Friday, May 22, 2020
The Power Of The Praying Parent - 1595 Words
Justine Clarke | April 10, 2017 The Power of the Praying Parent Saint Augustineââ¬â¢s Praise Song to His Mother Choose you this day whom ye will serve;... but as for me and my house, we will serve the Lord. - Josh 24:2, Around the year 354 in Tagaste, arose a child who fulfilled the prophecy in his nameââ¬â¢s meaning and grew to become ââ¬Å"great, and venerableâ⬠. The child, later regarded by theologists as the ââ¬Å"Doctor of the Churchâ⬠was Saint Augustine of Hippo. In his book, ââ¬Å"The Confessions,â⬠Saint Augustine recounts his spiritual journey to becoming a devout Christian. The purpose of his narrative is to convey that throughout his challenging journey, one specific spiritual figure remained a constant, his mother Saint Monica of Hippo. Althoughâ⬠¦show more contentâ⬠¦(Augustine, Confess. 1.2) During his spiritual journey, Augustineââ¬â¢s path to enlightenment is hindered by sinful obstacles when he seeks for ââ¬Å"pleasures, sublimities... and [falls] headlong into sorrows, confusions, errors.â⬠(Confess. 1.31) He realizes that because of the weak and sinful nature of man, humans can not hope to find salvation without God s assistance and ââ¬Å"faithful mercyâ⬠. (Augustine, Confess. 3.5) Augustine views his prayerful mother as this assistance. Monica prays in order to prevent harm from coming to Augustine while ignorant to the truth of salvation. Her pious and gentle ways guide Augustine away from his secular lifestyle with ââ¬Å"wrong notions of Godâ⬠and towards a lifestyle more pleasing to God. It is Monicaââ¬â¢s fervent prayers, that leads Augustine to salvation and later fuels his dedication to the church. Moreover, in the process of interceding, Monica lets an important opportunity to save and and baptized Augustine slip away. He falls ill at a young age, and begs to be baptised, in case the illness became worse. Monica denies him because she ââ¬Å"foresees; that the defilements of sin would, after that washing, bring...more perilous guilt.â⬠(Augustine, Confess. 1.17) Although this is the only time Monica lets the opportunity slip away, Augustine laments over her decision to ââ¬Å"let him alone, and let him do as he willâ⬠Show MoreRelatedReflection Paper on Parenting Principles1712 Words à |à 7 PagesArts in Education Dr. Teody M. Pajaron Dr. Evelyn R. Pajaron ES621: Parenting, Schools and Achievement International Graduate School of Leadership Quezon City, Philippines Submitted June 30, 2012 ââ¬Å"What makes an effective parent?â⬠ââ¬Å"How can one be effective in his or her parenting?â⬠Answers to these questions are very much needed by a father or a mother who truly loves his or her children and has deep concern for them. These are simple questions which may be answered rightRead MoreDaniel And The Lion s Den933 Words à |à 4 Pagesclass. Through reading Daniel chapter 6 the reputation that Daniel had for serving the God leaped off the pages. Danielââ¬â¢s adversaries knew what kind of character Daniel had. They also realized he was a man who placed Godââ¬â¢s Law above all other powers. They knew Daniel dedicated himself to pray God and no matter what and that he would not discontinue his commitment. Daniel was committed. He was the marathon runner who does a 12 miler in the sleet. Daniel was the season ticket holder that hasRead MorePsychology, Theology, And Spirituality Essay1665 Words à |à 7 Pagesthat counselors should stay away from including spirituality in counseling. (McMinn, 2011 p.77) McMinn states that there are seven different types of prayer Christian counselors can implement while counseling clients. McMinn (2011) concludes that praying silently or outside counseling sessions is not harmful to the client. He moves on to his second concept which is using the Scripture in counseling clients. Although the use of scripture is controversial among some people, McMinn (2011) stresses thatRead MoreSeven Keys And Effective Prayer1014 Words à |à 5 Pagesindigenous shamans have taught that we need to pray the results and not the problem. They exhorted people to focus on the outcome as if it is already a reality: to pray healing instead of praying for healing; to pray rain instead of praying for rain. Praying for something reinforces our perceived lack; praying the desired outcome visualizes it from a place of inner faith as if it is already there. Our abundant universe always contains sufficient peace, health and happiness in some form. EffectiveRead MoreBuilding Faith Community From Day One924 Words à |à 4 Pagesfaith. Our relationship with Mary and Jesus is strengthened through praying the rosary and graces are earned as well. The rosary is a â⬠popular pietyâ⬠that is ââ¬Å"vital element in a Catholic life.â⬠(United States Conference of Catholic Bishops, 2005, p. 152) Rosary Devotion In setting the tone for the year, the rosary will symbolize the schoolââ¬â¢s mission to service through the making of rosaries, the mission of love through the praying and emerging students in xxx, and the faith community connectionsRead MoreMy Prayer Time With God1224 Words à |à 5 Pagesbelieving in Mary, Jesus mother. Until, my parents sent me to a Christian school which wasnââ¬â¢t something I agree with. I would always ask myself why did my parents send me to a Christian school instead of a Catholic school. But over the years I was interested in knowing more about the bible and God. I finally decided to be saved back in 2009 when I finally understood the meaning of living for eternity in heaven. Although, Iââ¬â¢ve always had problems with praying because I was afraid of not saying the rightRead MoreAnalysis Of The Book The Left Of Tell By Immaculee Ilibagiza Essay1596 Words à |à 7 Pagesof Rwanda, located in Central Africa. She was brought up with in a middle-cl ass home which consisted of her three siblings, all male, and both her parents. In their household, education and religion where two values of great importance. Ilibagizaââ¬â¢s parents were both educators, and brought up their children a strong catholic faith, and belief in the power of God, and compassion for others. During her childhood, she never experienced racism because of her ethnic group, she always felt safe, and as thoughRead MoreHistory And Traditions Of Ancient Egypt886 Words à |à 4 PagesBeauty, a common-man is travelling to his lover but encounters Mehy, a well-known and fearsome warrior. Mehy is representative of ancient Egyptian traditions and obligations and so, upon his encounter, the lover attempts to avoid the warrior. The power and influence that Mehy retains, as illustrated by him being ââ¬Å"in his chariot,â⬠causes the boy to want to hide his wanton desires. This reflects the social stigma attached to being in love in ancient Egyptian society. Whi le in self-conflict, he considersRead MorePrayer In Schools Has Been A Much Talked About Debate In1434 Words à |à 6 Pagesis and has always been legal, try to keep the balance between church-state separation as it is. This has kept the political issue of religion at a boil and confused many people on the actual issue of coercive school prayer. The banning of school praying is a major assurance of individual freedom and must be cultivated. The United States has long been divided on the issue of prayer in school. From the very beginning our Founding Fathers wanted to keep religion out of governmental affairs andRead MoreAnalysis Of The Book Women And Alcohol A Highland Maya Town 1748 Words à |à 7 PagesHowever, some men oppose this switching role as they think true men do not depend on their women for food. Though the Pedranos men respect their wives, women are still be placed in an inferior position compared to that of their husbands. Men, with their power and authority, are the ones to make most decisions in the family. Though ââ¬Å"romantic love is not a part of Pedranos marriagesâ⬠(75), the elderly teach their sons and daughters how to become good partners, maintaining happiness in their marriage life
Saturday, May 9, 2020
Hamlet Effects Of Revenge On Characters And Society
Hamlet: Effects of Revenge on Characters and Society Revenge can be termed as an action of hurting or harming someone in return for an injury or wrong suffered at his or her hands. Revenging is known to cause more harm to both the parties involved. Different literature works has widely used revenge to show impact of a conflict and to institute drama. Shakespeare is one of the famous authors who have utilized revenge in their literature works to make his audience ground to following his works. In this paper, we are going to look at the effects of revenge in Hamlet and the effects it has on the characters and the society. Hamlet is a play plotted on revenge, a number of characters try to lure their foes into death or misery in whatâ⬠¦show more contentâ⬠¦This plot creates a prolonged conflict that becomes the foundation of the play. In one attempt in trying to make the king admit his wrongdoing, he stages a play where actors play out his fatherââ¬â¢s death in front of King Claudius. The king is traumatized and the reaction he gives confirms he is guilty of the murder. Therefore, revenge is an element that creates conflict and decisions in the society. Revenge leads to recklessness and losses of lives in a society. Hamlet despite learning of his fatherââ¬â¢s death in early stages of the play he fails to act swiftly in avenging it. Consequently, other people die because of the failed revenge. Such deaths include Polonius, Ophelia Rosencrantz and Guildenstern (Jamieson, 1). On the contrary, Laertes upon learning of his fatherââ¬â¢s murder, he reacts swiftly and recklessly. He threatens the king that he will overthrow him if he does not describe how Polonius was killed. Laertes upon learning that Hamlet is the killer swears that he will take revenge. He swears, ââ¬Å"Only Iââ¬â¢ll be revenged most thoroughly for my fatherâ⬠(Hamlet, IV, V, 133-134). Laertes and King Claudius make a deal to exterminate Hamlet. Eventually this plans backfires and leads to their own death. Therefore, revenge is seen to make characters behave irrationally and this leads to deaths of other characters. Irrational actions may lead to haste or excessive contemplations thatShow MoreRelatedA Traditional Revenge Tragedy Approach To Hamlet759 Words à |à 4 PagesA Traditional Revenge Tragedy approach involves the drama of a character seeking revenge for an injury or caused by another character (Reedy). In the play of Hamlet, this approach can easily be seen in the character Hamletââ¬â¢s plot to ââ¬Å"rememberâ⬠his father. After his fatherââ¬â¢s death, Hamlet spends the whole play concocting a plan to avenge his father. He develops a play to bring guilt to his fatherââ¬â¢s murderer and to convince the royal subjects of their kingââ¬â¢s foul sin. The tragedy in this approach occursRead MoreHamlet, By William Shakespeare852 Words à |à 4 Pagestragedy, Hamlet, the churning tides of and hate are very prominent, but, as the characterââ¬â¢s personalities collide and develop, revenge is the key that unlocks their unprecedented doom. There are different styles of writing in t his piece that represents revenge. From the start of the play (the epilogue) there were signs of different styles of writing. Looking more closely to the text, Hamlet would address the royalty in the poetic form while addressing to people under him in old English. Revenge isRead MoreThe Death Of Hamlet By William Shakespeare1325 Words à |à 6 Pagesbe seen in Hamlet, when King Hamlet dies in the beginning of the play. Hamlet, like any other Shakespearean tradgedy, contains a series betrayal and death. Hamlet seeks revenge when his deceased fatherââ¬â¢s ghost tells him that his uncle, Claudius, murdered him. Since Hamletââ¬â¢s grief for his father was expressed more than any other character, the strong bond between Hamlet and his father is clearly seen. Along the way, death finds other characters and corruption follows. Throughout Hamlet, death becomesRead MoreHamlet Cause and Effect Essay1716 Words à |à 7 PagesCause and Effect Essay ââ¬â Elizabethan Target Audience ââ¬Å"Always mystify, torture, mislead, and surprise the audience as much as possible (Roff).â⬠Hamlet is a dramatic production written by William Shakespeare. ââ¬Å"The play, set in the Kingdom of Denmark, recounts how Prince Hamlet exacts revenge on his uncle Claudius for murdering the old King Hamlet, Claudiuss own brother and Prince Hamlets father, and then succeeding to the throne and marrying Gertrude, the King Hamlets widow and mother of PrinceRead MoreCommon Themes In The Tragedy Of Hamlet By William Shakespeare1071 Words à |à 5 Pagescommon theme throughout his many works. He uses characters to show the flaws in humans and as society . à In à Shakespeares classic play The Tragedy of Hamlet, the main character, Hamlet is shown with wanting revenge on his mother and uncle after his fatherââ¬â¢s death.à à à In this play Hamlet feels the need avenge his father, as well as dealing with being ââ¬Å"madâ⬠. In his mantle break he murders the father of h is love, Ophelia, and her brother. The theme of revenge is strung out throughout the play. à à à It isRead MoreHamlet : A Cycle Of Revenge1165 Words à |à 5 Pagesin the case of The Tragedy of Hamlet, the Shakespearean masterpiece, parents may face untimely deaths at the hands of enemies. This, of course, commences a cycle of revenge, a cycle where an equilibrium of justice is attempted to be reached through retribution. But much too often this cycle of retribution has little thought. Despite following a procedure with valid, emotional roots and a lengthy pensive phase, there is rarely logic in the emotional process of revenge, but rather invented, false logicsRead MoreBeowulf : The Comparison Of Hamlet And Grendels Mother1221 Words à |à 5 PagesHamlet and Beowulf : The Comparison of Hamlet and Grendelââ¬â¢s Mother After the immoral loss of a beloved family member, friend, or leader, oneââ¬â¢s ideas on how to overcome the situation may be questionable. Dealing with the death of a loved one can leave an enormous toll on the well-being and psychological state of a person. In some cases, it may direct them towards taking the path of extreme measures in order to restore their mental balance. In the literary works Hamlet by William Shakespeare and BeowulfRead MoreHamlet s Attempt For Pursue Revenge Essay1525 Words à |à 7 PagesHamletââ¬â¢s Attempt to Pursue Revenge Theatrical plays are usually created to teach the audience a moral or lesson. In William Shakespeareââ¬â¢s Hamlet, there are quite a few lessons. The moral that the play conveys the most is the path of revenge has destructive consequences.Hamletââ¬â¢s pursues revenge at all cost but the justice he seeks leads to tragedy. Hamletââ¬â¢s attempt to pursue revenge did not result in justice because it had negative consequences on all the characters involved. To understand the meaningRead MoreComparing The Ghost Character in ââ¬ËHamletââ¬â¢ and ââ¬ËSnow in Midsummerââ¬â¢1797 Words à |à 7 Pagesmost famous drama which was written by Guan Hanqing. Hamlet, one of the four famous tragedies which is written by William Shakespeare from between 1599 to 1602. This drama tells the story of his uncle Claudius murdered Hamlets father, usurped the throne and married the kings widow, Gertrude. In order to get back the throne, Prince Hamlet He was determined to avenge for his fathers murder from his uncle. In all the works of Shakespeare, Hamlet is probably the most controversial film, which is alsoRead MoreThe Life of William Shakespeare669 Words à |à 3 Pagesoften creating a debate. The causes and effects are responsible for the different points of view on Hamlet. Shakespeare may display multiple themes throughout each of his plays, which also led to a debate, themes including, love, hatred, power, incest, but above all is revenge. Revenge is a theme that has been unquestionably displayed in Shakespeareââ¬â¢s play Hamlet along with multiple other themes. Claudius had secretly sent orders for the death of Hamlet upon his arrival to England. In Claudiusââ¬â¢
Wednesday, May 6, 2020
My First Real Experience With Biometrics Free Essays
My first real experience with biometrics occurred when my son purchased a new cell phone nearly two years ago. During the initial setup, he selected an iris scan as his passcode. I was a little surprised by the technology and skeptical of the convenience and security. We will write a custom essay sample on My First Real Experience With Biometrics or any similar topic only for you Order Now My first question to him was, ââ¬Å"What if someone needs to get in your phone?â⬠. He quickly replied, ââ¬Å"That is what the security feature is for, so they canââ¬â¢t get in. If I want them in it, Iââ¬â¢ll open it and hand it to them.â⬠He is an active duty Navy sailor. He explained to me that he felt more secure knowing that no one could break into his phone because of this passcode. I observed him over the next two weeks while he was home on leave. Each time he accessed his phone, he simply looked into the screen and instantly he had access. He has shared that when others see that his passcode is an iris scan, they realize they cannot hack into the phone. Most never attempt anything at this point. Those that do are not successful. To this day, he has not had any security issues with his phone. Watching the success and ease at which biometrics worked with a cell phone, I moved to a biometrics passcode when I purchased a new computer earlier this year. My new computer came with FastAccess Facial Recognition. After initial setup which included some training to recognize my face, I no longer had to enter a password or PIN. .There are advanced features that turn off the webcam, enable parental controls, and enable an automatic login feature that make FastAccess safe and user-friendly. When someone else tries to access my computer, access is denied because FastAccess does not recognize them. Iââ¬â¢ve been told for many years that my daughter could pass as my twin, but the computer knows better, it would not unlock for her. Lighting can affect the process, the system does not work in poor lighting conditions. In these cases, I am prompted for a second form of authentication, a PIN or password. Other than this, I have been very pleased with not having to use a password to access my system and knowing my data is secure. Now that I was familiar with biometrics in ââ¬Å"myâ⬠environment, I wanted to learn more about biometrics in the area of health information, an area I have worked in for nearly thirty years. According to Whitman and Mattord (2018), biometric access control refers to physiological characteristics used to authenticate identification that has been provided. This control relies on recognition, comparing an actual image to a stored image. Fingerprints, palm prints, hand geometry, facial recognition, retinal prints, and iris patterns are types of biometric authentication technologies. The three characteristics in humans that are generally considered unique are the fingerprints, the retina, and the iris (pp 334-335). Iris recognition provides the highest level of accuracy of all biometric markers. According to Katz, the algorithms used in iris recognition are so accurate ââ¬Å"that the entire planet could be enrolled in an iris database with only a small chance of false acceptance or false rejectionâ⬠(2002). Concerns in the area of biometrics are ââ¬Å"false negativeâ⬠and ââ¬Å"false positiveâ⬠. When an individual has a false negative their identity is registered within the system but for some reason, the system does not recognize them. A false positive is the larger concern. This rating means the individual is not registered within the system, yet the system is recognizing them as another registered user and providing access to them based on that recognition. Facial recognition technology opens the door to many possibilities in healthcare, particularly in the area of health information management. This technology has been widely discussed as part of the national patient identifier initiative. Facial recognition is a preferred technology over other biometric techniques because it does not require direct contact with the patient and it is easily deployed. Some of the uses for facial recognition in the health information management area allows for authentication of proper security clearance for employees to grant or deny access within the EHR to staff without a password or PIN. By authenticating your employee, you are maintaining the confidentiality of the protected information. The same technology can be used to verify or authenticate the identity of a provider when they access controlled substances. Facial recognition is the preferred technology because ââ¬Å"some areas within a hospital zones require clinicians to wear surgical gloves and masks, thereby prohibiting the use of fingerprint authenticationâ⬠(Callahan, 2017). Another option is a feature where ââ¬Å"a patientââ¬â¢s image can bring up their file in the EHR using facial recognition softwareâ⬠(McCleary, 2016). This security feature allows the healthcare provider to compare their patient to the stored patient image. Authenticating the patient allows you to maintain the integrity of your data, minimize medical mistakes and improve patient safety. Additional bonuses will be cost savings by reducing fraud, and improved protection or security of confidential patient heath information. There are yet additional benefits of facial recognition to the medical arena. One benefit is the prevention or reduction of medical identity theft. Medical identity theft occurs when someone uses another individualââ¬â¢s information to obtain medical services for personal or financial reasons. If the individual presenting for treatment had to be identified by facial recognition, their identity would be authenticated or denied. This could prevent someone from trying to use your insurance benefits or obtain access to your demographic or financial information. Again, this protects the security of confidential patient data. Facial recognition is also an important authentication feature in the healthcare field to establish the identity of patients, particularly those that are unresponsive. Early identification of these patients in emergency situations within an integrated EHR can give healthcare providers instant health information about medical conditions, medications, and allergies. Facial recognition provides a better alternative for identification than fingerprinting for burn victims those patients who have experienced amputations. Some genetic conditions allow diagnosis via facial recognition according to a study at the National Human Genome Research Institute. One provider of facial recognition software, Nextgate, ââ¬Å"claims to simplify registration, flag fraudulent activity, and eliminate the creation of duplicate recordsâ⬠(McCleary, 2016). We may be able to eliminate duplicate records if this software meets its expectation. Duplicate records are a data quality issue that result in compromised ââ¬Å"patient safety, medical care, data accuracy, and reimbursementâ⬠(Harris and Houser, 2018). Duplicate records occur for a variety of reasons, primarily human error due to transposing of letters and/or numbers during data entry, the use or non-use of middle names, and abbreviations. As we see more and more organizations merge or become part of a larger healthcare organization, the opportunity for duplicate medical records increase. ââ¬Å"Duplicate records have caused negative outcomes in the discovery phase of the litigation process because there will be discrepancies with diagnoses, medications, and allergiesâ⬠(Harris and Houser, 2018). Maintaining a single, confidential patient record ensures the availability and integrity of the patient data. Organizations are beginning to turn to biometrics to eliminate their duplicate records. The three possible methods include iris, palm vein, and fingerprint scanning. Iris scanning is the preferred method because it ââ¬Å"supports hospital infection control initiatives and is very effective in preventing duplicates as there is a low occurrence of false positives and extremely low (almost zero percent) false negative rateâ⬠(Harris and Houser, 2018). With iris scanning, the technology never has to touch the patient whereas, palm vein and fingerprint scanning technology requires a physical contact between the patient and the technology. This increases the opportunity for infections to be spread. Organizations with an advanced enterprise master patient index (EMPI) are those that often contain patient information for multiple locations within one health system. The EMPI integrates data from the various systems forming an ââ¬Å"overarching technology umbrella, resolving and synchronizing data issues and providing a single patient view that can be accessed across the enterprise. The EMPI resolves data quality issues and synchronizes back to enable accurate patient identification and matching that minimizes duplicates recordsâ⬠(Harris and Houser, 2018). The EMPI provides a level of confidentiality and security throughout the organization. When biometrics are implemented at the registration process and integrated into the EHR, health information professionals and providers can view and authenticate the patient information while working with the patient and within the EHR. Members of a data integrity team can verify patient records are properly integrating into the EHR as the patient moves through the health system. In areas where a facial recognition or fingerprint cannot be captured but a barcode can be scanned, the integration provides the patientââ¬â¢s image for a comparison prior to medication administration or other service. This form of authentication provides an added security and safety feature. While all of this technology sounds like a win for the patient and the healthcare system in general, we must also consider the law. According to Hedges, three states (Illinois, Texas, and Washington) now have legislation that regulate how biometric information is collected and used. More states are expected to follow suit. The Illinois Biometric Privacy Act (BIPA), ââ¬Å"defines biometric information to mean ââ¬Å"any information, regardless of how it is captured, converted, stored, or shared, based on an individualââ¬â¢s biometric identifier used to identify an individual.â⬠(Hughes, 2018). BIPA does not include information captured in a healthcare setting or collected for treatment, payment, or healthcare options under HIPAA. It is uncertain how the Department of Health and Human Services will address biometric information at this time. One area that healthcare organizations should start to consider is how their business associates may interact with any biometric information they collect. The changing pace of technology is trying to keep up with the pace of todayââ¬â¢s security challenges. It seems as if each day we hear of another security breach or security issue almost daily. There are tools for the health information professional to address or combat areas information security issues. Two of the most powerful tools are iris scanning and facial recognition. These tools can authenticate employee and patient identification. By authenticating the employee, you maintain confidentiality of information. By authenticating the patient, you maintain patient safety and the integrity of your data. How to cite My First Real Experience With Biometrics, Papers
Subscribe to:
Posts (Atom)