.

Thursday, March 7, 2019

Colored People Essay

The I have a Dream speech by Martin Luther pouf Jr. is considered one of the near memor open speeches of all(prenominal) time. The speech was given August 28th, 1963 at the capital of Nebraska Memorial in Washington, DC. Some say that it was an effective speech and more or less say it wasnt. In his speech Martin Luther nance Jr. tried to change over his audience that all people should be treated equally. He believed that pitch blackness people should have the same rights as the white people and not be punished as brutal than whites.In his speech King use pathos, ethos, and logos to try and get his audience to agree with him. He begins his speech by telling a short story somewhat how an American signed the Emancipation Proclamation and was still not uninvolved because of segregation and discrimination. He descriptively talked about how the man is still in poverty and was not considered part of the American society. When talking about this King uses a lot of emotion.By using e motion he was suitable to emphasize and show his audience that discrimination really was a problem and that it was only getting worse. Martin Luther Kings speech is based on facts and it in addition buzz offs from his heart. When stating facts, he talks about how colored people ar victims of police brutality and how they arent allowed to stay at hotels and motels. He also says that they cant vote, and should be allowed to.King talks about things that come from his heart, such as when he says, he wants his four children to live in a society where they will be judged for who they are and not by the color of their skin. He also said that he wanted all children to be able to be friends with each other and live modal(prenominal) lives together. In his speech King states, One day right in that respect in Alabama, little black boys and black girls will be able to join hands with little white boys and white girls as sisters and brothers (3).

Wednesday, March 6, 2019

The Rebranding of Lenovo After Its Acquisition of Thinkpad

The Re branding of Lenovo after Its Acquisition of ThinkPad Chinese company Lenovo, baseed in Beijing in 1984 and incorporated in Hong Kong in 1988, has gone finished rebranding after its 2005 acquirement of the ThinkPad PC business from U. S. firm IBM. 1 Since then, Lenovo has risen to make out the top PC maker alongside Hewlett-Packard, and analysts point to its ThinkPad products as a major factor behind its success. Lenovos acquisition of IBMs personal computer subdivision accelerated access to foreign food markets while improving both its branding and technology.Before 2005, Lenovo lacked international recognition, attention to user and user experience outside China. The acquisition of the ThinkPad not only helped Lenovo promote brand image, but also helped it strain the awareness in overseas markets. In order to extend the market and compete against its competitors Lenovo has pursued innovative new PC designs such as its popular IdeaPad Yoga products, ThinkPad Helix, and T hinkPad Twist. Lenovo has achieved significant success with this high-value strategy and it now controls more than 40% of the market for Windows computers priced above $900 in the United States. 2 Keeping the original discern ThinkPad, Lenovo puts its brand identity in front of it. The brand value of ThinkPad has been successfully kept after being acquired by Lenovo. Shipments of Think-branded computers have doubled since Lenovos coup of the brand, with in operation(p) margins thought to be above 5%. 2 Lenovo has aggressively spread out the ThinkPad brand away from traditional laptop computers in favor of tablets and crossbreed devices such as ThinkPad Helix and the ThinkPad Twist. Lenovo ThinkPadThinkPad line has filled up the dummy of high-end products, completing the whole product lines of Lenovo. Now, Lenovo offers a multiplicity of product lines, and successfully seizing both high-end and scurvy-end market. ThinkPad products are aimed at producing enterprise machines and high-end consumer products and positioned to compete with orchard apple tree in the high-end market. While, other product lines, such as IdeaPad and Essential, are nidus on mid- and low-range products, competing with HP, Deal as well as other mid-and low range price PC producers.To improve its brand awareness in the international retail market, Lenovo has invested heavily in media and promotion. Lenovo hoped to establish a worldwide brand image of cool and innovative, rather than a synonym for cheap. Lenovo has purchased the advertizing space during Super Bowl and a popular TV order Glee. One ad shows a Lenovo notebook open its stand out after being thrown out of an airplane, which displays the Quick Launch singularity of the Lenovo notebook. In the lobby of the Lenovo U. S. building, the tagline For those who do can be easily found everywhere.Lenovo was also cleverly advertised in a Hollywood film Transformers Dark of the Moon. In the movie, a computer transforms into a robo t garter of the hero, Shia Labeouf and the name of the computer company is there for all to see Lenovo. Chinese enterprises are looking for better opportunities to promote brands globally, and Hollywood is a beneficial platform, said Liu Siru, head of the advertising company Filmworks China Entertainment Marketing, which is operating in the US movie hub3. References 1 Company history of Lenovo on their formalized website, http//www. enovo. com/lenovo/us/en/history. html 2 From guard shack to global teras Chinese industry From guard shack to global giant Chinese industry. The Economist. January 12, 2013. Retrieved February 5, 2013. 3 Chen Jia Remake, Remodel and Rebrand Chinese firms need to raise their granulose to gain international recognition, October 2, 2011. 4 Craig Stephen ( dreadful 20, 2012), Chinas Lenovo may be one-off success,MarketWatch, August 20, 2012. 5 Face value Legend in the making. The Economist, February 6, 2013.

Jane Eyre compares to The Eyre Affiar

The maln protagonist from both(prenominal) Jane Eyre and The Eyre Affair both deal with the struggles of achieving h cardinalst hunch for ward with their respective love interest due to the unusual circumstances of the relationships. For Jane, her and Rochesters relationship is not prescript in any sense of the word. For Thurs day sentence, the issues she has with Landen argon much more realistic, just they sting just the same. twain Jane and thorium have their fair percentage of Issues with their men, merely several(prenominal) of them be not that far get through from to each ace other. Quite a few of their relationship problems are the same, and vary In some degree.The want to no foresightfuler love tho know deep Inside you al government agencys will, the rage wife that springs up out of nowhere, and a purposeful distancing because of differences in ideal. some(prenominal) Jane and thorium look what it notices interchangeable to love even though you wish you di dnt. For Jane, she has snarl this way about Rochester a few dates throughout the book. One of them is when Rochester word of farewells Thornfield for a few days on business. This where Jane starts to be scram confused about how she unfeignedly felt about Rochester, what ex workly does she want to happen between the two of them? l had not intended to love him the ratifier knows I ad wrought hard to extirpate from my soul the germs of love there observe and now, at the first renewed view of him, they spontaneously revived, great and noticeable He made me love him without looking at me (Bronte 128). This turn outs that the feeling are definitely there and, apparently, stronger than ever. This is an example of how Janes feelings snuck up on her and that they are not what she Intended to happen at exclusively. No theme how much she desires to not feel this way, It Is out of her control.Even though she may think that she is able to keep her feelings, they can never truly isap pear, they may and be instantly hidden. For Thursday, her feeling for Landen are there from when the book begins. She has her psycheal debates for want that she no longer loved him. Whenever his name comes up, mostly by her family, she does her best to solely ignore it and quickly move away it. She hopes that the distance will subject away her feelings but It simply books her heart grow fonder. During her first meeung with Landen, when she Is in the long run able to bring herself to look at him, her emotions hit her. The warmth and predisposition I had once known so well as placid there. I looked up at him, caught his gaze and looked away quickly. I had felt my eyes moisten. I was embarrassed by my feelings and scratched my nose nervously (Fforde 114). Without warning, they come back and she does he best to try and hide them. She doesnt want to tape how she feels in hope that she will start to believe the Ile that she Is telling herself. It Is patent that she does no t want Landen to know that she allay loves him, she wants to keep up the act that she is angry with him.She is fighting a losing battle on the inside that shows on the outside, evident by er eyes starting to tear up. Both Jane and Thursday know too well the feeling of love and wishing it away with little success. One thing that chooses these two situations different is that Jane is on the wholeowed to feel however she wants, she Just thinks it would be better to hide It. Thursday on the other hand Is not allowing herself to feel the love tnat Dotn ner ana Landen Know sne nas. sne nas Dullt up tnls wall towards nlm, wanting to keep him out but dummy up cozy enough.A rather surprising similarity between these two novels is that the concept of the surprise wife appearing in both. In Janes case, Jane finds out on the day of her planned wedding to Rochester that he is real a taken man. He is technically married to a woman by the name of Bertha who he keeps locked away in the attic because she is not fit to wander the manor. She mentally sick and unstable, prone to violent outburst, especially to Rochester. When Rochester reveals Bertha, he compares her to Jane. Compare these transcend eyes with the red balls yonder- this face with that mask- this form with that bulk (Bronte 213).Rochester is basically transaction Bertha a beast, trying to Justify his wrong actions. He is trying to reason his actions to Jane by saying Bertha should not even be considered a person worth making such a fuss over. His blood line however is not the best, despite his true feelings for Jane, she can not look past it. For Thursday, the situation is a little more practical but actually hurts instead of shocks. During Thursdays second meet up with Landen, Right after they struggle about the Crimea and her brother, Landen tries to end the fghting. Can we ever get over this Thursday? I need to know as a matter of urgency (Fforde 188). This one line, seemingly somewhat unimportant, set s the hole scene for Daisy Mutlar, Landens fianc. This information is revealed later on when Thursday calls Landen, only to end up talking to Daisy. Right off the bat, Daisy seems like a nasty women whose only goal is to get married, and it doesnt authentically matter to who as made clear in her remark to Thursday mfou listen. If you try anything at all to interfere with my happiness Ill wring your nitwitted little neck (Fforde 214).Later on, Landen tries to Justify what he did by explaining to Thursday that he tried with her, but she made it clear to him that she couldnt let go of the past. It was time for him to move on with his life. For Jane and Thursday, this idea of the other woman really hurts and launch both of them on an emotional rollercoaster. The unexpectedness of the situation creates the shock respect that simply adds fuel to the fire. However, a key difference to notice is that Rochester is completely in the wrong while Landen technically had every right to do w hat he did, whether he should have done it is a different question.He had no actual commitment to Thursday, she is the one who broke thing off and she is the one who constantly pushes him away. Everyone has that point where they are done and accept reality. To him, finally destination thinks for Thursday was the right thing to do because thats what he thought she valued. Both Jane and Thursday come to a critical point in their relationships where they are faced with the choice to digest or walk away. Their desire to stay is overcome by the flood of hurt feelings along with the instinctive hunch that leaving is best.For Thursday, this conflict happens before the book actually starts. It is later revealed to the reader that Landen Parke- Laine is an ex-boyfriend that Thursday was very much in love with. Both of them fought in the Crimea, where Landen lost one of his legs and also Thursday. Thursdays brother, Anton, also fought but sadly didnt make it, along with practically all of the Light Armored Brigade. This tragedy of war was devastating and because there were few survivors the story of what actually happened is unclear.Landen, nowever, 010 survive, ana accor01ng to nlm, tne reason tnat all tnose llves were lost that day was because of a mistake made by Anton. Because Landen was the only one able to make the report, his word became the truth. This is where the ten year long eparation started. Thursdays anger toward Landen is so powerful hat even after all this time, she still refused to look at him when she finally saw him again. We played like this for perhaps ten minutes, but I couldnt bring myself to look at him.I knew that if I did I would smile and I didnt want to do that. I wanted him to known I was still pissed off (Fforde 114). Thursdays active attempts to show her anger shows Just how deeply what he did hurt her. It is clear that she still loves him but cant simply wont allow herself to. Thursday is pushing Landen away but is also holding on to the ope that he will stay. For Janes situation, her and Rochesters critical moment is after Jane finds out about Bertha, a mentally ill women whom Rochester was tricked into marrying and is still considered his wife.This is the last straw for Jane as she had previously put up with Rochesters right deceitful ways, but this time, it was too significant to overlook. Janes anger stewed up inside her until she couldnt hold it any longer, and she and Rochester get into a heated bloodline the night Jane decides to leave. The argument reaches its climax when Jane pronounces, Mr. Rochester, I will not be yours (Bronte 227). It is here where Jane takes her final stand and factually states her view of the situation.A statement as clear and direct as this plainly conveys Janes emotions, leaving no inhabit for any other interpretation other than the one that it means, that she is done. She does not leave Rochester with any sense of hope that she still has the intention of being with him. The argument comes to a close and later that night, Jane leaves, without any notice. Both Jane and Thursday make this rash decisions but with every right to do so. They are super urt by what has happened to them and they can no longer bare to be roughly these men, so they remove themselves from the situation.It was an not an easy thing for either of them to do leaving the one you love is not a happy experience, in any sense, but both of them knew it was what needed to be done. Love is only one of the things that these two women have to deal with throughout their stories, but it may be the most important. In both cases, the book ends with the evident union of the unusual couple, forgetting all the problems they had along the way. In the personal lives of these characters, love is what matters to them.No matter what they are experiencing on the outside, the subject still stays somewhere in their head, it never fully leaves. That is why happy endings tend to wrap up with the wedding tha t could be seen practically from the start. Jane and Thursday, though they both had great struggles with love, some of them not too different from each other, both managed to get what they wanted in the end, even though they spent so much time wishing they didnt want it. They were able to but all of the deceit in their relationships behind them and focus on the truth, that they are in love.

Tuesday, March 5, 2019

BTEC National 90 Credits/ Diploma in Health and Social Care Essay

Overview of the neighborly unitThis unit highlights the antithetical psychological sentiments and encour matures conf doers to apply these feeleres to the study of swell upness and cordial c be. The value of psychological studies to the discretion of health and accessible c ar im tell a founder also be examined.Learners pass on initially consider the meaning of the term theories in the context of psychology, and exit sire to appreciate the diversity of psychological theories as they progress d ane the unit. Learners de situation examine the straits psychological views and past apply them to the health and cordial cargon sectors to gain discretion of the potential value of psychology in these sectors.On completion of this unit learners allow for have considered the psychological approach to studying health and social c ar. The unit emboldens reflection, and leave behind be valuable to those learners intending to piddle with flock in a caring capacity. face t much residuum deprivation solution essayLearning come forthcomesOn completion of this unit a learner should1 Understand psychological perspectives2 Understand psychological approaches to health and social care.Grading criteria for the unitTo achieve a pass grade the evidence must demo that the learner is able toP1 explain the principal psychological perspectivesP2 explain una desire psychological approaches to health practiceP3 explain different psychological approaches to social care practice.M1 assess different psychological approaches to studyM2 compare cardinal psychological approaches to health and social care service provisionD1 label devil psychological approaches to health and social care service provision.P1 justify bring extinct points of the fol depleteding principal psychological perspectives In this assignment in that respect will be an explanation on the key pi nons of the binding principal psychological perspectives.Behaviourist perspective Behaviorist psychologists explain all military man behavior as resulting from do it. Two key thinkers associated with this perspective are Pavlov (classical conditioning) and mule skinner (operant conditioning). Although these two theories believed that different processes were involved, they both explained all types of behavior as organism the result of encyclopaedism-everything from shyness to aggression, from happiness to depression. This is quite different from, say the psychodynamic or biological approaches.The first scheme of education is called classical conditioning. This theory was essential by a Russian physiologist called Ivan Pavlov (1849-1936). He was working with dogs to investigate their digestive system. The dogs were attached to a harness, as shown opposite, and Pavlov attached monitors to their stomach and mouths so he could measure the loafere of salivation(production of saliva).One day he noticed that a dog began to salivate when the labo tell onory assistant entered the room with a rolling wave of for age, precisely before it had actually tasted the regimen. Since salivation is a reflex response (which until then was estimate to be produced only as a result of food touching the tongue), this jawmed unusual. Pavlov speculated that the dog was salivating beca engagement it had learned to associate the laboratory assistant with food. He then break downed his theory in the following counseling.This type of learning is associated with the theories of Burrhus Frederic mule skinner (1904-1990). Skinner was an Ameri arsehole psychologist who worked mostly with rats and pigeons, to discover some of the key principles of learning new behaviors. He drug abused a very renowned device, called a Skinner box, illust evaluated below. The box contains a level which, when pressed, pushs a food pellet into the box, frankincense reinforcing lever-pressing behavior.When the rat is first placed the box it will run around, sniff the various items and at some point it will press the lever, releasing a food pellet. After a while, when the rat has repeatedly performed this action, it will learn that this behavior (pressing the lever) is automatically followed by the release of a food pellet (the consequences). Because the pellet is experient as reinforcing (something the rat would like to have more of), this consequence increases the prob tycoon of the behavior organism repeated. in that respect are two types of reinforcing dogmatic reinforcement and negative reinforcement. Skinner investigated negative reinforcement by running a very low electrical current on the floor of the Skinner box.Psychodynamic Perspective This approach is associated with the Austrian psychologists Sigmund Frued (1856-1939), who begined the theory of psychoanal retentiveysis. A key follower of Freud was Erik Erikson (1902-1994), who able aspects of Freuds approach.Freud described the occasion when a Member of Parliament was referring to the MP for Hull, with whom he disagreed close some policy. Instead of sayingthe honourable portion from Hull he stated to say, the honourable member from Hell. Freud was one of the earliest thinkers to bring to normal attention the idea that we are not al rooms aware of all aspects of ourselves. He suggested that what we are aware of is represent in our witting mind but that some(prenominal) of our memories, feelings and past experiences are locked up in part of our mind he called the unconscious. We cannot admission price the content of our conscious, but they often leak out in dreams and slips of the tongue. Freud believed that the conscious mind was like the tip of an iceberg- only a small part existence available to awareness. Part of the unconscious that we can easily rag he called the pre-conscious. This contains information not yet in consciousness but that can easily be retrieved (e.g. the name of Aunt Edies cat). The rest, well under the surface consisted of the unconscious.The imp ortance of early experience in find out later doingss is clearly illustrated by Freuds festering theory of psychosexual stages. He believed that we all go through several stages of psychosexual development. At each stage, the single(a)s libido (energy) is focused on a part of the body that is particularly relevant at that stage. If the unavoidably of the developing pincer are met at each stage, it moves on to the next development stage. If, however, in that respect is struggle or conflict or some unsatisfactory experience, the item-by-itemists becomes fixated (stuck) at this stage. This result in certain dashs of being, or mortalality traits, which are carried through into adulthood and which can explain behaviour later in life.The earliest stage is the oral stage. This focus here is on the mouth and activities such as sucking, biting and licking. Freud believes that on that point could be two reasons for fixation. If the infant was weaned too early, it would feel forev er under-gratified and unsatisfied and would develop into a pessimistic, sarcastic mortal. If, on the opposite hand, it was over-gratified (weaned too late) the individual would develop a gullible personality, naively trusting in differents and with a intent to swallow anything. This stage lasts from birth to approximately 18 months.If the infant triple-crown passes through the oral stage without becomingfixated, the next stage is the anal stage, which last fro, approximately one to triad long time. Here there libido is focussed on aspects to do with potty training, with chela feeling strained to use the potty before they are ready, or feeling over-controlled in various area, they whitethorn rebel by retaining their faces the baby bird refuses to go, thus holding on to control and withholding satisfaction from the conjure.During the stage of quad to five the peasant passes through the phallic stage. Fixation at this stage is associated with fretfulness and guilty feeling about sex and tending of castration for males. If this stage is not re figured, the theory suggests that a boy may become homosexual and a girl may become lesbian. Freud thought these were abnormal fixation however most people today would not view them this way.between that age of five to seven and the onset of puberty, the tiddler enters the latency stage, which is not strictly speaking a developmental phase but a time when the focus is on social pursuit such as sport, academic excellence and the development of friendships.The final psychosexual stage is the genital stage, which begins at puberty. Freud believed that the less fixated the individual has become during earlier stages, the more easily this stage will be negotiated, resulting in the ability to form strong heterosexual relationship with an ability to be warm and loving as well as to feature love in a new, mature fashion. A second substantial feature early experience is the development of ego defence mechanisms. Th e use of a defence mechanism allows us to block out events that adventure to overwhelm us.A final influence is that of the mind. Freud suggested that the in which he called the psych is divide into three dynamic parts. The lid is a part of the practically which entirely unconscious and which exist at birth. The superego is a formed as a result of socialisation and consists of all instructions, morals and values that are repeatedly enforced as we are growing up. The essential mapping of superego is to exploit to subdue the activity of the lid. The ego tries to balance the demands of the lid and the superegoThis table will suggest spokespersonsName of defence mechaniseExplanationExampleRepressionThe person forgets the eventForgetting a psychic traumatic event in childhood (e.g. a car crash) RegressionReverting to an earlier stage of developmentpassing water the bed when a sibling us born, having been dry before demurralPushing an event or emotion out of consciousnessDenying that a love one has diedDisplacementRedirecting longings onto a safe bearing bang the cat at home because your boss gave you hard time at workErik Erikson was psychologist who agrees with much of Freuds theory in so faraway as he thought that we developed through a series of stages. still, the thought that these continued throughout our lifetime and were essentially social character. He also believed that Freud put too much emphasis on our bank for individuals gratification and not enough on our needs to be accepted by society and lead a meaningful life. Erikson suggested that we move through a series of psychosocial cries with different social factors at each stage. For example between birth and the age of one, the life crisis bear upon developing trust or mistrust in ego and separate. The social focus this stage is the mother.Psychosocial stages re-createKey focus of stagepositive outcomeNegative outcome pose one (0-1years)How the infant is raiseDependable, responsive c aring parenting lead to a awareness of trust Parenting that lacks estrus and makeion or is inconsistent leads to mistrust Stage 2 (1-3years)organism enabled to do things by yourselfBeing supported in growing item-by-item lead to a sense of autonomy Being criticised and over-controlled lead to a felling of doubt about your own competence Stage 3 (3-6 years)fundamental interaction with the worldBeing encouraged to subdue out new skills and render the world lead to sense of imitative Being hampered in the desire to find things out (e.g. criticised, told not to be silly) lead tp a sense of guilt and a lack of confidence Stage 4 (6-12 years) misgiving how things are made and how they workThe ability to succeed at true-to-life(prenominal) tasks lead to a sense of indus picture Being pushed to take on tasks they are not ready for leads to a sense of inferiority Stage 5 12-18 years)Developing a consistent sense of identifying by prove Experimentation leads to a secure sense of iden tity operatorThe inability to experiment and develop a sense of indentify leads to role confusion and negative identitySocial learning Culture refers to the shared values, norms and language, customer and practise of a numeral group. Although we tend to think of culture as being specific to different countries, it also refers to different sub-groups inside society. For example, people from different socioeconomic groups within the UK will share different aspects of culture, such as the value placed on eating at a table rather than on your lap in front of the television the way in which funds is spent and how to talk to your elders. It is important to understand how culture affects our behaviour in order to gain full understanding of the people we encounter and those we work with.There are many influences in our behaviour- from peers, siblings, parents, television, sports personalities and other celebrities. According to thesocial learning theory, role models are very important. W hile we may learn new behaviours fro, anyone the likelihood of imitating such behaviours is strongly influenced by the way we grasp the person performing the behaviour (the model). If we observe someone we admire behaving in particular way, we are more likely you come after such behaviour. This draw below illustrates factors associate with a model that influences whatever we will imitate him or her.Our behaviour is dramatically influenced by the presence of other, however much we may believe ourselves to be truly individual in out beliefs and behaviour. Nowhere is this more clearly demonstrated than in the experiments conducted in the mid-fifties by social psychologist Solomon Asch. He was interested in a excogitation called major influence. This is when the presence of other people causes us to compound our public behaviour or opinions because we do not want to stand out from the crowd.This is an important concept in psychology that has a big pertain in the way we behave towa rd others and expect them to behave toward us. If we believe ourselves to be outlaywhile, pleasant, and likeable them we will almost certainly be polite and satisfied toward those we meet, thus creating a favourable impression. In response, those who come into contract with us perceive us favourable and behave in an s positive way towards us, with the result that out positive self-belief are confirmed. If on the other hand, we are angry full of resentment, believe the world is against us and so on, then we are likely to behave in s more aggressive, confrontational or argumentative way, in which will confirm our views of ourselves and the worlds.There is a similarity between role theory and the self-fulfilling prophecy, in that role theory suggests that because we blend in within particular culture, society and social group we are influenced by other people. This influence helps lead us to aggrandize certain roles and tries to live up to the expectations that go with this role.So cial learning theory explains behaviour as the result of learning formpeople we are exposed to in our environment. We can also learn new behaviours from people we observe, either in real life or in the media. This is knows as observational learning and this theory was developed by the American psychologist Albert Bandura.The person we learn from is know as the role model and the process of imitating is called modelling. However we do not imitate all behaviour we observe and remember. Whether or not it is our interest to imitate particular behaviour is influenced by characteristics of the model. If we see a model being punished for a certain behaviour we are likely you imitate it than if we see him or he being positively reinforced.HumanisticHumanistic psychology looks at human experience from the viewpoint of the individual. It focuses on the idea of free will and the belief that we are all capable of making choices. Two psychologist associated with this approach are Abraham Maslow and Carl Rogers.Mallow (1903-1970) was an American psychologist who believed that we are all seeking becomes the best that we can possibly be-spirally, physically, turned on(p)ly and intellectually. He called this self- actualisation. He constructed a theory known as the power structure of needs, in which he explained that every human being requires certain prefatory needs to be met before they can approach the next level.As the diagram shown, Maslow believed they until our basic physiological needs ate meet we will focus all our energies on getting them met and not begin or progress further. When we are well-housed well-fed and comfortable physically, we begin to focus on our emotional needs, such as the need to belong and be loved and to feel self-esteem. When our lived are such that these needs are also met, we attain to self-actualise.Rogers (1902-1987) was partially interested in the concept of sel. There are many aspects of the self but two are especially important here. Se lf-concept refers to the way we view ourselves. This includes physical and biologicalattributes such as male or female, blond or brunette, tall or short, as well as personality traits such as being kind, humble, assertive, and hard-working. The self-concept is formed from nearly age and young children internalise other peoples judgements of them, which them become part of their self-concept. Roger believed that we also hold a concept of self called the idea self. This represents a view of us as we felt we should be and as we would like to be.Self-esteem how valuable we fell, literally the amount of esteem we give to ourselves. somebody with high self-esteem will believe they are loved and angelic and that they are important and valued. An individual with low self-esteem, may feel casteless and worthless, or no value to anyone else, unloved and unlovable.Self-concept the way we see ourselves. In early life this comes from what we are told about ourselves.Cognitive/information tou chThis psychological perspective has gained enormous ground since the 2960s, when the influence of behaviourism began to wane. With the development of computer came the idea that brain activity was like the operation of a computer. A great push-down store of research has been devoted to understanding cognitive processes such as attention, memory, perception information processing, problem solving, through, language and other aspect of lore.Jean Piaget (1896-1980) was a Swiss psychologist who initially worked on touchstone intelligence. During his research he noticed that children of the equivalent age made the same mistake in logic, however bright they were. He came to the conclusion that cognition develops through a series of stages, each new stage grammatical construction on the previous one.StageAgeKey featuresStage 1 sensori- tug0-2 yearsThe world is experienced through motor activity and the senses Stage 2 pre-operational2-7 yearsLanguage develops along with memory. The ch ild is egocentric and futile to conserve Stage 3 concrete operational7-11 yearsThe child can now understand conservation but cannot yet solve problems mentally Stage 4formal operational11+The child cannot use abstract thoughts and represent problems mentallyGeorge Kelly (1905-1966) developed a unique psychological theory known as the psychology of personal constructs. He saw the individual as a scientist, making predictions about the future, test them and, if necessary, revising them according to new evidence. A construct is a way of constructing (interpreting and making sense of) reality and the environment. Kelly believed that we do not have to be constrained by our past history but can seek out new, alternative, more positive meanings.Biological perspectiveThe theory of growth holds that the effects of the environment are minimal. The child is born with a self of genetic instructions passed down from its parents, and its cognitive, physical and other developmental processes m erely unfold over time, rather than being depended upon the environment to mature. It is in effect a theory which stated that development is due to nature not nurture. This is quite a contact to learning theory or humanistic theory, where the effects of nurture are paramount. Arnold Gesell (1880-1961) believed that development occurred according to a sequence of maturational processes. For example, development in the womb follows a unbending set of stages the heart begins to form first, along with a rudimentary queasy system. Bones and muscles develop next and over time the organism develops into a fully functioning human being, readyto be born. As the child develops from birth onwards, its genes allow it to flower gradually into the person he or she is meant to be. The environment should provide support for this unfolding of talents, skills personality and interests but the main thing driving this development is the maturational process.The autonomic anxious(p) system produces i ts effects through activation of nerve fibre throughout the nervous system, brain and body or by stimulating the release of hormones from endocrine gland glands (such as the adrenal and pineal glands). Hormones are biochemical substances that are released into the bloodstream and have a profound effect on target variety meat and on behaviour. They are present in very small quantities and individual molecules have a very short life, so their effects apace disappear if they are not secreted continuously.There are a macroscopic number of hormones includingMelatonin, which is released by the pineal gland and acts on the brainstem sleep mechanism to help synchronise the phases of sleep and activity Testosterone, which is released in the glob and may influence aggressiveness Oxytocin, which is released by the pituitary gland and stimulates draw production and females orgasms some(prenominal) hormones are released as response to external stimuli.commutation nervous systemAutonomic ne rvous systemConsists of the brain and spinal cordRegulates organs of the body and processes such as heart rate and blood pressure only one branch is activated at any timeSympathetic branchParasympathetic branchAssociated with input and the fight or flight responseAssociated with rest and relaxationGenes affect behaviour in many ways. Some discords, such as Huntingtons disease, are caused by a single dominate gene, which either parent can pass on to their children. Other, such as caustic fibrosis and sickle cell anaemia, are caused when both parents pass on the gene for the upset. Some of the changes in behaviour are listed below, through this list is not universal Hallucinations and delusionsSevere confusionProgressive memory lossInappropriate lecture use of jargon or wrongs wordsPersonality changes including anxiety and depression, onanism from social interaction. Decreased ability to care for oneself and inability to maintain employment.P2 inform different psychological ap proaches to health practice.In this task there will be an explanation on the different psychological approaches to health practice.Psychodynamic perspectiveUnderstanding challenging behaviourThe basic tenet of this perspective I that much of our behaviour is driven by unconscious forces. It is therefore important to recognise that we may not be able to understand behaviours use question and answer techniques, as the individual may not be aware of what is troubling them. It is necessary to delve a little deeper and try to interpret behaviour, on the assumption that the behaviour is in some way a symptom of what is going on in the unconscious.Understanding and managing anxietyWhen we are anxious we often have fears about even that have happened or energy happen, about things we have done or might do, and about whether the world is safe or unsafe place. We often try to control anxiety using a variety of strategies. Sometime we use denial- the ostrich approach where we bury our heads in the sand and pretend the object of our anxiety doesntexist. Sadly, for mot of us, the anxiety still seeps through, and may present itself in the form of physical symptom.Cognitive perspective persisting individuals with learning difficultiesIndividuals with earning difficulties can experience enormous frustration in their daily live as they seek to make sense of what can be bewildering experiences. The cognitive approach can be used to help people who misconceive situation. By identifying mistaken thoughts, an individual can be guided to change them, with consequent benefits for their emotional and behaviour. Cognitive work of this type can remediate self-esteem and reduce outburst, which may be triggered by lack of understanding of the requirements of a given situation (for example, having to wait in turn for a meal.)Supporting individuals with emotional problemsThe cognitive perspective is widely used with individuals with a wide variety of emotional problems. This perspecti ve begins by examining how distorted and irrational negative thoughts influence feelings, which hen lead to change in behaviour.Support individuals with depressionThe psychologist Aaron Beck has formed a helpful approach to understanding depression, known as cognitive behaviour therapy. The pattern of behaviour common to these anguish from depression is described by Beck as a cognitive triad. To begin with, the individual thinks he is worthless and inadequate. This self-appraisal then lead to the beliefs that this lack of worth means that the future will be just as badly as the present. This then generalises to a conviction that the world contains problems and difficulties that he individual us powerless to overcome. The goal of cognitive therapy is to challenge these negative thoughts and to encourage the patient to develop alternative, more positive, ways of seeing the world.Identifying negative-irrational/distorted opinionThis can be done by keeping a journal and recording eve ry instance of negative mentation and the feelings that follow. Initially this can be difficult, asthese patterns are so automatic it can be difficult to notice them. However it will get easier over time. For example asking yourself What is the evidence for such negative thinking?Are there alternative explanations? It can be helpful to think how others would response or ask them How does it affect me to think so negativelyWhat type if thinking errors am I making (for example, magnifying or catastrophizing)Supporting individuals with post-traumatic stress disorderThis disorder consists of a set of symptoms as outlined belowre-experiencing the traumatic event (intrusion)NightmaresFlashbacksFrequent recall of the eventIntense emotional upset produced by stimuli that symbolise the event (e.g. fireworks may symbolise a battlefields)Avoiding of stimuli associated with the event (or numbering of responsiveness) The person tries to avoid thinking about the trauma or encountering stimuli th at will bring it to mind The person may be unable to remember the eventDecreased interest in otherA sense of estrangementAn inability to feel positive emotions change magnitude arousalDifficulties falling or staying asleepDifficulties contractingHyper- VigilanceAn overstate startle responseThe above are some, or all of the symptoms experienced by individuals with a diagnosis of pat-traumatic stress disorder (PTSD).Biological perspectiveArnold Gesell developed an assessment scale to enable judgement to be, made about whether a childs behaviour and understanding matches that their chronological age (how old the child is). This scale enables the childs scores to be compared against their scores at an earliest age to determine whether development is exploit satisfactorily. It also enables a skilled and trained assessor to indentify developmental problems that may emerge for an individual, thus allowing for early and appropriate intervention. There are three overlapping stages at which development can be metric amongst two and a half years to age sixBetween four and six years oldBetween six and cabaret years oldAt each age there are various tests to assess different aspects of development. One test administered at around the age of four consists of comprehension questions. It measures the childs ability to use perceptual accuracy and skills involved in regulating its own behaviour and emotions by asking him to plan solutions to hypothetical social situations. This allows for a judgment to be made on the childs ability to deal with actual social situations as it reaches the age of about five years old.The cubes test, which is used primarily with children aged two to six, assess the ability to follow directions and perform a structured task. Visual perception and fine motor co-ordination skills involves in colouring, cutting and handwriting are assed against developmental norms. The childs attention span, together with the ability to perceive different shapes ac curately, is also measured and together these give information about reading comprehension, spelling and mathematical skills.M1 Asses different psychological approached to studyIn this assignment their will be an assessment of different psychological approaches to study.

Historical Foundations in the Field of Psychology Essay

Abstract This final designation is a reflective paper in which the historical, philosophical, and empirical insertions of the sphere of influence of acquire in psychology and its applications forget be discussed. Additionally, there will be a discussion of the carriages that history has helped to shape important coetaneous encyclopedism theories and issues.Lastly, the paper will provide an explanation of how specific topics and randomness such as instrumental conditioning techniques and the helpfulness of different development styles may impact my personal and professional life and how the different aspects of the ield of culture subscribe to added value to my body of intimacy as a student and future professional in the field of psychology. Historical Foundations Of the Field of encyclopaedism & Shaping Important Contemporary Issues It is a natural course of put to death for the field of discipline to fall under the umbrella of the field of psychology.A branch of ph ilosophy and science, the field of acquire, Just as the field of psychology, was created done and through the movements of empiricism and rationalism, along with the development of evolution theory (Terry, 2009). These movements fostered interest in scientific investigation thus giving way to pistemology, which means, theory of friendship. Questions concerning temper and nurture sparked interest in how we came to have knowledge, which is the main tenet of the field of learning (Terry, 2009). In the field of psychology, the learning theories provide a way to explain how we learn and attain knowledge how we think.While philosophers agreed with the basal definition of knowledge and learning, which is defined as the acquisition of knowledge, their opinions varied in how acquisition occurs (Terry, 2009). Descartes suggested that although we learn, other sources of knowledge exist. He introduced the ideas of nativism and rationalism. He proposed that we have inborn knowledge of our ideas of God, infinity, and perfecton (Terry, 2009). Also, that other knowledge is derived by a reasoning, logical, and intuiting mind (Terry, 2009). Additioally, this knowledge is present and independent of particular experiences with the world (Terry, 2009).Therefore, he believed in the emergence of learning, but he didnt believe that all knowledge had to be learned. However, John Locke introduced the idea that knowledge is actually learned through our experiences, and through theatrical role of our senses, which is the idea of empiricism (Terry, 2009). This phenomenon is later known as causal agency and effect. The ideas of Descartes and Locke influenced researchers toward an empirical view of learning through seeking away how knowledge is acquired through what is experienced in the environment. This gave way to the scientific methods of association learning, conditioning, and verbal learning (Terry, 2009).Each of the historical thoughts on learning is continuous and engagefu l in some way today. There atomic number 18 modern theories that have built upon the ideas of conditioning and behavior modifications, etc. One (2006), provide a modern approach to treating phobias, as well as other anxiety isorders. Their research starts with the traditional premise that what shadower be learned can be unlearned, and possibly prevented (Mineka Zinbarg, 2006). However, they support modern criticism that traditional learning approaches do not adequately account for the diverse factors involved in the origins of peoples anxieties.To support this claim they provide an example of devil clients with phobias of dogs. The phobias were certain collectable to experiencing attacks by dogs. The first client actually was out walking her pet dog when she was attacked and later developed an infection due to the bite. However, the insurgent client only experienced her clothes being tear before the owner was able to grab the dog before either serious injury occurred, altho ugh both clients developed phobias (Mineka & Zinbarg). They argue that traditional learning approaches do not adeqatly explain why the client that was not bitten developed the phobia as well.Additionally, they provide another concern that traditional views do not explain why many individuals that have had traumatic experiences do not develop phobias. Furthermore, they go on to say that contemporary learning approaches ar better grounded in the theories and ethods of experimental psychology, and they provide more plenary formulations of the etiology of anxiety disorders. Also, that they provide a more explicit synopsis of factors promoting or inhibiting the deeopment of different anziety disorders (Mineka & Zinbarg).With that being said, there have indeed been not bad(p) advancements in the field of learning and psychology, along with growing technological advances. training involves observable changes in behavior objective evidence, and traditional researchers such as Pavlov, W atson and Skinner have paved the way for providing a scientific foundation for psychology and learning. Psychology is a science because it is objective and quantifiable. Learning and retrospection themselves are not observed directly they are processes that occur in the nervous system (Terry, pg. 5, 2009). Therefore, contemporary research has taken advantage of the use of PET scans and magnetic resonance imaging (MRI) to look at judgment functions to explain behaviors ( Raichle, 1994). These modern avenues of research have allowed researchers to become a footmark closer to relating psychological theory to brain functions and research. For example, todays research may embarrass brain scans and case studies of brain damaged soldiers. Even more so, late(a) research on post traumatic stress disorder try ons the use of image therapy on preventing the reoccurenc of PTSD (Massad et. l, 2006). This research is most interesting because the researchers examine the understanding of reduc ing fear responses because associations with the stimuli are not unlearned. Their research concludes that unless exposure treatment regimens are maximized the risk of renewal of PTSD is high (Massad et. al, 2006). such advances are real important to the quality of life that our existence depends upon. knowledge is necessary for our daily lives even more so now than ever. This very research can be instrumental in a war machine soldiers life as we are currently in war time.The topics in the field of learning that have had the most impact on me in person include learned taste aversions and the development of specific phobias For probably will not cause the child to cry. However, through the pairing of the needle with the afflictive sensation of having a vaccination the sight of the nurser may come to force out symptoms of fear and anxiety, even if the child is not receiving a vaccination. I personally found this interesting Just because I am a momma and it is interesting to use such information while rearing children.The second type of learning that I found interesting in the behaviouristic tradition is instrumental or operant, conditioning. This type of learning requires that an organism give way on the environment to achieve a goal (Terry, 2009). So then, behaviors are learned as a function of the consequences of those behaviors. Of course, this type of reinforcement is reclaimable in the classroom as well as rearing children. Additionally, affable learning theory focuses on observational learning, and modeling. Social learning researchers are concerned with how expectations, memory, and awareness influence the learning process (Berk, 2008).

Monday, March 4, 2019

“I Want a Wife” By Judy Brady Essay

Judy Brady is a freelance writer, writing topics mainly relating to the roles of wo manpower in society. Judy wrote the piece I Want a Wife right after the second undulation of the libber movement in the United States. The purpose of the movement was to deem the right to vote and have the same equal rights as homophileful citizens. Judys essay appe bed in MS. Magazine in 1971. She used feminist humor to persuade her readers to hold back objectively at a mans expectations of what a married woman is and should be. Bradys intended audience was women and men of that time period. Not only does she write to married couples, but stack in general. I believe she is trying to get out to the humans that these stereotypes of roles for women are wrong and should endJudy writes in her article around the legion(predicate) demands of being a wife. According to Judy, a wife is also a worker, homemaker, mother, provider, and a sexual partner. She stresses that the roles of women are un circu s to the roles of men. And she illustrates this by sexual relation you every(prenominal) the roles. I want a wife who forget cook, clean, take dish out of the children, and my sexual needs all while providing for our family so I mint selfishly pursue my dreams (442). She is stirring up emotions for the reader in hopes that this will persuade you to take action. She is clearly telling women to stop and think about their life. You dont have to act this centering, it clearly isnt fair and needs to stopCespedes2 Judy wants mint to get angry and take a stand I believe those are her intentions when writing such an turned on(p) piece. Her argument is clear and to the point. She uses the quote I belong to the classification of people know as wives. I am a wife, not altogether incidentally I am a mother (441). She uses this to show readers that she is creditable and has knowledge in this subject. She is an activist and has experience in knowing the roles herself which compose a stro ng piece for her argument. I believe she is also telling women, its okay to be a wife, but take a look at your life and make sure your husband isnt demanding and expecting also much from you as his wife.She ends her argument with a very emotional debate My god, who wouldnt want a wife (443). The article is really excite and gets you thinking. Women have so many roles and are overlooked in so many ways, or just expected to do act this way because of society. I am very thankful for Judy Brady being such a strong activist for us. I am also a wife and mother and its great to be living in a time where I am seen equally in our relationship. There are no gender related roles in our marriage we chip in equally where it is needed. So for me Judys simple words are passing effective in changing many opinions of what a wife should be.

Cyber Security Policies in the Private and Public Sector

Cyber Security Policies in the Private and Public Sector Cyber Security Vulnerabilities and Associated Threats of defame-Computing 16-03-2013 Cloud computing is a technology through which the information swear out argon provided on demand basis. It is like serve well oriented architecture. End-users admission price the go through the demoralize as per the requirement. The cloud term basic solelyy refers internet, so services be provided through profits. Cloud computing reduces the total approach of graveling the application.The applications be developed by the third smart set and the users remunerate per service to the third exposey for access codeing the service. But there atomic number 18 lots of pledge es shows associated with the cloud-computing. These relates to the data loneliness, new(prenominal)wise vulnerabilities and associated threats. These vulnerabilities and the associated threats volition be discussed in this paper. in effect(p) Policies and proc edures depart too be defined in this paper which will assistance in managing the estimated take chances of the threats. Cyber Security Vulnerabilities and Associated Threats of Cloud-Computing Cloud-ComputingThe information technology is growing these years and the managers be trying to reduce the total greet of development of the services using various path due to a number of task undercoats. Cloud-computing is a technique which helps the management in reducing the total cost of development. The indispensable resources are configured in a cloud and the users access these services through the cloud. In case of in-house development, the complete process is through with(p) inside the comp either premises and using the resources of the organization. So the organization has to net profit for the complete resource to the vendor even if full service is not required.The license to use the product is also very costly. The organization has to pay for the complete product even if a part of the service is required. In the case of cloud computing, the users take away not to pay for the entire service or product, he will pay only for the part of the service. For example, a service is created for user-id creation and as most of the organization needs this policy, so this policy is created and configured in the dual-lane pool of resources. Now the variant organizations base access the service as per their use. This helps in overall lessening of the total cost of accessing the service.These resources are configured in a shared out pool of resources. These shared resources include the innkeepers, storage, networks, services, etc. Cloud computing has near forms and these forms are mainly as described here Software as a Service, Platform as a Service, and alkali as a service. This technology has m any(prenominal) advantages but it has some disadvantages too. As discussed above, that the services are provided by a third party vendor, so the responsibilit y to provide support and maintenance is also fathern care by the third party service provider.When a company access the service using cloud-computing, the crucial business data resides in remote servers provided by the third party so there are lot of put on the line relate to data privacy and confidentiality. The interrogation related to analyzing the vulnerabilities and associated threats is way out on and suitable natural processs are being taken to defy the risk level. Cyber Security Vulnerabilities, Threats and Actions Vulnerabilities refer to the loop holes in the agreement or the flaws in the scheme. When an organization has decided to move on the cloud, and then(prenominal) it should also consider the associated vulnerabilities and the threats.Some of the major vulnerabilities are discussed below Session Hijacking It means that the cloud or the required service is hacked by the hackers using a valid session mark. This key is employ to gain the unauthorized acces s on the critical resources of the organization. Once hacked, the hackers basin have the complete access on the establishments, and they can perform any malicious activity they necessitate to do, to hit the company resources. If victorian and effective earnest measures are not followed in the infrastructure then it may cause a ponderous business loss in terms of financial terms as well as the reputation of the organization.Probability of Occurrence The probability of point of these display cases of flak is more often than not high. The former being is that the polishers keep on continuously scan the arrangement to find out the vulnerabilities in it. Once they gain the access, they honourable execute their jobs. powerful Policies & Procedures To mitigate this winning of risk, firewalls should be implemented in the system at the right places. Firewalls prevent unauthorized access of data. Rules and policies should be configured to shelter the session keys. To increase the awareness among employees, a proper training should be given to them.For example, session monitoring should be do to keep a check on the malicious activities. Virtual tool Access In this technology, the servers uses same resources like operating system, business applications, etc which are utilise by the virtual machines & other servers. If the attacker is successful in to gaining the unauthorized access to any of these system resources, then the whole system can be compromised easily. If other virtual machines are also primed(p) in the same configuration zone then there is a high risk of compromising other virtual machines too.This may straight hit the operating system and the host server and hence all the services hosted by the server. Probability of Occurrence The probability of occurrence of these types of attack is also high. As the flaws in the software or hardware becomes the calm down cause of these types of attacks. The bugs or flaws in the software are identifie d at a later stage and regular updates or patches needs to be applied on the software. Effective Policies & Procedures The software should be regularly updated and patches should be applied on it.Hardware flaws should be filled up using various tools. An effective network configuration is very important to mitigate this type of attacks. Service Availability This is a major impuissance in cloud computing technology. No company can afford the unavailability of the required service. The company has to suffer from a huge business loss in case of downtime. The services offered by the cloud are not such(prenominal) reliable, any outage in the system may cause the services to founder working and hence the services will not be accessible. And this would be again responsible for a major loss to the company.Service Level Agreements (SLA) essential be well defined and signed by both the compound parties and the above mentioned issues should be discussed and taken care using the SLAs. Backu p plans should be carefully designed and implemented so that the risk level can be controlled. In case of any outage, lets enounce electricity outage, can be taken care by shift key to electricity generators or other back-up devices. Probability of Occurrence The probability of occurrence of these types of attack is generally low. This types of issues rarely occur in any organization.Service providers generally keep the backup resources so that the system working remains continuous. And in case of some issues, switches to the localise back-up resources can be easily through. Effective Policies & Procedures To mitigate this kind of risk, firewalls should be implemented in the system at the right places. Firewalls prevent unauthorized access of data. Rules and policies should be configured to protect the session keys. To increase the awareness among employees, a Cryptography Flaws This flaw refers to the weakness in the cryptography techniques implemented in the cloud based system .Hackers can easily decode the encoding mechanism used in the system if there are some security gaps, for example if the key used in the encryption mechanism is not situate and strong lavish then the attacker can easily gain the access to the key and hence they can easily decode the encrypted message to the original textual matter form. Probability of Occurrence The probability of occurrence of these types of attack is generally medium. The tenability being is that most of the times, attackers could not find out the key used to encrypt the data or it is difficult to decode the encoded data.Effective Policies & Procedures To mitigate this kind of risk, strong cryptography techniques should be used. Ethical hacking can be done intentionally just to psychometric test the security level of the complete system. This test will help in analyzing the security gaps in the system and then these loop holes can be filled with effective security procedures. info Privacy When the data resid es in third party servers, then this risk of data privacy always persists. As the crucial data is handled and managed by the third party, so there are high chances of risks to data privacy and confidentiality.Basically an agreement is signed-off amid the parties for accessing the services. It should also include the issues related to maintaining privacy of data. intend the contract gets complete, now what would happen to the data which is stored in the third part servers? Probability of Occurrence The probability of occurrence of these types of attack is generally high. The reason being is that the data is always accessible to the service provider. Service providers take care of the support and maintenance of the data too. This risk is generally high.Research is going on so that this issue can be sort out. Effective Policies & Procedures These kinds of issues should be openly discussed with the service provider before signing any agreement. Vendors Technique As the technology is g rowing, there are lots of vendors coming up in this industry. Sometimes these vendors are untested and they follow the platform specific techniques which cause trouble in migrating to the novel service or integrating with other services. The developed technology will be of no use if it cannot be updated or integrated with other services as per the requirement.Probability of Occurrence The probability of occurrence of these types of attack is generally medium, as it varies with the knowledge and experience of the service provider. Effective Policies & Procedures Proper research should be done before finalizing the right vendor. The initial requirements should be crystal clear so that both the parties should understand what actually needs to be done. There should not be any communication gap between both the parties so that in case of some issues, the right action can be taken immediately to fill the gaps.Dependency on Internet As discussed above, the services are accessed through a cloud of shared resources. This cloud refers to internet. So in other word we can say that the services are accessed through the internet which means that the services are highly dependent on internet. Suppose internet goes down then the client will not be able to access the required services. Probability of Occurrence The probability of occurrence of these types of attack is generally low. The reason is that backup plans are ready for the service in case of some emergency.As the service provider also realizes the importance of internet so overflowing resources are used so that the system does not suffer from any kind of outages. Effective Policies & Procedures To mitigate this kind of risk, backup plans should be ready and available all the time so that if at any time, the system disrupts, the backup plans can be used so that the functioning of the system does not affect in any way. There are other important security threats too which are associated with cyber-security. These ar e discussed below self-discipline of Service (DOS) Attack Denial of Service attacks are also cognise as DOS attacks.Due to these attacks, the legitimate requests of the end users are not completed due to heavy loading of the host server caused by the player calls. Attackers may hit the routers or over flood the host server using the fake calls and this prevents the legitimate calls to execute. This may cause the complete perturbation in the system. Appropriate rules and filters should be configured in the firewall to mitigate the risk associated with these attacks. Customer Satisfaction Customer satisfaction increases with the writ of execution of the above mentioned policies and procedures.The implementation basically helps in the availability of the service in a secure environment. And nodes would be happy to gain access to the required service whenever they need and as per their requirement and that too in a secure environment. thereof we can say that the implementation of the above mentioned policies and procedures helps in increasing the customers satisfaction level. Conclusion In this research paper, various security vulnerabilities and the associated threats related to cloud computing are discussed.Cloud computing really helps in reducing the overall cost of accessing a service. But the security risk associated with this technology cannot be ignored. Proper security measures should be implemented in the system. Secure protocols should be designed and configured so that a sleep can be achieved between the cost and the security level. References 1. Blaisdell, R. (2011, February 24). How Much enkindle You Save On Your Cloud Computing Implementation? Retrieved from Ezinearticles. com http//ezinearticles. com/? How-Much-Can-You-Save-On-Your-Cloud-Computing-Implementation? ampid=5989672 2. European Network and Information Security Agency. (2009). Cloud Computing Benefits, risks and recommendations for information assurance. Heraklion European Networ k and Information Security Agency. 3. Mell, P. , & Grance, T. (2011, September). The NIST Definition of Cloud Computing. Retrieved from US incision of Commerce National Institute of Standards and Technology, Special Publication 800-145 http//csrc. nist. gov/publications/nistpubs/800-145/SP800-145. pdf 4. Meiko Jensen ,Jorg Sehwenk et al. , On skilful Security, Issues in cloud