Sunday, August 23, 2020

Does Shylock deserve his punishment free essay sample

There is no uncertainty that Shylock is a cleverness and vindictive man, yet nothing can legitimize the treatment he gets on account of the Christians. † How far do you concur with this announcement? Does Shylock merit his discipline? Shylock is rebuffed by the Venetian court for trying to end Antonio’s life. He is charged under a Venetian law (of Shakespeare’s creation) and he is compelled to surrender his riches and to ask the Duke to save him his life. Seen like this it appears to be sufficiently straightforward; Shylock violated a Venetian law and, as an outcome, is rebuffed. Nonetheless, Shylock’s case is a long way from basic. Antonio’s request that Shylock ought to repudiate his Judaism and become a Christian and his request that Shylock should will his cash to the Christian Lorenzo who of late took his daughter1, mean considerably more than discipline for bad behaviors. Additionally, the treatment of the Jew by the as far as anyone knows kind Christians, albeit promptly acknowledged by a less open minded Elizabethan culture, appears, to a 21st century crowd with its information on the holocaust, to be unfeeling to the point of mortification. The inquiry to be addressed is this: is Shylock’s finished embarrassment a reasonable discipline for his wrongdoings? Shylock does himself no favors. By all accounts, he seems, by all accounts, to be a cash orientated, ravenous character who is likewise determined by a contempt of Christians and especially of Antonio: I loathe him for he is a Christian; But more, for that in low straightforwardness He loans out cash gratis2 He is by all accounts driven by an undesirable want for vengeance, to take care of fat the old grudge3 he has for Antonio. The joyful sport4 conceived by Shylock is just a mischievous snare set so as to get [Antonio] on the hip5. Moreover, his response to Jessica’s elopement with Lorenzo doesn't fixate on the loss of his girl, yet on the loss of his ducats: I would my little girl were dead at my foot, and the gems in her ear: would she were hearsed at my foot and the ducats in her casket. 6 However, his resentment and his scorn do require some unique circumstance. What Shakespeare never does is available Shylock as a two dimensional emulate scoundrel. The past citations, taken in detachment, change Shylock into a beast. He isn't. He is, similar to us all, an imperfect person, subject to angry outbursts, episodes of thoughtfulness and snapshots of empathy. Shylock’s contempt of Antonio, and Christians all in all, is a consequence of the ceaseless condition of dread that existed between the two races at the time the play was composed. The Christian people group regarded Jews with scorn incompletely as a result of Jewish association in Christ’s torturous killing. Laws existed that disallowed Jews from claiming property or taking part in any calling. They were outsider by Christian culture yet had no place to go; Israel didn't exist as a state until after the Second World War. The main way open to them was usury, or cash loaning which, obviously, was a taboo practice for Christians and, hence, disapproved of, prompting further ill will. It is noted remorsefully by Shylock that all in all and the Christians need cash, they deceptively come to him regardless of the way that they have appraised me/About my monies and my usances7. It is during this discourse in Act One Scene Three that Shylock records the wrongs that Antonio has done to him, giving some defense for Shylock’s despising: You call me doubter, relentless canine, What's more, spit upon my Jewish coat. †¦.. You that voided your rheum upon my facial hair, And foot me as you reject a more interesting dog Over your threshold8. The language is amazing, convincing and idyllic. In the play, Shylock talks in a blend of section and composition and in this entry, he has all the earmarks of being recounting a practiced discourse, rolling out Antonio’s ‘crimes’ which Antonio completely concedes he would rehash. It is hard not to feel frustrated about Shylock. Shylock’s response to Jessica’s wickedness appears brutal. Be that as it may, his little girl has escaped with a Christian, disgracing him. She has likewise taken his cash and has utilized Shylock’s prearranged engagement ring in installment for a monkey. His upheaval is cruel, however it speaks to the upheaval of a man decimated by his own fragile living creature and blood’s brutal mentality. Ironicly Jessica’s activities ought to end up being the impetus that solidifies Shylock’s demeanor towards Antonio; she has turned Christian similarly as Antonio accepted that Shylock’s bond turned him Christian. Regardless of the attributes that we can't respect, in Act Three Shylock is at his generally energetic and smooth in a bit of unrehearsed writing provoked by yet all the more urging from Salerino and Solanio. The central inquiries he presents are explanatory †they require no answers. He sets out, powerfully and undeniably, realities so fundamental about human presence that they would make even the most solidified supremacist reconsider. Hath not a Jew eyes? Hath not a Jew hands, organs, measurements, detects, expressions of love, interests? Taken care of with a similar food, hurt with similar weapons, subject to similar sicknesses, recuperated by similar methods, warmed and cooled by a similar winter and summer as a Christian may be? 9 It is an all inclusive message, as significant today as it was 406 years prior, when the play was first performed. Be that as it may, as referenced previously, Shylock is certifiably not a two dimensional character, he is no more just a boss of social liberties than he is essentially a savage parasite. One of his next lines affirms his nastier side: and on the off chance that you wrong us, will we not vengeance? 10 Shylock’s melancholy, outrage and scorn are more remarkable than his empathy and he makes plans to have his retribution. An expression of caution here, in any case; Shylock has contemplations of vengeance some time before his daughter’s elopement, some time before he finds she is going through his cash wildly. In spite of the fact that this data solidifies him against Antonio, the seeds of disdain were planted some time before. Shylock’s wrathful character is additionally uncovered in Act Three Scene Three in which he experiences a captured Antonio. His refusal to be lenient, abused by Portia in Act Four Scene One, is first observed here: Jailer, look to [Antonio]. Tell not me of benevolence. This is the idiot that loaned out cash free. 11 Here, Shylock won't face leniency; he is a universal Jew, subject to the lessons of the Old Testament which underscores the significance of law and equity; he has made a solemn vow in heaven12. In any case, there is an error here which thinks about severely Shylock. He has just a single legitimate explanation behind seeking after Antonio through the courts: to be specific, Antonio’s inability to reimburse the 3 000 ducats before the bond has terminated. An advanced crowd may contend that there is an ethical case to reply, as well, given his treatment of Shylock. By the by, the explanation Shylock refers to in his underlying proclamation toward the start of this scene for the corrections officer to watch out for Antonio, isn't to do with obligation or misuse, rather, it is about Antonio’s business exercises, which, as Shylock expressed prior have obstructed me a large portion of a million13. Also, there is something fairly disagreeable about Shylock’s treatment of Antonio in this scene; he resembles a pooch with a bone that he will not drop, rehashing on four events in the space of only sixteen lines, I’ll have my bond. The incongruity is, obviously, that the Christian characters frequently allude to Shylock as far as a savage brute like a canine or a wolf, so it should not shock them that Shylock carries on like one. Shylock shows up at the court accepting he has a watertight argument against Antonio; this is blessed as he has positively no help from the court at all. Prior to his passageway, Shylock is depicted by the Duke as a stony foe, a barbaric knave,/Uncapable of pity, void and void/From any measure of kindness. Plainly, the Duke, the alleged unbiased appointed authority for this situation, is definitely not fair-minded. Shylock is disconnected by his religion †the Duke alludes to him essentially as the Jew or Jew on various events †and by the seriousness and mercilessness of his supplication against Antonio. In the event that he disintegrates in court and gives way, at that point he will be totally vanquished; the Christians will have squashed the Jew. Shylock must choose the option to look for equity precisely. By all accounts, Shylock’s mission for equity seems outrageous, however notwithstanding such maltreatment of intensity from his restriction, it is nearly advocated. By and by, Shylock’s boasting at his appearing triumph is disagreeable. He loses the audience’s compassion through his words and the unwarranted honing of his blade on the sole of his shoe. He is unaffected by arguing or by affront and when sentence is passed against Antonio, he rehashes the expressions of the bond with practically cruel relish: †¦.. Ay, ‘his breast’: So says the bond †doth it not, respectable appointed authority? †‘Nearest his heart’ †those are the very words. Shylock requests a severe recognition of the law, and this is actually what he gets. He is vanquished by his hunger for a twisted equity and retribution over Antonio. He enters the court as a separated man, yet in any event with some respect and compassion. He leaves the court having lost everything †his little girl, his riches, his strict opportunity and the wedding band given him by his significant other. Along these lines, in choosing whether or not Shylock is meriting his disciplines, it is fundamental to recognize that his complexities keep us from making a high contrast answer. As the play advances, so our compassion toward Shylock back and forth movements. Shylock is a person and he endures over the span of the play, yet he makes languishing. He appears to be without adoration, yet he feels the loss of affection acutely. He seems cold and figuring, however is liable to eruptions of shock and energy. It is anything but difficult to be tempted by Shylock †regardless of his inf

Friday, August 21, 2020

Changes to Womens Rights Since 1945 Free Essays

Women’s rights have changed altogether after 1945 as thoughts that show ladies are substandard compared to men were being canceled to make a progressively equivalent society. Work, governmental issues and social change were factors that have been adjusted. Without these changes, Australia would at present be a sex †isolated society with defended thoughts that a women’s place is in the home. We will compose a custom paper test on Changes to Womens Rights Since 1945 or on the other hand any comparable point just for you Request Now Preceding 1945, women’s rights were constrained in territories of work, governmental issues and social change. Ladies were relied upon to be housewives who were not qualified for a similar compensation as men since society had a revered thought that men sufficiently required to help a spouse and kids. Additionally, ladies had restricted chances to voice their interests and interests out in the open places and endured against damaging family circumstances. This started to change when women's activists began to libber against these imbalances. Work before 1945 indicated numerous imbalances among people because of contrasts in wage and out of line rights. The Equal Pay Case of 1972 was an occasion that started during the 70’s because of imbalances of wages among people. The Whitlam government presented the lowest pay permitted by law for the two sexes as a beginning for correspondence in the working environment. Something else the Whitlam Government presented was free tertiary training for all ladies permitting social portability. This opened ways to a more extensive scope of occupations like medication, nursing, or law and allowed ladies to be autonomous. The Anti Discrimination Act of 1985 was a law made to deny segregation dependent on sex or pregnancy for everybody from bosses to associates or in open territories. In spite of the fact that the equivalent compensation case was not a total achievement, presenting the lowest pay permitted by law, free tertiary training and the counter segregation act was a significant accomplishment in changing women’s rights. Ladies had constrained voices to talk about issues of equity in governmental issues. This changed when women's activists, for example, Germaine Greer composed and urged ladies to be politically dynamic. The Women’s Electoral Lobby (WEL) was shaped in 1972, which supported for childcare and maternity leave. In 1975, the Whitlam Government chose a women’s delegate Elizabeth Reid for address women’s rights in the political field. Governmental issues has changed massively since 1945 as ladies lawmakers began to energize for women’s rights. Social change was a significant change in women’s rights from 1945 as various thoughts and perspectives were being voiced to compel change. In 1961, the presentation of the Birth Control Pill was a significant occasion that influenced many average workers ladies. This pill allowed ladies to assume responsibility for their own body and lives as they would now be able to move into the workforce without the issues of leaving because of conceiving an offspring. Likewise, the new laws like the No Fault Divorce of 1975 and the changing of the assault laws in 1981 helped ladies get away from harsh connections and restricted men from separating from their mate for reasons unknown. The presentation of the pill and new laws gave ladies more control and wellbeing to ladies and this was a significant change in women’s rights from 1945. The most effective method to refer to Changes to Womens Rights Since 1945, Essay models

Friday, July 10, 2020

Sample College Admission Essay

Sample College Admission EssaySample college admissions essays are offered online by some great writers, who make a great use of these materials. These articles are based on actual examples of college admission essays that have been written by the writers. When you go online to check out the samples, you will get a great deal of information that will help you. You can easily come up with your own version of an essay.The main objective of the essays is to show off your thoughts about yourself and also to present your efforts, qualifications and achievements. College admissions applicants always put a lot of effort into writing their own applications. This is because it is important for them to convince the admissions committee members about their capabilities, strengths and aptitude for education.The information that you will be given through the sample essays is helpful in producing your own essay. You will get an idea of what is expected of you. These sample essays are useful becaus e they include advice and suggestions about how to create your own application. You will know what you should not include and also what is essential for your college application.However, one of the factors that you need to take into consideration is how many college admission essays are available for you to look at. You can definitely find samples that you like and ones that are really worth reading. When you search online, you will find numerous samples that offer guidance. Most of the writers you find online are experienced and most of them can help you come up with a unique application.When you start reading through the samples, you will find that there are many other essay formats that are included in the sample college admission essays. You should know that you can always add more information that is needed in your application. You can include information about your hobbies, interests and experiences. You can also include personal details like your parents' names, phone numbers , email addresses and addresses of your school as well as your university's name. You should remember that the samples that you find online are only samples and not the completed application.As long as you find a good website, you will have the opportunity to read through different college admission essays. In fact, you may find a much larger selection of samples than the ones you will find in an essay writer's website.When you are searching for the best samples for your college admission essay, be sure to do some research on your own. You should read several papers written by various students who have had an application accepted. You can compare the samples you find online with the student samples. Remember, you can always use these samples to get a good idea about the format of your application and how to write it correctly.

Wednesday, May 20, 2020

Mahatma Gandhi Speeches - 904 Words

Mahatma Gandhi â€Å"The best way to find yourself is to lose yourself in the service of others.† (BrainyQuote.com). Mahatma Gandhi participated in many mentionable functions throughout his life. He help Indians gain rights in Africa, to going on a fast to promote what he believed was right. He was an important tribute to India, and many people look up to him for his bravery. His childhood experiences, adult life struggles, and middle age successes tell his story well. Mahatma Gandhi went through many difficulties throughout his childhood. He also had many problems to overcome as an adult that could have very well affected his character, but he chose to let it not it hurt him. Through these trying times, he made many successes in his later†¦show more content†¦Before Gandhi left, his mother made him promise to stay away from wine, women, and meat (Lal). When he left, he left behind his son, Harilal, who was a few months at the time (Lal). As you can see, Mahatma Gandhi had many chi ldhood experiences that contributed to many years of hard work down the line. Claim 2: Adult life struggles Gandhis adult life struggles helped him learn to be hard-working to achieve his successes in his later life. Gandhi had one unsuccessful year at law school over in England, and after that he took a job as a legal adviser down in South Africa and ended up staying for over 20 years (Lal). There were no rights for Indians in South Africa, and Gandhi dealt with racism on a day to day basis (Lal). For example, one of the more memorable experiences with racism that Gandhi had to deal with was when he was thrown off of a train, even though he had a first class ticket (Lal). Furthermore, there were many more experiences because he had no rights. Gandhis experiences, therefore, taught him to be patient with people who chose not to respect those of the Indian race. One of many other experiences Gandhi had in his adult life was his Satyagraha campaign in SA, which led to the 1914 Indian Relief (Lal). Another struggle he endured was in 1922 when he was arrested and put in prison on charges of sedition, where he was released six years later due to poor health (Lal). Furthermore, he had enduredShow MoreRelatedMahatma Gandhis Path to peace Essay examples788 Words   |  4 Pages Mahatma Gandhi once said, â€Å"I wish for equality for all people, except for photographers and journalists† (â€Å"Mahatma Gandhi biography†). Gandhi was commonly known for his loving personality and his passion for life and equality. It was his mission to free India from the clutches of the British Empire and he will be remembered as one of the greatest pacifists to walk this earth. However, to achieve all of his objectives for truth and equality, he would have to overcome many adversities and hardshipsRead MoreGandhi Heros Journey Essay936 Words   |  4 PagesMahatma Gandhi once said, â€Å"You must be the change you wish to see in the world†. This shows that Gandhi believed in peaceful change. Gandhi was well known in India by many people. People were inspired by his ways and would stand by him in peaceful protesting. A lot of people believed in Gandhi as a hero. Just as well, Percy Jackson from the Lightning Thief is a known hero for stopping world WWIII between the gods. Both Gandhi and Percy Jackson follow the path of the hero s journey because they reRead MorePersuasive Powers of the Reknown Gandhi and Daldier1946 Words   |  8 PagesEvery successful movement through speeches has always conveyed a more in depth message of the writer’s true purpose. There are many ways in which a writer uses rhetorical devices such as diction, style of word arrangement, purpose, and tone in order to achieve his effects upon his audience. Although there are different uses of rhetorical devices in speeches, Mahatma Gandhi’s, â€Å"The Quit India,† and Edouard Daladier’s January 29, 1940 address, â€Å"The Nazi’s Aim is Slavery,† to the people of France, wereRead MoreMahatma Gandhi : The Ba ttle Of Wandiwash1250 Words   |  5 PagesMohandas Karamchand Gandhi, also known as Mahatma Gandhi was born on October 2, 1869 in Porbandar, Gujarat. At the age of 19, he studied at Inner Temple law school in London. After graduating, he returned to India and started his own law firm, but found little success. Later on, he joined an Indian firm and was sent to an office in South Africa along with his wife and kids. Discrimination against Indians in South Africa motivated Gandhi to lead an 8-year campaign of civil disobedience. After theRead MoreDr. Martin Luther King919 Words   |  4 PagesLuther King Junior and Mahatma Gandhi both struggled, I think that the charisma in them influenced social change, because of their tactics used, like non-violence. Martin Luther King Junior and Gandhi both functions as charismatic leaders and influenced others with their fascinatingly positive attitudes. It was hard for them to get there message s and world view s across but they remained stro ng and preserved through their struggles, no matter how tough things got. Gandhi transmitted his messageRead MoreAnalysis Of The Civil-Rights Movements Of Gandhi And Malcolm X879 Words   |  4 Pagesoverlooked flaw or exaggerated prejudice against a certain situation. The Important influencers include that of Dr. Martin Luther Kings non-violent protests, and their efforts for an equal and safe America, the Civil-Rights movements of the 1960s or Gandhi and Malcolm Xs peaceful protest way. All Four found a peaceful way to have a common genuine effort for change in a situation that the leaders of our country fail to deem as an extremely poor guidance for our country. Without the efforts of such leadersRead MoreMartin Luther King Essay758 Words   |  4 Pagesnotice, when he went out, how his family and other black people were treated. This made him angry, but he dealt with it not by using violence, but by peaceful protests. King was very much influenced by the non-violent strategy that Mahatma Gandhi used for a social change. When King was a lot older, he witnessed something which changed his life forever. A black woman had been sent to jail for not giving up her seat for white man on a bus. Martin Luther King, being the Baptist Read MoreMahatma Gandhi And The Indian National Congress1264 Words   |  6 PagesMahatma Gandhi is a non-violent protestor who joined a party called the Indian National Congress. Gandhi is known for his famous speeches and how he peacefully protested to gain his freedom and equal rights for all his fellow people in India from the British. Gandhi’s passion for wanting equal rights led everyone to freedom in India in 1947 when Gandhi was 78. In South Asia a person regarded with reverence or loving respect; a holy person or sage. Gandhi was born on October 2nd 1869 in ProbanderRead MoreRacism, Bias And Prejudice921 Words   |  4 Pagesone of the biggest leaders of racial equality and help change history for the better. Mahatma Gandhi, was born October 2nd, 1869 to a wealthy Indian family in Porbandar, Gujarat India. His father, Karamchand Gandhi, was a well-respected man that held the political position of, Chief Minister of Porbandar. Mahtma’s mother, Putlibai Gandhi, was a kind woman and devote Jainist. Her gentle nature provided Mahatma with a compassionate upbringing that instilled a non-violent, mutual tolerance attitudeRead MoreGandhi : An Icon Of Social Justice And Nonviolent Resistance Essay1986 Words   |  8 PagesGandhi, as an icon of social justice and nonviolent resistance has captivated the hearts of people all over the world. Gandhi is a remarkable individual who was able to do something rarely seen in the history of revolutions and political struggles. Gandhi was able to unite a bitterly divided country of people to peacefully bring down one of the most powerful political entities in world history; The British Empire. Gandhi has a powerful life story which has been recre ated in films such as â€Å"Gandhi†

Wednesday, May 6, 2020

With The Current Type Of Government, The States Could Not

With the current type of government, the states could not form a community in order to deal with the issues in the new nation. Under the Article of Confederation, the American colonies acted as independent sovereign states. In order to pass a bill, there had to be a complete consensus. This meant that if any state opposed Congress’s new bill then it could refuse to enforce it. Also, Congress was prohibited from taxing citizens in order to bring revenue in order to deal with its debt giving the nation no revenue (OpenStax, 199). Around this time, United States had accumulated about $78 million (Locks et al.,437). Due to the high inflation of American currency and lack of job opportunity, citizens began revolting against the wealthy elites†¦show more content†¦Unless America makes a decision on how to solve the nation’s debt, it will never be able to recover and advance. Washington followed Hamilton’s plan by paying the full amount of debt and focusing on the self-interest of the elites (Locks et al., 438). Our country needs stability in order to begin paying off its massive debt. The elites are the economic foundation because through their wealth the nation would recover. Also, Hamilton wanted to create the Bank of the United States, which would facilitate the payment of federal taxes and tariffs (Locks et al., 440). A national bank would establish the groundwork on which states could then build their own state banks. Once the national debt is solved, then the country can solve other issues—states and citizens’ debt. By following Hamilton’s plan, America would build credit as a nation because then other countries and American citizens would trust the government that kept its obligations. Finally, by taking the burden off of the states, the states in response will pledge allegiance to the national government (Locks et al., 438). When states abandon their independent statehoods and come together to form a communit y—central government—then America can operate smoothly and more efficiently. Overall, America’s debt is a major issue for both the government and its citizens, and through Hamilton’s plan, America can solve this issue and persevere. By France declaring war on allShow MoreRelatedThe Constitution Of The Texas Constitution948 Words   |  4 Pagesin the case of the Texas Constitution having the second longest state Constitution and the fourth most amended Constitution in the United States, makes it a difficult and complicated document. The Texas Constitution has been rewritten a total of six times since becoming independent from Mexico. The most recent being the Constitution of 1876, which is excessively detailed and exact due to the framers fear of a strong state government. The framers of the constitution placed strategically in the bodyRead MoreThe Truth in Negotiations Act1100 Words   |  5 PagesThe Truth in Negotiations Act was passed on December 1, 1962 requiring government contractors to submit cost or pricing data if the procurement met specific requirements in order to establish that the offer is fair and reasonable. The history of The Truth in Negotiations Act will set the stage for its significance in the twenty-first century. Prior to World War II, the United States government conducted its bidding process for procurement in an open bid environment. What was required for a bidRead MoreGovernments of the World Essay1271 Words   |  6 PagesMany different forms of government have existed throughout civilization. Theocracy, dictatorships, democracy, and many others have all had periods of time where they reigned as the government of choice. Arguments could be made in favor of each form of government. The key to finding the most viable form of government is to consider this: which form of government provides the most stability for the state? The stability of the state is based upon the foundation of the government. Shaky foundations leadRead MoreThe Revolutionary Revolution And Its Effects On The Economic, Culture And Political Structures Of A Government1029 Words   |  5 Pagesworld modernizes, some governments become outdated and call for a change through revolution. Revolution is a change in the economic, culture and political structures of a government. Social revolution is a rapid and a complete overthrow of the current regime. Social is usually violent but can be nonviolent as well. A nonviolent revolution is a another type revolution in forms of protests, strikes, boycotts, etc. Both types of revolution have been successfully exploited by states to accomplish reformRead MoreThe Right For Individual Legal Age Essay1234 Words   |  5 Pagespeople living in a given country. As applied to the United States, list and explain at least two shared political values that most people, regardless of race, creed, national origin, in the US share. Something that I believe everyone share regardless of race, National Origins and, creed is the Freedom of Liberty, the right to be free. As long as other people right aren t abused. Another thing that everyone shared in the United States is Democracy. The right for individual legal age citizens toRead MoreForms of Government Essay1104 Words   |  5 PagesMany different forms of government have e xisted throughout civilization. Theocracy, dictatorships, democracy, and many others have all had periods of time where they reigned as the government of choice. Arguments could be made in favor of each form of government. The key to finding the most viable form of government is to consider this: which form of government provides the most stability for the state? The stability of the state is based upon the foundation of the government. Shaky foundations leadRead MoreFlat Tax Reform : A Call974 Words   |  4 PagesTax Reform: A Call to Action â€Å"I love paying my income tax! This tax system is so easy to understand!† said no United States citizen, ever. No one has ever said this because it is highly unlikely that no one actually enjoys struggling with the complexity of the current income tax system in the United States. The concept of contributing to the good of the community, county, state, and nation through taxation is not new, nor is it generally opposed by American citizens. Most tax paying citizens doRead MoreRelationship Between United States And Cuba765 Words   |  4 Pages Trade Between U.S. and Cuba Zoe McDowell Randolph Community College Since 1961, the United States and Cuba have had no relations with one another, and have used Switzerland as a mediator for the two countries to communicate (Suddath, 2009). This is beginning to change; the U.S and Cuba did business and trade together long ago, but when the U.S. found that Cuba allowed the Soviet Union to build missile bases in Cuba, along with other things leading up to this down-fall,Read MoreEssay about Authoritarianism: Prevail, or Not? 1618 Words   |  7 Pages â€Å"History proves that all dictatorships, all authoritarian forms of government are transient. Only democratic systems are not transient. Whatever the shortcomings, mankind has not devised anything superior,† Vladimir Putin once said this. With such a view of authoritarianism, there would be assumption that the entire world is on its way to seek such democracy if it is such a clear, correct choice. However, nothing is ever so simple, and this is not the case. In this essay I will take a lookRead MoreArticle Report On Making Investment Plans Essay1480 Words   |  6 Pagesthere should be an additional amount of money that could be used as emergency cash, and protection against other various risks. This protection could be through life, health, property, and liability insurance. Step 2: Establishing Investing Goals-Once the prerequisites are taken care of, an investor will then want to establish their investing goals, which is laying out financial objectives they wish to achieve. The goals chosen will determine what types of investments they will make. The most common

Cyberphysical Security in Networked Control †MyAssignmenthelp.com

Question: Discuss about the Cyberphysical Security in Networked Control. Answer: Introduction Information is considered to be the most valued asset of any sector. Information is susceptible to various types of risks as well as threats. With the emergence of information technology, the cyber threats are increasing at a fast pace. Information security focuses on protecting the valuable and sensitive data of an organization. Information security is involved in protecting the integrity, confidentiality and availability of the information. Banking sectors deal with financial data that needs to be protected. Nabil Bank is known as the first commercial private bank of Nepal (Nabilbank.com 2017). Nabil Bank is involved in providing wide range of banking services via its 52 representation points. This report discusses and plans a security program for providing information security to Nabil Bank. It tries to improve the present security structure of Nabil Bank. This report gives a brief overview of information security. It gives suggestion about the kinds of security models that can be adopted by Nabil Bank for better and secure operations. Threat identification along with risk assessment is also carried out in this report. This report discusses about the ISO standards as well as modes that will be suitable for Nabil Bank with proper reasoning. The training requirements are also provided in this report for adopting security programs in an effective manner. This report recommends certain steps and procedures that can be taken by Nabil bank for improving its security infrastructure and for making the system of information security strong. Information security can be considered to be a practice of defending and protecting information from any kind of unauthorized access, misuse, disclosure, modification and disruption (Vacca 2012). The modern generation is completely dependent on the information and communication technology for confidential as well as commercial purposes. There are several risks as well as threats that are associated with information technology like safety risk, environmental risk, physical risk and financial risk. Security concerns that are related to ICT are gaining major importance with time. All the organizations in every sector face some kind of security issues (Webb et al. 2014). Strong information security structure as well as risks can be adopted in an organization to protect it from risks and threats. Risks can be mitigated and prevented by several methods and techniques. Information security has certain aspects like confidentiality, availability and integrity. When the information cannot be accessed by any unauthorized user then the confidential aspect of information is achieved (Von Solms and Van Niekerk 2013). When the information cannot be misused, destructed or modified by an attacker or user than the integrity of the information is maintained. When the right information is available to the right or authorized person at the correct time with no such interference or obstruction then the availability of information is achieved. Banking sectors have been a major target for the hackers, crackers as well as the cyber criminals. Information security aims at identifying the risks and mitigating it for protecting sensitive information. Current Security Situation and Titles of the Security Personnel Nabil Bank was founded in July, 1984. Their main objective is to extend the services of modern banking to different sectors of the society. Nabil Bank provides several banking and financial services via its 52 representation points. It has introduced several innovative and modern marketing concepts and products in banking sector. Their main objective is customer satisfaction. Highly qualified personnel are responsible for managing the daily operations. Sensitive financial information is handled by the bank. Risk management is carried out by highly experienced and qualifies management team. Nabil Bank is totally equipped with advanced technology that consists of banking software of international standard for supporting E-transactions and E-channels. Their aim is to provide a complete and secure financial solution to their customers. The risk management team is highly efficient in assessing the risk and providing information security to the organization (Sandberg, Amin and Johansson 20 15). There are many security personnel present in the risk management team. They are as follows: Chief Risk Officer: The main duty of the Chief Risk Officer is to implement risk functions, tools as well as systems for identifying, assessing, measuring, monitoring and reporting risks. They identify main risk areas and enhance the function of security architect. They are also responsible for implementing security program. Head of Credit Risk Management: They are responsible for implementing procedures and policies for the purpose of reducing credit risk. They are also involved in building financial models that have the capability to predict any type of credit risk that can affect the organization. The credit risk management team reports to their head regarding daily operations and activities. Senior Credit Analyst: They are responsible for reviewing and assessing financial history of a company or an individual for the purpose of determining whether the candidate is eligible for getting loan. They evaluate financial statements like balance sheets as well as income statements for understanding the default risk level. Compliance and Operational Risk Manager: They are responsible for handling the risk related to legal sanctions, financial loss or loss of banks reputation. They ensure that the bank complies with the government laws, standards and its own code of ethics and conducts. They also manage any type of risk arising because of failure of internal processes, systems, people as well as external events. Risk Assessment and Threat Identification Risk assessment deals with a number of steps and procedures for understanding the asset values, possible threats, system vulnerabilities, and predictable impacts of threats along with the likelihood of threats (Kit et al. 2014). Risk can be defined as vulnerability functions as well as the expected impacts of threats. Risk depends on the probability of the occurrence of threat. System characterization is the first step in risk assessment. Information about the software and hardware involved is initially found out (Aloini, Dulmin and Mininno 2012). NIST framework of risk management involves assessment of risk after all the risks have been framed. This framework integrates business processes, company goals, mission, SDLC processes and information security infrastructure for effective risk assessment. The methodology of risk assessment includes a process, risk model, an approach for assessment and analysis approach (Lo and Chen 2012). After risk identification is carried out, the risks are monitored. ENISA framework will be effective in the E-transaction processes of Nabil Bank for the purpose of assessing risks (Theoharidou, Mylonas and Gritzalis 2012). This model identifies the risk and analyses it for the purpose of evaluation. Information security can be enhanced in an organization only by identifying the possible threats and risks. Threat can be considered to be a potential for some kind of trouble or damage to IT infrastructure. After proper identification of threats a well planned security program can be carried out in order to protect the bank from any data and security breach. Nabil Bank provides several financial and banking services. It also provides online banking facilities to the customers. There are two broad categories of threats that are identified initially. These are the internal and external threats. Internal threats: Business practices and processes of a financial institute have a huge influence on internal threats. If more number of employees is able to access sensitive customer information then the probability of threats will be more. The intensity of internal threats is less as they are under the control of the bank. External threats: These threats have a greater intensity as they are not under the control of the bank. External threats can be reviewed by listing the reasons and ways in which personal data can be accessed, identifying the ways by which the banks system is connected to outside world via emails and networks, identifying service providers that have access to the data. Then the exposure of the threat is identified. Some of the threats that have been identified in the internet banking system of Nabil Bank are phishing, spyware, viruses, Trojan horses as well as key loggers. In phishing attack hoax mails are used for committing a fraud activity (Hong 2012). Online thieves can steal sensitive data of the customers to misuse it. Spyware is a type of malicious software that collects valuable information of the users in a secretive manner for misusing and modifying it (Giannetsos and Dimitriou 2013). Viruses can get attached to another program like spreadsheets for replicating itself. Trojan horses are another type of threat where an application acts like a secure application and harms the system in which it is downloaded or injected. Key logger software is considered to be the most harmful threat of Nabil Bank (Dadkhah and Jazi 2014). If key logger software is installed in the electronic device of the customer from where the customer accesses online banking services, then it tracks all the informati on that is used by the customers. This information can be used by the attackers in order to steal money from the bank. The financial database of the bank can be hacked to access sensitive financial data (Martins, C., Oliveira and Popovi? 2014). Deliberate and external threats are extremely harmful for the banking sector as it causes huge financial loss. After identifying the threats, their exposure must be determined to rank them based on their intensity. This will be extremely helpful for the bank to mitigate risk in an efficient manner. Security Models Security models are responsible for providing standards for the purpose of comparison and reference. Nabil Bank uses the NIST access control model for the purpose of identification of access mechanism that is used in different levels that exist in the bank. Management level is involved in dealing with information that will help in the strategic planning process. The level that deals with administration work will be responsible for controlling operational data. The technical layer of the bank deals with daily operational data that is needed for running the business. NIST framework is responsible for describing the present cyber security posture, their target state, find out ways to improve risk management and fosters the process of communication between the external and internal stakeholders of the bank. The present risk management procedure is not replaced when the bank uses NIST framework. Rather the NIST framework tries to complement the present security structure (Chang, Kuo and Ramachandran 2016). The bank can use its current structure and leverage NIST framework for the purpose of identifying opportunities for improving the current risk security management. The security models of NIST framework will be highly beneficial for Nabil Bank as their documents are available at free of cost. It can also be updated by government. Risk assessment guidelines, security plans and privacy control plans are provided NIST framework (Malik and Nazir 2012). Strong information security policies can be implemented for protecting the banks valuable information . Development of Security Program Nabil Bank is a large sized company having 52 points of representation across Nepal. The organization structure that is present in the bank is hierarchical in nature. The organization has code of ethics and conducts incorporated in its culture. The main objective of the bank is to provide a single and secure financial solution to its customers. Nabil Bank gives first priority to its customer. The employees follow a code of ethics in the organization (Peltier 2016). They act in an honest manner to protect the interest of their clients (Hu et al. 2012). The bank takes major action against any employee who commits any misconduct. Strong information security policies can be implemented for protecting the banks valuable information. A well planned security program can be effective for protecting the bank from any security risks and threats. Financial data breach will cause loss to the clients and also will affect the reputation of the bank. The following steps can be taken in order to dev elop an efficient security program: Risk assessment: The first step in this process is to identify what department deals with what information. The bank also needs to find out who has access to what sensitive information. The second step will be to identify external and internal threats and determine its probability of occurrence. The last step is to determine whether the existing policies are adequate for protecting the information. Current policy adjustments: A security policy must be designed to protect the customer information. This policy must be approved by the board of directors in order to carry enhance the information security of the bank. Security control design: The management should focus on developing security control plans for all the business units. There must be security guidelines present. Access controls need to be designed where authentication procedures like passwords, PINs, electronic tokens are used. Biometric identification and firewalls can be implemented for protecting the databases that store sensitive financial data. The networks can be protected by implementing firewalls. The customer details can be encrypted to protect it from any unauthorized access. Response plan: The management team must develop and design a response plan for overcoming a security breach situation. The person who is in charge of maintaining customer information must design this plan. It must be well written. The plan needs to include the contact details of law agencies for taking appropriate steps. Service provider: The contract between the bank and service provider must contain effective response plans. The bank must ensure that the contract contains appropriate standards for information security. Testing: The testing of the security controls and plans must be done to make sure that the bank is well protected from any type of security threat and risk (Shackelford et al. 2015). The parties involved in the contract must conduct control testing. They must conduct ethical hacking to find out the effectiveness of the security policies and plans. Roles and Responsibilities Chief Risk Officer: The main duty of the Chief Risk Officer is to implement risk functions, tools as well as systems for identifying, assessing, measuring, monitoring and reporting risks. They identify main risk areas and enhance the function of security architect. They are also responsible for implementing security program. Security Manager: The role of the security manager is to collect and utilize information in an effective manner to achieve the goal of the organization. They are responsible for proper communication of information among various layers. Senior Credit Analyst: They are responsible for reviewing and assessing financial history of a company or an individual for the purpose of determining whether the candidate is eligible for getting loan. They evaluate financial statements like balance sheets as well as income statements for understanding the default risk level. Information security of Nabil Bank can be improved by adding more designations and roles so that there is no overlap of responsibilities of the employees (Ahmad, Maynard and Park 2014). Some of the new titles that can play an effective role in improving information security are: Technical security manager: The technical aspects of security will be looked after by these managers. They will be involved in firewall implementation and encryption processes. Program security manager: The third pert or vendor risks can be evaluated by these managers. CISO: The whole security policies can be looked after by CISO. CISO can take the responsibility of design strong security policies for the organization. Source code manager: The source codes can be reviewed by these managers for detecting any type of vulnerability. There can be many specialized roles like virus technicians whose responsibility will be to detect new virus as well as develop a defense plan to fight the virus. Training Requirements The employees of Nabil Bank must be aware of the need of a strong information security program. Employee training can be considered to be a critical component for the information security of bank. Management must document the information regarding which employee has access to what valuable information of the customers (Hu et al. 2012). The employees must be made aware of the security policies of the bank. They must be trained to identify valuable customer information. Employees must be given training on how to implement the written policies that governs the disclosure of the information of the customers (Lebek et al. 2013). There need to be regular meetings to discuss new policies and modify existing policies for improving the present information security policy. ISO Standards and Models ISO model is used in most of the industries. ISO standards provide a common base to all the organizations in order to develop security standards and policies (Disterer 2013). Organizations are able to develop inter organizational deals by using ISO standards. ISO/IEC 27001: This standard helps in implementing ISO/IEC 27002 in order to set up ISMS (Susanto, Almunawar and Tuan 2012). ISO/IEC 27002: This standard addresses the security needs of an organization. It also helps in developing security policies (Ramanauskaite et al. 2013). ISO model is well suited for Nabil Bank because it will assist the bank in developing management system for managing information security. The ENISA model can also be suitable for Nabil Bank for the purpose of securing the E-transaction and E-channel. Conclusion This report concluded that Nabil Bank can improve its information security by adopting a well defined security program. This report discussed about the critical factors of information security like confidentiality, availability and integrity. It said that the breach of data and information security can lead to serious and potential losses. The main purpose of assessing risk is to identify organizational threats and vulnerabilities. Internal threats can be identified by finding out which staff has access to which information and overlapping information. It pointed out that the security system of the bank is accessed by an unauthorized outsider then this result in external threats. It gave a description about the security program that can be adopted by Nabil Bank. This report discussed about the current roles and suggested an improvement plan for making the information security of the organization strong. It suggested that the employees must be made aware of the security policies of th e bank. This report concluded that ISO model is suitable for the bank and ENISA model is suitable for its electronic transaction system. The advanced technologies as well the communication channels need to be protected from attackers. Recommendations Nabil Bank can secure its information and data from unauthorized access by following certain steps: Encryption: Financial data must be encrypted so that the hackers cannot get access to it. Employee training: Proper training must be imparted to the employees to enhance the information security. Updated software: Latest version of the software must be installed in the system. It must be updated regularly. Firewall: Firewall implementation will protect financial information from any external intrusion. References Ahmad, A., Maynard, S.B. and Park, S., 2014. Information security strategies: towards an organizational multi-strategy perspective.Journal of Intelligent Manufacturing,25(2), pp.357-370. Aloini, D., Dulmin, R. and Mininno, V., 2012. Risk assessment in ERP projects.Information Systems,37(3), pp.183-199. Chang, V., Kuo, Y.H. and Ramachandran, M., 2016. Cloud computing adoption framework: A security framework for business clouds.Future Generation Computer Systems,57, pp.24-41. Dadkhah, M. and Jazi, M.D., 2014. Secure payment in E-commerce: Deal with Keyloggers and Phishings.International Journal of Electronics Communication and Computer Engineering,5(3), pp.656-660. Disterer, G., 2013. ISO/IEC 27000, 27001 and 27002 for information security management.Journal of Information Security,4(02), p.92. Giannetsos, T. and Dimitriou, T., 2013, April. Spy-Sense: spyware tool for executing stealthy exploits against sensor networks. InProceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy(pp. 7-12). ACM. Hong, J., 2012. The state of phishing attacks.Communications of the ACM,55(1), pp.74-81. Hu, Q., Dinev, T., Hart, P. and Cooke, D., 2012. Managing employee compliance with information security policies: The critical role of top management and organizational culture.Decision Sciences,43(4), pp.615-660. Hu, Q., Dinev, T., Hart, P. and Cooke, D., 2012. Managing employee compliance with information security policies: The critical role of top management and organizational culture.Decision Sciences,43(4), pp.615-660. Kit, R.I.S., Allen, K., Mazzotti, F.J. and Briggs-Gonzalez, V., 2014. Risk Assessment Methodology. Lebek, B., Uffen, J., Breitner, M.H., Neumann, M. and Hohler, B., 2013, January. Employees' information security awareness and behavior: A literature review. InSystem Sciences (HICSS), 2013 46th Hawaii International Conference on(pp. 2978-2987). IEEE. Lo, C.C. and Chen, W.J., 2012. A hybrid information security risk assessment procedure considering interdependences between controls.Expert Systems with Applications,39(1), pp.247-257. Malik, A. and Nazir, M.M., 2012. Security framework for cloud computing environment: A review.Journal of Emerging Trends in Computing and Information Sciences,3(3), pp.390-394. Martins, C., Oliveira, T. and Popovi?, A., 2014. Understanding the Internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application.International Journal of Information Management,34(1), pp.1-13. Nabilbank.com. 2017.About Nabil Bank - Nabil Bank Limited First Private Commercial Bank. [online] Available at: https://www.nabilbank.com/intro/about-nabil-bank/11-product-services/deposit-products [Accessed 5 Oct. 2017]. Peltier, T.R., 2016.Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Ramanauskait?, S., Olifer, D., Goranin, N. and ?enys, A., 2013. Security ontology for adaptive mapping of security standards.International Journal of Computers, Communications Control (IJCCC),8(6), pp.813-825. Sandberg, H., Amin, S. and Johansson, K.H., 2015. Cyberphysical security in networked control systems: An introduction to the issue.IEEE Control Systems,35(1), pp.20-23. Shackelford, S.J., Proia, A.A., Martell, B. and Craig, A.N., 2015. Toward a Global Cybersecurity Standard of Care: Exploring the Implications of the 2014 NIST Cybersecurity Framework on Shaping Reasonable National and International Cybersecurity Practices.Tex. Int'l LJ,50, p.305. Susanto, H., Almunawar, M.N. and Tuan, Y.C., 2012. Information security challenge and breaches: novelty approach on measuring ISO 27001 readiness level.International Journal of Engineering and Technology. IJET Publications UK,2(1). Theoharidou, M., Mylonas, A. and Gritzalis, D., 2012. A risk assessment method for smartphones.Information security and privacy research, pp.443-456. Vacca, J.R., 2012.Computer and information security handbook. Newnes. Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security.computers security,38, pp.97-102. Webb, J., Ahmad, A., Maynard, S.B. and Shanks, G., 2014. A situation awareness model for information security risk management.Computers security,44, pp.1-15.

Thursday, April 23, 2020

Professional School Counseling free essay sample

Professional School Counseling A school counselor assists students in developing strategies to surmount society before society surmounts them. By teaching children social skills, and also a way of coping, a school counselor serves as a role model among the youth. Their primary purpose is assisting children with educational, emotional, and social development skills that will guide them in the direction of a healthier future. In most schools there is at least one counselor. Most School Counselors work in secondary schools (Grubb). Most opportunities will occur to meet replacement needs. Outlook is dependent on pupil population so job opportunities are best in growing areas. Those in the area of specialty who are bilingual and bicultural may have better chances for employment. Beginners may have to work at lower paying or part-time jobs in order to gain experience in the field. Jesse B. Davis was the founder of school counseling. Jesse B. Davis was the first individual that becomes known for introducing â€Å"vocational and moral guidance† into the school system. We will write a custom essay sample on Professional School Counseling or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page â€Å"This was the first systematic guidance program in public schools† (A Brief History of School Counseling, 2011). Jesse B. Davis was a school administrator in Michigan who seen how the new classes in the school systems were challenging to the students so he created a guidance curriculum. Davis introduced his guidance curriculum at the Grand Rapids, Michigan School that he was a principal at. This program was introduced to 11th grade boys and girls during 1898 to 1907. He introduced this curriculum into an English class once a week. During this class that teachers would teach the lessons that were suggested by Davis. Frank Parsons was influenced by the work of Jane Adams. He was a social worker in Boston Massachusetts. Parsons began a house for people that were unemployed. He thought that vocational education should be introduced into the public school systems. Parsons introduced the Vocation Bureau in Civic Service House in Boston in 1908. This established the first vocational institute in the United States. He also wrote a book called â€Å"Choosing a Vocation† right before he died in 1909. The American Counseling Association started out being known as the National Vocational Guidance Association, which was founded in Grand Rapids Michigan. This form of vocation guidance that the above people developed began to spread throughout many of the larger cities. This spread also involved Eli Weaver. Eli Weaver wrote a book called â€Å"Choosing a Career†. He began to introduce vocational guidance in New York City Schools as early as 1906. Vocational guidance began to spread fast. By 1909, it was I introduced into Boston schools, then in 1911 into Cincinnati schools. Vocational guidance mainly was developed because of a fear of unemployment. This in return created a strong social reform and progressive education movement. By 1924 guidance counselors (School Counselors) began to get certified. Vocational guidance and school counseling began to grow between the 1920’s and 1930’s. This growth happened due to the progressive education in the schools. The progressive movement placed emphasis on personal, social, and moral development. Many schools refused this education, saying that it was an anti-educational movement and that they should only be teaching the fundamentals of education. All this added with the Great Depression cause a decline in the school counseling and guidance profession. â€Å"In the 1940’s the United States were using psychologists and counselors mainly to select, recruit, and train military personnel† (A Brief History of School Counseling, 2011). This usage of counselor in the military caused the 1950’s â€Å"the Guidance and Personnel Services Section in the Division of State and Local School Systems. In 1957 the National Defense Education Act was launched, which created an increase in vocational guidance. School Counseling has continued to grow since then. It has grown created new legislation and new professional developments. In 2006, congress created February 6-10 National School Counseling week. There were not very many requirements for those wanting to be a school counselor back during the development of the job. Most of the people that were school counselors were teachers that had very little to no training at all in the guidance field. The National Defense Education Act established different guidance institutes were teachers would attend summer guidance seminars to receive specialized training in different guidance techniques. These seminars would offer endorsements and certificates to the teachers that were participating in the school-counseling career. â€Å"By the 1970’s most states required that teachers earn a master’s degree in school counseling in order to be certified as a school counselor† (A Brief History of School Counseling, 2011). The master’s degree programs consisted of 30-36 semester hours. At present there are about forty states that allow non-teachers that have school counseling degree’s to become counselors at their schools. Many of these states also require that a counselor have internship hours in a school setting. A Licensed Professional Counselor is different from a Licensed or Certified School Counselor. Many Counselors that work in different settings other than school usually do not require a school counseling certification. In order to compete with other professional such as psychiatrists and social workers a counselor should obtain this certification. Duties of a school counselor are to work with students, school staff, families, and members of the community in order to make education easier for the students. Counseling programs in schools tend to create school success with â€Å"a focus on academic achievement, prevention and intervention activities, advocacy, and social/emotional and career development† (Hartley, Richard amp; McLearen, Cynthia, 2006). A School Counselor is a person that is a certified professional with a Master’s degree and specialized training. A counselor also is an educator who advocates for all students, coordinates services, consults, is a group leader, is a mediator, is a professional helping teachers, parents, and others to understand the development of children and youth, and finally a counselor is a professional who helps children understand themselves and others. A School counselor has many jobs. These jobs include (Hartley, Richard amp; McLearen, Cynthia 2006): †¢ Counsels with students individually and in groups †¢ Provides developmental classroom guidance activities †¢ Responds to students’ needs in crisis situations   Orients new students to school programs and settings †¢ Works with potential drop-outs and other at-risk students †¢ Actively participates in the referral process for helping students and families connect with community agencies †¢ Analyzes test results and provides information about students’ abilities, achievements, interests, and needs †¢ Coordinates efforts with other school professionals †¢ Conducts conferences with parents †¢ Guides students’ school and career plans †¢ Adheres to ethical and legal standards †¢ Pursues opportunities for professional growth Conducts periodic evaluation of the school counseling and guidance programs †¢ Helping a student to enjoy their educational experience †¢ Be someone that a student can talk to when needed †¢ Give parents and families appropriate information when needed †¢ Provide students counseling in order to ensure school success, personal development, behavior management, assertiveness, †¢ The counselor also provides ways for the students to deal with: stress/anxiety, anger, divorce, and grief amp;loss †¢ The counselor also teaches the student how to build their friendship skills and how to make smart decisions. The school counselor provides assistance to fellow staff members and students by promoting social skills †¢ The counselor keeps in contact with teachers and school administrators about the students’ progress and development Some counselors offer parents and children or just parents different programs that help them to learn more about their education. A counselor’s job is much more different than it was 50 years ago. Back 50 years ago a counselor was more concerned with just getting a student the classes they wanted to take. At present a counselor helps their students in a much broader way. The counselor helps students deal with almost any problem that might arise. The counselor helps to guide students toward productive futures, and tries to create positive environments for them to learn in. There are many different skills that a school counselor must be able to teach to students. These skills include (Maxwell, Nadine, 2007): †¢ Self-understanding and self-confidence †¢ Motivation †¢ Decision- making, goal-setting and planning †¢ Conflict resolution †¢ Interpersonal relationships/ social skills †¢ Communication skills †¢ Respect for others †¢ Appreciation for cultural/ethnic diversity Responsible behavior †¢ Career awareness †¢ Self empowerment and resiliency Narrative theory has provides a model that serves numerous and complex issues that help to face the diverse student population with whom all school counselors have the privilege to counsel in today’s schools. Schools continue to be challenged when they address the academic needs of Latino students in our schools for example â€Å"The graduation gap between Latino students and their classmates is an issue school districts are struggling with across the country† (McNeill, 2005, p. 23). The article particularly addresses the issue of Washington DC metropolitan school districts and specifically Fairfax County Public Schools (FCPS), and how â€Å"in the past five school years, the number of Latinos who dropped out from Fairfax County schools has more than doubled far more than their white, black or Asian classmates† (McNeill, 2005, p. 15). The Latino, Juan Pacheco who was a community activist and former FCPS student, shared that, â€Å"existing programs in school and community centers need to find better ways to engage children and provide them with ‘culturally appropriate’ role models† (Schumitz, 2004, p.101). Counselors are ethically obligated to find culturally appropriate ways for to interrupt in Latino student’s lives so that there is a way to ensure that all students have an equal opportunity in order to achieve academically. Narrative theory has the propensity to provide counselors with a culturally sensitive framework that hel ps to build counseling practices that take culture into consideration. This has occurred due to underlying assumptions and theoretical concepts that are based from those assumptions. Informed consent is usually a legal condition that a person can be said to have agreed upon by giving their consent based on appreciation and their understanding of the facts and implications of the actions they will be receiving. Usually an informed consent statement is given so that each individual that is receiving counseling services understand the type of services they will receive. This statement is something that describes that nature of services, the counselors’ credentials, the confidentiality information, office hours, and contact information. A patient has the right to know all this information. They have the right to know that their information will be kept confidential. Confidentiality and School Counseling is pretty much the same as regular counseling. It is understood that whatever is discussed between the client and the school counselor is confidential. Confidentiality is essential when wanting to develop trust among your clients. Dealing with minors is more complex than dealing with adults and confidentiality. School counselors should learn how to balance their clients, the parents of their clients, the school system and their ethical and legal responsibilities to all involved. The issue of confidentiality is raised quite often because of the complex balancing of student clients. In order to aid the school counselor in their attempt to weigh their ethical obligations they must identify those of which they consider to be their â€Å"clients. † Seeing School counselors are a part of the educational community they don’t only deal with the students they deal with the teachers, administrators, and the student’s parents. It is extremely important that as a school counselor on must clarify that their clients are the students. â€Å"The Code of Ethics and Standards of Practice of the American Counseling Association (ACA, 1995) and the Ethical Standards for School Counselors of the American School Counselor Association (ASCA, 1998) are two resources available to help school counselors manage privacy and confidentiality in their counseling relationships. The moral issues that are most often shown in relation to ethical practices of school counselors include the following: †¢ Veracity or telling the truth †¢ Justice or fairness †¢ No maleficence or doing no harm.