1
Assessment details for ALL students
Assessment item 3 - Individual submission
Due date: Week 12 Monday (1 Oct 2018) 11:55 pm AEST
Weighting:
Length:
50% (or 50 marks)
There is no word limit for this report
Objectives
This assessment item relates to the unit learning outcomes as stated in the unit profile.
Enabling objectives
1. Analyse a case study and identify issues associated with the business;
2. Develop and deploy the application in IBM Bluemix;
3. Evaluate existing and new functionalities to address business problems;
4. Prepare a document to report your activities using text and multimedia (for example screenshots, videos).
General Information
The purpose of this assignment is to create a cloud based simulating environment which will help to
identify/understand the problem stated in the given case study using analysis tools available in IBM
Bluemix. In assignment three, you are working individually. By doing this assignment, you will
learn to use skills and knowledge of emerging technologies like cloud computing, IoT, to simulate a
business scenario to capture operational data and share with a visualization tool. You will acquire a
good understanding of smart application design in a cloud environment for efficient application
configuration and deployment.
What do you need to do?
The assignment requires you to do the following -
• Download the ‘Starter_Code_For_Assignment_Three.rar’ given in week 8 to
configure, and deploy a cloud based smart/IoT (Internet of Things) application to
simulate the business case.
• Choose a case study out of given two below and analyse the case study to
understand the business problem and design a solution for those problems.
• Deploy the starter source code in your Bluemix account and modify it to address
all required milestones mentioned in your chosen case study.
• Finally prepare a report according to given format and specifications below and
submit it in Moodle.
2
Report format and specifications -
You are required to submit a written report in a single Microsoft Word (.doc or .docx)
document. There is no word limit but any unnecessary information included in the report
may result in reduced marks.
The report must contain the following content (feel free to define your own sections,
as long as you include all the required content):
o Cover page/title page and Table of contents
o URL of the app and login details of the IBM Bluemix account
o Introduction
o Case study analysis which will report –
o Business problems you have identified in the case study
o Possible solutions for each and how do these solutions address the
business problems?
o What are the solutions you implemented in the application?
o The step by step process you have followed to configure and deploy the smart app
for business case simulation. You may choose to use screenshots and notes to
enrich your report but you must have a video of the pr.
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
1 Assessment details for ALL students Assessment item.docx
1. 1
Assessment details for ALL students
Assessment item 3 - Individual submission
Due date: Week 12 Monday (1 Oct 2018) 11:55 pm AEST
Weighting:
Length:
50% (or 50 marks)
There is no word limit for this report
Objectives
This assessment item relates to the unit learning outcomes as
stated in the unit profile.
Enabling objectives
1. Analyse a case study and identify issues associated with the
business;
2. Develop and deploy the application in IBM Bluemix;
3. Evaluate existing and new functionalities to address business
problems;
4. Prepare a document to report your activities using text and
multimedia (for example screenshots, videos).
General Information
2. The purpose of this assignment is to create a cloud based
simulating environment which will help to
identify/understand the problem stated in the given case study
using analysis tools available in IBM
Bluemix. In assignment three, you are working individually. By
doing this assignment, you will
learn to use skills and knowledge of emerging technologies like
cloud computing, IoT, to simulate a
business scenario to capture operational data and share with a
visualization tool. You will acquire a
good understanding of smart application design in a cloud
environment for efficient application
configuration and deployment.
What do you need to do?
The assignment requires you to do the following -
• Download the ‘Starter_Code_For_Assignment_Three.rar’
given in week 8 to
configure, and deploy a cloud based smart/IoT (Internet of
Things) application to
simulate the business case.
• Choose a case study out of given two below and analyse the
case study to
understand the business problem and design a solution for those
problems.
• Deploy the starter source code in your Bluemix account and
3. modify it to address
all required milestones mentioned in your chosen case study.
• Finally prepare a report according to given format and
specifications below and
submit it in Moodle.
2
Report format and specifications -
You are required to submit a written report in a single Microsoft
Word (.doc or .docx)
document. There is no word limit but any unnecessary
information included in the report
may result in reduced marks.
The report must contain the following content (feel free to
define your own sections,
as long as you include all the required content):
o Cover page/title page and Table of contents
o URL of the app and login details of the IBM Bluemix account
o Introduction
o Case study analysis which will report –
o Business problems you have identified in the case study
o Possible solutions for each and how do these solutions address
the
business problems?
o What are the solutions you implemented in the application?
o The step by step process you have followed to configure and
4. deploy the smart app
for business case simulation. You may choose to use
screenshots and notes to
enrich your report but you must have a video of the process.
o Video link of you working while deploying and configuring
o Self-Reflect –
o Was the telemetry data effective to visualize required
information?
o Suggest collection of five new data elements (other than data
already
collected by the telemetry) which could be helpful to solve the
business
problems in the smarter way.
o Difficulties you faced –
o What are the difficulties you have faced during the process of
app
deployment and data collection?
o How did you address those difficulties?
o Conclusion
o References
Plagiarism Checking Information
It is VERY important that you do not copy content directly from
either the text or Internet
resources: this assignment is to be in your own words. You will
lose marks if you do not
use your own words! Actual plagiarism will result in the
5. instigation of the student
misconduct process.
On uploading your assignment for the first time you will be able
to immediately see your
similarity score. However, a 24 hour delay exists for the release
of similarity scores for the
submission of successive items (drafts).
To be clear, the delay will not apply to your first draft which
will receive a Turnitin
similarity score as soon as possible. This mandatory delay was
implemented by Turnitin to
minimise misuse of the similarity-checking service by students
who were simply modifying
their submissions to avoid match detection and without citing
sources appropriately.
3
Choose a Business Case only for the assignment
Business Case One:
Smart application to monitor trucks movement and telemetry
AB Pty. Ltd is a delivery company who has 3 trucks to deliver
different products for third parties.
They have their set delivery zone which covers an area (feel
free to choose an area) of Austin
downtown, Texas, USA. Due to the expanding demand their
trucks are always busy. Most recently,
6. they are receiving complaints about delayed delivery and long
queue of pending delivery. In the initial
stage of their business a truck on average can deliver 5 times a
day. However, current average for
their trucks is only 3 times per day. The general manager of AB
Pty. Ltd appointed a business analyst
to identify potential causes of the delay. The business analyst
made a number of stage one
recommendations below -
• Develop a smart application to simulate the trucks movement.
• Divide the entire delivery area into two zones.
• Write a NODE-RED function node that will
o set different speed limits of the truck for each zone and
outside the zone.
o change speed value( feel free to assume the speed values)
when it enters in a delivery
zone and change it back when it is outside of the delivery zone.
You can use ID of
delivery zone, entry and exit message from GeoAlert to know
about their entry and
exit in a specific zone.
• Set following custom properties –
o Total delivery allocated ( this field will show a delivery
number allocated to the
truck)
o Total delivered numbers at current time (will show number of
delivery done). In this
case assume that every entry in the zone is the start of a
delivery and every exit in a
zone is the end of a delivery.
7. • System should alert the management via email/Twitter, if a
truck
o violated the speed limit of the zone. [ NB: Use the speed limit
you have set in your
assignment two] or
o finished their allocated delivery
• Create a visual dashboard using NODE-RED which will have a
speed gauge and speed chart
of a specific truck.
AB Pty. Ltd appointed you as an ICT professional to develop a
simulated connected vehicle
application for simulation in Bluemix which will address the
milestones above recommended by the
business analyst.
Business Case Two:
Smart application to remotely monitor a patient’s movement
details
AB hospital has a physiotherapy department with 3 patients.
The hospital is very renowned for their
services. It is receiving increasing pressure to increase their
capacity to serve more physiotherapy
patients. However, their current capacity is limited to 3 patients
only. Furthermore, as part of their
service, they also want to collect information about their
patients walking habits within the walking
zone of the hospital to serve them better. They have appointed a
business analyst to identify actions to
address the issues. The business analyst made a number of
stage one recommendations below -
8. • Divide the entire walking area (feel free to choose an area) in
Austin downtown, Texas, USA
into two zones.
• Write a NODE-RED function node that will
o set different walking speed of the patient for each zone and
outside the zone.
4
o change speed value when it enters in a walking zone and
change it back when it is
outside of the zone. You can use ID of walking zone, entry and
exit message from
GeoAlert to know about their entry and exit in a specific zone.
• Set following custom properties –
o Total number of meters required to walk ( this field will show
a delivery number
allocated to the patient)
o Total number of meters walking done at current time (number
of entries in the zone
X 10 meters).
• System should alert the management via email/Twitter, if a
patient
o violated the walking speed limit of the zone. [ NB: Use the
speed limit you have
set in your assignment two] or
o finished their allocated walking meters
9. • Create a visual dashboard using NODE-RED which will have a
walking speed Gauge and
speed chart of a specific patient.
The AB hospital appointed you as an ICT professional to
develop a simulated connected patient’s
application for simulation in Bluemix which will address the
milestones above recommended by the
business analyst.
5
Marking guide:
Student number:
Name:
Marker / Date:
Sections
Marks
Comments
The report quality –
• Is the report easy to follow? Did it
address all the key information required
for the report?
• Is it prepared using formal report writing
style such as table of content, page
10. numbers, appropriate referencing (if any),
cover page, introduction, conclusion,
referencing and so on.
• Did it specifically address all the
guidelines provided by the ‘Report format
and specifications’ section.
/3 (1 for each bullet
point)
• Case study analysis which will report –
o Business problems you have identified
in the case study
o Possible solutions for each and how
do these solutions address the
business problems?
o What are the solutions you
implemented in the application?
/6 (2 for each bullet
point)
Working application -
• Working URL of the app and login
details of the Bluemix account. (5
marks)
• Working application ( 15 marks)
11. • Functionality of the application as
per required and stated in the
report ( 10 marks)
/(5+15+10=30 marks)
The step by step process -
• Video link of your working while
deploying
/4 marks
6
Self-Reflect –
• Was the telemetry data effective to
visualize required information?
• Suggest collection of five new data
elements (other than data already
collected by the telemetry) which could
be helpful to solve the business problems
in the smarter way.
/4 (2 marks for each
bullet point)
Difficulties you faced –
• What are the difficulties you faced
12. during the process of app deployment
and data collection using debug?
• How did you address those difficulties?
/3( 1.5 marks for each
bullet points)
Total Marks: /50
ObjectivesEnabling objectivesGeneral InformationWhat do you
need to do?The assignment requires you to do the following -
Download the ‘Starter_Code_For_Assignment_Three.rar’ given
in week 8 to configure, and deploy a cloud based smart/IoT
(Internet of Things) application to simulate the business
case.Report format and specifications -You are required to
submit a written report in a single Microsoft Word (.doc or
.docx) document. There is no word limit but any unnecessary
information included in the report may result in reduced
marks.Choose a Business Case only for the assignmentBusiness
Case One:Business Case Two:Marking guide:Student
number:Name:Marker / Date:
10/23/2018 Week 2 - Assignment
https://ashford.instructure.com/courses/33753/assignments/6752
88?module_item_id=1711605 1/2
Week 2 - Assignment
What Would You Do? Ethics and Today’s Administra�ve
13. Professional
Read the Ethics and the Administrative Professional. What
Would You Do?
(http://www.amanet.org/training/articles/Ethics-and-the-
Administrative-Professional-What-Would-iYou-
Do.aspx) Write a paper with your responses to the five cases
presented at the end of the article.
Clearly identify each case and provide an explanation of how
you would respond or react in each case
using communication techniques used to manage conflict. Your
responses should be thorough and
complete with details explaining your response and using
knowledge from this class and two outside
resources. You may also indicate if additional information is
needed and if so, what would you like to
know.
The paper must be two to three pages in length (excluding title
and reference pages) and formatted
according to APA style. You must use at least two scholarly
resources (at least one of which can be
found in the Ashford University Library) other than the
textbook to support your claims and sub claims.
Cite your resources in text and on the reference page. For
information regarding APA samples and
tutorials, visit the APA checklist
(http://writingcenter.ashford.edu/introduction-apa) in the
Ashford
Writing Center (http://writingcenter.ashford.edu) .
Carefully review the Grading Rubric
(http://ashford.waypointoutcomes.com/assessment/9520/preview
) for the criteria that will be used to
14. evaluate your assignment.
Waypoint Assignment
Submission
The assignments in this course will be submitted to Waypoint.
Please refer to the instructions below
to submit your assignment.
1. Click on the Assignment Submission button below. The
Waypoint "Student Dashboard" will open
in a new browser window.
2. Browse for your assignment.
3. Click Upload.
4. Confirm that your assignment was successfully submitted by
viewing the appropriate week's
assignment tab in Waypoint.
http://www.amanet.org/training/articles/Ethics-and-the-
Administrative-Professional-What-Would-iYou-Do.aspx
http://writingcenter.ashford.edu/introduction-apa
http://writingcenter.ashford.edu/
http://ashford.waypointoutcomes.com/assessment/9520/preview
10/23/2018 Week 2 - Assignment
https://ashford.instructure.com/courses/33753/assignments/6752
88?module_item_id=1711605 2/2
This tool needs to be loaded in a new browser window
For more detailed instructions, refer to the Waypoint Tutorial
15. (https://content.bridgepointeducation.com/curriculum/file/dc358
708-3d2b-41a6-a000-
ff53b3cc3794/1/Waypoint%20Tutorial.pdf)
(https://content.bridgepointeducation.com/curriculum/file/dc358
708-3d2b-41a6-a000-
ff53b3cc3794/1/Waypoint%20Tutorial.pdf) .
Load Week 2 - Assignment in a new window
https://content.bridgepointeducation.com/curriculum/file/dc358
708-3d2b-41a6-a000-ff53b3cc3794/1/Waypoint%20Tutorial.pdf
https://content.bridgepointeducation.com/curriculum/file/dc358
708-3d2b-41a6-a000-ff53b3cc3794/1/Waypoint%20Tutorial.pdf
Scholarly, Peer Reviewed, and Other Credible Sources
Source type What is it? Examples Best used for
Scholarly
A source written by scholars or academics in a
field. The purpose of many scholarly sources is
to report on original research or
experimentation in order to make such
information available to the rest of the
scholarly community. The audience for
scholarly sources is other scholars or experts
in a field. Scholarly sources include references
and usually use language that is technical or at
a high reading level.
*Note: Different databases may define
“scholarly” in slightly different ways, and thus
a source that is considered “scholarly” in one
16. database may not be considered “scholarly” in
another database. The final decision about
the appropriateness of a given source for a
particular assignment is left to the instructor.
Scholarly Journals
• Journal of Management Information
Systems
• American Journal of Public Health
• Early Childhood Research Quarterly
Scholarly Books (published by a university
press or other high-quality publisher)
• Shari’a Politics: Islamic Law and
Society in the Modern World
• The Grand Design: Strategy and the
U.S. Civil War
• The Hidden Mechanics of Exercise:
Molecules That Move Us
Journal articles:
• Recent research on a topic
• Very specific topics or narrow
fields of research
• NOT good for an introduction to
or broad overview of a topic
17. Books:
• In-depth information and research
on a topic
• Putting a topic into context
• Historical information on a topic
Peer Reviewed
A publication that has gone through an official
editorial process that involves review and
approval by the author’s peers (experts in the
same subject area). Many (but not all)
scholarly publications are peer reviewed.
*Note: even though a journal is peer reviewed,
some types of articles within that journal may
not be peer reviewed. These might include
editorials or book reviews.
**Note: some publications (such as some
trade journals) can be peer reviewed but not
scholarly. This is not common.
See “Scholarly Journals” above
Books go through a different editorial process
and are not usually considered to be “peer
reviewed”. However, they can still be
excellent scholarly sources.
See above
18. Credible
A source that can be trusted to contain
accurate information that is backed up by
evidence or can be verified in other trusted
sources. Many types of sources can fall into
this category.
*Note: The final decision about the
appropriateness of a given source for a
particular assignment is left to the instructor.
See above. Also:
• Newspapers
• Magazines
• Books
• Trade journals or publications
• Government websites
• Websites from educational
institutions (like universities)
• Websites or other publications from
reputable organizations (like the Mayo
Clinic)
• Encyclopedias (general or subject)
19. Many websites could be considered credible.
The more information provided about the
source, the more likely they are to be credible.
Look for information about the author and/or
the organization, how recently it was
published, the intended audience, the
intended purpose, and whether there is
evidence of bias.
• Basic/general/background
information about a topic
• Current events
• Local news
• Statistical data
• Information about specific
organizations or companies (look
at the organization’s or company’s
website, or look for articles in
newspapers or trade journals)
• Government information
• Information about popular culture
• Opinions or commentaries
• Topics of general interest
20. Ashford University Library, June 2015, CR 0130415
ManagingCon�lictthroughCommunication
FifthEdition
Dudleyd.Cahn
ProfessorEmeritusStateUniversityofNewYork,NewPaltz
RuthAnnaAbigail
ProfessorEmeritusAzusaPaci�icUniversity
Boston Columbus Indianapolis NewYork SanFrancisco
UpperSaddleRiver
Amsterdam CapeTown Dubai London Madrid Milan Munich
Paris Montreal Toronto
Delhi MexicoCity SãoPaulo Sydney HongKong Seoul
Singapore Taipei Tokyo
Chapter1IntroductiontotheStudyofCon�lictCommunication
Objectives
Attheendofthischapter,youshouldbeableto:
De�ineinterpersonalcon�lictandgiveexamplesofcon�lictsituati
ons.
De�inecon�lictmanagementandexplainhowithasthepotentialtoco
nvertpotentiallydestructiveinterpersonalcon�lictsintoproductive
ones.
Explainwhythetransactionalmodelofcommunicationispreferablet
othelinearmodelformanagingcon�lictsituations.
41. sactionalmodelofcommunicationemphasizesmanagingand
coordinating.Giventhisview,communicationmaybede�inedasthee
xchangeofverbalandnonverbalmessagesinanattempttobetterunder
standoneanother’sperspectiveandcreatesharedmeaning.
Suchanapproachrecognizes that this view of communication
(and by extension, con�lict) isn’t
somethingwedotooneanother,butsomethingwedowithoneanother(
liketeamwork).
10
(http://content.thuzelearning.com/books/Cahn.7882.17.1/section
s/sec1-5#P7000481815000000000000000001AF4)
https://content.ashford.edu/books/Cahn.7882.17.1/sections/sec1-
5#P7000481815000000000000000001AF4
Similarly,acon�lictisnotseenassomethingthathappenswhenonepe
rson“sends”amessagetoanotherindicatingthatheorsheisunhappyw
ithsomebehavioroftheother.Rather,con�lictisseenasthe
behaviorsofeachperson,inresponsetooneanother,exchangingmess
ages,hearingeachotherout,cooperating,andconjointlycreatinganu
nderstandinginwhichbothpeopleperceivethemselvesasbeingin
con�lictwithoneanother,mutuallysharingresponsibilityforthecon
�lictsituation,andworkingtogethertobetterdealwithit.Onestudent
describeditas“tryingtobuildasandcastlebydirectingsomeone
else’s hands.” Con�lict is viewed as giving and taking, working
together for a solution to a
problem,discussingandarrivingatmutualunderstandings,consensu
s,agreement,andresolution.Bothcon�lictingpartieshavearesponsi
bilitytowardempathizingwitheachother,avoidingjudgment,keepin
g
anopenmind,welcomingfeedback,andrealizingthatbothmayhaveto
adapttoresolvetheissue.
44. Wedonotwanttotakesuchastaticapproachwhendiscussingcommuni
cationandcon�lict.Instead,weseethemasdynamic,changeable,and
movingtowardsomeend.Bycombiningtheterms,wecande�ine
con�lict communication as a process of exchanging verbal and
nonverbal messages in a con�lict situation that starts with
antecedents, moves through steps, and ends with consequences.
Weknowthatresolvingcon�lictthrough communication does not
end con�lict forever, however
muchwemightwantthattobethecase.Weengageincon�lictagainand
again,andwehaveaprettygoodideahowthesecon�lictsunfold.
Aprocessviewofcon�lictcommunicationhasimplicationsforhoww
eviewacon�lictsituationandcon�lictmanagementbehavior.Botha
reembeddedinaseriesofinstancesthatfollowoneanother(asina
video of people meeting, talking, and departing). Such a view of
reality re�lects awareness that our lives consist of events
in�luencing subsequent events.
Whenwelearntotakethisview,webegintoseesituations and
behaviors as phases or stages,
re�lectingaswitchtoaprocessorientation.Iftheseriescontinuestore
peatitself(likeaperpetualmotionmachine),itbecomesacycle.Insom
ecases,con�lictsituationsbecomecyclesbecausetheygetbogged
down in particular stages and repeat themselves. Effective
con�lict management consists of converting potentially
destructive messages into productive con�lict communication.
Later, in Chapter 2
(http://content.thuzelearning.com/books/Cahn.7882.17.1/section
s/ch02#ch02),weelaborateondysfunctionalandfunctionalcyclesof
con�lictcommunicationtohelpusidentifythebehaviorsthat
makecon�lictdestructive,and,itishoped,choosebehaviorsthatkeep
thecon�lictfrombecomingso.
AsdepictedinFigure1.1(http://content.thuzelearning.com/books/
Cahn.7882.17.1/sections/sec1-
55. Whatcomestomindwhenyouthinkofinterpersonalcon�lict?Howw
ouldyoucompletethissentence:Tome,con�lictislike....Wouldyoud
escribecon�lictaslikeawar,battle,or�ight?Wouldyousaycon�lict
ismorelikeastruggle,anuphillclimb,oracontestofwills?Isitlikefeel
ingsicktoyourstomach?Doyouthinkofcon�lictaslikebeingontrial,
adayincourt?Perhapsyouseeitasagame,match,orsport?Or
would you describe it more as a communication breakdown, a
barrier between you and another? Photo 1.1
(http://content.thuzelearning.com/books/Cahn.7882.17.1/section
s/sec1-
3#P7000481815000000000000000001AC0)showsoneperson’svie
wofcon�lict:Itissomethingthatmakesherfeelboundandgagged.
Con�lictisalmostalwaysassociatedwithnegativefeelings.Weknow
thatmanypeopledonotfeelcon�identabouthandlingacon�lict.Inas
tudy,researchersaskedpeopletodescribepastinterpersonalcon�lict
s
andfoundthattheyoverwhelminglyusednegativetermstodescribeth
eircon�licts:“Itislikebeinginasinkingshipwithnolifeboat,”“likea
checkbookthatwon’tbalance,”or“likebeinginarowboatina
hurricane.”
Theparticipantsinthestudydescribedtheircon�lictsalmostuniform
lyasdestructive
ornegative,suggestingthatwhentheyeffectivelymanagedaninterpe
rsonalcon�lict,respondentsdidnotthinkitwasacon�lictatall.
Thisistypicalofanegativeviewofcon�lict:Theideathatcon�lictsar
epainfuloccurrencesthatarepersonallythreateningandbestavoided.
Tosaywhatcon�lictislikeisanexerciseincreatingacon�lictmetaph
or,whereyouareaskedtocompareoneterm(con�lict)withsomething
else(struggle,explodingbombs,beingontrial).Metaphorsarenot
only�iguresofspeechbutalsoare�lectionofhowwethink.
Howwethinkaboutsomethinglikecon�lictandthemetaphorswemay
createforitcreateanexpectationastowhatcan,will,orshouldhappen,
60. longline,dealwithagovernmentagency,orlistentopeopleinashoppi
ngmalltorealizethatcivilityislackinginour
society.Theuseofprofanityisatanall-
timehigh;accordingtoarecentradiostation’s“guesswhat”game,thea
verage
Americancurses70–80timesaday.Incivilityisno stranger to the
workplace, either. As Sutton points out, “many
workplacesareplaguedby‘interpersonalmoves’thatleavepeoplefee
lingthreatenedanddemeaned,whichareoften
directed by more powerful people at less powerful people.”
Sometimes,incivilitybecomessointensethatitisbettercharacterized
asbullying,asetofbehaviorswediscussin
Chapter12
(http://content.thuzelearning.com/books/Cahn.7882.17.1/section
s/ch12#ch12) or violent social
groups we discuss in Chapter 13
(http://content.thuzelearning.com/books/Cahn.7882.17.1/section
s/ch13#ch13).
Carter’sseminalworkonCivilityprovidesaperspectiveonwhyweha
vebecomesounciviltowardoneanother.He
tracesthehistoricaldevelopmentofbooksofetiquette,developedtoh
elppeoplegetalonginclosequarters.Someof
theearliestAmericanwritingsoncivilitywereproposedasguidelines
tohelppeoplegetalongonrailwaycars,where
theywereinthecompanyofstrangersforlongperiodsoftime.Theearly
writingswerereminderstopassengersthat
theywerenotaloneonthetrain.Theyaffectothersbyuntowardbehavi
or.AsCarterpointsout,inmanyways,wehave
becomeunawareofthefactthatwearenotsolitarypassengersthroughl
ife.Therelativeisolationofourlivestoday,
whetherinourcars,ourhomes,orourcommunities,oftenleadsustoact
inwaysthatarerudetoothers.
Carteralsoindicatesthatattitudesandbehaviorsconstitutecivility,b
61. uthetakestheideaabitfarther.Civility,Carter
argues, “is the sum of the many sacri�ices we are called to
make for the sake of living together.”
These
sacri�icesmayincludegivinguptheneedtoberightortheneedtobehe
ardinordertoattainagreatergoodforthe
relationship,group,family,ororganizationasawhole.Thisdoesnotm
eanwesuppressneededandhelpfulcon�lict,
butthatwestopandthinkaboutwhetherspeakingupreallyisnecessary
forthegoodofall.Carterarguesthat“a
nationwhereeveryoneagreesisnotanationofcivilitybutanationwith
eredofdiversity....Whenwearecivil,weare
notpretendingtolikethoseweactuallydespise;wearenotpretendingt
oholdanyattitudetowardthem,exceptthat
we accept and value them as every bit our equals . . .”
In other
words,howwetreatothersshouldbeindependentofwhatwethinkofth
em.Sometimes,ittakesawhileforpeopleto
catchontothisnotion,asthenarrativebelowindicates:
20(http://content.thuzelearning.com/books/Cahn.7882.17.1/secti
ons/sec1-
5#P7000481815000000000000000001AFF)
21
(http://content.thuzelearning.com/books/Cahn.7882.17.1/section
s/sec1-5#P7000481815000000000000000001B00)
22
(http://content.thuzelearning.com/books/Cahn.7882.17.1/section
s/sec1-5#P7000481815000000000000000001B01)
23
(http://content.thuzelearning.com/books/Cahn.7882.17.1/section