is increasing tremendously. WSN is used in many martial appliances. As these networks provide many benefit for organizations and users it lacks in providing security to data while transferring. Wireless sensor networks play a vital role in transferring the data from one network to another without any delays or disturbances. The functionality and behavior of the WSN are completely dissimilar from the other wireless network devices present in WSN.WSN are not assured by the users. In terms of battery and power these devices are much more restrained. The WSN can be separated into two parts Data acquisition and data dissemination network. Data acquisition network consists of sensor nodes and base stations. Sensor nodes are the accumulation of small devices wit h the charge of assessing the physical information of its setting, and base stations are influential devices in case of gathering information of its surroundings. Sensor networks are mainly projected for real-time collection and analysis of low level data in aggressive environments (Javier Lopez and Jianying Zhou, 2008). For this reason they are well fitted to a significant amount of monitoring and observation applications. Famous wireless sensor network applications involve wildlife monitoring, bushfire response, military command, intelligent communications, industrial quality control, infrastructures, smart buildings, traffic monitoring and examining human heart rates etc. greater part of the sensor network are spread in aggressive environments with active intelligent resistance (Feng Zhao and Leonidas J. Guibas, 2004). Hence security is a crucial issue. One obvious example is battlefield applications where there is a pressing need for secrecy of location and resistance to subvers ion and destruction of the network. 2.3. Evaluating the existing security designs in WSNs Evaluation of existing systems can be done with the help of data security requirements like data authentication, availability and authentication. Security is not provided efficiently by the existing systems due to weak security strengths and is exposed to many different attacks. Security authentication tools such as authentication and key management. These tools provide various security mechanisms for sensor network. Routing and localization are supports sensor network (Donggang Liu and Peng Ning, 2007). Similar to the traditional networks most of the sensor network applications need security against introduction, and modification of packets. Cryptography is the standard defense. Interesting system tradeoffs grow while comparing cryptography into sensor networks. For point-to-point communication, continues cryptography attains a high level of protection but involves those keys to be set up among all end points and be in companionable with passive participation and local broadcast (C. S. Ragahavendhra, Krishna M. Sivalingam, Taieb F. znati, 2004). Link layer cryptography with a network wide shared key simplifies key setup and supports passive participation and local broadcast but intermediate nodes might alter messages. The earliest sensor networks are likely to use link layer cryptography because this approach supplies the greatest ease of deployment among presently available network cryptographic approaches. Subsequent systems may react to demand for more security with more advanced use of cryptography. Cryptography implies a performance cost for extra computation that frequently gains packet size. Cryptographic hardware support increases efficiency and also increases the financial cost of implementing a network. Limitations of existing key management schemes From many past years many different pre-distribution schemes have been proposed. Hop-by-hop is one of the techniques which dont provide end-to-end security in a proper manner. This hop-by-hop not only involves the end points but also have the intermediate components for data forwarding. Hop-by-hop header carries information which should be examined by each and every node along the packet path. As this technique involves each node referencing and processing it becomes complex in analysis of networks (Alberto Leon Garcia and Indra Widjaja, 2004). Data authentication and confidentiality is very much vulnerable to inside attacks and the multi hopping makes a worse while transmitting the messages. The problem of distributing and updating cryptographic is to valid member is known as Key Management. The key management is one of the most important tasks in the cryptographic mechanisms for networks. However the sensor networks, the key management is one of the more challenging network because there may be no central authority, trusted third party, or server to manage security keys. The key management performed in the distributed way. The self organization scheme to distribute and manage the security keys proposed (Yang Xiao, 2006). This system certificates are stored and distributed to the user by themselves. False data filtering and their analysis This helps in protecting data from validation in WSNs. Data that is not authorized will be filtered out by the transitional nodes. Location Based Resilient Secrecy (LBRS) is the proposed scheme that identifies the problems and errors in Statistical En-route Filtering (SEF) and Interleaved Hop-by–Hop Authentication (IHA). All these methods are highly exposed to interference attacks and selective forwarding attacks (kui Ren, Wenjing Lou and Yanchao Zhang, 2008). SEF helps in detecting and dropping the false reports during the forwarding process that contains Message Authentication Codes (MAC) generated by multiple nodes (Anne-Marie Kermarrec, Luc Bouge and Thierry Priol, 2007). IHA identifies the fake reports by using interleaved authentication 2.4. Data Security Requirements in Wireless Sensor Networks (WSNs) As wireless sensor networks usage is increasing in organizations, security should be provided for data in order operate organizations successfully. Data security in wireless sensor networks includes data authentication, data availability and data confidentiality. Data should be available for authenticated users only in order to provide security. Various data security requirements for wireless sensor networks are (Kui Ren, Wenjing Lou and Yanchao Zhang, 2008): Data availability Data Confidentiality Data authentication Data integrity Time synchronization Secure Localization Data availability – To ensure availability of message protection in sensor network it should protect the resources or sensor nodes. Nodes in sensor networks should be guarded from unnecessary processing of messages. Avoiding unnecessary processing can reduce the energy usage so that the life time of sensor network increases. Wireless sensors are influenced by many factors like limited communication capabilities and computation. Wireless sensor networks are vulnerable to various attacks like Denial of Service attacks, node compromise attack and resource consumption attack (Shinqun Li, Tieyan Li and Xinkai Wang, 2002). Hence, in order to provide availability and security resources should be maintained effectively. Data Confidentiality – In wireless sensor networks confidentiality can be achieved by allowing only authenticated users to access the data. In sensor networks data can be secured by using cryptographic methods. Using encryption and decryption for data allows only authenticated users to access the data. Unauthorized or third parties cannot read the original data if confidentiality is provided effectively (Chris Karlof, Naveen sastry and David Wagner, 2004). Hence to have confidentiality for data wireless sensor networks should make of encryption methods. Data authentication – Authentication is necessary for controlling the sensor networks effectively. Data authentication in sensor networks allows the users to verify whether the data is sent from authorized resources or not. It also protects the original data from alterations. Digital signatures can be used for authentication in sensor networks (Mona Sharifnejad, Mohsen Sharifi and Mansoureh, 2007). Hence, authentication in sensor networks can be achieved with digital signature which helps in authenticating the senders. Hence from the discussion it can be given in order to provide security data availability, authentication and confidentiality should be sustained in sensor networks. Data Integrity Data integrity in sensor networks is required to check the dependability of the information and concerns to the capability, to support that message has not been corrupted, altered or changed. Even if the network has confidentiality measures, there is still a possibility that the data integrity has been compromised by alterations (Richard Zurawski, 2006). The integrity of the network will be in trouble when the malicious node present in the network throws fake data. Wireless channel cause damage or loss of data due to unstable conditions. Hence from the above it can be given the information provided by the sensor network is easily corrupted which can leads to loss of data. Time Synchronization Most of the sensor network applications trust on some form of time synchronization. Moreover, sensors may wish to calculate the continuous delay of a packet as it moves among two pair wise sensors. For tracking the applications a more collaborative sensor network may involve group synchronization. Secure Localization The usefulness of a sensor network will trust on its ability of each sensor to accurately and mechanically locate in the network (G. Padmavathi and D. Shanmugapriya, 2009). A sensor network planned to locate faults and it need accurate fixed information in order to identify the location of a fault. In this an attacker can easily misrepresent non secured location information by giving false signal strengths and playing back signals. Hence from the above content it has discussed about the security goals that are widely available for wireless sensor networks. 2.5. Proposing Location-Aware End-to-end Data Security (LEDS) LEDS helps in providing safety to data in a well-organized way. Security to data is provided through confidentiality, authentication and availability in LEDS. This mechanism has the ability to provide en-route filtering and end to end authentication. It makes use of key management for achieving data security. LEDS can be used either in small networks or large networks (Ed Dawson and Duncan S. Wong, 2007). LEDS splits the whole network into small cell regions and sends keys for each cell in order to provide security. Cell size of LEDS depends on the number of keys distribute and it does not support dynamic topology. Sensors helps in finding events that are occurring in network. Encryption of events is happened in networks by sensor nodes which are participating in the network. In order to encrypt the events LEDS uses the pre distributed cell keys (Abu Shohel Ahmed, 2009). Sensor nodes calculates unique share key for sensors after encrypting the data, where this is demonstrated using d ifferent sinks. Sensor nodes use authentication keys for calculating MACs. To avoid duplicate reporting each and every report is given with different MACs. A report or data validity will be checked at each and every node while broadcasting through networks in order to provide data security (Fan Ye, Hao Yang and Starsky H.Y. Wong, 2006). Hence from the above discussion it can be understood that, LEDS mechanism helps wireless sensor networks in providing end to end security. This mechanism makes use of key management in order to provide data authentication, confidentiality and availability. The main aim of designing LEDS is to provide end to end data security through data confidentiality, authenticity and availability. LEDS has the capability of preventing false data report attacks. Brief description of the goals of designing LEDS: Provide end-to-end data confidentiality and authenticity: Event reports in wireless sensor networks can maintain authenticity and confidentiality if the sending nodes themselves are not compromised for data corruption. Compromised nodes may affect the neighbor node performance. Cryptographic methods are used to protect data from attackers which is collected from compromised nodes. Key management assists in providing data authenticity and confidentiality by LEDS (Jun Luo, Panos Papadimitratos and Jean-Pierre Hubaux, 2007). In LEDS key management mechanism the nodes use keys for applying cryptographic methods on data in order to provide security. Achieve high level of assurance on data availability: If any attack occurs on data in wireless sensor network, then it should be flexible in selecting alternative ways for forwarding the data. In order to ensure availability, networks should be able to detect and drop the duplicate reports in an efficient and deterministic manner (Kui Ren, Wenjing Lou and Yanchao Zhang, 2008). LEDS assures data availability in the networks by identifying the duplicate reports early in the networks. Hence from the discussion it can be understood that, LEDS was designed for providing security in the wireless sensor networks. False information reports can be eliminated by using some LEDS mechanisms in networks. 2.6. Components of Location-Aware End-to-end Data Security To provide data security, LEDS makes use of two major components: Location-aware key management framework. End-to-end data security mechanism. LEDS provides end to end security by providing data authentication, confidentiality and availability. 2.6.1. Location-aware key management framework As wireless sensor networks are used in wide range of applications it should be deployed correctly in order to collect data. Network planners should give a framework before organizing in order to have security to data. LEDS makes use of key management in providing framework for the sensor networks. Using Key management in LEDS exploits the static and location-aware nature of wireless sensor networks (Reihanah Safavi Naini, 2008). Key management adopts a grid structure for redistributing and examining specific properties related to designing process. For providing a light-weight and robust location aware key management framework for sensor nodes in network preloaded keys are distributed in networks. This framework can be understood through embedding location information into the keys. Framework using key management should be derived in such a way that it should provide data authentication, confidentiality and availability (Yan Zhang, Honglin Hu and Masayuki Fujise, 2006). In LEDS ever y sensor node computes three different types of location-aware keys for distributing purpose. A sensor node computes two unique secret keys which can be shared between a node and sink. These keys help in providing node to sink authentication. A cell key will be distributed between two nodes in the same cell. Confidentiality to data in Wireless Sensor Networks is given by distribution cell keys among network elements. A set of authentication keys can be distributed among the nodes in the network in order to provide authentication to the nodes. This distributing of keys can help sensor networks in data filtering. A Sensor node in the network computes the location-aware key independently. Key management provides basis for end to end data security (Kui Ren, Wenjing Lou and Yanchao Zhang, 2008). Key management strategies for wireless sensor network have proposed recently existing keys which are based on pre-distribution where a probabilistic access for fixing up session keys among adjace nt nodes. Random key Pre-distribution schemes are dangerous to selective nodes and node replication attacks. These frequent attacks can be prohibited by the location aware key management. More challenges are to be taken by the location aware key management such as connectivity within the groups, deployment flexibility and security resilience (Xiaofang Zhou, 2006). Existing strategies need the deployment data as a priority before the deployment. This makes it very hard in major applications. Hence from the above discussion it can be concluded that, for developing a structure for WSN LEDS uses the key management technique. In this framework the safety to data is given by the distribution of keys between sensor nodes. Different location-aware keys computed from sensor nodes can provide data confidentiality, authentication and data filtering. 2.6.2 End-to-end data security mechanism Security is the main issue in transformation of data over internet or any wired or wireless communication. Several encryption methods are implemented and deployed in organization for providing security to data. Network smart cards supports networking mainstream standards and secured protocols. Private data can be sent from smart cards to remote server by establishing a secured connection between network smart cards and trusted remote internet server. This mechanism helps in avoiding manual type for confidential information. End-to-end mechanism struggle in identifying threat mechanism that will capture the data before it is encrypted (Yuliang Zhenq, 2004). Specificdevices and protocols can be installed at the end point connection for offering end to end security. Hyper text Transfer Protocol (HTTP) connection is an example of end-to-end connection to web server where an IP security is used as end-to-end security. There is an opinion that end-to-end security mechanism provides solutio ns in providing security to network based systems. Wireless sensor networks usually consist of a prominent number of resource constraint sensor nodes which are distributed in neglected uncongenial surroundings, and therefore are displayed to more characters of serious insider approaches due to node cooperation. Existing security designs generally supply a step by step security prototype and are exposed to such attacks (Claude Castelluccia, 2005). Moreover, existing security designs are also exposed to several DOS attacks such as report disruption attacks and selective forwarding attacks and thus put information accessibility at stake. To overcome these exposures for major static WSNs come up with a location-aware end-to-end security framework in which secret keys are bound to geographic locations (frank Stajano , Catherine Meadows, Srdjan Capkun and Tyler more, 2007). This location alert property successfully limits the impact of settled nodes only to their locality without involvin g end-to-end data security. The suggested multi functional key management framework checks both node to sink and node to node authentication along with the report forwarding routes and the suggested data delivery access assures effective en-route fake data filtering, and is highly influential against DOS attacks. In end-to-end security the end points refers to connection between client and server. Providing security is the major constraint for transferring data in a secured manner. For providing end-to-end secure communication constrains components like (Michael H. Behringer, 2009) Identity- which helps in identification of entities at both the ends Protocols- to provide required security functions protocols are implemented with the help of algorithms. Security- the end points used by network should be provided with secured protocols and the operations implemented on the end points should be in a secured manner. Thus from the above context it can be given that networks which uses end-to-end security mechanism provides a great security. In spite of having some potential problems end –to-end security many of the organizations are deploying this type of mechanism. End-to-end security protocols and their clarification acts as keystone in having security for the networks. 2.7. Security and performance analysis of LEDS Location aware End to end Data security design (LEDS) function is to anticipate the security and analyze in diverse etiquette. Digital systems afford the sanctuary by means of sundry techniques. In providing the security features researchers generate innovative services for improving the recital and trustworthiness of single technique algorithm (Sam Brown, 2002). Along with security the performance, hardware and software implementations are focused, transparency of the requirements as well as performance and productivity. The factors that involves in escalating this technology are Viability, power consumption, area, complexity, Flexibility. Security analysis can be explained in three dissimilar ways (Kui Ren, Wenjing Lou and Yanchao Zhang, 2008): Data Confidentiality as the security strength Data Authenticity Data Availability Data Confidentiality as the security strength: The requirement of provide data confidentiality within the internal network can be met using the same deployment and management approaches used. Using of the data encryption standard the confidentiality of encryption could be obtained. Data Confidentiality is also used in the Marketing and Sales (John W. Ritting House and James F. Ransome, 2004). In LEDS every report is encrypted by the corresponding cell key and therefore no nodes out of the event cell could obtain its content. Node from the event cell is compromised as the attacker obtains the contents of the corresponding reports because of the data confidentiality. Scheming total network cells number of compromised nodes and portion of compromised cell were utilized. There are two ways for calculating they are Random node capture attack and selective node capture attack. The above figure shows the data confidentiality in LEDS. One has to be clear that in compromising 40% of total cells at least 5% of the total nodes are to be compromised. Along with random node capture attacks accessible defense designs in which compromising a few hundred nodes usually compromise even in all the network communication, which specifies the dominance of the altitude in litheness. Data Authenticity By using diverse online techniques authenticity of data is accomplished. Significance of the data generation determines the position of the obligation (Chris Mann and Fiona Stewart, 2000). Security strength of LEDS regarding the data Authenticity is obtained by the content o

Tuesday, August 20, 2019

Mental Health: Concepts of Race and Gender

Mental Health: Concepts of Race and Gender Mental distress/disorder as a function of the society we live in: implications for the practice of mental health social work in terms of gender and race Introduction Mental illness/disorder/distress is a rather ambiguous umbrella term for describing a wide range of diverse disorders of the mind. According to the Oxford Medical Dictionary, mental illness is â€Å"a disorder of one or more of the functions of the mind (such as emotion, perception, memory, or thought), which causes suffering to the patient or others† (Oxford Medical Dictionary, 2007). The global burden of mental illness was estimated at 12.3% at the beginning of the millennium and is expected to rise even further in the next decade (Murray and Lopez, 1997; Patel et al, 2006). Critical perspectives that refute the biological definitions of mental illness started to arise in the 1960s. Szasz (1961) and other critical theorists have continually challenged the classification of normal and abnormal behavioural categories, and focused instead on the role of social factors on the development of mental illness (Martin, 2003). Key among these factors are gender, race and ethnicity, sexual preference, age and class. Apart from several medical theories that explain the aetiology of mental illness with neurological chemical imbalances, the actual causes of such psychological disorders are largely unknown. However, as outlined above, there are myriad known factors that trigger or prompt such mental impairment. Work stress and work-related psychosocial conditions, for example, plays an important role in self-reported mental health (Kopp M et al, 2008). Furthermore, gender is generally accepted as a significant risk factor for the development of mental distress. The World Health Organization acknowledges that a large majority of common mental health diseases are more frequently reported in the female gender than in their male counterparts. As an example – common psychological disorders such as depression and anxiety are predominant in women. Conversely, there are other disorders of the mind that are more common in men. These include, but are not limited to, substance misuse (including alcohol dependence) and antisocial personality disorder (The World Health Organization). Nevertheless, there are no reported differences in the incidence of some severe mental disorders, like schizophrenia, in men and women. In addition to the gender-related differences documented in the incidence of these disorders, there have also been reported differences in terms of the epidemiology and severity – age of onset, symptom frequency, soci al adjustment, prognosis and trajectory of the illness. The World Health Organization proffers possible explanation for the observed differences between genders – men and women have differential withstanding power over socioeconomic determinants of their mental health, social position, status and treatment in society and their susceptibility and exposure to specific mental health risks (The World Health Organization). Similarly, race could also be a determining factor for the development of mental illness. In addition, mental illness in some races, e.g. black and minority ethnic (BME) groups can be further exacerbated by alleged discrepancies in the mental health services available to this potentially vulnerable groups of patients (Ferns P, 2008). A possibly rational explanation for the reason behind any disparities in mental health across diverse races could be the societal differences that are inherent to various cultural backgrounds. The main objective of this paper is to analyse the social factors that can prompt mental distress, especially in women and people from BME populations, and to rationalise how these factors may actually pathologise the discourse of mental health. Mental Illness in Women The natural subordinate role of women and gender stereotypes in most societies makes them prone to disorders of the mind. Psychoanalytic theories believe that patriarchy-based communities are associated with a higher rate of mental illness in women (Olfman S, 1994). These supremacy-governed organisations in which men are largely in control leave women with a consistent feeling of repression, which could culminate in mental distress. Indeed, in some extreme societies, women with more independent views who express anger or dissatisfaction with the standard patriarchal social structure are often seen as having psychological problems (Martin, 2003). According to The World Health Organization, gender-specific roles, negative life occurrences and stressors can adversely affect mental health. Clearly the impact of the latter factors (i.e. life experiences and stressors) is in no way exclusive to the female gender. However, it is the nature of some events that are sometimes commonplace in women’s lives that could account for the documented gender-related differences. Risk factors for mental illness that mainly affect women include women-targeted violence, financial difficulties, inequality at work and in the society, burdensome responsibility, pregnancy-related issues, oppression, discrimination, and abuse. There is a linear correlation between the frequency and severity of such social factors and the frequency and severity of female mental health problems. Adverse life events that initiate a sense of loss, inferiority, or entrapment can also predict depression (The World Health Organization). Furthermore, in a domino-effect way some female factors can also lead to mental illness, not just in the individual concerned, but also in subsequent generations and/ or interacting family and friends. For example – maternal depression has been shown to be associated with failure of children to strive in the community, which in turn could culminate in delays in the developmental process and subsequent psychological or psychiatric problems (Patel et al, 2004). In the past three decades, the debate of women and mental health illness and their treatment in mental health services has been quite controversial (Martin J, 2003). From a social constructionist point of view, it is believed that some women are wrongly labelled as ‘mentally ill’ merely because they do not accept certain (usually unfair and unfounded) gender-related stereotypical placement in the society. In this often-cited and somewhat controversial book chapter by Jennifer Martin (Mental health: rethinking practices with women) she expresses great concern for the biological explanations of mental health which have the tendency to lay undue emphasis on the female reproductive biology that supposedly leads to a predisposition to mental illness. Such sexist notions tend to disproportionately highlight female conditions such as pre-menstrual tension, post-natal depression and menopause, in a bid to foster the notion that women are at higher risk of developing mental distr ess (Martin J, 2003). Instead of this allegedly short-sighted approach to the medicalisation of mental health in women, feminist theorists focus on female mental illness as a function of the lives they are made to live within patriarchal, and often oppressive, societies. Women are disadvantaged – both socially and psychologically – by these unreasonably subservient role expectations (Martin J, 2003). Mental Illness and Race The United Kingdom (UK) is a home to a very diverse and multicultural population, and BME communities make up approximately 7.8% of the total UK population (Fernando S, 2005). There are innate differences in the presentation, management and outcome of mental illness between the different races and ethnic groups (Cochrane R and Sashidharan S, 1996; Coid J et al, 2002; Bhui K et al, 2003). In a recent policy report for the UK Government Office of Science, Jenkins R et al, (2008) explained that while some mental disorders appear to be more common in the BME populations, others are not. In addition, incidence rates of different mental disorders also vary among different ethnic groups within the BME populations. For example, depression is increasingly common in the Irish and Black Caribbeans, but not necessarily in the Indian, Pakistani and Bangladeshi sub-populations (Jenkins R et al, 2008). In the UK, the risk of suicide also varies by gender as well as ethnicity, with Asian men and Black Carribeans having lower rates than the general UK population, and Asian women having higher rates. Similarly, the incidence of psychoses is not uniformly elevated in all BME groups – the highest incidence is seen in Black Caribbean and Black African groups in the UK, (4 – 10 times the normal rates seen in the White British group) (Jenkins R et al, 2008). In a retrospective case-control study of a representative sample of more than 22,000 deceased individuals, Kung et al (2005) highlighted important disparities in mental health disorders, such as substance misuse, depressive symptoms and mental health service utilisation as possible determinants of suicidal behaviours and/ or attempts. Also, clear associations have been demonstrated between racism and the higher rates of mental illness among BME groups (McKenzie K, 2004). The rising incidence of suicides in some developing countries, as seen with Indian farmers, South American indigenes, alcohol-related deaths in Eastern Europe, and young women in rural China, can be partly attributed to economic and social change in these nations (Sundar M, 1999; Phillips M et al, 1999). Pre-, peri- and post-migratory experiences can be major stressor determinants for the development of mental health illness (Jenkins R et al, 2008). Therefore, in order to understand the differences in these populations, it is of utmost importance to gain some insight into their cultural backgrounds and the happenings in their countries of origin all of which could be determinants of mental health. There is a direct relationship between social change and mental health and, in the recent past, many developing countries have undergone incomparable, fast-paced social and economic changes. As Patel et al (2006) have pointed out, such economic upheavals commonly go hand-in-hand with ruralà ¯Ã¢â€š ¬Ã‚ ­urban migration and disruptive social and economic networks. Furthermore, it is noteworthy that The World Health Organization has acknowledged that such changes can cause sudden disruptive changes to social factors, such as income and employment, which can directly affect individuals and ultimately lead to an increased rate of mental disorders. Also Alean Al-Krenawi of the Ben-Gurion University of the Negev has extensively explored how exposure to political violence has influenced the mental health of Palestinian and Israeli teenagers (Al-Krenawi A, 2005). Al-Krenawi goes on to emphasise that the concept of mental health in the Arab world is a multi-faceted one and is often shaped not only by the socio-cultural-political aspects of the society, but also by the spiritual and religious beliefs. In addition, the perception of racial discrimination has been identified as a significant contributory factor to poor mental and overall health in BME groups – even more important that the contribution of socio-economic factors (Jenkins R et al, 2008). It is disheartening to note that institutionalised and/ or constitutional racism is rife in the conceptual systems that are employed in the provision of mental health services (Wade J, 1993; Timimi S, 2005). Implications for the Practice of Mental Health Social Work In general, people suffering from mental illnesses receive substandard treatment from medical practitioners both in the emergency room and in general treatment, and insurance coverage policies are usually unequal compared with their mentally balanced counterparts (McNulty J, 2004). For BME populations, especially Black and Asians, access and utilisation of mental health services are very different from those recorded for White people (Lloyd P and Moodley P, 1992; Bhui K, 1997). Exploring the pathway to care in mental health services, Bhui K and Bhugra D (2002) highlight that the most common point of access to mental health services for some BME groups is through the criminal justice system, instead of their general practitioner, as would be the case in their White counterparts. Major areas in which institutional racism is rife in the provision of mental health services to BME patients include mental health policy, diagnosis and treatment (Wade J, 1993). For example, Black patients with mental illness are more likely to be treated among forensic, psychiatric and detained populations (Coid J et al, 2002; Bhui K et al, 2003) and are also disproportionately treated with antipsychotic medication than psychotherapy (McKenzie K et al, 2001). Having said this, it is important to differentiate between racial bias and the consideration of racial and ethnic differences. In fact, ignoring these essential differences could actually be seen as a different type of bias (Snowden L, 2003). Already, members of the BME population face prejudice and discrimination; this is doubled when there is the additional burden of mental illness, and is one of the major reasons why some of these patients choose not to seek adequate treatment (Gary F, 2005). As such, stigma arising from racism can be a significant barrier to treatment and well-being, and interventions to prevent this should be prioritised. It is therefore also of utmost importance that institutional racism be eliminated. As far back as 1977, Rack described some of the practical problems that arise in providing mental health care in a multicultural society. These include, but are not limited to: language, diagnostic differences, treatment expectations and acceptability. Some effort has been made to address some of these problems in England, by the development of projects for minority ethnic communities both within the statutory mental health services and in non-governmental sector (Fernando S, 2005). In addition, overcoming language barriers should help in eliminating racial and ethnic disparities towards achieving equal access and quality mental health care for all (Snowden L et al, 2007). The World Health Organization also draws attention to similar bias against the female gender in the treatment of mental disorders. Doctors are generally more likely to diagnose depression in women than in men, even with patients that present with similar symptoms and Diagnostic and Statistical Manual of Mental Disorders (DSM) scores. Probably as a result of this bias, doctors are also more likely to prescribe mood-altering psychotropic drugs to women. Considering that immigrants and women separately face challenges with the provision of mental health care, it is expected that immigrant women would have even more setbacks, owing to their double risk status. Using Kleinman’s explanatory model, O’Mahony J and Donnelly T (2007) found that this unfortunate patient group face many obstacles due to cultural differences, social stigma spiritual and religious beliefs and practices, and unfamiliarity with Western medicine. However, the study did also highlight some positive influences of immigrant women’s cultural backgrounds, which could be harnessed in the management of these patients. To effectively target and treat the diverse population that commonly present with mental illness in the UK, it is necessary to promote interculturalisation, i.e. â€Å"the adaptation of mental health services to suit patients from different cultures† (De Jong J and Van Ommeren M, 2005). Hollar M (2001) has developed an outline for the use of cultural formulations in psychiatric diagnosis, and advocates for the inclusion of the legacy of slavery and the history of racism to help understand the current healthcare crisis, especially in the Black population. Conclusion As we have discussed extensively in this paper, females and patients of BME origin are commonly disadvantaged in the treatment of mental illnesses. Mental healthcare professionals need to eliminate all bias in the treatment of these patients, while at the same time, taking into consideration their inherent differences to ensure that mental health services provided are personalised to suit the individual patient. References Al-Krenawi A. Editorial: mental health issues in Arab society. Israeli Journal of Psychiatry and Related Sciences 2005; 42 (2): 71. Bhui K. Service provision for London’s ethnic minorities. In London’s Mental Health, London: King’s Fund (1997). Bhui K and Bhugra D. Mental illness in Black and Asian ethnic minorities: pathways to care and outcomes. Advances in Psychiatric Treatment 2002; 8: 26 – 33. Bhui K, Stansfeld S, Hull S, Priebe S, Mole F, Feder G. Ethnic variations in pathways to specialist mental health care: a systematic review. The British Journal of Psychiatry 2003; 182: 5 – 16. Cochrane R and Sashidharan S. Ethnicity and health: reviews of the literature and guidance for purchasers in the areas of cardiovascular disease, mental health, and haemoglobinopathies. York: University of York, 1996: 105 – 126 (part 3). Coid J, Petruckevitch A, Bebbington P, Brugha T, Brugha D, Jenkins R, et al. Ethnic differences in prisoners. 1: criminality and psychiatric morbidity. The British Journal of Psychiatry 2002; 181: 473 – 480. De Jong J and Van Ommeren M. Mental health services in a multicultural society: interculturalisation and its quality surveillance. Transcultural Psychiatry 2005; 42 (3): 437 – 456. Fernando S. Multicultural mental health services: projects for minority ethnic communities in England. Transcultural Psychiatry 2005; 42 (3): 420 – 436. Ferns P. The bigger picture. If racism exists in society, then surely it must influence mental health services. Mental Health Today 2008 March; 20. Gary F. Stigma: barrier to mental health care among ethnic minorities. Issues in Mental Health Nursing 2005; 26 (10): 979 – 999. Hollar M. The impact o0f racism on the delivery of healthcare and mental services. Psychiatric Quarterly 2001 Winter; 72 (4): 337 – 345. Jenkins R, Meltzer H, Jones P, Brugha T, Bebbington P, Farrell M, Crepaz-Keay D and Knapp M. Foresight Mental Capital and Wellbeing Project. Mental health: Future challenges. The Government Office for Science, London (2008). Kopp M, Stauder A, Purebl G, Janszky I, Skrbski A. Work stress and mental health in a changing society. European Journal of Public Health 2008; 18(3): 238 – 244. Kung H, Pearson J, Wei R. Substance use, firearm availability, depressive symptoms, and mental health service utilization among white and Africa-American suicide decedents aged 15 to 64 years. Annals of Epidemiology 2005; 15 (8); 614 – 621. Lloyd P and Moodley P. Psychotropic medication and ethnicity: an inpatient survey. Social Psychiatry and Psychiatric Epidemiology 1997; 27: 95 – 101. Martin E ed. (2007). Oxford Concise Colour Medical Dictionary. Oxford University Press; 4th edition, page 445. Martin J (2003). Mental health: rethinking practices with women in Critical social work: an introduction to theories and practices. By Bob Pease, June Allan, Linda Briskman. Published by Allen Unwin, 2003 ISBN 1865089079, 9781865089072. McKenzie K, Samele C, Van Horn E, Tattan T, Van Os J, Murray R. Comparison of the outcome and treatment of psychosis in people of Carribean origin living in the UK and British Whites. Report from the UK700 trial. The British Journal of Psychiatry 2001; 178: 160 – 165. McKenzie K. Tackling the root cause: there are clear links between racism and the higher rates of mental illness among ethnic minority groups. Mental Health Today 2004; 30 – 32. McNulty J. Commentary: mental illness, society, stigma and research. Schizophrenia Bulletin 2004; 30 (3): 573 – 575. Murray C, Lopez A. Alternative projections of mortality and disability by cause 1990 – 2020: global burden of disease study. The Lancet 1997; 349: 1498 – 1504. O’Mahony J and Donnelly T. The influence of culture on immigrant women’s mental health care experiences from the perspectives of health care providers. Issues in Mental Health Nursing 2007; 28 (5): 453 – 471. Olfman S. Gender, patriarchy, and womens mental health: psychoanalytic perspectives. The Journal of the American Academy of Psychoanalysis 1994; 22: 259 à ¯Ã¢â€š ¬Ã‚ ­ 271. Patel V, Rahman A, Jacob K, Hughes M. Effect of maternal mental health in infant growth in low income countries: new evidence from South Asia. The British Medical Journal 2004; 328: 820 à ¯Ã¢â€š ¬Ã‚ ­ 823. Patel V, Saraceno B, Kleinman A. Beyond evidence: the moral case for international mental health. The American Journal of Psychiatry 163: 8; 1312 – 1315. Phillips M, Liu H, Zhang Y. Suicide and social change in China. Cultural Medical Psychiatry 1999; 23: 25 – 50. Rack P. Some practical problems in providing a psychiatric service for immigrants. Mental Health Soc 1977; 4 (3à ¯Ã¢â€š ¬Ã‚ ­4): 144 – 151. Snowden L. Bias in mental health assessment and intervention: theory and evidence. American Journal of Public Health 2003; 93 (2): 239 – 243. Snowden L, Masland M, Guerrero R. Federal civil rights policy and mental health treatment access for persons with limited English proficiency. American Psychology 2007; 62 (2): 109 – 117. Szasz (1961) in Martin J (2003). Mental health: rethinking practices with women in Critical social work: an introduction to theories and practices. By Bob Pease, June Allan, Linda Briskman. Published by Allen Unwin, 2003 ISBN 1865089079, 9781865089072. Sundar M. Suicide in farmers in India. The British Journal of Psychiatry 1999; 175: 585 – 586. The World Health Organization. Gender and womens mental health: Gender disparities and mental health: The Facts. [WWW] Available online at http://www.who.int/mental_health/prevention/genderwomen/en/ (Accessed Friday November 15th 2008). Timimi S. Institutionalised racism lies at the heart of the conceptual systems we use in psychiatry. Mental Health Today 2005; 21. Wade J. Institutional racism: an analysis of the mental health system. The American Journal of Orthopsychiatry 1993; 63 (4): 536 – 544. Cervical Cancer: Types, Causes and Cures Cervical Cancer: Types, Causes and Cures By: Omar Abdulle What is Cervical Cancer? Cervical cancer is a disease that affects the cervix of the female reproductive system. The cervix is located in the lower part of the uterus; it connects the vagina to the uterus. Cervical cancer can be classified to two types, Squamous cell carcinomasand Adenocarcinomas. Squamous cell carcinomas account for 80-90 % of all cervical cancer cases. Meanwhile, Adenocarcinomas in found in the glandular cells of the cervix makes up for 10-20% of cervical cancer cases.1 Most cervical cancer starts in the cells in the transformation zone. The cells do not immediately change into cancer. The normal cells of the cervix slowly develop benign tumours that turn into cancer. Only some of the women with pre-cancerous tumours in the cervix will develop cancer. It normally takes several years for benign tumours to turn into malignant tumours. Statistics indicate that 1,500 Canadian women will be diagnosed with cervical cancer in 2016. An estimated 400 will die from it.2 Causes Most cases of cervical cancer are caused by a high-risk type of HPV. HPV is a virus that is passed from person to person through genital contact, such as vaginal, anal, or oral sex. If the HPV infection does not go away on its own, it may cause cervical cancer over time.3 The viruses in the sexual transmitted (HPV) trigger abnormal behavior in the cervical cells causing pre-cancerous conditions. Risk factors Many sexual partners. Early sexual activity. Weak immune system. Smoking. Detection and Diagnosing Detecting Cervical cancer that is detected early can be treated successfully. Doctors recommend regular screening to detect any abnormal cells in the cervix. During screening Doctors will conduct Pap tests to find out the DNA of the cervical cells. The purpose of Pap test is to spot the cancer cells in the cervix. If not diagnosed with cervical cancer, doctors highly suggest continuing screening as risks of getting cervical cancer are high. Diagnosing If cancerous cells are found in the cervix, Doctors will perform the following tests to examine the cervix. The tests are; Punch Biopsy Involves a sharp tool to pinch off cervical tissue for further examination. Endocervical curettage small spoon-shaped instrument to brush a tissue sample from the cervix. The final stage of detecting and diagnosing cervical cancer is called staging. At this point, Doctors have determined you have cervical cancer. Staging can be divided in to for sub-sections. They are: Stage I Cancer is restricted. Stage II Cancer is existent in the cervix and upper vagina. Stage III Cancer is moving. Stage IV Cancer has spread to other nearby organs and parts of the body. Precautionary steps Taking precautionary steps is the right path to reduce the risk of contracting cervical cancer. Experts suggest; Avoid exposure to Human Papilloma Virus (HPV). Get a HPV vaccine. Avoid smoking. Forms of Treatment Just like other forms of cancer, cervical cancer can be treated through the main forms of treatment. I.e. Surgery, Chemotherapy, Radiation therapy, and Targeted therapy. Surgery Determines how far the cancer has spread. Treats cancer successfully during the early stages. Radiation Treats cancer that has spread excessively. Chemotherapy Treats cervical cancer that returns after treatment. Targeted therapy Drug used with chemo to stop cancer growth. This method is still in process Current research and Potential Cures Doctors and scientists are working hard to find out the best ways to prevent and best treat cervical cancer. These methods will improve the functionality of the treatments method, detection and diagnosing. Improvements are being to screening and detection methods. Another innovative and also potential cure is called Immunotherapy, also known as biologic therapy. This is designed to boost the bodys natural defenses to fight the cancer. It uses materials either made by the body or in a laboratory to improve, target, or restore immune system function.5 References Types of Cervical Cancer | CTCA. (0001, January 01). Retrieved March 02, 2017, from http://www.cancercenter.com/cervical-cancer/types/ Cervical cancer statistics Canadian Cancer Society. (n.d.). Retrieved March 02, 2017, from http://www.cancer.ca/en/cancer-information/cancer-type/cervical/statistics/?region=on EPublications. (n.d.). Retrieved March 02, 2017, from https://www.womenshealth.gov/publications/our-publications/fact-sheet/cervical-cancer.html Cervical Cancer: Latest Research. Cancer.Net. N.p., 10 June 2016. Web. 02 Mar. 2017.