Tuesday, December 31, 2019

The Theme Of Good And Evil In Bless Me By Rudolfima Anaya

There are a lot of good in the world, but there may also be a lot of evil that exists. This story written by Rudolfo Anaya discusses about a young man and an elderly lady attempting to end the battle amongst good and evil that is happening through their town during World War II. In the novel Bless Me, Ultima Anaya uses characters to explore the true meanings of good and evil by comparing those that believe and those who don’t believe, death of Lupito and Narciso, and including characters that are both good and bad. It can be seen in the novel that Anaya uses animals as a way to symbolize good and evil. He uses an owl to represent Ultima, and to portray as a good character. Many people believe that Ultima is truly a bruja simply based†¦show more content†¦Lucas enters the forest where he sees the Trementina sisters dancing as fireballs and casting evil spells. This shows that the Trementina sisters and Tenorio are the truly the ones that are evil. Besides all the good and evil mentioned in this novel Antonio learns about all this with the guidance of Ultima leading him through it. Another example of Antonios sense of development in good and evil is his home. It is means a lot to Antonio, because the people living in it makes him feel protected and provide warmth to him. When Tenorio and his men came to his house to take Ultima away, Antonio’s father You walk on my land! That is my business (Anaya 130). This make Antonio feel that he would be protected by the presence of his father., Gabriel. However, Antonios mother made home very fond and ardent for him. She had always been affectionate towards him and would show him care. Most importantly, Ultima was the one who contributed to the goodness of Antonios home. She made Antonio feel as though her presence filled the home with love and safety. It was Ultima who calmed Antonio down after he had seen Lupito die. Whenever he had a nightmare, Ultima would always be right beside to comfort Ant onio and could sleep again (Anaya 34). Ultimas fearlessness against Tenorio and his three daughters made Antonio feel that he would be safe wherever Ultima was. Overall, the

Monday, December 23, 2019

The s Equations Of The Universe - 1401 Words

Isaac Newton, famous for his equations of the forces of the universe, has been put to the test by Einstein himself. Although Newton has found the numbers and equations to describe gravity and the way nature is, he has not figured out how it really works. Einstein noticed this, and learned that space, gravity, and time work together like a Spiral Wishing Well. He says that space is flat with no matter, but when there is matter, like the earth, the fabric of space warps and curves. One must imagine the hole of the Spiral Wishing Well as the earth and the penny rotating around it is like the moon to see how space warps and how the medium that affects gravity is space itself. With this in mind, many other theorists and physicists began†¦show more content†¦After this discovery, many started to ask where are these other dimensions? A man named Oskar Klein found a way to answer this question in 1926. He stated the dimensions come in two different kinds. One is the dimension s we see with our own eyes, and the others are tiny, minuscule curled up dimensions that we cannot see. This idea reveals that deeply tucked in the fabric of space itself, there could be other dimensions. In result, the theory called the Superstring theory was discovered. Superstring theory tries to describe the basic and fundamental components that make up everything in the world around us. The idea can be described by looking at an object such as a pencil and trying to find out what its made of. When one looks deeply, there are atoms, and then electrons and protons, and then finally quarks. This is where conventional ideals stop. However, due to Superstring theory, there are actually more past quarks. Deep inside these particles, there is a dancing thread of energy. It looks like a vibrating string on a guitar and can also vibrate in different patterns just like guitar strings do. They do not make musical notes, instead, they produce the different particles making up the world around us. If these ideals are right, this is what the tiny, microscopic landscape of the universe looks like. It is made up of a large amount of minuscule fibers of vibrating energy that vibrate in various frequencies. TheseShow MoreRelatedScientific View of Creation and the Big Bang Essay1449 Words   |  6 Pagesby most scientists as the explanation of the beginning of the universe. The big bang theory suggests that the universe was once extremely compact, dense, and hot. Some uncommon event, a cosmic explosion called the big bang, occurred about 10 billion to 20 billion years ago, and the universe has since been expanding and cooling. The theory is based on mathematical equations, known as the field equations. These equations come from the general theory of relativity, established in 1915Read MoreThes Equations Of The Universe1749 Words   |  7 PagesIsaac Newton, famous for his equations of the forces of the universe, has been put to the test by Einstein himself. Although Newton has found the numbers and equations to describe gravity and the way nature is, he has not figured out how it really works. Einstein noticed this, and learned that space, gravity, and time work together like a Spiral Wishing Well. He says that space is flat with no matter, but when there is matter, like the earth, the fabric of space warps and curves. One must imagineRead MoreThe Objectivity Of The Enlightenment1156 Words   |  5 Pagesthrough Thomasina’s equation. â€Å"Each week I plot your equations dot for dot, x’s against y’s in all manner of algebraical relation, and every week they draw themselves as commonplace geometry, as if the world of forms were nothing but arcs and angles. God s truth, Septimus, if there is an equation for a curve like a bell, there must be an equation for one like a bluebell, and if a bluebell, why not a rose?†(Stoppard, 37). Thomasina’s ultimate goal is not to find a mathematical equation that expressesRead MoreThe Ontological Argument Made By Anselm1365 Words   |  6 PagesThe ontological argument made by Anselm was criticized by one of his contemporaries, a monk named Gaunilo, who said, that by Anselm s reasoning, one could imagine a certain island, more perfect than any other island, tf this island can exist in the mind, then according to Anselm, it would necessarily exist in reality, for a perfect island would have this quality. But this is obviously false; we cannot make things exist merely by imagining them. Anselm replied, upholding his argument by sayingRead MoreScience Fiction : Extraterrestrial Life1601 Words   |  7 Pagesreal world. They all have varying ideas of what we expect from extraterrestrial life, how we would interact with aliens, and what kind of technology it would require to find them or what they would have. The idea of other intelligent life in the universe is not a s farfetched as some people think it is. Scientists have been searching habitable planets for years using advanced telescopes to observe planets outside of our solar system. Planets can be found by observing if a star â€Å"wobbles† (Fuller-Wright)Read MoreBill Bryson Reading Assignment Essay1405 Words   |  6 Pages What do astronomers think the universe was like the instant before the Big Bang? Astronomers believe the whole universe started with that we re shrunk to a billionth of its normal size into a place infinitesimally tiny. Then you must pack that minuscule space about an ounce of matter. Then you are ready to start the universe. To imagine this you need to gatherRead More Albert Einstein Essay829 Words   |  4 Pagesexplanation of the photoelectric effect quot;and other contributionsquot;; however, the announcement of the award was not made until a year later, in 1922. His theoretical work suggested the possibility of creating an atomic bomb. His discovered equation, E=MC2 is well known as one that changed the world. Einstien was born March 14, 1879 at Ulm in Wberg, Germany. He grew up in Munich and later in Italy, and received his higher education in Switzerland. At age 17 he renounced his German citizenshipRead MoreDepression And Its Effects On Depression1325 Words   |  6 PagesSo the whole thing is about depression, and about how to overcome it. There is a secondary story running throughout about how DC comics works and Morrison s critique of that but it also serves the depression metaphor. So the whole thing starts with a dead god. That s pretty heavy, and it is a dead god of war at that. Must mean that war is won - and the good guys lost. So he wasn t killed with a regular bullet - he was killed with a bullet from the future (and as we learn later) an idealized protoRead MoreThe Big Bang Theory Essay1208 Words   |  5 Pagesalso somewhat misunderstood. One on these misconceptions is that it explains the universes origin, a statement that is not quite true. The Big Bang Theory is an attempt in explaining how the universe has been developed, not what initiated such a creation. (Strickland, 2008) The basics of the theory can be explained with reasonable simplicity, in that essentially, all of the current and past substance in the universe came into existence at the same time. At one point about fifteen billion years agoRead MoreThe Genius Of Sir Isaac Newton1687 Words   |  7 Pagesonce said â€Å"If I have done the public any service, it is due to my patient thought†. Isaac Newton transformed the way people saw the universe in the 1600’s because of his law of universal gravitation, his laws of motion, and other discoveries and inventions. Isaac Newton s law of universal gravitation and planetary motion shed light on the clockwork of the universe. Newton’s discoveries about gravity all began while he was sitting under an apple tree. one of the apples fell from the tree making

Sunday, December 15, 2019

Nora’s Individualism Free Essays

Nora’s Individualism Women in the 19th century live in the shadows of men. They don’t have occupations. Their gender role was to cook, clean, shop for the household, and to care for the children. We will write a custom essay sample on Nora’s Individualism or any similar topic only for you Order Now They were expected to find a suitor; this man would take care of the family financially. Women were submissive to their husbands back then. They didn’t stand up for their rights or voice their opinions. Women catered to their husbands. Nora is submissive to Torvalds’s needs. The play is about Nora’s behavior to her husband. She submits to him and is a mother to their children. She is unhappy as a caretaker. She over enthusiastic personality throughout the play seems forced. She feels she has no purpose in life, being a mother or housewife isn’t fulfilling her needs. She lacks being a mother the nannies constantly look after the children. She is searching for her true self subconsciously in the beginning of the play. Due to her upbringing, Nora has been raised to live under a man, to be submissive to them. Nora doesn’t know any other way than being an oppressed woman. The way Nora grew up influences her behavior now as an adult. She grew up wealthy, her father took care of her, and then she married Helmer at any early age. Nora says to Torvald † When I lived at home with Papa, he gave me his opinion about everything, she had the same opinions and if I didn’t I keep my mouth shut he wouldn’t have liked it. And then I came to live in your house. I was Just passed from Papa’s hands to yours. You arranged everything according to your own taste, and I choose the same tastes as you. Or else I pretended to† (Ibsen 1167). Nora was raised by her father to live under a man. She transitioned from living with her father and now to her husband, Torvald. Through this realization she isn’t content with her well-being. Nora appears to be happy on the outside, she is not deep inside. Her personality is over exaggerated to all. It’s apparent that it is ungenuine. She is quite giddy about small things, such as showing Torvald the items she bought. Nora says, â€Å"But come here and let me show you what I bought. And all so cheap! Look a new suit for Ivar, and a sword, a horse and a trumpet for Bob, and a doll and a doll’s bed for Emily’ (Ibsen 1122). She doesn’t ave anything exciting going on in her life, she has to focus on something no matter how minute it is. The only excitement she has is hiding the secret from Torvald. Which isn’t excitement at all, she fears he will find out about it. That’s why Nora keeps up her charade of shopping for her children and the household. That’s what she use to do before borrowing the money. This loan has given her purpose; she has to find ways to pay it back. She has done side Jobs and started being more frugal about her money she gets from her husband. Through this experience she realizes she is nhappy in her marriage. Her husband’s expectations of her are too high with a lack of love and care for one another on an intimate level. She has to live up to her husband’s standards of being a trophy wife. Nora is not satisfied with knowing that Torvald Just cares about the outward appearance ot ner and the tamily, and not the love they should share with each other. Torvald wants to have the appearance to others they are well put together. He focuses on small things like Nora dancing the Tarantella. It must be perfection in his eyes, he wouldn’t settle for anything less. He makes her practice it numerous times and gets quickly frustrated with her when she doesn’t perform the moves correctly. He should focus on her feelings, not worrying about his wife’s outward appearance. Torvalds’s narcissism makes it difficult for Nora to be happy in their marriage. She likes materialistic things but cares about her marriage more. She forged her signature on a formal document for a loan to travel to Italy to save her husband’s life when he was ill. She shows her love to him by getting this loan in secret and by taking care of their children. What has Torvald done lovingly for Nora? That is the issue; he hasn’t done anything loving or romantic for her. Women need their love shown by spending quality time together, not by getting money to buy gifts. Torvald see’s providing for his wife as sustainable to keep their relationship going. Women like to hear that men love them and to be shown that they are loved through actions. Nora is unhappy with Torvalds’s behavior. Their marriage is for show and spurious in Nora’s perspective, she is unhappy. She feels there is no substance or closeness there. They don’t share intimate details with one another. Torvald is always concerned about work, while Nora is looking after the children or preparing for an event they will attend in the near future. Torvald isn’t aware of Nora’s unhappiness in the most of the play because Nora masks her feelings. She expresses herself when she can’t hold her feelings in about their lack of a marriage anymore. Nora realizes that nothing is going to change in her life and she won’t settle for less. Nora has gone on for eight years doing what Torvald expects of her. She is willing to makes a change for her happiness. Nora begins to tell Torvald that their relationship lacks a good solid foundation based on trust and concern for one another mutually. Nora says you have never understood me. IVe been treated badly, first by Papa and now by you (Ibsen 1167). She has a husband who she hardly knows and won’t accept it. She no longer has the interest in being a wife or a mother. She decides to leave it all to figure herself out. Nora tells Torvald, Duties to myself. I believe that first and foremost I’m a human being, Just as you are, or at least I have to try to become one. I can’t be satisfied with what most people say or with what’s in books. I have to think things through for myself and come to understand them (Ibsen 1168). Nora has decided to leave her old life to discover a new one. She is willing to sacrifice her children for her happiness. What is more realistic? For a woman to have children and be in an unhappy marriage or abandon her children and pursue her desires? Nora pursues herself she no longer has interest in taking care of others. Nora leaving her husband in the 1800’s is unheard of. Women didn’t venture from their roles as a wife and a mother. Ibsen’s play got negative attention, being that his main character did the unthinkable at the end of the play; leave her family for her goals. The play leads the audience to believe she doesn’t need her husband anymore. That she is strong and will discover her needs and aspirations. Nora has gone through a transformation of being an oppressed women to now caring about herself. She has had to make a drastic change to start a new Journey to meet her new goals. I’m proud of Nora for standing up for herself. She went against the grain of all women and explor ed her dreams. How to cite Nora’s Individualism, Papers

Saturday, December 7, 2019

Transactions Parallel Distributed Systems †Myassignmenthelp.Com

Question: Discuss About The Transactions Parallel Distributed Systems? Answer: Introduction Webbs Stores that operates in Australia and New Zealand has decided to integrate cloud computing in their daily operations. In order to do so, they are planning to close their Auckland data center and the existing data center would be moved to cloud (Li et al., 2015). The report discusses the risks and security issues associated with a hybrid cloud approach. The different risks and associated with backing up of data to cloud and the effects on cloud backup on their DR plan are elaborated in the following paragraphs. Migration of MS SQL Server 2012 R2 database to IaaS Webbs Stores is planning to migrate their MS SQL Server 2012 R2 database to an IaaS instance in a hybrid cloud environment. However, there are certain risks associated with storing the database in a hybrid cloud environment and therefore, proper risk mitigation policy is needed to be undertaken. The major types of security that Webbs Stores can deploy in order to protect the critical database are encryption of data and authenticated use of data apart from other strategies, which include data masking and back up of the data (Hashizume et al., 2013). Encryption is a process of converting a data into cipher text or unreadable text in order to prevent the unauthorized use and access of data. Through the process of encryption, the electronic data is converted into cipher text. The primary aim of enabling an encryption process in to protect the confidentiality of the digital data stored over the cloud, in this case, it is the database of Webbs Stores. Different encryption algorithm can be used in order to severe the database. Confidentiality of data is one of the primary aims of encryption and therefore, this method will be very effective in securing the database (Malawski et al., 2013). Authentication is often used to ensure that only the registered candidates are allowed to access the data. Authentication allows any user to access the data only if he is registered to use that data. Different authentication techniques can be used to protect unauthorized use and access of data (Boyd Mathuria, 2013). Therefore, the Webbs Stores must necessarily deploy these two security techniques as a primary security feature. Although the hybrid environment is safe to be used, the Webbs Stores must implement these two security essentials for securing their data after moving their MS SQL server 2012 R2 database to an IaaS instance in cloud. Benefits and Issues with the deployed security measure The security measures deployed for securing the data in cloud approach is encryption and authentication. The different benefits that is associated with the deployment of these information security are as follows- 1) Security of all data types: Data is generally more vulnerable when it is moved to a different location. The same is the case for Webbs Stores as well. Encryption works in the process of data transferring as well. The protects the data from being stolen, as even if an attacker gets access to the data, it would be unreadable for them since it is encrypted (Chen Zhao, 2012). 2) Data Integration is maintained in Encryption: Maintaining the integrity of data is essential. Encryption helps in maintaining the integrity of the data (Doan, Halevy Ives, 2012). 3) Privacy of data is protected: The personal and the confidential data of the Store is properly protected through the method of encryption. This is possible because, with the method of encryption only the authorized person is able to access the data (Zissis Lekkas, 2012). Apart from this, deployment of these security standards would further allow other advantages that are discussed below- 1) Flexibility: the deployment of this security policy would offer a high flexibility in the use of database. 2) High security: the process of encryption coupled with the authentication provides high security of the database (Arora, Parashar Transforming, 2013). 3) Cost Effective: The deployment of this security policy is a cost effective solution with a very low maintenance cost. However, with these advantages, there are certain issues that are associated with the process of encryption and authentication. The issues associated with the security measures of the organization is listed below (Tao et al., 2014)- 1) Complex structure: The method of encryption is complex and therefore proper research is necessary for implementing this structure. 2) Brute Force Attack: It is a method of trial and error method that can be used by an attacker to decode an encrypted data stored in a database (Wei et al., 2014). Therefore, it can be said that the process of encryption is associated with the risk of Brute Force attack as it can result in data leak and loss of data. These are the two major issues associated with the security measure deployed by the organization apart from the other minor issues that includes, the method of data storage, and process of proper encryption of the data (Garg, Versteeg Buyya, 2013). Risks Associated with the migration of database to cloud There are certain risks that are associated with the migration of database in cloud. Furthermore, Webbs Stores is planning to migrate their MS SQL server 2012 R2 database to an IaaS instance in cloud. The risk associated with the migration of the database in cloud environment are listed below- 1) The major risk in migration of data to a cloud database is the risk of data loss. This is because, migrating the whole R2 database is prone is very complex and if proper measures are not taken, few or all data may face this risk (Hashem et al., 2015). Therefore, Webbs Stores must ensure proper strategic plan before the migration of data in order to avoid this risk. 2) Another risk associated with migrating the database to IaaS instance is data loss due to corruption of data. This is a common risk associated with data migration and therefore, proper measures are needed to be taken by the Webbs Stores in order to eliminate the risk of data corruption. The Risk IaaS Infrastructure The different risk associated with the migration of Webbs Stores MS SQL server 2012 R2 database to an IaaS instance are listed below- 1) Privacy and security Risk: One of the major concerns associated with adopting the IaaS infrastructure is security of confidential data. This is because, the database is hosted on a public server managed by a vendor, and therefore Webbs should ensure that the vendor is trusted enough to protect the data from unauthorized access. This risk can be termed as risk from insider as well (Hashizume et al., 2013). Since the vendor would be able to access the data, it is essential for Webbs Stores to keep a track of their database. 2) Risk of downtime and technical difficulties- The IaaS Infrastructure is a bit complex and therefore, it is probable that the structure would face technical difficulty, which may freeze the operational work of the Store. Furthermore, the whole IaaS setup is largely dependent of an internet connection and therefore, any connectivity or network related issue might render the entire setup useless. 3) The risk of Vulnerability: Any cloud-based solution has a high chance of being attacked or exploited by malicious users and hackers. Nothing is completely secure on internet and the interdependency of cloud systems may lead to the loss and leakage of important data (Zissis Lekkas, 2012). 4) Limited Flexibility and control: Another issue associate with the IaaS instance is that, it is controlled by a third party vendor and therefore, it offers little control and low or negligible flexibility. 5) Denial of Service Attack: The cloud storage is prone to external attack, one of which may be denial of service attack. This attack is generally implemented to make the resources unavailable for the legitimate users. Public cloud environment is more prone to this attack (Malawski et al., 2013). The Risk in communication between Webbs and IaaS database The different risks that is associated with the communication between Webbs and iaaS database in cloud are listed below- 1) The major risk associated with the communication is that, an attacker can intercept or breach the data during an ongoing communication. 2) The data might be lost due to some technical error while an ongoing communication. This is another risk associated with communication (Fernando, Loke Rahayu, 2013). 3) Any technical error may render the data unavailable, thus freezing the operations of the Webbs Stores. Risk associated with data archival and Data back up i) The risks associated with the backing up of data in the cloud are listed below- Security: One of the major concerns or risks in backing up of data in cloud is the security risk. This is because, while backing up of data in cloud, The Webbs Stores will have to rely on the IaaS Vendor thus inviting a risk of unauthorized access of data (Gonzalez et al., 2012). Data Loss: The cloud storage while backing up of data, overwrite the previous version of the files, which saves the time and bandwidth. However, this leads to the delete of the previous versions of the data and in case if the Store needs an old data, it may find itself in a problem (Hashem et al., 2015). Therefore, the procedure of backing up of data leads to data loss. ii) The risks associated with the storage of data in cloud after backing up described below- Security Risk: Since the vendor has access to the data stored in IaaS infrastructure, there is a high possibility of security risk and data loss. The chances of sensitive and confidential data being stolen are high in storage of data in cloud (Wei et al., 2014). Lack of data Standardization: The data stored will be can be accessed by the third party vendor and there is lack of proper standardization and protocol in limiting the access of data. This is another concern of data storage in a cloud environment (Dinh et al., 2013). Data Theft of data loss: another major concern associated with the storage of data in the cloud environment is that it is prone to data theft. Malware infections: Third party vendors use cloud services for data ex filtration, which can result in malware infections (Chou, 2013) iii) The risk that Webbs Stores might face while retrieving the data are listed below- Snooping: One of the major risks associated with the retrieval of data in cloud is snooping. The stored data is transmitted over internet, which is a primary risk factor. The possibility of intercepting of data on route is high during the data retrieval and therefore it possesses a significant amount of risk (Leippold Lohre, 2012). Data leakage: Retrieval of data is dependent is largely dependent on internet connection and therefore, the risk of data leakage is considerably high during the data retrieval. Cloud back up and DR plans The disaster recovery concept in cloud involves the storage and maintenance of the copies of electronic records in cloud environment. The primary aim of DR is proving an organization a way to recover its important data in case of data loss (Li et al., 2013). The migration of the entire database to cloud will definitely help in developing a better DR plan for Webbs Stores. This is because, the process of data recovery us very simple in case of cloud environment (Phillips, 2015). The primary advantage of migrating the data in cloud and deploying a cloud back up strategy is that it keeps a copy of the data in an offsite server as well (Rahimi et al., 2014). The Iaas infrastructure allows this facility of periodic data backup and therefore, data recovery becomes easier. The backup and restore strategy will definitely change as a result of this service. This is because the process of data recovery and back up in cloud is very simple and Webbs Stores need not have to worry about the backup as well. This is because; the cloud provider will control the regular data backup (Sanaei et al., 2014). A proper DR plan eliminates the risk of data loss during migration, retrieval or storage. Therefore, this strategy will be helpful for the Webbs Stores in data recovery. Access protection on moving to cloud Access control and access protection is very essential for protection of data from unauthorized access. Access control limits the access of data only to the authorized person thus eliminating the risk of data theft and data loss. The recommendation for protecting the access to IaaS infrastructure, database, cloud network infrastructure and cloud backup and restore are elaborated below (Khan, 2012)- IaaS Infrastructure The IaaS infrastructure should be properly protected in order to avoid the risks associated with the loss of data and data theft. The recommendations for ensuring access protection for IaaS Infrastructure are elaborated below- 1) Controlling the physical access to the IaaS infrastructure is an effective method of ensuring access control in IaaS Infrastructure. Use of multifactor authentication, which includes OTP, tokens and smart cards, will help in reducing the risk of unauthorized access to the infrastructure. 2) The access of IaaS infrastructure with unsecure API is one of the primary reasons of malware infection and data threat. Only secure and authorized utilization of API should be ensured in order to protect the data in IaaS infrastructure (Xiao, Song Chen, 2013). MS SQL Server 2012 R2 Cloud Instance The contents of MS SQL Server R2 cloud instance can be protected ensuring a proper access control methodology. The access control procedures recommended for SQL server are elaborated below- 1)Only the registered users should be able to access the database. This should be controlled by the Webbs Stores to ensure that an employee with a sufficient permission will only be allowed to access the database and the servers. 2) Proper encryption standards can help in preventing the unauthorized access to the data. The person having the decryption key can only decrypt encrypted data and therefore, this strategy helps in controlling the access to the database (Biham Shamir, 2012). Cloud network infrastructure The recommendations in ensuring the access control in cloud network infrastructure are listed below- 1) The only useful approach of ensuring the access control in cloud network infrastructure is monitoring the cloud database server. This will help in keeping a tract of users accessing the data and can further help in eliminating the risk of data theft (Whaiduzzaman et al., 2014). 2) The cloud network infrastructure would be accessible to the cloud service vendor and therefore, protection against the internal threats is necessary (Rittinghouse Ransome, 2016). The traffic in the system should be regularly monitored and any suspecting communication or transaction should be immediately tracked. Cloud backup and restore infrastructure The recommendations from protecting the access to cloud backup and restore infrastructure are listed below (Rahimi et al., 2014)- 1) One of the most useful security measures for protecting the access to backup data is to encrypt the data. The encryption will help in preventing any unauthorized access to the backup data (Avram, 2014). 2) The process of data restoring should ensure password protection. This indicates that the data restoring will be enabled only after providing a valid password (Botta et al., 2016). Conclusion Therefore, from the above discussion it can b concluded that the migration of database to an IaaS instance would definitely benefit the Webbs Stores. However, there are certain issues that are associated with the data migration that should be properly dealt with. The report provides certain recommendation in ensuring data protection in hybrid cloud and secure access of data. References Arora, R., Parashar, A., Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms.International journal of engineering research and applications,3(4), 1922-1926. Biham, E., Shamir, A. (2012).Differential cryptanalysis of the data encryption standard. Springer Science Business Media. Boyd, C., Mathuria, A. (2013). Protocols for authentication and key establishment. Springer Science Business Media. Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 647-651). IEEE. Chou, T. S. (2013). Security threats on cloud computing vulnerabilities. International Journal of Computer Science Information Technology, 5(3), 79. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Doan, A., Halevy, A., Ives, Z. (2012). Principles of data integration. Elsevier. Fernando, N., Loke, S. W., Rahayu, W. (2013). Mobile cloud computing: A survey.Future generation computer systems,29(1), 84-106. Garg, S. K., Versteeg, S., Buyya, R. (2013). A framework for ranking of cloud computing services.Future Generation Computer Systems,29(4), 1012-1023. Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Nslund, M., Pourzandi, M. (2012). A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications, 1(1), 11. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., Khan, S. U. (2015). The rise of big data on cloud computing: Review and open research issues.Information Systems,47, 98-115. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing.Journal of Internet Services and Applications,4(1), 5. Khan, A. R. (2012). Access control in cloud computing environment. ARPN Journal of Engineering and Applied Sciences, 7(5), 613-615. Leippold, M., Lohre, H. (2012). Data snooping and the global accrual anomaly. Applied Financial Economics, 22(7), 509-535. Li, J., Li, Y. K., Chen, X., Lee, P. P., Lou, W. (2015). A hybrid cloud approach for secure authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 26(5), 1206-1216. Malawski, M., Juve, G., Deelman, E., Nabrzyski, J. (2015). Algorithms for cost-and deadline-constrained provisioning for scientific workflow ensembles in IaaS clouds.Future Generation Computer Systems,48, 1-18. Phillips, B. D. (2015). Disaster recovery. CRC press. Tao, F., Cheng, Y., Da Xu, L., Zhang, L., Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system.IEEE Transactions on Industrial Informatics,10(2), 1435-1442. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing.Information Sciences,258, 371-386. Zissis, D., Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592.

Friday, November 29, 2019

Form In Art Essays - Token, Sculpture, Pinniped, Shape, Wing, Seal

Form In Art The object in question is marked as a Syrian, Bronze Age, stone label seal (c. 3rd- 2nd millennium). Most of the seals I have viewed have much more representational forms on them than this object has. I have not been able to find any books which have pictures of items with this name, which leads me to believe that it has been marked wrong. The object resembles a small, oval shaped bead with indentations in the centers of the longer sides, making it look like the number 8. Both sides have the same, simple decoration of carved lines;(if the object is viewed with the hole through its middle going up to down rather than left to right) two vertical lines in the center and four horizontal lines on either side of these. One side of the object is flat, but the other side is convex. After viewing many pictures of seals and cylinder seals, I find it unusual that this object should be marked as a seal because the design of its decoration is so simple. It seems more likely that this object is what one definition calls a token or "a small, stone or clay bead worn on a string about the neck. Each token was a different size or shape and stood for different business transactions. An impression would be made in clay or wax signifying that the transaction took place."(1). These tokens were often only a shape that could be recognized as being different from other individual's token shapes, like a person's signature. The indentations and line decoration on the token make it resemble a pair of wings. The shape of the token's flat side and rounded side are like a human chest cavity. This could be a combination of human (skeleton) and spirituality (wings). There are many depictions of winged gods and goddesses in ancient Near Eastern art. Though this object is highly utilitarian and has little representational decoration, it seems likely that there would be a connection between its wing-like shape and the frequency of wings in other Syrian art. The shape of wings being repeated on a token used for business transactions seems to signify that the concept of wings is important culturally. This implies that the Syrian culture fused their religious beliefs with other aspects of their lives. One example of a similar shape used in a religious sculpture is of a North Syrian goddess with a bird's face from the 2nd millennium BC. The chest cavity and wings of this goddess sculpture have a very similar shape to the token. The lines on the wings of the sculpture radiate down to the edges of the wings like the horizontal lines on the token. The indented-oval shape is also repeated here. Shaping a tool (tool, meaning: the object in its metonymical sense), to look like a pair of wings, makes the object metaphorical. The object was made with simple decorations to only imply the shape of wings because it was a tool which identified a person or business with a quickly recognizable icon. This is much like a company logo would be today, though the significance of wings was probably used here because of its spiritual implications. One winged Near Eastern goddess, Inanna, was thought to be the bringer of bounty and fertility (2). In this case, using wings for a business tool may be thought to bring plentiful success to the user of the tool. Another example of wings being depicted in Syrian art is on a cylinder seal with a winged sun disk and lion attacking animals (1500-1300 BC). This example has more in common with the token metaphorically On this seal the winged sun represents male power; the strength of the lion defeating the other animals. The difference here is in the figure in the center of the wings. On the token, there are only two vertical lines between the wing shapes; a figurative "blank space". There is no actual body represented on the token, only the two lines, as if they are the space where a body could be. Any winged creature could be placed between the lines on the token. The space between those two lines makes the tool have a shifting metaphorical value. It is like a space to be filled whichever deity can best help with the business at hand. The lines could also imply that the user himself is winged, powerful like a god. The user of the tool can place himself between the lines. The minimal decoration

Monday, November 25, 2019

Adam Smith and the Wealth of Nations essays

Adam Smith and the Wealth of Nations essays The Nature And Sources Of The Wealth Of Nations Adam Smith has been regarded to be the father of modern economics, and many of his ideas have been integrated the nations in the present day western world. His major work was "An Inquiry into the Nature and Causes of the Wealth of Nations," where he discusses many of his economic views. Smith was born in Kirkcaldy, and raised by his mother, Margaret Douglas. His father, Comptroller of Customs in Kirkcaldy, died before Smith was born. Smith began his education at the University of Glasgow at the age of 14. He demonstrated a talent for math and physics, but his interest was in philosophy, to which he applied his analytical skills and tireless inquiry for the rest of his life. He later studied at Oxford, although he wasnt satisfied with the education provided at the famous university, and later returned to Scotland to lecture in Edinburgh. Smith gained fame as an intellectual in 1759, when he published of The Theory of Moral Sentiments, which was based on his lectures from Edinburgh and Glasgow, where he was Professor of Logic and then Professor of Moral Philosophy for thirteen years. Following his position at the University of Glasgow, Smith became tutor for the third Duke of Buccleuch in France and Geneva, where he met Voltaire and other philosophers. Perspectives gained during this time inspired Smith's work on Wealth of Nations Smith showed surprising conclusions during his time, when he applied scientific principles to economic behavior. One of his conclusions was that people mainly acted out of their own self-interests, and if permitted to follow their instincts, it created natural harmony and economic productivity. This would occur and was led without any conscious control or direction, as if by an invisible hand. According to Smith's "The Wealth of Nations," he stated the idea that a greater division of labor lead to increased p...

Thursday, November 21, 2019

Evaluate the following article; discuss the research methodology and Assignment

Evaluate the following article; discuss the research methodology and implications for research in homeopathy - Assignment Example lbum 200, which are both collectively referred to as â€Å"verum† in the study, actually proved to be therapeutic only when â€Å"the volunteers [from the observed situation] were advised strictly to take arsenic-free water during the course of investigation† (Belon et al. 2007, p. 142). This therefore means that â€Å"some doubt was expressed as to whether the improvement noticed was actually due to their intake of the arsenic-free drinking water or†¦the homeopathic remedies† (Belon et al., p. 142). The study being analyzed right now was based on this idea that is why the 2007 study did not try to use any arsenic-free water for the purpose of avoiding the same confusion as the first studies that used such homeopathic remedies. However, the constant use of arsenic-contaminated water may have actually interfered with the expected results of the study since the subjects kept on taking arsenic-contaminated water at the same time that they were taking homeopathi c remedies. Thus, there could have been a sort of constant progression of the diseases brought about by arsenic contamination at the same time that the individual is being treated using homeopathic remedies. The efficiency of the remedy could have therefore been affected by the continuous supply of the cause of the disease. Furthermore, since the arsenic levels in every individual is not accounted for or that there is no way they could possibly be accounted for, then the study is therefore not entirely controlled. Some individuals may obviously be receiving relatively more arsenic levels than others, thus the effects of the homeopathic remedies on them may be different. In fact, this could have been the reason for the withdrawal of many of the respondents from the study who claimed that they did not experience ameliorating changes in them. Another problem with the research investigation was that 39 subjects of 20 males and 19 females may not have been enough as a particular sample size to represent the whole

Wednesday, November 20, 2019

Trust and Customer Service Performance 312 wk 6 forum Assignment

Trust and Customer Service Performance 312 wk 6 forum - Assignment Example Reliability-based trust is based in the company’s discernments of a prospective partner’s real behavior and operating performance. It engrosses a notion that a partner is disposed to execute and capable of acting as promised. Efforts to create collaborative associations fail when supply chain partners cannot rely on their performance as promised. In simple terms, an organization that is alleged to be unable to act as guaranteed will be perceived as unreliable and thus not fit for the trust in the association. On the other hand, character-based trust is grounded on a company’s culture, philosophy and leadership. Principally, it originates from discernments that supply chain partners are interested in each other’s wellbeing and not work without putting into account the effect of their actions on the other partner. Character-based trust is critical in collaborative relationships because the partners in the relationship act in confidence that the other party will deliver up to anticipations because of the developed character of the association. In this case, the partners in a relationship do not feel susceptible to the deeds of one another. Needless to say, the partners believe that each will safeguard the other’s interest. For example, a manufacturer who shares ideas on new product launches with a merchant trusts that he or she will not give the idea to a

Monday, November 18, 2019

Mentoring as Part of Professional Development Essay

Mentoring as Part of Professional Development - Essay Example This essay discusses that within the professional development domains, mentoring works at producing magnanimous effects for the people who want to bring about a positive change within their working ideologies. If the aim is to set things in a corrective fashion, mentoring is the path that shall take one towards that. However, it comes with its own disparities. One such is the manner in which the mentoring is being undertaken. The professional development requires of the organizations to embed mentoring as a vital ingredient because it embodies the basis of success that any enterprise or corporate entity can achieve with the passage of time. It will also dictate how well the organization has been able to showcase its professionals and how these individuals have been shaped up to meet the desired goals and expectations which were of them in the first place. The mentoring role is such an important one that it has been talked about in different circles time and time again. The ones who p erform the art of mentoring are taken in a good stead and given the respect that they richly deserve. This is the reason why the mentor is seen as someone whom people look up to for help and assistance, and who brings with him a significant amount of experience and knowledge. The mentor is therefore given respect for what she does and how she is able to garner support from the people who believe in his mentoring. He is usually the one people look up to and seeks help in terms of their respective needs and requirements. The organizations have also started to branch out to such mentors because they know that these will bring in help for the employees and workers. These are in the form of counselors who are doing their best to bring sanity within the ranks of the employees and give them the help that they direly require. However, professional development can only come about when there are concerted efforts to do things right on the part of the person who is bringing that change within his own entirety. It just cannot happen overnight and the mentor can help only to a certain level. This is the basis of understanding how mentoring is and what roles are required for mentoring in the related settings. If such comprehensions are reached upon easily, there would be success for all and sundry, and the professional developments would be handled in an amicable way. What is Mentoring? Mentoring is defined as the formal or informal relationship between two people where one is a senior and another, a junior. It involves communication and is based on the premise of having a relationship – formal or informal. It is based on the personal developmental relationship perspective where an experienced or more knowledgeable person holds the torch for the one who is not that skilled and has little or less experience and knowledge. Since mentoring involves some form of empathy within the individual who is mentoring, it is the duty of the person who is being mentored that he lis tens and adapts to what the mentor has to say. It will then create a situation where both the mentor and the mentee are on the same page, and the process of mentoring will come about in full circle. This is so required because if the mentor and th

Saturday, November 16, 2019

Stakeholder management in tourism and hospitality

Stakeholder management in tourism and hospitality 2. Structure of the tourism and hospitality industry and role of stakeholders: (Burcu Ozgur, 2008) The stakeholders’ needs and demands are understood and responded to by organizations, based on the concept of stakeholder management. According to (Svendsen, 1998), the main role of stakeholder management is to protect the organization from the damaging impacts of the activities of the stakeholder. Some techniques like consultation, issue analysis, strategic communications, and formal contracts or agreements should be utilized by the organization. (Huber, Scharioth, Pallas, 2004), explained that organizations strive to gain the trust of the main stakeholders, who have a greater influence on them and with whom they have constructive interactions. For any organization, financial success is important and they will use any tools at the expense of the environment, members of staff, and/or local communities. This careless attitude will result in losses and damages in relationships with the stakeholders. The two significant variables for the decision on stakeholders by an organization are a) their possibility of threatening an organization and, b) their possibility of cooperating with an organization. The two relationship variables are cooperative potential and competitive threat. These two relationship variables reflect the capacity of stakeholders’ for cooperation and threat in a specific matter facing the organization. (Lim, Ahn, Lee, 2005), stated that companies can adopt four possible categories for stakeholder management: a) reactive, b) defensive, c) accommodative, and d) proactive. Depending on the stakeholder’s potential for threat and cooperation, companies decide their postures and strategies for stakeholder management such as a) leading, b) collaborating, c) involving, d) defending, e) educating, and f) monitoring. (Clarkson Centre for Business Ethics, 1999), developed a list of the essential principles of stakeholder management. The first principle highlights the requirement of identifying stakeholders’ legitimate interests, which will be used in decision making processes by an organization. The second principle refers to the need for communication between the organization and its stakeholders. The engagement with the stakeholder is required to reduce conflicts. The third principle reflects the idea that there could be differences with the involvement of stakeholders in the organization. While the organization may have official relationships with few of stakeholders, other stakeholders are approached in unofficial ways either through direct contact, press release or advertising. The fourth principle underlines the significance of balancing risks and rewards among various stakeholders impartially and observes the need of distributing benefits to all parties. The fifth principle highlights the need for cooperation with public and/or private entities with the sole objective to reduce risks related to corporate practices. The sixth principle relates the aspect of respecting human rights which are threatened by the present and future activities in an organization. The last principle brings the attention of managers to identify their own difference of interests to normalize stakeholder relationships in order to increase credibility of organization. 3. Strategic Stakeholder Management: Tourism’s Perspective One of the important generators of revenue is the Tourism sector which is also a job generating sector and serves as a medium of development. Tourism sector has gained great importance as it generates economic development and prosperity even in places which would not be used as an economic source. The industry’s coordinated actions; highly fragmented and diverse structure makes it special and successful. The tourism sector could be contemplated as a system. As (Mill Alastair, 2002) mentioned, there are many reasons to view tourism as a system. Some of them are: Interdependency in tourism i.e., all organizations in this sector are interrelated parts and work together to achieve common goals. Dynamic and constantly changing characteristics i.e. it be affected by outer influences such as political uncertainty, war, international relations, terrorism, technological developments, epidemics, and changes in demographic conditions. Complex sector with different types of activities and organizations. Intense competitiveness of tourism i.e. all kinds of tourism organizations have to vie with each other globally. Need for responsiveness. Tourism is a sector where many elements which are independent and any change in one element can cause changes in other parts. Therefore, it’s important to maintain harmony of all parts. The stakeholder management practices should be utilized to create the harmony and forge strong relationships between the tourism organizations and their stakeholders. 4. Environmental trends in the global tourism industry: (Dwyer, Deborah, Nina, Carolina, Noel, 2008) Tourism is closely connected to the environment. The two main reasons for determining the viability and attractiveness of an area as a tourist destination is the natural environment and climate conditions (Dwyer Kim, 2003). The developments for tourism are based on features such as gaining easy access for visitors to natural or manmade environments. The concerns of stakeholders of tourism which include researchers has always centered on the ways tourism development may offer opportunities for managing environmentally sensitive areas and the conservation of unique environments. (United Nations Environment Programme ((UNEP), 2002), reported that the focus is on tourism where it can help in reducing environmental pollution and usage of resources. The main environmental trends include change of climate, depletion of natural resources and loss of biodiversity: Change of Climate: The increase in release of concentrations of greenhouse gases influences the change of climate and global warming. Climate change is a global occurrence and its major effects are felt at the local and regional scale. Effects of climate change and warming trends include: rise in sea-level, changes to ocean currents, melting of glacial and polar ice, losing of snow cover, high heat index and high diurnal temperatures, and changes to precipitation patterns (IPCC, 2007). Climate changes are influential in determining the destinations preferred by tourists and also on the profitability of the industry through increase in costs of energy use. Policies to lessen emission of greenhouse gas will invariably affect the operator costs and destination competitiveness particularly for longer destinations (Dwyer Forsyth, 2008). Depletion of natural resource: The increasing paucity of natural resources required to steer industrial development will give rise to a number of effects. The factors affecting the availability of natural resources like food production, water and energy, are increase in population and economic development. The result of ‘peaking’ in oil production, commonly known as ‘Peak Oil’, will increase the expenses of fossil fuel based energy sources. ‘Peak Oil’ refers to the maximum rate, i.e. ‘peak’ of production of world oil to a point beyond which it goes to permanent decline. The decline in production of oil along with increase in demand will result in increase of fuel costs. Consequently, the new ‘carbon economy’ is set to push the want for energy efficiency and investment in renewable forms of energy. In future, half of the world’s population will face shortage of water due to scarcity of water resources. The arable land and native bush land will diminish extensive agriculture and broad-scale land clearing due to demands for higher food production. Loss of bio diversity: (United Nations Environment Programme (UNEP), 2003), reported that the main danger to loss of species biodiversity is habitat loss. Loss of biodiversity is expected to substantially affect those destinations that highlight nature based or eco tourism. Analyzing Marketing Opportunities Challenges: The Macro-environment (Amy, Eliza, Cynthia, 2009) The major macro-environmental forces recognize and discuss the affect the ability of hospitality industry to market its offerings. All organizations in the hospitality industry function in a constantly changing macro-environment, and thus giving prospect for marketers to conduct business or pose threats to the companies. The environmental changes have to be monitored closed before marketing strategies are considered by companies. The hospitality marketers must analyze and observe the six major forces (demographic, economic, political/legal, social/cultural, technological and natural/ecological), as shown below: Figure 1: Macro-Environmental Forces Table 1: Macro-environmental Forces 5. Market research Importance of Psychographic Research (Yvette Felix, 2004) (Wells, 1975), defined Psychographic research as â€Å"quantitative research intended to place consumers on psychological dimensions.† According to (Gladwell, 1990), this type of research â€Å"analyzes consumer’s attitudes, perceptions, needs, interests, opinions, activities, and daily lifestyle.† (Shih, 1986), recognized that â€Å"Psychographics is very meaningful and relevant† and (Abbey, 1979) stated that â€Å"it’s very important means to provide additional information beyond the demographic characteristics.† Abbey suggested that psychographic variables produce major differences between the groups of consumers, and these differences were bigger than the differences produced by the demographic profiles. (Mayo, 1975), stated that psychographics are useful than demographics in explaining consumers because they differentiate better between them (Ryel Grasse, 1991). The market segmentation has found a valuable means in Psychographics. (Gladwell, 1990), observed that psychographic characteristics of tourists have to be examined thoroughly by marketer if their destinations need to be marketed successfully to tourist. Psychographic variables are helpful in recognizing various types of tourists, distinguishing their segments and differentiating between the segments (Schewe Calantone, 1978). Psychographic measures provide complete profiles of tourists and give the marketers a clear picture of the tourists they are attracting. Psychographics cannot be independent even though psychographics has a comparative advantage over demographics, (Schewe Calantone, 1978). In order to understand a consumer market better, marketers should use psychographic data along with other criteria such as demographic, geographic, or behaviorist. Psychographic data needs to be incorporated in its research studies of the tourism and hospitality industry to benefit from the k nowledge of its customers. The data was collected through a qualitative research method. Qualitative methods offer varied empirical processes intended to describe and interpret the experiences of participants in a context specific setting. Data was collected from 30 representatives via semi-structured, in-depth interviews. Local residents, governmental, non-governmental and academic stakeholders were considered in order to acquire the opinion locally, regionally and nationally regarding the implementing sustainable tourism development. The concept of sustainable tourism development became important due to fact that local residents are involved in tourism planning and decision-making. (Jackson, 2000). A sampling strategy was arrived at to ensure residents participating were ambassadors of a cross-section of the community. The sampled residents included those who resided in the tourism/non-tourism zone and were directly/indirectly involved with and/or affected by tourism activities. Many of the interviewed residents and who were involved in the industry were engaged as local guides or owners of home stay lodging and resorts, or souvenir and food catering shops. In-depth interviews saw participation of 20 local residents. Convenience sampling constituted a technique of non probability that attempts to get a sample of convenient elements which is less expensive and less time-consuming when compared with other sampling techniques (Malhotra, 2004). Governmental institutions had an essential part in sustainable tourism development initiatives. Therefore, they participated in the study and to aid in establishing a swell of other respondents. This was considered the most appropriate method, as the researcher was not well informed about the formal or informal ‘network connections’ locally (Jennings, 2001). The researcher chose a few respondents involved decision making for the destination i.e. Town Council, Sub-District Administration Organization. Other relevant stakeholders interviewed were the local tourist office, a non-governmental organization and academics. Totally 10 governmental respondents were interviewed. Interview questions related to the sustainable tourism development concept and stakeholders were developed. These questions were directed to five local residents in August 2012. The interviews led to alterations in: (1) interview time and how respondents were approached, and (2) the interview questions usi ng simpler and non-technical terminology. Then, in-depth interviews were conducted in September 2012. In order to gain further insights and data, the questions were open ended. The interviews were recorded, transcribed and organized based on the interview questions.

Wednesday, November 13, 2019

New technologies dismiss social relationships Essay examples -- Tech

In this fast-changing world, new technologies have become essential in societies and have an impact on everyone’s life. This process of â€Å"technologization† has grown exponentially since the nineties and the beginning of the Internet, which has significantly decreased boundaries of communication. Some expert agreed that new technologies would make communication and exchange easier, and thus give an incentive to communicate with other people. However, those change have caused communication to change and people have totally change their way to communicate. Ever since people have become increasingly dependent on those technologies because they only see their advantages and convenience for everyday life. New technologies dismiss social relations; due to the way people use them. This paper will argue that an excessive use of new technologies can damage people’s social interactions, which in term might cause numerous social issues. To support this argument, three reasons will be approached: the first part will explain how new technologies make people more selfish and individual by explaining online communication issues; second, people rely so much on new technologies that there has been an increase in technological addiction which turn people into technological aliens. To finish, advanced technologies change people’s behavior in their everyday life; here, the fact that virtual life comes over real life will be developing. This research will demonstrate how new technologies dismiss social relationships by comparing and analyzing different academic sources. In order to proceed, the word communication needs to be defined. According to the Longman Dictionary of Contemporary English, communication is the process by which people exchange... ...umà ©riques, Des Enfants Mutants ??" Sciences Humaines [France] Oct. 2013: 35-37. Print. Kelion, Leo. "Hannah Smith Death: Father Says Daughter Was Victim of Cyberbullies." BBC News. BBC, 08 June 2013. Web. 27 Nov. 2013. Kudler, Amanda. "Video Games Timeline." Infoplease. Infoplease, 2007. Web. 24 Nov. 2013. Netburn, Deborah. "The Business and Culture of Our Digital Lives." N.p., July 2011. Web. 30 Nov. 2013. Soong, Jennifer. "When Technology Addiction Takes Over Your Life." WebMD. WebMD, June 2008. Web. 24 Nov. 2013. Tong, Krystel. "Social Networking Leads to Social Isolation." Prezi.com. Prezi.com, Apr. 2013. Web. 27 Nov. 2013. Turkle, Sherry. "Sherry Turkle: Connected, but Alone?" TED: Ideas worth Spreading. TED, Feb. 2012. Web. 27 Nov. 2013. Young, Kimberley. "Gà ©nà ©rations Numà ©riques, Des Enfants Mutants ?" Science Humaines [France] Oct. 2013: 52-55. Print.

Monday, November 11, 2019

Experience Of Facilitating Cpbl Tutorials Education Essay

I am asked to ease PBL and CPBL at St. George ‘s ( SGUL ) on a regular footing. Consequently, I selected this learning experience as the subject of this assignment, in order to let an chance to see the function of these tutorials within undergraduate medical instruction and how to maximize the acquisition experience for the pupils. When I was a medical pupil, PBL was comparatively new and merely comprised a really little proportion of the course of study. Since so, PBL has been progressively used in the UK and some medical schools now offer classs which about entirely employ PBL as the acquisition method. This has stimulated me to believe about the theory underlying PBL and how it compares to traditional undergraduate medical instruction. SGUL runs three separate undergraduate classs. One of these is the traditional five-year class, which accepts both school departers and alumnuss. In this assignment, I shall mention to this class as MBBS5. The other class that is relevant to this assignment is the four-year class, which is merely unfastened to alumnuss. I shall mention to this class as MBBS4.The experience of easing CPBL tutorialsI shall be depicting my most recent experience of easing a series of five hebdomadal CPBL tutorials with a group of seven pupils in the next-to-last twelvemonth of the MBBS4 class. I have chosen to concentrate on the 2nd tutorial in the series, as I felt that this was a peculiarly successful larning experience. As usual, the tutorial started with one of the pupils showing a patient that they had seen. Once the instance had been presented, the other pupils asked inquiries, easing a treatment about diagnosing, direction program and any other issues that the instance generated. The pupils identified subjects that they would wish to read more about and put larning aims consequently. They so researched these larning aims for treatment at the following tutorial. Once the pupils felt they had exhausted the treatment about the instance, we moved on to discoursing the larning aims set the old hebdomad. In the first tutorial, the pupils had identified the mental province scrutiny ( MSE ) as a subject that they would wish to read more about. In the tutorial, the pupils discussed each country of the MSE, with peculiar focal point on what inquiries to inquire to arouse symptoms from a patient. This stimulated an interesting conversation about the different ways each pupil had learnt to arouse the symptoms. I besides shared the inquiries that I use to analyze a patient ‘s mental province. The pupils reached the decision that there was no individual right manner to inquire the inquiries and that they needed to develop their ain manner that they felt comfy with. We so used function drama, during which I acted as a patient and the pupils were given an chance to pattern executing a MSE. The pupils reported that they found this highly utile, as it helped them to get down to develop their ain method for MSE and improved their assurance for executing the scrutiny on a existent patient.Critical contemplation on the experienceI frequently feel dying prior to learning Sessionss. My specific anxiousnesss around PBL tutorials include actuating the pupils, as I have found it hard in old tutorials to promote MBBS5 pupils to originate a treatment ; staying within the boundaries of my function as a facilitator, instead than supplying a didactic instruction session ; and a fright that the pupils will inquire inquiries that I am unable to reply. I exhaustively enjoyed easing this set of tutorials. This was my first experience of tutorials with the MBBS4 pupils. I found them to be much more occupied with the tutorials than their equals on the MBBS5 class. They were able to bring forth first-class treatments without motivating from me. I found it easier to stay within my function as a facilitator, instead than supplying active instruction. The pupils discussed complicated psychological constructs at a high degree, which I found peculiarly exciting. This highlighted the deepness of cognition that can be gained from others and reminded me how of import it is for physicians to pull upon this cognition as they progress through their callings, instead than dismissing their juniors as pedagogues. The MBBS4 pupils come from a huge assortment of backgrounds, so each was able to convey a different set of accomplishments and cognition to the tutorials. For illustration, one of the pupils had a background in catering and she was able to raise of import issues about a patient ‘s nutritionary position that I would non hold considered. In the past, I have found myself learning instead than easing in CPBL and PBL. However, during this set of tutorials, I found that I was better at inquiring inquiries to motivate the pupils to believe about the right replies, instead than stating them the reply. I felt that this was besides what the pupils wanted, whereas in my old experiences with MBBS5 pupil groups, the pupils frequently seem acute to be ‘spoon-fed ‘ the replies, instead than utilizing treatment to obtain cognition from their equals. This may be because the MBBS4 class uses PBL as its chief acquisition method from the start of the class, so the MBBS4 pupils are more familiar with the format and anticipate to larn by autonomous acquisition and sharing of cognition. On the contrary, the MBBS5 pupils have a batch more traditional talks and are accustomed to being taught in this mode. I did non see in anxiousness during this set of tutorials. We successfully created a safe, relaxed environment and the pupils seemed to experience comfy inquiring inquiries and discoursing hard feelings that they had experienced. This may hold been because all the pupils in the group knew each other and were used to working with each in PBL scenes. Again this is different to easing tutorials with MBBS5 pupils, who frequently are non well-acquainted with the other members of the group because until now the MBBS5 class has had a much larger cohort than the MBBS4 class. However, the Numberss accepted onto the MBBS4 class are increasing and I wondered whether this will impact on the group kineticss in MBBS4 PBL tutorials. In footings of countries for betterment, I think it would hold been helpful if I had besides researched the larning aims each hebdomad. I was surprised by the deepness and comprehensiveness of reading by the pupils. At times, they discussed really complex topics and I was non ever able to reply their inquiries. For me, this highlighted the abrasion of my cognition since finishing my postgraduate scrutinies two old ages ago and encouraged me to set about more professional reading and alteration. On a positive note, I think the pupils found it helpful to see that I was able to work aptly as a senior physician despite being unable to remember everything I have learnt. Students can experience overwhelmed by how much they have to larn and retain. I felt that I was able to reassure them that it is acceptable non to be able to remember everything you have learnt and that you can mention to text books. I received positive feedback through verbal remarks from the pupils and written feedback to the class organizers. The pupils seemed to bask the tutorials and found them of educational value. Equally good as discoursing the instances and larning aims, we discussed a calling in psychopathology, as a figure of the pupils expressed an involvement in this field. I think I was able to give the pupils a realistic and enthusiastic penetration into my profession. My hope is that, even if the pupils do non prosecute a calling in psychopathology, they will hold a positive position of mental wellness professionals, assisting to decrease stigmatization of the profession.Key pointsWhat is the grounds behind the development of PBL course of study? Does holding an adept facilitating PBL impact on pupil acquisition? Are graduates better suited to PBL?Literature reappraisalMy literature hunt revealed really minimum literature on CPBL. Therefore, I have decided to concentrate my cardinal points and literature reappraisal on the broader subject of PBL.The theoretical footing of PBLOriginally, PBL was based on the theory of contextual acquisition. The basic rule is that when stuff is learnt in the context of how it will be used, it supports acquisition and capacity to utilize the information. PBL uses this rule by supplying a instance in the real-life context of a patient sing a physician. Colliver ( 2000 ) undertook a reappraisal of the literature and concluded that the contextual acquisition statement was based on a weak research determination. Albanese ( 2000 ) concurred with Colliver ‘s unfavorable judgment of contextual larning theory as an statement for PBL and proposed four new theories for understanding how and why PBL works, specifically information-processing theory, concerted acquisition, self-government theory and control theory. Schmidt ( 1983 ) claimed that information-processing theory underpinned PBL. This theory involves three major elements, viz. anterior cognition activation, encoding specificity and amplification of cognition. Prior cognition activation is the procedure of pupils utilizing previously-gained cognition to understand and organize new information. Encoding specificity is similar to contextual acquisition theory, i.e. acquisition is promoted when the environment in which something is learned resembles the environment in which it will be applied. Amplification of cognition describes how information will be better understood and easier to remember when there is an chance for amplification in the signifier of treatment and replying inquiries. This theory incorporates contextual larning theory but provides a more comprehensive theory for understanding PBL. I will now briefly discuss each of the other three larning theories of PBL proposed by Albanese ( 2000 ) and reflect on my experience of easing PBL with regard to these theories. First, concerted larning refers to an person ‘s perceptual experience that they can merely carry through their ends if the other group members besides do so. Qin et Al ( 1995 ) conducted a meta-analysis of surveies measuring the consequence of concerted versus competitory acquisition on job work outing. They defined cooperation as the presence of joint ends, common wagess, shared resources, and complementary functions among members of a group. In competitory acquisition state of affairss, persons perceived that they could merely make their ends if the other group members could non. They found that members of concerted squads outperformed persons viing with each other with regard to job work outing. These consequences held for persons of all ages and for surveies of high, medium, and low quality. The high quality of cooperation, nevertheless, was greater on non-linguistic than on lingual jobs. I observed concerted acquisition in action during the set of CPBL tutorials that I have described in this assignment. The pupils were acute to portion the cognition that they had reaped from autonomous acquisition and support all group members to achieve the same degree of understanding. I felt that the pupils were better able to place the beginnings of misconstruing if a fellow pupil was fighting to understand a construct than I was as an adept facilitator. Self-determination theory may underlie affairs of motive and behavior relevant to PBL. Williams et Al ( 1999 ) argue that self-government theory has the possible to significantly better instruction. The theory differentiates between two types of actuating conditions, controlled and independent. Controlled incentives are thought to be maladaptive and include external demands every bit good as â€Å" introjected ordinance † , which are internalized beliefs about what one â€Å" should † make. These are all associated with either explicit or inexplicit wagess or penalties. Under controlled signifiers of motive, persons act with a sense of force per unit area and anxiousness. In educational footings, this refers to ephemeral, rote acquisition, which pupils do non incorporate into their long-run values and accomplishments. Albanese ( 2000 ) inferred that traditional course of study tended to affect controlled signifiers of motive. Albanese ( 2000 ) described independent incentives as â€Å" those which are personally endorsed by the scholar and reflect what the single finds interesting and of import † . In comparing to the external wagess and penalties associated with controlled motivation conditions, independent motive allows the person to act with a sense of will, bureau, and pick. PBL promotes independent incentives by sing the positions of the pupils and encouraging pupils to accept more duty for their ain acquisition. I felt that I was able to back up this by inquiring the pupils what they wanted to accomplish from the tutorials, easing their treatments by inquiring motivating inquiries and seeking the sentiments and feelings of pupils in a non-judgemental mode. As I discussed in my contemplation, we were able to make a safe, relaxed environment, which minimised force per unit area and control and encouraged a high degree of public presentation and collaborative acquisition. The concluding theory of PBL proposed by Albanese ( 2000 ) was control theory. This theory was foremost introduced by Glasser ( 1986 ) , who conjectured that all behaviors, including acquisition is intended to fulfill one or more of the undermentioned five internal demands: 1 ) To last ; 2 ) To belong and be loved by others ; 3 ) To hold power and importance ; 4 ) To hold freedom and independency ; and 5 ) To hold merriment. Albanese felt that PBL satisfies all five demands. It allows freedom because the pupils are able to construction their clip and take what to discourse. It satisfies the demand for power, as pupils have the power to put their ain acquisition aims. PBL promotes love and belonging because it allows pupils and facilitators to go more personally involved with one another than in talks. The literature ( Albanese and Mitchell, 1993 ) foreground how both pupils and module enjoy PBL, thereby fulfilling the demand for merriment. PBL promotes survival through pupils assisting pupils. These claims by Albanese ( 2000 ) are in harmony with what I experienced as the facilitator of the CPBL tutorials. To reason, although Colliver ( 2000 ) found the theoretical development of PBL to hold been weak, there is an array of theory that can be applied to PBL. I have described four theories but there may be others. Further research is required to look into how theory can be transformed into effectual PBL.Comparison of PBL-based and traditional course of studyIn the early 1990s, four separate systematic reappraisals comparing PBL to traditional course of study were published. I shall summarize these reappraisals before traveling on to discourse the more recent literature. The first reappraisal was published in 1992 by Norman and Schmidt, who examined the psychological footing for PBL. They found no grounds that PBL brought about betterment in â€Å" general, content-free problem-solving accomplishments † . However, they felt that there was some preliminary grounds to propose that PBL may â€Å" heighten both transportation of constructs to new jobs and integrating of basic scientific discipline constructs into clinical jobs † . Their other decisions were, â€Å" acquisition in a PBL format may ab initio cut down degrees of larning but may further, over periods up to several old ages, increased keeping of cognition † ; â€Å" PBL enhances intrinsic involvement in the capable affair † ; and â€Å" PBL appears to heighten autonomous acquisition accomplishments, and this sweetening may be maintained † . Albanese and Mitchell ( 1993 ) conducted a systematic reappraisal and meta-analysis of literature on the results and execution issues of PBL. They concluded from their findings that, compared with conventional medical instruction, PBL is more nurturing and gratifying ; PBL graduates perform every bit good, and sometimes better, on clinical scrutinies ; and they are more likely to come in household medical specialty. However, they besides found that PBL graduates tended to prosecute in backward concluding instead than the forward concluding experts engage in, and at that place appeared to be spreads in their cognitive cognition base that could impact pattern results. Vernon and Blake ( 1993 ) published a really similar meta-analysis of the literature, which supported â€Å" the high quality of the PBL attack over more traditional methods † . They found that pupil attitudes, category attending and temper were all systematically more positive for PBL than for traditional classs. In footings of clinical operation, PBL pupils performed better than traditional pupils. However, there was no important difference between the two groups on steps of clinical cognition. The decisions of a literature reappraisal by Berkson ( 1993 ) were much less positive, saying, â€Å" the alumnus of PBL is non distinguishable from his or her traditional opposite number. The experience of PBL can be nerve-racking for pupil and module. And execution of PBL may be unrealistically dearly-won. † In 2000, Colliver reviewed the medical instruction literature from 1992 to 1998, including the four chief reappraisals of PBL from the early 1990s, and produced a critical overview of PBL, its effectivity for cognition acquisition and clinical public presentation, and the implicit in educational theory. Colliver concluded, â€Å" the reappraisal of the literature revealed no converting grounds that PBL improves knowledge base and clinical public presentation, at least non of the magnitude that would be expected given the resources required for a PBL course of study † . Unlike old reappraisals, Colliver ‘s reappraisal challenged believing about the educational effectivity of PBL. Colliver suggested that farther research was required to clear up both theory and pattern. Subsequently in 2000, Norman and Schmidt responded to Colliver ‘s paper with their ain reading of the research grounds. They did non believe its was sufficient to trust on randomized controlled tests and argued for the usage of a wide scope of research designs and variables. Albanese ( 2000 ) besides produced a paper as a rejoinder to the reappraisal by Colliver. Albanese used consequences of pupils from differing course of study on the United States Medical Licensing Examination ( USMLE ) to propose that PBL produced higher tonss than traditional talks. Albanese concluded that the positive consequence that PBL has on the acquisition environment is â€Å" a worthwhile addition in, and of, itself † , despite the absence of a thorough apprehension of its consequence on cognition. Since 2000, PBL has been used progressively in undergraduate medical instruction in the UK. During this clip the educational theory behind PBL has continued to develop and several new reappraisals and surveies have been published. A reappraisal was conducted by Newman ( 2003 ) , which included merely randomised controlled tests and quasi-experimental surveies in which pupil public presentation or other results were objectively measured. They concluded that results for pupils in the PBL groups were less favorable than those in the â€Å" control group † . However, there was no consensus in the surveies that they reviewed on what constituted a control group. Dochy et Al ( 2003 ) were responsible for another recent meta-analysis of the effects of PBL, which showed that PBL had a positive consequence on cognition application of pupils. However, no consequence on cognition was found. A figure of surveies including that by Prince et Al ( 2005 ) ( look into ref ) have used self-report questionnaires to compare the sentiments and competences of alumnuss from PBL and non-PBL schools. The consequences suggest that PBL alumnuss are better prepared with regard to several of the competences. Antepohl et Al ( 2003 ) conducted a questionnaire survey of all alumnuss of the new PBL medical course of study at the Faculty of Health Sciences, Linkoping University, Sweden. They found that â€Å" alumnuss of the new medical course of study showed a high grade of satisfaction with their undergraduate instruction and how it prepared them for medical pattern † . However, this survey had some restrictions. The usage of postal questionnaires introduces response prejudice. They had a good response rate of 77 % but it is possible that the 23 % who did non react may non hold a positive position of their medical instruction. This survey raised inquiries sing the grade to which alumnuss ‘ subjective retrospective rating of their ain undergraduate instruction can supply relevant information refering the quality of the class. Schmidt and van der Molen ( 2001 ) overcame this issue when comparing PBL alumnuss to traditional alumnuss. They identified and corrected self-overestimation among PBL alumnuss by mentioning to self-ratings consequences in countries in which a difference between PBL and traditional pupils was non expected. If differences did occur, they were used to quantify self-overestimation and to rectify for it. Tiwari et Al ( 2006 ) conducted a randomised controlled test aimed at comparing the effects of PBL and talking attacks on the development of pupils ‘ critical thought. Their consequences revealed that PBL pupils had â€Å" significantly higher critical thought temperament tonss on completion of PBL compared with talk pupils † . â€Å" They besides continued to hold higher tonss, albeit to a lesser grade, than the talk pupils for two old ages afterwards. † This survey involved little Numberss of pupils and relied upon self-report by pupils, which can present recall prejudice. Despite these restrictions, this survey highlights the demand for farther research to find whether the differences in critical thought are maintained in subsequent old ages. Besides in 2006, Schmidt et al conducted a big, robust survey comparing professional competences of PBL alumnuss to traditional alumnuss in the Netherlands. Participants were asked to finish a questionnaire, evaluation themselves on 18 professional competences derived from the literature. They concluded, â€Å" PBL non merely affects the typical PBL-related competences in the interpersonal and cognitive spheres, but besides the more general work-related accomplishments that are deemed of import for success in professional pattern † . More late, Koh and co-workers ( 2008 ) performed a systematic reappraisal of how PBL during medical school affected the competency of physicians after graduation. The writers merely included publications that incorporated a control group of alumnuss from a â€Å" traditional † course of study. This high quality study employed a thorough methodological analysis, whereby physicians ‘ ego appraisals of their competences and appraisals by independent perceivers were considered individually. Small correlativity was seen between self-assessed and observer-assessed competence. Self-assessment showed a strong degree of grounds against PBL for ownership of medical cognition, but this was non confirmed by independent observation. The writers concluded that PBL has positive effects on alumnus competences in of import societal and cognitive spheres. Again, one of the jobs with this reappraisal was the absence of a definition of the control â€Å" traditional † course of study . In 2009, Macallan et Al evaluated which constituents of CPBL contributed most to the success of the theoretical account utilizing semi-structured questionnaires, focal point groups and a consensus method. They showed that pupils found CPBL a â€Å" positive acquisition experience † . They found that successful CPBL was supported by â€Å" the coach ‘s degree of expertness and a non-threatening acquisition environment, contributing to student oppugning † . This survey verified the thought that CPBL is â€Å" a parallel instruction attack that helps construction the instruction hebdomad, but does non replace traditional bedside instruction † .AndragogyUpon contemplation, I noted important differences in the manner in which the MBBS 4 pupils interacted in the CPBL tutorials and their ability to utilize these tutorials as a larning tool compared to pupils on the MBBS 5 class. I wondered whether this may reflect how learning manners change as we become grownups and mature. McCrorie ( 2002 ) described graduate-entry pupils as â€Å" extremely motivated and committed † and â€Å" much more autonomous, ambitious, demanding, oppugning † . â€Å" Alumnuss have already larn how to analyze and how to ration the other enticements of pupil life in order to maintain up with their surveies. This makes them better able to manage a autonomous acquisition attack † ( Rushforth, 2004 ) . Taylor et al stated, â€Å" the major difference between grownups and younger scholars is the wealth of their experience † ( Taylor, Marienau, & A ; Fiddler, 2000, p.7 ) . This is something that I reflected on following the CPBL tutorials, as the pupils in the group came from a assortment of backgrounds. Each pupil was able to convey a different position and cognition to the group, leting for a richer acquisition environment. On the other manus, pupils on the MBBS 5 class who have started their medical grade heterosexual from school tend to hold a similar educational background and experiences. In the 1950s, Malcolm Knowles developed the theory of andragogical acquisition, contrasting the larning methods of grownups with those of kids, pedagogical acquisition. Knowles claimed that one of the chief differences between these two signifiers of acquisition was that the function of the pedagogue was minimised in grownup acquisition. Andragogy is based on the undermentioned five premises about how grownups learn and their attitude towards and motive for larning ( Kaufman, 2003 ) : Adults are independent and self directing ; They have accumulated a great trade of experience, which is a rich resource for acquisition ; They value larning that integrates with the demands of their mundane life ; They are more interested in immediate, job centred attacks than in capable centred 1s ; and They are more motivated to larn by internal thrusts than by external 1s. Learner-centeredness is described in the literature as a separating feature of grownup instruction. Traditional medical course of study reflect inform pupils as to what they should larn and what sorts of cognition are considered of import ( Sheared & A ; Sissel, 2001 ) ( Titmus, 1999 ) . In contrast, PBL places scholars at the Centre of their learning experience and promotes flexibleness and individualization for autonomous, sceptered grownups ( Manusco, 2000 ) . However, andragogy has been criticised, as grownups do non automatically go autonomous upon accomplishing maturity. They may non be psychologically equipped for it and may prefer or necessitate way from others ( Beitler, 1997 ) ( Titmus, 1999 ) ( Courtney, Vasa, Luo, & A ; Muggy, 1999 ) . Kaufman ( 2003 ) suggested that alumnuss may hold some restrictions to their acquisition, including fixed learning attacks, greater fiscal concerns and a limited scientific background at registration. Survey of the literature reveals a deficiency of empirical grounds to back up the distinction between childhood and grownup acquisition. Nonetheless, many instruction methods that are frequently used in higher instruction, including experiential acquisition, pupil liberty and autonomous acquisition, root from andragogy.Analysis of literature and treatmentWhat is the grounds behind the development of PBL course of study?In the early 1990s, four systematic reappraisals of undergraduate medical instruction carefully supported the short-run and long-run results of PBL compared with traditional acquisition ( Albanese & A ; Mitchell, 1993 ; Vernon & A ; Blake, 1993 ; Berkson, 1993 ; Norman & A ; Schmidt, 1992 ) . There were restrictions to the reappraisals, as highlighted by Albanese and Mitchell ( 1993 ) , including failings in the standards used to measure the results of PBL ; general failings in survey design ; a limited research base, with surveies of PBL course of study coming from merely a smattering of medical schools ; and diverseness in what different persons call PBL. Furthermore, these surveies were conducted at a clip when PBL was a comparatively new and advanced manner of medical instruction. Therefore, studies of negative experiences may non hold been submitted or accepted for publication. There was besides a hazard of confusing, as it is really hard to randomly assign pupils to different learning methods for big sections of their preparation. These restrictions lessen the assurance one can give decisions drawn from the literature sing the results of PBL at that clip. On the whole, recent research mostly supports the findings of the earlier reappraisals, which suggested that alumnuss of PBL course of study are better able to use cognition and map clinically. However, the literature does non show differences in the cognition base of alumnuss from the two different course of study. Albanese ( 2000 ) argued that PBL improves clinical competency by doing pupils more confident and self-conscious as professional scholars, thereby bring forthing more efficient and enthusiastic physicians. However, non all the literature is consistent with this position. Rolfe et Al ( 1995 ) demonstrated that alumnuss from a traditional course of study were rated higher for instruction, diagnostic accomplishments and apprehension of basic mechanisms compared to those from a PBL course of study. There is a wealth of grounds to back up the claim that PBL consequences in greater participant enjoyment and enthusiasm for larning than traditional medical instruction. For illustration, Colliver ( 2000 ) found that pupils value the interpersonal accomplishments that PBL encourages and that are besides cardinal to effectual clinical pattern. Research into this field continues to be debatable. A batch of the recent surveies used questionnaires to compare the results of different course of study, which introduce callback and response prejudice. When measuring some PBL quantitative surveies, I noticed that the surveies were non based on any learning theory or were non proving anticipations from a larning theory and, therefore does non offer better apprehension of why or why non PBL might work. A challenge for future research is to utilize larning theory to plan quantitative PBL surveies and use the information from surveies to back up theory. Macallan et Al ( 2009 ) considered CPBL from the pupils ‘ point of view. They acknowledge that this is a common restriction of PBL research, as â€Å" pupils may non right perceive those factors that truly heighten their acquisition † . However, I agree with their remark that more nonsubjective steps are hard to use in this context. Another of the failings of the surveies that I have encountered is that comparings are frequently made between pupils or alumnuss from different medical schools. Consequently, it is hard to cognize whether any differences observed are the consequence of course of study design or the overall context of the school. Although randomised controlled tests have non been able to turn out statistical effectivity of PBL, there is considerable practical grounds from the 1993 reappraisals that pupils and module enjoy PBL more than traditional instruction methods. There are a assortment of statements for believing that it is excessively early to accept the negative findings of the literature. It seems that more refined research methods and a wider scope of research designs and variables are required to place educational alterations in a complex, larning environment. Bligh ( 2000, page ) stated, â€Å" deficiency of difficult `scientific ‘ grounds for the effectivity of PBL is non a ground for detaining execution of PBL in course of study † . There is chance for more UK-based surveies following the debut of PBL-based course of study at many UK medical schools over the past 10 old ages. The literature sing CPBL is really thin, so this could be a cardinal focal point of future research.Does holding an adept facilitating PBL impact on pupil acquisition?There is much contention in the literature as to whether an adept PBL facilitator promotes larning or non. Barrows ( 1985 ) suggested that non-directive facilitation was more of import than subject-matter expertness when he described the function of PBL coach as follows: â€Å" Alternatively of giving pupils the information and facts they need through talks and readings, they must larn to ease and indirectly guide pupil larning. They must let pupils to find on their ain what they need to cognize and to larn through the survey of varied resources. Alternatively of stating pupils precisely that they should larn and in what sequence they should larn it, the coach must assist pupils find this for themselves. † Hendry et Al ( 2003 ) claimed that some PBL coachs are excessively dominant. They reported that â€Å" a dominant coach causes tenseness and struggle in groups which leads to miss of committedness, cynicism or pupil absenteeism † . However, it has besides been shown that excessively small ordinance by the facilitator besides causes jobs. Silver and Wilkerson ( 1991 ) demonstrated that adept coachs impede student-to-student treatment by taking a more directing function in the tutorials, talking more frequently, supplying direct replies to pupils ‘ inquiries and proposing more points for treatment. However, other surveies have found the opposite consequence. A survey by Eagle et Al ( 1992 ) found that in tutorials facilitated by an adept coach, pupils generated twice every bit many larning issues and spent about twice the sum of clip on autonomous survey than pupils go toing tutorials facilitated by non-experts. Macallan et Al ( 2009 ) found that pupils â€Å" greatly appreciated it when adept clinicians demonstrated how clinical logical thinking applied to the instance † . As a consequence of these contradictory findings, some research workers began to look into the relationship between coach features and differential contextual fortunes ( Dolmanset al, 2002 ) . These surveies were based on the impression that â€Å" PBL is a complex acquisition environment in which different variables influence each other reciprocally † ( Dolmans et al, 2005 ) . Schmidt examined the consequence of coach expertness on trial tonss under conditions of PBL classs with low or high construction and curricular stuffs that match ill or good to pupils ‘ degree of anterior cognition ( Schmidt, 1994 ) . He found that when the construction of a class is low and/or pupils lack anterior cognition, the coach ‘s expertness has a greater impact on pupil public presentations. Dolmans et Al ( 1999 ) demonstrated that tutorial groups with comparatively low degrees of productiveness require much more input from a coach than extremely productive groups. As discussed in my contemplation, this is consistent with my experience. The MBBS4 pupils were extremely productive and my function in the tutorials was minimum. On the other manus, my old experience of PBL and CPBL with MBBS5 pupils has been that the pupils did non prosecute in the procedure or bring forth sufficient treatment or larning aims. In these tutorials, I found myself taking a much more cardinal function. Bochner et Al ( 2002 ) identified one contributory factor to the inconsistent findings is as the fact that there are no established criterions by which to find expertness. Although there has been debate as to whether the facilitator needs to be an â€Å" expert † , the consensus position seems to be that expertness in group kineticss together with supportive enthusiasm is more valuable than deep capable cognition. I found that, for the most portion in this series of tutorials, my function was entirely as a facilitator. However, the pupils on occasion discussed complex clinical issues, which were non easy to to the full understand from reading a text edition. This was when I would step in to explicate the construct in the clinical context.DecisionHelped to understand how PBL should run to be effectual – attempt to utilize motivating inquiries instead than give direct replies Use ice surfs at first tutorial to assist with group kineticss The accomplishment of PBL facilitation is that of cognizing when to supply aid to the group, be it proposing utile resources they might wish to see or come ining with thought arousing remarks to steer the comprehensiveness and deepness of acquisition, without needfully leaving facts.4a† Ã‚ µ4Maudsley G. Roles and duties of the problem-based acquisition coach in the undergraduate medical course of study. BMJ1999 ; 318:657-61.