.

Tuesday, January 28, 2020

Developing Privacy in Clinics | Research Study

Developing Privacy in Clinics | Research Study Introduction Privacy has some deep historical roots, however because of its complexity; privacy has been difficult to define. It has often been a heated debate among sociologists, philosophers and scholars (Pritts,2015). The term â€Å"privacy† is frequently used, yet there is no universally accepted definition for the term. Confusion persists over the value, meaning and concept of privacy. At its core, privacy is experienced on a personal level and often interpreted differently by different people (Whitman, 2004:1153). Today, the term is used to signify different, yet overlapping concepts such as the right to disclose personal information about one’s self or to be free from intrusive searches (NRC, 2003:18). Our report focuses on Privacy within the Ikhwezi clinic, in the context of personal information and confidentiality. There are a variety of reasons to improving privacy within Ikhwezi, one being many theorists depict privacy as a basic human right. They see privacy as an essential component of the human well-being. Respecting privacy of an individual contributes to a human’s moral uniqueness (Pritts,2015). The ethical principle of nonmaleficence requires safeguarding personal privacy. Exposure of an individual’s privacy and confidentiality may not only affect their dignity, but may also cause harm (NRC, 2003:18). An example; if confidential information is passed on or over heard by another individual stigma, discrimination and embarrassment may be the end result. Thus, without some form assurance of privacy, patients may be reluctant to provide sensitive information to their doctor. Ensuring privacy can promote more effective communication between the staff of Ikhwezi and patients, which is essential for quality care. However, it is important that the perceptions of privacy differ among individuals, groups and different cultures. No matter how privacy is defined, it is an on-going battle among staff and patients in Ikhwezi Clinic. It is important that all members within our societies work together to ensure every patient are treated according to the Patients’ rights charter. 1.1 Research problem: Ikhwezi is a clinic located on the out skirts of Nomzambo, a rural area that runs parallel to the N2 (Medpages, 2015), tries to help their local community by prevention of disease and to promote community health by offering family planning services and other basic health care. The poor living conditions in Nomzambo entails the community to live restricted lifestyles where residents are susceptible to disease and live in poor conditions. This creates a constant worry among the residents about their health status. Ikhwezi Clinic is growing and struggles with an extreme form of a lack of privacy. 1.2 Problem statement: Ethical health practice and privacy protections both provide valuable benefits to society. Health treatments are vital to human health and health care improvement and protecting individuals’ rights is essential to the conduct of ethical practice. The primary justification for protecting personal privacy is to protect the interests of individuals (Nass, 2009: 10). Privacy is a large issue being faced within Ikhwezi Clinic. As a group we decided to focus mainly in Ikhwezi’s HIV waiting and counselling area. What would be an effective way to solve Ikhwezi’s privacy problem? Where is privacy a present issue in Ikhwezi clinic? How would patients benefit from privacy structures being implemented? Who would be affected most by the lack of privacy Ikhwezi clinic? 1.3 Background: Informal settlements have become a common problem in developing countries around the world due to the rapid population growth, social and economic systems (Ndingaye, 2005:1). Due to limited resources available and minimal municipal support, these settlements often face social and economic concerns that result in poor living conditions and transmission of disease, therefore health care is needed in rural communities. Ikwezi Clinic, located on the out skirts of Nimzambo, helps their local community and others by prevention of disease and promoting community health. Ikwezi is growing each and every day and sees an average of 500 patients a day. It is noisy, busy which results in a lack of privacy among the patients and staff. Literature review: This literature review will provide an analysis of privacy and privacy in third world countries . According to Gaede and Versteeg the relationship between social and health causes is poverty and food security (2011: 100). From whichever lenses or angle viewed, poverty poses, financial, emotional social and physical predicaments that puts residents in a state of jeopardy (Rose and Charlton, 2001:383 ). It deprives and often pushes victims of poverty to grapple in getting even their most basic needs. Deprivation in rural areas contribute significantly to the nation’s poor health status and has impacted the availably of healthcare services (Sankar, 2003: 659). Today, accessing affordable, good quality and comprehensive health care in South Africa remains a real challenge for many (Gaede and Versteeg, 2011: 101). Since 1994, there have been significant improvements in the healthcare system, an example; free primary health care (Sankar, 2003: 659). According to section 27 of the Constitution the right to access healthcare services is guaranteed. It went as far as creating The Patients Rights Charter in 1996 which includes confidentiality and privacy as a sub heading (Gaede and Versteeg, 2011: 101). However, even with this law set in place many patients are still unaware or misunderstands their legal or ethical legal right to medical confidentiality (Sankar, 2003: 659),( Lammes, 2005: 903) . Despite the diminished state of medical confidentiality it still remains highly important among medical practitioners and patients. Effective treatment requires accurate information. Patients are mostly likely going to provide the information needed when they do not have to worry about any of their private information being publicly exposed (Gaede and Versteeg, 2011: 100),( Nass, 2009: 12) . Communication between doctors and patients has attracted an increasing amount of attention within health care studies over the past few years. Notably the doctor-patient relationship is one of the most complex ones. It involves interaction between two individuals; often personal information is disclosed and requires close cooperation from both individuals. Inter personal communication is still the primary tool which the doctor and patient exchange information (Sankar, 2003: 660). Information exchange consists of exchanging information to establish the right diagnosis and treatment plan. However a patient is not going to freely discuss personally information if they do not feel comfortable or feel that their information will not be kept discreet (Sewell, 2013: 17). Privacy has some deep historical roots, however because of its complexity; privacy has been difficult to define (Sankar, 2003: 660). The same as in the Xhosa society, the term â€Å"privacy† is frequently used, yet there is no universally accepted definition for the term. Confusion persists over the value, meaning and concept of privacy ( Nass, 2009: 15), ( Lammes, 2005: 908). Privacy has been depicted as a basic human right by man theorists (Lammes, 2005: 904), (Gaede and Versteeg, 2011: 100). However it is felt that privacy is also a requirement when wanting to develop interpersonal relationships with others. By giving people the ability to control who knows what and who has access to their information would alter their behaviour with different people, allowing them to maintain and control various social relationships (Nass, 2009: 15) . The South African society has placed a high emphasis on an individuals’ right to medical confidentiality. Medical records can include some of the most intimate details about a person’s life. They often contain information about a patients mental a physical health, personal relationships and social behaviours. It is strongly advised for staff to reassure their patients that their information is kept confidential. It has been proven that when patients perceive that their health services are not confidential, they are less likely to seek care or disclose vital personal information (Lammes, 2005: 904). Protection of personal information is key, as it is sensitive, potentially embarrassing and private. However, if personal information is breached, the individual may face potential harm. The patient could face social harm as a stigma may be created, which may result in a cause of social isolation. These articles show that the protection of health care information is vital for ensuring that individuals’ seek and obtain quality health care. Methodology This research report is shaped by themes such as privacy, privacy in Ikhwezi and privacy experienced by different cultures. However, the fundamental goal of this project was to help a local rural clinic Ikhwezi in Strand from privacy issues faced within the clinic among the staff and patients. Objectives were established to obtain this goal: Gather information about privacy. Gather information about Ikhwezi, the patients and staff. To find where Ikhwezi struggles with privacy by interviewing patients and staff. Explore different options to alleviate privacy issues. Propose an idea or solution The most important aspects of research will be to find possible solutions to alleviate the privacy issue faced by both staff and patients in Ikhwezi, with the hope by the end of the research a solution could be recommended. 3.1 Research Type Literature review The literature review will take care of correcting the theoretical material available on privacy and rural clinics in third world countries around the world. It helps to widen the scope of knowledge, strengthen thoughts to be more independent on the discussion of the evaluation of the effects of privacy. Necessary background information and current situations will be looked at in order to gain more insight and knowledge. Case Study Case studies allow for in depth descriptions of the studies which generate a richness of perceptions while exploring, recording and reflecting data recorded. Case studies are particularly useful when one needs to understand specific people, situations, a particular problem or a unique situation in greater depth (Trochim, 2013). Why Choosing a Qualitative Approach? This study is done in a qualitative informative research paradigm. The reason to why the qualitative methodology was selected to gather information was because a certain issue and problem needs to be explored for this study. A complete understanding of the issue is required; therefore empowering individuals to share their stories would be the way forward (Thagaard , 2003: 12). Qualitative research allows one to place yourself among the subject matter within ‘real life’ situations which could also be referred to as a ‘natural setting’. Qualitative helps provide insights into the setting of the problem and helps generate ideas or hypotheses for later quantitative research (Trochim, 2013). Qualitative methodology allows one to also obtain first-hand knowledge about the social world and experiences of people in Ikhwezi. It also develops the analytical and conceptual components of explanation from the data collected. Another reason to why the quantitative method was selected as a form of gathering research was because most of the patients in Ikhwezi we not English speaking and illiterate, therefore a verbal and more personal interaction with the community would benefit this study Participant Observation To gather the needed research, our group made a two hour visit to Ikhwezi. We were given a guided tour and we were allowed to walk around freely. According to Thagaard (Thagaard , 2003: 15) observation is based on an attempt to understand the culture from the inside by participating with the subjects of the study. The position as an outsider can contribute to a more distanced perspective on the other culture. This, further helped by gathering more in-depth insight towards the problems faced. References : Gaede, B and Versteeg, M. 2011. The state of the right to health in rural South Africa. SAHR. 9(1): 99-106. Lammes, B. 2005. Doctor-patient communication: a review of the literature. Elsevier Scienc. 40(7): 903-918. Medpages, 2015. Ikhwezi Clinic. Medpages. [Online]. Avaiable: http://www.medpages.co.za/sf/index.php?page=organisationorgcode=113375. [25 February 2015]. Nass, J. 2009. Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research. United States: Institute of Medicine. Ndingaye, X. 2005. [An evaluation of the effects of poverty in Khayelitsha: a case study of Site C]. Bellville: University of Western Cape. (Unpublished Masters of Arts in Development thesis). NRC, 2003. Who goes there?: Authentication through the lens of privacy.Washington, DC: The National Academies Press. Pearson, M., Wilson, H. 2012. Soothing spaces and healing places: Is there an ideal counselling room design? . Psychotherapy in Australia. 18(3): 46 – 53. Pritts J. 2015. The importance and value of protecting the privacy of health information: Roles of HIPAA Privacy Rule and the Common Rule in health research. Bookshelf. [Online]. Available: http://www.ncbi.nlm.nih.gov/books/NBK9579/#a20016f79rrr00082. [20 February 2015]. Rose, D and Charlton, K. 2001. Prevalence of household food poverty in South Africa: results from a large, nationally representative survey. Public Health Nutrition. 5(3): 383–389. Sankar, P. 2003. Patient Perspectives on Medical Confidentiality. J Gen Intern Med. 18: 659-669. Sewell, J. 2013. Overcoming barriers to HIV testing in the UK: Lessons from Kenya, Zimbabwe and South Africa. Mediscript Ltd. 13(4): 14-18, Winter. Trochim, W. 2013. Qualitative Measures. Research Methods and Knowledge Base. [Online]. Available: http://www.socialresearchmethods.net/kb/qual.php. [20 February 2015]. Whitman, J. 2004. The Two Western Cultures of Privacy: Dignity. Yale law school. 113(1):1553-1221. Fall. The Trojan Horse Virus: An Overview The Trojan Horse Virus: An Overview Another type of malware that is not technically a virus because there is usually no auto-replication is a Trojan horse program, which seems to be something useful, as a free utility, but actually contains some kind of malware. The unhappy about a Trojan program that is running the software users willingly and still do not know what is causing problems on their systems. Rootkits are a form of Trojan horse programs that can monitor the traffic from a computer, monitor keystrokes and capturing passwords. Are the most modern backdoor on one system and are between the most insidious Trojan horse software because they can mask that the system has been compromised by changing the file system and drivers needed for the normal operation of the computer. Viruses A virus is a program that spreads, replicating it in other programs or documents. Its only purpose is to interrupt the operation of your computer or network by deleting or corrupting files, disk formatting or by using large quantities of computer resources. Viruses and worms that spread through e-mail attachments were common place for years. They are simple to avoid; just dont open any attachments from emails sent by someone who you arent expecting a message. Even if you know the sender, careful; malware programs may use address book from an e-mail program to send messages, causing you to believe that the message is safe. In fact, most virus scanners detect a virus or worm contained in an e-mail message and often excludes the annex before it ever reaches your Inbox, but if the virus is very new, it cannot be detected. Worm A worm is similar to a virus that replicates automatically, but a worm does not attach to another program; indeed, it is a standalone program. Worms are now more common than viruses, because with the Internet and network connectivity, worms in general do not need help to spread. Whereas a virus requires a user to run the program that contains the virus to operate and then copy this file to spread a worm can do their work without any help and can propagate through a network connection available. Some insidious actions that a worm can commit include using the network bandwidth, deleting files, send e-mails and creating backdoors in computers. NETWORK SECURITY POLICY Without a security policy, the availability of your network can be compromised. The policy begins with the assessment of risk to network and build a team to respond. Continuation of the policy requires the practical implementation of change management and monitoring of network security for breaches of security. Finally, the review process modifies the existing policy and adapts the lessons learned. The last area of responsibility is the answer. While often network monitoring identifies a security violation, the security team members that are the real solution and fixing of such violation. Each Member of the security team should know in detail the security features provided by the equipment in its operational area. While we define the responsibilities of the team as a whole, you must define the individual roles and responsibilities of the security team members in your security policy. Approving Security Changes Security changes are defined as changes to network equipment that can have an impact on overall network security. Your security policy must identify the requirements of specific security configuration in non-technical terms. In other words, instead of setting a requirement as no outside sources FTP connections will be allowed through the firewall, set the requirement as outside connections should not be able to retrieve files from inside the network. You need to define a unique set of requirements for your organization. The security team should review the list of simple language requirements to identify issues of design requirements or specific network configuration. After the team created the network configuration changes necessary to implement the security policy, you can apply these possible future configuration changes. Although it is possible for the security team review all changes, this process enables them to only review the changes that risk sufficient to justify special treatment. We recommend that the security team to review the following types of changes: Any change in the firewall configuration. Any amendment (ACL) of access control lists. Any changes to the configuration of the simple network management protocol (SNMP). Any change or update software that differs from the list of approved software revision. We recommend that you also meet the following guidelines: Change passwords for network devices on a routine basis. To restrict access to network devices to a list of approved personnel. Ensure that the current revision levels of environments software network servers and equipment are in accordance with the security configuration requirements. Monitoring Security of Your Network Security monitoring is similar for network monitoring, except focuses on the detection of network changes that indicate a security breach. The starting point for security monitoring is to determine what constitutes a violation. Conduct a risk analysis, we identify the level of monitoring required based on the threat to the system. By adopting security changes, we identify specific threats to the network. Looking at both of these parameters, I will develop a clear picture of what you need to monitor and frequency. In risk analysis matrix, the firewall is considered a high-risk network, indicating that he should follow. In approving security changes section, youll find that you must monitor for changes to the firewall. This means that the SNMP polling agent should monitor things such as failed login attempts, unusual traffic, changes to the firewall, access granted to the firewall and configuration of connections through the firewall. Following this example, create a monitoring policy to each area identified in your risk analysis. We recommend that the equipment of low risk, medium risk equipment weekly and daily monitoring equipment high-risk per hour. If you need more rapid detection, monitor in a short time interval. Finally, your security policy should address how to notify the security team of security breaches. Often, your network monitoring software will be the first to discover the breach. It should trigger a notification to the operations centre, which in turn shall notify the security team using a pager number, if necessary.

Sunday, January 19, 2020

Turkeys Strategic Geographical Location In The World of Geo-Politics E

Turkey's Strategic Geographical Location In The World of Geo-Politics The country of Turkey, slightly larger than Texas in size (780,580 sq km), lies on the southeastern side of Europe and the southwestern side of Asia.? It borders the Black Sea, the Aegean Sea, and the Mediterranean Sea.? Land wise, Turkey is bordered to the northwest by Bulgaria and Greece, to the east by Azerbaijan, Armenia, and Georgia (all three part of the former USSR) and Iran, and to the south by Iraq and Syria.? Strategically located, Turkey controls the Turkish straights including the Bosphorus, Sea of Marmara, and Dardanelles.? Because Turkey is positioned on an area where Europe meets Asia and is very close geographically to Africa, the country provides a link between these three continents. The European part of the country is named Thrace, while the Asian part is known as Anatolia.? Throughout history, Turkey, especially Anatolia, has been a prominent center of commerce because of its land connections to three continents and the sea surrounding it on three sides (?Tur key at a Glance?).? Additionally, Turkey?s geographical location plays an important role in the geo-politics of Europe and Asia not just as a crucial land bridge between Europe and Asia but as an integral part of the prosperous Mediterranean economy, a center for trade, and a critical link to the sea for Russia and the Ukraine.? In the past, Turkey?s geographic location has been the center of the Byzantine and Ottoman Empires and has acted as a fortress against an expanding Soviet Union and more recently an expanding Iraq (Larson). Turkey?s Role in ?Operation Iraqi Freedom? Within the past year, Turkey has played a vital role in ?Operation Iraqi Freedom. The United ... ...ews. 10 Dec. 2003 Stanford, Dick. ?Panel Discussion, Turkey's Relationship and Foreign Policy Issues with ?her Neighbors and the European Union.? 12 June 2003. Accessed on 22 Nov. 2003.< http://facweb.furman.edu/~dstanford/med04/topic3.htm> Stanford, Dick. ?Water Control Issues in the Eastern Mediterranean region.? 13 June ? 2003. Accessed on 22 Nov. 2003. ?Turkey at a Glance.? Google. 10 Dec. 2003 ?Turkey Belongs in Europe.? The Economist 7 Dec. 2003: LexisNexis Acadmic: News. ?10 Dec. 2003 ?Turkey, Iraq, Sign Protocol to Boost Trade.? Turkish Daily News 22 Nov. 2003: LexisNexis Acadmic: News. 10 Dec. 2003 Turkey's Strategic Geographical Location In The World of Geo-Politics E Turkey's Strategic Geographical Location In The World of Geo-Politics The country of Turkey, slightly larger than Texas in size (780,580 sq km), lies on the southeastern side of Europe and the southwestern side of Asia.? It borders the Black Sea, the Aegean Sea, and the Mediterranean Sea.? Land wise, Turkey is bordered to the northwest by Bulgaria and Greece, to the east by Azerbaijan, Armenia, and Georgia (all three part of the former USSR) and Iran, and to the south by Iraq and Syria.? Strategically located, Turkey controls the Turkish straights including the Bosphorus, Sea of Marmara, and Dardanelles.? Because Turkey is positioned on an area where Europe meets Asia and is very close geographically to Africa, the country provides a link between these three continents. The European part of the country is named Thrace, while the Asian part is known as Anatolia.? Throughout history, Turkey, especially Anatolia, has been a prominent center of commerce because of its land connections to three continents and the sea surrounding it on three sides (?Tur key at a Glance?).? Additionally, Turkey?s geographical location plays an important role in the geo-politics of Europe and Asia not just as a crucial land bridge between Europe and Asia but as an integral part of the prosperous Mediterranean economy, a center for trade, and a critical link to the sea for Russia and the Ukraine.? In the past, Turkey?s geographic location has been the center of the Byzantine and Ottoman Empires and has acted as a fortress against an expanding Soviet Union and more recently an expanding Iraq (Larson). Turkey?s Role in ?Operation Iraqi Freedom? Within the past year, Turkey has played a vital role in ?Operation Iraqi Freedom. The United ... ...ews. 10 Dec. 2003 Stanford, Dick. ?Panel Discussion, Turkey's Relationship and Foreign Policy Issues with ?her Neighbors and the European Union.? 12 June 2003. Accessed on 22 Nov. 2003.< http://facweb.furman.edu/~dstanford/med04/topic3.htm> Stanford, Dick. ?Water Control Issues in the Eastern Mediterranean region.? 13 June ? 2003. Accessed on 22 Nov. 2003. ?Turkey at a Glance.? Google. 10 Dec. 2003 ?Turkey Belongs in Europe.? The Economist 7 Dec. 2003: LexisNexis Acadmic: News. ?10 Dec. 2003 ?Turkey, Iraq, Sign Protocol to Boost Trade.? Turkish Daily News 22 Nov. 2003: LexisNexis Acadmic: News. 10 Dec. 2003

Saturday, January 11, 2020

Judgment and no conscience Essay

In Mary Shelley’s Frankenstein; the monster is not Frankenstein’s creation, the so-called monster, but rather Frankenstein the creator.  Society views monsters as ugly beasts that are a sigh of destruction and commonly depicted as having no since of judgment and no conscience.  However, not all monsters fit this common description.  Some monsters can hide beneath seemingly normal physical appearances.  In, Frankenstein, it is the creator who is the monster and not the creature.  The creature is a reflexion of the creator. Frankenstein is the monster for many reasons: first, he goes to charnel houses and searches around for body parts to create a perfect monster â€Å"Now I was led to examine the cause and progress of this decay, and forced to spend days and nights in vaults and charnel houses.† (56).  He was searching through body remains, he seems unbothered by the dead people that surround him, and in fact he almost is happy â€Å"suddenly a light broke upon me brilliant and yet so simple†(56). He’s happy finding the parts for his creation. Once Frankenstein has created his being he is appalled by it, † I had selected is features as beautiful. Beautiful! Great God†(60). He seems to finally see what he was creating and have become aware of the vast differences that common man will see in the creature. So, astonished by his creations grotesqueness he abandons it â€Å"Unable to endure aspect of the being I had created, I rushed out of the room, and continue the longtime traversing my bedchamber unable to sleep.† (61) Rather then Frankenstein being a normal parent he is monstrous and abandons his creation, he isn’t like human parents that don’t betray their babies they take care and nurture them. Killing is also trait of monsters. Frankenstein has a dream that he is talking to his father, â€Å"I’m not mad, I cried energetically; the sun in the heavens that was viewed my operations, and bear witness of my truth. I’m the assassin of those most innocent victims; they died by machinations.† (160). In Frankenstein’s dream he talks to his father about the killing he’s had to do to rescue the human race the room his own creation. When Justine was being framed for a murder she didn’t compete it was Frankenstein that new the true character. However he didn’t help her and as a result, she was sentenced to death. Frankenstein was a monster for not only abandoning his creature but for also killing, and picking through the remains of people. It is his hideous behavior that doesn’t resemble human nature; only a monster could be as monstrous as Frankenstein. Frankenstein’s creation the â€Å"monster† is grotesque looking ; he fits the commons monster description in terms of appearance, made up of dead peoples’ remains. The quote seen here just as Frankenstein created the creation â€Å"his yellow skin scarcely covered the work of muscles and arteries beneath; his hair was of luscious black, flowing; his teeth of pearly whiteness; but these luxurious only formed more horrid contrast with his watery eyes, that seamed almost of the same colors the dun white sockets in which they were set, his shriveled complexion and straight black lips.† (60). Later in the story he sees a little girl playing and when she starts to slip he saves her â€Å"Her foot slipped, and she fell into the rapid stream. I rushed from my hiding place; and with extreme labor from the force of the current, saved her, and dragged her to shore.† (125) He tries to save the little girl, however his act of kindness is taken as though he’s trying to kill the girl. And he is even shot at by the girl’s father. Because of this incident the monster becomes enraged that his efforts not only will go on praised but also will be shot out for them. Because his creator has abandoned him, the creature starts to take revenge on all of man, for being so cruel to him. The creation begins to take on more and more behavior that could be interpreted as monstrous, though it is not his fault. Frankenstein’s creation kills Frankenstein’s little brother, however it is not an act of a monster it is an act of a creature that has had no guidance and the fault of his killing belongs to Frankenstein, because he was the creator and should be the teacher in the guide is well. Frankenstein’s creation though it is called a monster isn’t the monster in Mary Shelley in the book Frankenstein that she was writing about. Frankenstein’s creation is no monster. He knows the difference between right and wrong. We can see this because he feels guilty when he does something that is wrong â€Å"No, guilt, no mischief, no malignity, no misery, can be found comparable to mine† (188). The creation also knows the difference between good and bad. This is seen in his final statements â€Å"Am I to be thought the only criminal, when all of human kind sinned against me?†(188) The monster also feels human traits such as hunger, and thirst. Feeling these traits is typically a and aspects of all humans. â€Å"Oh, that I have for ever remained in my native would, you’re known nor felt beyond the sensations of hunger, thirst, and heat!† (109). This is no monster, this is a creature created without guidance, which sees his way through books, and the watching of others. While some people would look at the creation and see him has a monster only for his grotesque nature, it is not his fault that he was made from dead corpses, which Frankenstein found at charnel housed and vaults. The monster is always trying to do well; he does not want to be shunned from society he wants to be accepted. The creature lives in the forest in the woods near a cottage and was resting when, â€Å"Her foot slipped, and she fell into the rapid string. I rushed for my hiding place; and, with extreme labor from the force of the current, saved her, and dragged her to shore.† (125) A being that is a monster would never try to save a life. Yet we see here Frankenstein’s creation saving a little girl. He’s no monster, for monsters don’t have the will to save, the will to keep life alive. This is not the only instance where we see the creation trying to help trying to make others happy. The monster though out the novel feels allot of sorrow and other human emotions, as he learns more he reflex on his own self in comparison to society. â€Å"I cannot describe to use the agony that these reflections inflicted upon me I tried to dispel them but sorrow only increased with knowledge blow, that I have for ever remained in my native would, you’re known nor felt beyond the sensations of hunger, thirst, and heat.† (109) Here Frankenstein’s creation is talking to us about sorrow he feels. He feels the sorrow because he knows he’s not accepted into society. A being that knows the difference between acceptances and non-acceptance cannot be a monster for monsters are hideous creatures that don’t know; they simply do. Frankenstein’s creation never simply does without thinking about the consequence, he feels guilty. â€Å"No guilt, no mischief, malignity can be found comparable to mine.† (188) Frankenstein is the true projection of what a monster is. He continually displays monstrous behavior. Picking though corpses isn’t something that someone who isn’t a monster would do. Frankenstein also abandons life that he creates; this is something that no parent would do. He also kills people; this is a true sigh of a monster. Although his body does not look like that of the typical â€Å"monster† he creates a reflexion of his inner monstrous identity though his creation. Frankenstein is thus trying to create the perfect depiction of him, a monster that is so great he will be able to have strength and also brains.

Friday, January 3, 2020

A Civil Action/ Irac Style Format - 1370 Words

A Civil Action FACTS: This movie, A Civil Action, is about a lawsuit that began with the death of twelve people, and eight of those twelve people were children. This all takes place in the little city of Woburn Wells, Massachusetts. This is a small city that has two companies that are located really close to the cities river. One company is called W.R. Grace Company and the other is Beatrice Foods. Jan Schlitnmann is the main attorney for the plaintiff’s side along with his partners; Conway, Gordon, and Crowley. The attorney for W.R. Grace was William Cheeseman, and the attorney for Beatrice foods was Jerome Fatcher. Anne Anderson initially told one of Jan’s partners her story and put many calls into their office. However, she never†¦show more content†¦Well, the families of Woburn Wells wanted no part of the money. They just wanted the problem fixed and an apology from the ones who caused this tragedy. Jan Schlichtmann initially didnt want to take the case because he doesnt think that there will be any money in it for him and his firm. Even though he goes and sees how much pain this company has caused to the people in Woburn Wells, he still doesnt care because of the money. Not until he realizes how big the companies are does he take the case. The firm took the case and went to work. The first hearing ruled that Beatrice Foods wasn’t to be held accountable, just W.R. Grace Company, There were many scientific and complex tests that had to be run in order to prove that the water was contaminated by W.R. Grace. This was all at the cost of Schlichtmann’s firm. As the case goes on he isnt able to achieve what he ultimately wanted to do because the Grace Company has so much money that they will almost always win. Schlichtmann’s firm goes into debt trying to win this case but ultimately has to settle because they cant go on. Schlichtmann ended up settling with W.R. Grace for 8 million dollars. After all debts are paid (all of the equipment that was rented, the Dr.’s that ran the tests, the scientist’s, etc.) and the fee for Schlichtmann’s firm, the families were awarded $357,000 per family! This made the families very upset. Not because of the amount of the