SEARCH RESULTS

YOU WERE LOOKING FOR :Identity and Digital Communications

Essays 451 - 480

Transgenderism: A Psychological Disorder

Manual (DSM) III, transgenderism has long been described as a psychological problem due in great part to the manner by which child...

Amy Tan and Nancy McCabe

when she fails-according to them-it overwhelms her and undermines her sense of self and her self-esteem ("Meeting Sophie"). The "...

Barn Burning by Faulkner

testify, to lie for his father he can "smell and sense just a little of fear because mostly of despair and grief, the old fierce p...

Diploma Forgery and Identity Theft

a fake Kansas State University diploma and transcript for $249.99" (Rock, 2006). The same thing could be, and probably is, happeni...

Three Journal Articles: Analysis Of Adolescent Development

test site in which to explore various behaviors not deemed acceptable by adult standards, yet are perfectly fine within the constr...

How Do ‘Identity’ And ‘Obsolescence’ Contribute To This Continual Change In the Fashion?

interpreted as obsolescence these may be lead socially or as a result of the fashion industry. Blumer (1969) argued that there we...

Identity Explored in Three Texts

niece (Kingston) doesnt even know her aunts name. The scene in which the villagers wreck the girls familys home is related to th...

Sylvia Plath’s Identity as a Confessional Poet

was not just one simple dream that Plath had, but an ongoing connection or vision of these three old women, these three witches wh...

Multiple Personality Disorder And Consciousness

(Sancar, 1999). It often begins as a defense mechanism to escape the pain of what is happening at the moment but as this defense i...

Clothing and Identity: Cowboys and Cowgirls

Boots are made to easily slip on or off in case a horse goes wild and the riders foot is stuck in the stirrup. Boots that come off...

Popular Culture: Forging a Distinctive Identity

Each of these distinctive elements of society sprang from the pressing need to forge a distinctive self identity. Each was fed by...

Identity Theft and Information Systems

II. What is Identity Theft? The American government defines it as follows: "Identity theft occurs when a criminal uses another...

One of the Negatives of Advanced Technology: Identity Theft

his or her social security number written on various documents, someone that throws all mail into the trash without securing vital...

Security Analysis Questions

any qualitative facts about the organization at all. Some of the metrics can be moving average, "support and resistance, advance/...

Royall Tyler/The Contrast

fianc? was away, Maria restricted her social contacts, read a great many books and focused on letters from Dimple. Letitia explain...

Sentencing for Identity Theft

sentencing, they generally provide a range within which the judge must remain when imposing sentence. Also, legal issues can affe...

Literature of the New American Republic

commentators argued throughout the 1820s and 30s that there should be works of literature to match "emerging political greatness o...

Gender Identity Patient Disorder Diagnosis, Treatment, and the Film Boys Don’t Cry

by persistent discomfort with ones sex" (Meyenburg, 1999, p. 305). This gender identification with the opposite sex typically com...

Haas Dyson/Writing Superheroes

to explaining how children make use of semiotic resources is how this body of research relates the purposes played by oral languag...

Technological Change: Anthropological, Sociological, and Psychological Perspectives

example, is bypassed in favor of a machine to human interface. While the teacher is still involved in the classroom, that involve...

Personal Perception of Judaism

small child, I knew I was Jewish, so I really do not remember when this identity was established or how. I did not think about it ...

Literacy, Language, Culture And Identity

identity for people, a sense of where they themselves belong in history as well as in their own culture (Moll, 2001). If we consi...

Forming an American Identity

state of crisis" (Clay, 2007). Many of the colonists thought that the coming conflict was "between the colonies and the motherland...

Istanbul by Orhan Pamuk

there lived another Orhan so much like me that he could pass for my twin, even my double" (Pamuk, 2006; 3). This image is presente...

Identity Theft, Data Analysis and a Trend in Enterprise Integration

customers will immediately and the business relationship, and a further 40% will consider the ending of that relationship (Frieden...

PEOPLE AND CULTURALLY DIVERSE ENTITIES

2007). On the opposite side, the authors point out that there is much resentment toward Muslims (Bison et al, 2007). The a...

Ancient Greek Society and Steven Pressfield’s Gates of Fire: An Epic Novel of the Battle of Thermoplyae

the novel, the term city is used interchangeably with the term citizen to reinforce this unity: "Our city, my city... Without a ci...

Issues in e-Commerce

IT security professionals must take a "comprehensive view of threats both inside and outside the direct control of the enterprise"...

Jack the Ripper and His Impact on History

mostly prostitutes - were savagely murdered and mutilated by an unknown assailant, but after November 1888, the slayings stopped a...

Developing Identity: Gender in the 50s and 60s

to war because they felt it was their calling to engage in warfare. They were all relatively innocent and ignorant about war and a...