Saturday, January 25, 2020
Social interaction and the development of infants
Social interaction and the development of infants In the first two years of an infants life, they undergo many changes that allow them to develop into a fully functioning human being. These developments are controlled by internal and external factors. Social interaction is an exceedingly influential external factor, which can help to form many aspects of development. For example, infants in the first two years of their lives are learning to differentiate between social stimuli, for example recognising mothers face and voice. This is mastered by the infant in a relatively small time scale after birth (Mills Melhuish, 1974). The child can then use this new learned ability to interact with its caregivers, even without understanding the social meaning of their actions, for example when a child smiles, the child is not aware of what a smile means in our society, but when the caregiver sees this sign of emotion, they cannot help but to smile back, and positively reinforces that learned action to the child. To see how important social int eraction is for the development of a child in the first two years of its life, it is important to observe key areas of behaviour such as attachment to others, the childs temperament and their language acquisition. One of the most researched areas of development in children is attachment and how we form them. Attachment, as defined by Ainsworth and Bell 1970, is an affectional tie that once person forms between himself and another specific one. This is the first strong social connection that infants have to another human being/s. Research by Shaffer and Emerson, conducted in 1964, and suggested that there are three stages in the development of primary attachments; the asocial stage, the stage of indiscriminate attachment and the stage of specific attachment. The asocial stage, which spans from birth to six weeks, is when the infant uses signals to interact with its environment, for example crying, babbling, and smiling and so forth, which is not aimed specifically to anyone. The second stage of indiscriminate attachment, the infant has learnt that if it cries it will receive attention, but is still not aimed at a particular individual and the child can be comforted by anyone. This stage lasts u ntil around seven months after birth. The last stage, specific attachment, can be observed between seven and eleven months, and is suggests that the infant will start to form specific attachments to caregivers, a bond is then made, and will no longer accept comfort from others. Bowlby (1988) described that the need for social attachment between the infant and its caregiver is because the infant needs to actively seek to attain or maintain proximity to another individual that is more attuned to their surroundings and can provide for the infants needs (attachment behaviour). There have been three key theories to try and explain why we form attachments, and if it is important for children to form social bonds in the early stages of life. The psychoanalytical theory proposes that feeding and the production of food is the main reason why we form attachments. Based on Freuds psychosexual stages, this theory focuses on the oral stage (the first of the stages), and suggests that the child gets pleasure from attaining food through sucking behaviour (Miller, 1993). Erikson in his stage theory (1950, 1968) states that the first year of life is where the infant establishes trust between themselves and a caregiver, who in return provides nutrition and comfort. Without this trust, the child does not know whether they will be provided with the vital source of support that the child needs to survive. There are two main learning theories, the first being the early learning theory. The psychoanalytical theory is closely linked to this theory, as they both suggest that being provided with food is the main reason why we attach. This theory revolves around the secondary drive hypothesis by Dollard and Miller (1950), which explains that infants attach to the mother to gain access to important things that are needed for survival, things that they cannot provide for themselves for example food and warmth, all of which soothe the childs cries. This social interaction between the mother and the child then allows for the infant to associate this with the caregiver, and the bond is strengthened. However, this hypothesis disagrees with research conducted by Shaffer and Emerson (1964), which found that the infant can become attached to more than one caregiver, who is not necessarily the sole provider to the physiological needs of the child. The second learning theory for attachment is the social learning theory devised by Hay and Vespo, (1988). The theory states that the child does not automatically become attached to the mother, or caregivers, but that the caregivers has to interact with the child and show them affection, for the child to feel a connection with them, from which they can then form a relationship together. Another theory of attachment is Ethological theory, which states that there is an evolutionary role in the reasoning of why we as humans attach. The theory suggests that mothers before birth are already biologically predisposed to become attached to their offspring, and therefore ensures that they survive, and the species can continue. Research to support this theory was mainly collected by Bowlby (1969, 1980), who suggests that attachment is monotropic; focused on only one caregiver, namely the mother. However, research by Ainsworth (1979) disagrees with Bowlbys theory of monotropy, and suggests that infants form more than one attachment to many different caregivers. This is supported by Shaffer and Emersons study, which displayed attachments to other close family members for example grandparents and fathers. It has also been found that siblings can also be important in contributing to the social development of infants (Adler, 1964). These three theories suggest that attachment between the infant and its caregiver is formed relatively easily, but comparatively, if a child has little to no access to social interaction in the first two years of their life, it can be particularly harmful to the childs development. This can be explained by the social stimulation hypothesis which can be observed in research collected in the 1940s, which showed the children growing up in institutions had a low staff to child ratio and so rarely had any interaction with a caregiver. Children were also segregated from each other, and so were cut off from all forms of social stimulation. At first the infants acted no different from those brought up in normal family homes where the children are given lots of attention and interaction, but after six months there was a noticeable difference; the childrens behaviour changes and the children were completely avoidant of any social activities (negative working model of the self) and see that the y are not getting noticed by others (negative working model of others), (Goldfarb, 1943). This research implies that children need constant social interaction to develop properly. Bowlby (1953), after studying institutional care after the Second World War, saw that the care that the children were receiving was more physical, and not for their emotional needs. He developed the maternal deprivation hypothesis; suggested that infants should experience a warm, intimate and continuous relationship with his mother. Conversely, infants in institutions in which there are a much higher staff to infant ratio generally interact normally with their caregivers and develop well throughout life and suffer fewer effects (Tizard and Rees, 1975). Language is another element of develop in the first two years that is strongly influenced by social interaction. There are three main theories that discuss what influences our language acquisition. The learning/empiricist perspective explains that children learn their language by listening to their parents speech and imitating it (Bandura, 1971) and by positive reinforcement when the infant says something grammatically correct (Skinner 1957). Research by Weisman and Snow (2001) found that if caregivers expose their children to more advanced words earlier on in life, then the childs language will be more developed than other children of the same age group. However, it has been argued that children cannot learn syntax this way, as seen by Baron (1992), when children are just learning new sentences; they create statements that adults do not say and therefore could not have imitated. Chomsky (1959, 1968) disagrees with the learning perspective and suggests a more biological/nativist approach and not a social implication. He suggests that language is too complicated for it to just be learned from caregivers, instead that children born with an innate language acquisition device (LAD) in the brain which processes verbal input. Slobin (1985) thinks that we have an inborn language-making capacity (LMC) instead of an LAD. Both of these systems supposedly enable infants to combine vocabulary that has been collected in the brain, enables them to understand what it means, and then can use this knowledge to create sentences. Lenneberg (1967), combined the two theories of Chomsky and Slobin, and suggests the sensitive-period hypothesis, which states that the best time to learn a language is before adolescence; after this period has been reached language becomes very difficult to learn. For example, a case study of 14 year old Genie (Curtiss, 1977), who until this age was ke pt locked away with little to no social interaction, and was beaten by her father if she made any noise. When Genie was discovered, she had not had access to language and so could not speak. When she was taught language, she was able to conjure up sentences quite easily, however she was unable to acquire the rules of syntax, which young children learn early on in life without being taught to, supporting Baron (1992) theory. However, Moerk (1989) suggests that language development cannot be explained using LAD or LMC because the researchers themselves do not understand how they work, and how the information received in the brain is processed and understood. The interactionist perspective suggests that both empiricist (social) and nativists (biological) perspective both contribute to learning acquisition (Tomasello, 1995). A third factor for development that is influenced by social interaction in childhood is temperament. A definition of temperament as described by Hartup and Van Lieshout (1995) is a substrate for personality development, consisting of simple, basic styles that emerge early and that are tied closely to distinctive modes of emotional expression. Thomas and Chess (1977, 1989) reported three main type of temperamental styles; Easy infants; happy, easily comforted, Slow to warm up infants; fussy and are less adaptive, and Difficult infants; negative, extreme reactions for example long periods of continuous crying. Hartup and Van Lieshout (1995), suggests that temperament has social implications for the way in which an infant relates to other people for example difficult infants are more likely to develop behavioural problems as they get older. A way to try and combat this behaviour is for caregivers to provide more stimulating challenges for the child and try to promote the children to act in a more pro-active manner (Smith, Cowie and Blades, 1998). Thus suggesting that although temperament can continue throughout life, using social techniques can reduce aspects of temperamental behaviour as the child develops. In conclusion, attachment to caregivers, language acquisition and a childs temperament are all influenced by social interaction, and can be seen that the lack of it can lead to developmental abnormalities in children. For infants to develop healthily in the first two years of their life, it appears that they need high amounts of cognitive stimulation, feelings of security from those that care for them, and encouragement for behaviour, so that the child can positively attribute their actions and use these social cues, for example smiling and babbling, to develop all the key skills that they will need as they grow up.
Friday, January 17, 2020
Computer Security Measures Essay
The Problem and Its Scope The Internet and computer networking means that there is a need for new security measures to reduce the threats and challenges inherent from these new technologies and software applications and network devices. Information, network equipments, transmission media, computer systems, and servers are subject to threats. ââ¬Å"Yet the use of information and communication technologies has increased the incidents of computer abuse.â⬠Computer security involves safeguarding computing resources, ensuring data integrity, limiting access to authorized users, and maintaining data confidentiality. Effective computer security therefore involves taking physical security measures (to ensure hardware and media are not stolen or damaged), minimizing the risk and implications of error, failure or loss (for example by developing a resilient back-up strategy), appropriate user authentication (for example by employing strong pass wording), and possibly the encryption of sensitive files. We live in a world where ââ¬Å"information wants to be freeâ⬠and in which people are getting used to having access to whatever information they want anytime, anywhere and from a wider range of computing devices. Unfortunately, in terms of the security and control of the resources to which computers permit access, this can prove quite a problem. Indeed, many users unfortunately often view security and control measures as inhibitors to effective computer use. The studentââ¬â¢s awareness about computer security measures can be a big help to them to acquire some knowledge about protection of their digital asset. In this sense, the students acquire knew knowledge on how to use computer security measures in order to protect all the data stored in their computer system. Because of the computers evolution, the researchers want to share the implications on how important the computer security measures, so that the respondents will be able to know on how to handle some cases in the future. Globally, the most used computer security measures are Anti-virus programs are the most frequently used tools to protect computer systems, and they must be upgraded regularly to protect against any new viruses. Firewallà is different from anti-virus software, which simply verifies that a file is virus free. You can also add an anti-spy ware program. Spy ware is a small program downloaded onto your computer via the internet, usually with your approval, to collect information. Anti-spy ware operates a lot like an anti-virus program, but its role is to prevent malicious spy ware (or malware) from sneaking onto your computer and transmitting your personal data. Firewall intercepts and controls traffic between networks with differing levels of trust. It is part of the network perimeter defense of an organization and should enforce a network security policy. By Cheswickââ¬â¢s and Bellovinââ¬â¢s definition, it provides an audit trail. A firewall is a good place to support strong user authentication as well as private or confidential communications between firewalls. As pointed out by Chapman and Zwicky [2] , firewalls are an excellent place to focus security decisions and to enforce a netw ork security policy. They are able to efficiently log internet work activity, and limit the exposure of an organization. The exposure to attack is called the ââ¬Å"zone of risk.â⬠If an organization is connected to the Internet without a firewall, every host on the private network can directly access any resource on the Internet. Or to put it as a security officer might, every host on the Internet can attack every host on the pri vate network. In the Philippines, some of the businesses are employing security products, such as intrusion detection system and firewalls, and other internal controls which are meant to safeguard, physically and logically, all servers and information systems, including the data stored in the systems. In Davao City, many collegesââ¬â¢ offers IT courses and one of these schools is the Holy Cross of Davao College. Some computer security measures used in some colleges are anti-virus, firewall, ad ware, spy ware and etc. This help to secure data from viruses, unauthorized a ccess, hardware failure and hardware theft. Rationale of the Study The term Information Technology is the area of managing technology and spans wide variety of areas that include computer software, information systems, computer hardware, programming languages but are not limited to things such as processes, and data constructs. In short, anything renders data,à information or perceived knowledge in any visual format whatsoever, via any multimedia distribution mechanism, is considered part of the Information Technology (IT) domain. Computer security is to prevent or detect unauthorized actions by users of the system. The protection of data stored in your computer system. The protection of data (information security) is the most important. The protection of networks is important to prevent loss of server resources as well as to protect the network from being used for illegal purposes. The objective of this study is to know the level of awareness and utilization of all first year BSIT students in terms of computer viruses, unauthorized access, and hardware failure and hardware theft. Theories and Concept This study was anchored on the concept of Dynamic awareness theory (DAT) offers an alternative to explaining the creation of awareness in distributed work groups. DAT highlights the important role of users and social practices in awareness creation. The theory further points to the dynamic nature of awareness creation: Awareness emerges over time and depreciates when not being actively attended to by the users. A personââ¬â¢s awareness is not a static state which can be arbitrarily turned on and off. It is rather a slow build-up of information about his surroundings (Kai Riemer, Russel Haines, 2008).à This theory of awareness is use to conceptualize each individual of their daily awareness about what happen in their community, because awareness requires active maintenance because it diminishes over time. Independent variable Dependent variable Figure 1. Conceptual Framework Showing the Variables of the Study The response of the first year BSIT students in the level of awareness and utilization about computer security measures in terms of Virus, Unauthorized Access, Hardware Failure and Hardware Theft depends with the experiencesà they encountered in their system in which it is the basis of the reasons for the awareness of the students. Statement of the Problems 1. What is the level of awareness of the respondents about computer security measures against the following threats: a.Virus b.Unauthorized access c.Hardware failure d.Hardware theft 2. What is the level of utilization of the respondents on computer security measures? 3. What is the most practiced computer security measure by the respondents? 4. What is the least practiced computer security measure by the respondents? 5. Is there a significant difference between the level of awareness and utilization of the computer security measures by the respondents? Method The researches conduct this type of research in order to obtain certain information about the computer security measures. The researchers used descriptive assessment method in order to meet the objective of the study. To gather data, the researchers use these procedures in order to analyze the data that has been collected. Research Design In order to determine the level of awareness and utilization about computer security measures, the descriptive assessment method of research is used. This is used by the researches because the objective of this study is to determine the level of awareness and utilization within the first year BSIT students without affecting them in any way. Descriptive research design exhibits specific subject and as precursor to more quantitative studies. The actual survey is conducted during the second semester of the year 2011-2012. The procedure used is carefully, analyzed in order to obtain accurate information. Research Environment The researchers conducted a research to a certain private school. The Holy Cross of Davao College is located at Sta. Avenue Davao City. The respondents of this research are all first year BSIT students. Respondents of the Study To achieve the desire information, all first year BSIT students of Holy Cross of Davao College were the participants of the study. They were chosen because they are not more knowledgeable compared to the higher years. The selected numbers of respondents were expected to give their honest answers. Research Instruments In this study, the researches use questionnaire as research instrument. It is most common instrument or tool of research for obtaining data beyond the physical reach of the observer.à Part I of the questionnaire is the level of awareness of all first year BSIT students towards computer security measures in terms of Viruses, Unauthorized access, Hardware Failure and Hardware Theft. Part II of the questionnaire is the level of utilization of all first year BSIT students towards computer security measures in terms of Viruses, Unauthorized access, Hardware Failure and Hardware Theft. Data Gathering Procedures In gathering data procedure, first the researchers conceptualized what study to conduct and arrived to a research title ââ¬Å"Level of Awareness and Utilization of All First Year BSIT students about Computer Security Measuresâ⬠. The research title was approved by the research adviser with the panel of examiners. After the approval of the title, a questionnaire was established to answer the research study was validated. Data Analysis The following statistical tools were employed to answer pertinent problems of the study, as follows: Frequency Count: This tool was used to count the number of items of the respondents who are aware and unaware about the computer security measures and its utilization. Weighted Mean: The weighted mean is similar to an arithmetic mean (the most common type of average), where instead of each of the data points contributing equally to the final average, some data points contribute more than others. The notion of weighted mean plays a role in descriptive statistics and also occurs in a more general form in several other areas of mathematics.
Thursday, January 9, 2020
Failure of the Battle of Britain Campaign Essays - 1747 Words
In the summer of 1940, Adolf Hitler began operation ââ¬Å"Sea-Lion,â⬠or better known as the Battle of Britain. This was the plot to destroy the British RAF so that a German landing on the beaches of England and air assault could be possible. Because of the failure of the battle of Britain campaign, the course of the war was changed in the allies favor, and, Hitlerââ¬â¢s plan for European domination was halted. The early stages of the war were dominated by Germany, attacking Europe in quick succession. The ground forces quickly overwhelmed the European nations with the support of aircraft. The Luftwaffe quickly gained air superiority. In early May 1940, the Norway Debates began to question the competence of Britain current Prime Minister, Nevilleâ⬠¦show more contentâ⬠¦it was a powerful aircraft with a liquid cooled Damlier-Benz DB-601 engine giving it 1,085 horsepower. A 3 bladed VDM variable pitch Propeller gave it an excellent climb speed of 17.5 m/s. also the aircraft had a low relatively low weight and giving it a high power to weight ratio. At high altitude the BF-109E could outfly the competition thanks to a 2 stage turbo-supercharger. The Fighter was also heavily armed. The plane sported two 7.92 synchronized machine guns in firing through the propellers with 1000 rounds per gun, and 2 MGFF 20-mm cannons firing through the propeller arch. Each cannon had 60 rounds per gun. Am munition was limited with the cannons, but one well-placed burst could critically damage or destroy a fighter. Because of their strengths, the BF-109 was used as fighter hunter and interceptor. The Germans also used heavy fighters to escort the bombers and dive bombers. The BF-110 was a dual-engine, heavy fighter with heavy firepower. The BF-110 has two DB-605 engines, each with 1,185 horsepower. These aircraft had a climb speed of 10.5 m/s, which was slow, but, impressive for an aircraft its size the aircraft had a large airframe, and heavier weight, making it a slower less maneuverable aircraft.so, what the BF-110 lack in agility, it made up in firepower. This aircraft had 4, 7.92 machine guns which were housed in the nose. Also the aircraft usually carried 2 MG FF cannons, but it wasnââ¬â¢t unusual to seeShow MoreRelatedEvaluate the View That Operation Barbarossa Was the Major Turning Point of the European War.1513 Words à |à 7 Pagesit became evident the tide was turning a gainst the Axis powers and in favour of the Allies. Operation Barbarossa and the entire Russian campaign can be seen as one significant turning point that helped to change the course of the war and yet it can be argued that this was not the sole and most major turning point. The Battle of Britain in the air war and the Battle of El Alamein in North Africa have also been labeled as turning points in the war due to their significance and the contribution they haveRead MoreWw2 Essay957 Words à |à 4 Pages on behalf of the Allies, made military contributions in the Second World War, albeit with varying results. Canada had declared war on the Axis Powers only a week after Great Britain and France had made their declarations. The war continued on, and Axis victory was being averted by sheer Allied bravery, even though Britain was near to collapse and France and the rest of Europe had long fallen. Allied victory seemed impossible, until the United States entered the war in December 1941 . It was a turnaroundRead MoreWorld War I Was A Great Power1374 Words à |à 6 PagesOn August 4, 1914 Great Britain declared war on Germany because the Germans attacked France through neutral Belgium. When Kaiser Wilhelm II took control of Germany, relations between Germany and Britain began to change because Wilhelm II wanted Germany to be a great power. Britain recognized Wilhelmââ¬â¢s II strong economy, large population, and powerful armed forces as a threat capable of dominating Europe, therefore, Britain began to support Russia and France, joining the Triple Entente. Under theRead MoreEvaluation of the Battle of the Somme Essays1232 Words à |à 5 PagesEvaluation of the Battle of the Somme World War 1 started in 1914 and lasted for four years. There were many causes for the World War and many thought it been coming for a very long time. There was a growing tension between France and Germany over land and border lines. Also, Kaiser Wilhelm, theGerman leader, wanted to prove how powerful he thought the Germans were. But, the assassination of Archduke Franz Ferdinand is what many historians believe to have started theRead MoreSir Winston Churchill Essay1225 Words à |à 5 Pagestwentieth century more than Sir Winston Churchill. Remembered mainly as Great Britains prime minister who led the first successful stand against Adolf Hitlers Nazi Germany, he showed the world the importance of democracy and liberty by leading the battle against fascism and dictatorship. Churchill appeared headed for greatness even at his birth in 1874; his grandfather was the first Duke of Marlborough and his parents were Lord Randolph Churchill and Jennie Jerome, the American daughter of theRead MoreGermanys World War One Reparations701 Words à |à 3 PagesGreat Britain were all drawn into the war, for the most part because they were engaged in treaties that obligated them to fend for other nations. Western and eastern front line quickly opened along the borders of Austria-Hungary and Germany. The inaugural month of battle consisted of audacious attacks and rapid troop movements on both front lines. In the west, Germany assailed first Belgium and then France. In the south, Austria-Hungary initiated an attack on Serbia. Succeeding the Battle of theRead MoreWorld War 2 Paper1057 Words à |à 5 PagesEVENTS: The Battle of Britain- Later in the summer of 1940, Germany launched a further attack on Britain, this time exclusively from the air. The Battle of Britain was Germanyââ¬â¢s first military failure, as the German air force, the Luftwaffe, was never able to overcome Britainââ¬â¢s Royal Air Force. Greece and North Africa- As Hitler plotted his next steps, Italy, an ally of Germany, expanded the war even further by invading Greece and North Africa. The Greek campaign was a failure, and GermanyRead MoreEssay about American Success in Achieving Independence1517 Words à |à 7 Pagesachieving independence due more to General Washingtonââ¬â¢s strategic skill or to British blunders? Introduction The British military was considered the strongest in the world at the outreach of fighting between England and the American colonies in 1775. Britain had just defeated France and the Indians in the Seven Years War and had attained its prominence as a worldââ¬â¢s superpower. Yet despite Britainââ¬â¢s overpowering military dominance, the British found themselves unable to subdue General Washington and theRead MoreThe Battle of Britain: The Nazià ´s Failure1201 Words à |à 5 PagesBattle of Britain is the name given to the effort by the German air force, run by Luftwaffe to gain air superiority over the Royal Air Force (RAF). The Battle of Britain was the first major battle to be fought entirely by air forces. It was the largest and most sustained bombing campaign to be attempted, as well as the first real test of vital bombing theories developed since World War I. The failure of Nazi Germany to destroy Britains air force or to break the spirit of the British governmentRead M oreA Brief Biography of Sir Winston Churchill Essay885 Words à |à 4 Pages ââ¬Å"Socialism is a philosophy of failure, the creed of ignorance and the gospel of envy. Itââ¬â¢s inherent virtue is the equal sharing of misery(Sir Winston Churchill).â⬠During World War I and II, much of Europe was taken over and placed into the slavery of socialism and of Adolf Hitler. While much of Europe was sitting on their hands over the crisis of Hitler, Churchill stood strong and knocked the Nazi general back into his place. Most European governments pre-World War II held total authority over
Subscribe to:
Posts (Atom)