LIT 229 Module Four 1
Introduction: Myth and…
Given its nature as the wellspring of our knowledge about ourselves and the world, myth
should be found in all our ways of knowing, and it is. The phrase “ways of knowing” is
shorthand for those collections of beliefs, assumptions, discourse, values, and practices that
offer their own approaches for understanding the world and our place in it. This description
of ways of knowing sounds much like myth because myth itself is a way of knowing. The
point here is not to overlay myth onto all ways of knowing but to illuminate the relationship of
myth to them. For this module, we will analyze the role of myth in three prominent ways of
knowing: psychology, religion, and science. These three operate on a deeper layer than
particular genres for myth like art, literature, and film (will explore the latter two later) and
thus promise to illuminate myth by their own lights.
Myth and Psychology
At the heart of psychological ways of knowing sits a story. It is—like our most profound and
provocative stories—erotic, strange, traumatic, and Greek. Oedipus is the son of Laius and
Jocasta, the king and queen of Thebes. A prophecy declares that the young Oedipus will
grow up to commit the most horrible crimes imaginable—the murder of his father and incest
with his mother. Desperate to forestall these events, King Laius binds the boy’s feet
(Oedipus means “swollen foot”) and leaves him to die on a mountainside. As fate literally
would have it, shepherds find the boy, rescue him, and take him to the king and queen of
Corinth, who raise him as their own. Oedipus eventually hears the prophecy himself from the
Oracle at Delphi and leaves his known family at Corinth and heads, fatefully, to Thebes. On
the way there, he quarrels with a man who refuses to give way on the road, eventually killing
the man. Unknown to Oedipus, this man is Laius, his father. Upon arriving at Thebes, he
answers the riddle of the Sphinx, who is terrorizing the city, and is rewarded with the throne
of the dead king and his wife Jocasta, who is Oedipus’s mother. Upon hearing that the
prophecy had indeed been fulfilled, Jocasta commits suicide, and Oedipus blinds himself
and goes into exile.
2 LIT 229 Module Four
Freud Gives Birth to a Way of Knowing
In this myth, Sigmund Freud saw the central drama of the human psyche and by extension a
primal feature of the new discipline of psychology. He writes in his Interpretation of Dreams
that Oedipus’s:
destiny moves us only because it might have been ours—because the Oracle laid the
same curse upon us before our birth as upon him. It is the fate of all of us, perhaps, to
direct our first sexual impulse towards our mother and our first hatred and our first
murderous wish against our father. Our dreams convince us that this is so. (295)
Without delving too deeply into Freud’s Oedipus complex, we can see that the myth provides
a story—Fr ...
Essay about Psychoanalytic Literary Criticism
Evaluation of The Psychoanalytic Approach Essay
Advantages And Disadvantages Of Psychoanalysis
Essay on Psychoanalysis
Five Key Concepts Of Psychoanalysis
Psychoanalysis : What Is Psychoanalysis?
Psychoanalysis And Cognitive Behavioral Therapy
Metamorphosis Psychoanalysis
Reflection Of The Psychoanalytic Perspective
Objective Psychology and Psychoanalysis Essay
Psychoanalysis And Psychoanalysis
Psychoanalysis In Mary Shelleys Frankenstein
Psychoanalysis In English Literature
A Look Into Psychoanalysis Essay
Outline Of Psychoanalysis
Psychoanalysis Of Psychoanalysis
Part 1.....InstructionsSelect one of the age groups disc.docxMARRY7
Part 1.....
Instructions
Select one of the age groups discussed in this unit (adolescent, adult, or elderly). Create a community health strategy for dealing with intentional and unintentional injuries (motor vehicle accidents, suicide, or violence).Your response should include information on the morbidity and mortality rates and the key factors associated with the injuries.Your APA-Style essay must be at least two pages in length (not counting the title and reference pages). All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Part 2....... Need To Be 1 Paragraph Long
According to the Centers for Medicare Services (CMS), the Affordable Care Act (ACA) was designed to give U.S. citizens improved flexibility and control, allowing them to make more informed decisions about their own health plans and healthcare providers.
Now that the ACA has been in place for several years, do you feel that in fact happened? Discuss the strengths and weaknesses of the ACA today.
.
Part 1 – Add to Website PlanList at least three .docxMARRY7
Part 1 – Add to Website Plan
List
at least three interactive features that could be added to your
site and what purpose each would serve for your site and its visitors.
The form created in Part Two of this assignment can be included as
one of the interactive features.
Part 2 – Refine and finalize your website
Refine
and finalize your website by doing the following:
•
Add a simple web form—such as an order form, a subscription
to a newsletter, or a request for contact.
•
Use division or a table to structure the form elements.
•
Apply JavaScript
®
to validate the form.
•
Finalize a navigation system.
•
Use metadata to increase accessibility and search engine
optimization.
15
WEB/240 Version 1
8
•
Test for functionality and usability.
As in the prior assignment, use only Adobe
®
Dreamweaver
®
or
another HTML editor to refine the homepage developed in Week
Three.
Check
your HTML code using the Markup Validation Service on the
W3C
®
website, (www.w3.org) prior to submitting your web page(s).
A link to this site may be found in the Materials tab on your student
website.
Submit
all website files in a compressed folder.
.
Part 1 True or False Questions. (10 questions at 1 point each).docxMARRY7
Part 1: True or False Questions.
(10 questions at 1 point each)
T
F
A hash algorithm uses a one-way cryptographic function, whereas both secret-key and public-key systems use two-way (i.e., reversible) cryptographic functions.
Answer: _____
T
F
The strongest 3DES (Triple DES) requires the use of three independent keys.
Answer: _____
T
F
When it comes to the ethics of a particular situation, there is only one right answer.
Answer: _____
T
F
Packet filters protect networks by blocking packets based on the packets’ contents.
Answer: _____
T
F
The biggest advantage of
public-key
cryptography over
secret-key
cryptography is in the area of key management/key distribution.
Answer: _____
T
F
In terms of privacy laws, companies have no advantage over the government in terms of the types of data that a company can collect.
Answer: _____
T
F
Intrusion Detection Systems (IDS) provide no protection from internal threats.
Answer: _____
T
F
A Denial-of-Service attack does not require the attacker to penetrate the target's security defenses.
Answer: _____
T
F
AES uses the Rijndael algorithm.
Answer: _____
T
F
A one-time pad is a safe house used only once by an undercover agent.
Answer: _____
Part 2: Multiple Choice Questions. Print
all
the correct answers in the blank following the question; in some cases a fully correct answer may require more than one lettered choice to be selected. (
Each question is worth 2 points.
There is no guarantee of partial credit for partially correct answers.)
If person A uses AES to transmit an encrypted message to person B, which key or keys will A have to use:
a.
A’s private key
b.
A’s public key
c.
B’s private key
d.
B’s public key
e.
None of the keys listed above
Answer(s): ____
From the perspective of
entropy
:
Plaintext will have a higher entropy than the ciphertext
The unequal frequency of characters in human languages tends to reduce the entropy of plaintext messages in that language
Encrypted messages appear to be noise-like
Plaintext requires more transmission bandwidth than ciphertext
None of the above
Answer(s): _____
Protection of a software program that uses a unique, novel algorithm could be legally protected by:
a.
A patent
b.
A copyright
c.
A patent and copyright
d.
Ethical standards
e.
All of the above
Answer(s): _____
Security
threats
include which of the following:
a.
Unlocked doors
b.
Disgruntled employees
c.
Hurricanes
d.
Un-patched software programs
e.
All of the above
Answer(s): _____
Denial of service attacks include:
a.
DNS poisoning
b.
Smurf attack
c.
Ping of death
d.
SYN flood
e.
All of the above
Answer(s): _____
Part 3: Short Answer Questions.
(10 questions at 5 points each)
Alan and Beatrice are both users of PKI. Explain how they use their keys to communicate when Alan sends a private message to Beatrice, and provides proof that he sent the message.
Answer:
Briefly describe the purpose of firewalls and how .
Part 11. Why is it so important in system engineering to become .docxMARRY7
Part 1
1. Why is it so important in system engineering to become familiar with some of the analytical methods?
2. Identify and describe some of the technologies that are being applied in the design process. Provide some examples of typical applications, and describe some of the benefits associated with the application of computerized methods in the design process.
3. How does CAM and CAS relate to system engineering? Describe some possible impacts.
4. How is design review and evaluation accomplished? Why is it important relative to meeting system engineering objectives? Describe some of the checks and balances in the design process.
5. What is included in the establishment of a "functional” baseline, Allocated baseline, and Product baseline? Why is baseline management important?
6. What is configuration management (CM) and how does it relate to system engineering? Define Configuration Identification (CI) and Configuration Status Accounting (CSA).
Part 2
Select a system of your choice, and construct a sequential flow diagram of the overall system development process. Identify the major tasks in system development, and develop a plan/schedule of formal design review. Briefly describe what is covered in each.
Part 3
Discuss some of the problems associated with the application of computerized methods in the design process. Provide examples. What cautions must be observed?
.
Part 1 Using the internet, search for commercial IDPS systems. What.docxMARRY7
Part 1: Using the internet, search for commercial IDPS systems. What classification systems and descriptions are used and how can these be used to compare the features and components of each IDPS? Create a comparison spreadsheet identifying the classification systems you find.
Part 2: What are some of the legal and ethical issues surrounding the use of intrusion detection systems logs and other technology tools as evidence in criminal and legal matters?
Part 3: Write a 2 - 3 page APA style paper summarizing the background, description, and purpose of NIST Special Publication 800-94,
Guide to Intrusion Detection and Prevention Systems
. The last section of your paper should be titled "Author Reflection" and should reflect your critique of the publication examined. You are not expected to read the entire guide, you should be mainly concerned with section two of the report, titled "Intrusion Detection and Prevention Principles" and section three of the report, titled "IDPS Technologies."
Part 4:
Why is it so important in system engineering to become familiar with some of the analytical methods?
Identify and describe some of the technologies that are being applied in the design process. Provide some examples of typical applications, and describe some of the benefits associated with the application of computerized methods in the design process.
How does CAM and CAS relate to system engineering? Describe some possible impacts.
How is design review and evaluation accomplished? Why is it important relative to meeting system engineering objectives? Describe some of the checks and balances in the design process.
What is included in the establishment of a "functional” baseline, Allocated baseline, and Product baseline? Why is baseline management important?
What is configuration management (CM) and how does it relate to system engineering? Define Configuration Identification (CI) and Configuration Status Accounting (CSA).
Part 5: Select a system of your choice, and construct a sequential flow diagram of the overall system development process. Identify the major tasks in system development, and develop a plan/schedule of formal design review. Briefly describe what is covered in each.
Part 6:
Discuss some of the problems associated with the application of computerized methods in the design process. Provide examples. What cautions must be observed?
.
Part 1- Create an outline of the assignment below thenPart 2-1000 .docxMARRY7
Part 1- Create an outline of the assignment below then
Part 2-1000 word assignment
Your fast-food franchise has been cleared for business in all 4 countries (United Arab Emirates, Israel, Mexico, and China). You now have to start construction on your restaurants. The financing is coming from the United Arab Emirates, the materials are coming from Mexico and China, the engineering and technology are coming from Israel , and the labor will be hired locally within these countries by your management team from the United States. You invite all of the players to the headquarters in the United States for a big meeting to explain the project and get to know one another. The people seem to be staying with their own groups and not mingling.
What is the cultural phenomenon at play here (what is it called/ term)?
How do you explain the lack of intercultural communication and interaction?
What do you know about these cultures—specifically their economic, political, educational, and social systems—that could help you in getting them together?
What are some of the contrasting cultural values of these countries?
You are concerned about some of the language barriers as you start the meeting, particularly the fact that the United States is a low-context country, and some of the countries present are high-context countries. Furthermore, you only speak English, and you do not have an interpreter present.
How will this affect the presentation?
What are some of the issues you should be concerned about regarding verbal and nonverbal language for this group?
What strategy would you use to begin to have everyone develop a relationship with each other that will help ease future negotiations, development, and implementation?
.
Part 1 Review QuestionsWhat is the difference between criminal la.docxMARRY7
Part 1: Review Questions
What is the difference between criminal law and civil law?
What is privacy, in the context of information security?
What is intellectual property? Is it offered the same protection in every country of the world? What laws currently protect it in the U.S. and Europe?
What are the three general categories of unethical and illegal behavior?
Part 2: Module Practice
What does CISSP stand for? Using the Internet, find out what continuing education is required in order for the holder of a CISSP to remain current and in good standing.
.
Part 1 Review QuestionsWhat is the difference between authenticat.docxMARRY7
Part 1: Review Questions
What is the difference between authentication and authorization? Can a system permit authorization without authentication? Why or why not?
What is the typical relationship between the untrusted network, the firewall, and the trusted network?
How does a network-based IDS differ from a host-based IDS?
What is a VPN? Why are VPNs widely used?
Part 2: Module Practice
Create a spreadsheet that takes eight values into eight different cells and then applies a transposition cipher to them. Next, create a row that takes the results and applies a substitution cipher to them (substitute 0 for 5, 1 for 6, 2 for 7, 3 for 8, 4 for 9, and vice versa).
.
Part 1 SQLDatabase workScenarioDevelopment of a relationa.docxMARRY7
Part 1: SQL/Database work
Scenario
Development of a relational database system for a food producing company
FoodRU is a Leicester-based food producing company. The company wants to keep details regarding both past and present employees and their assignment to shifts over time. At present, there are three defined shift patterns; the morning shift starts at 6am and finishes at 2pm, the day shift starts at 9am and finishes at 5pm, and the evening shift starts at 4pm and finishes at 12am (midnight). However, management have already indicated that they may need to add further shift patterns in the future (e.g., by adding a night shift to the existing ones so that the company can meet a high user demand for their foods). They therefore require shift details to be stored within a separate Shift table, with attributes that allow the storage of a shift name with its associated start and finish times (use the 24 hour clock for these times).
Past and present employee details are to be kept in the same Employee table, and the details to be kept are the employee’s unique 6 digit reference number, the first name, surname and any other names (if there are any) of the employee, the employee’s gender, contact address and contact telephone, the date on which the employee started his/her employment at the company and the date on which the employee finished his/her employment at the company (should s/he be a past employee). Details regarding staff assignments to shifts include the date that an employee was allocated to work a particular shift, and the date that s/he was taken off the shift (if not still assigned to it). Employees can be assigned to different shifts over time and even to the same shift over different time periods, although they cannot be assigned to more than one shift at any one time. A new employee may not yet be assigned to a shift.
Tasks:
1. Provide the table specifications for the THREE tables that are required by FoodRU to store employee, shift and assignment details. That is, for each of the three tables, you should provide, in a suitable presentation format, the name of the table and a specification of each its attributes to include:
• Attribute name
• Attribute brief description as to its meaning
• a description of the attribute’s data type/integrity (e.g., date field, character field of length 20, number field <= 10, etc. – you can use the Oracle data types within these descriptions if you want to)
• An indication as to whether the attribute is a primary key attribute and/or foreign key attribute
• An indication as to whether the attribute can or cannot take null values
Make sure your design specifies the appropriate links between the three tables. Remember to write down any additional integrity you need to enforce either at a specific table level or across two or more tables, if this is required. Also, remember to write down any justifications for the data types/integrity or for any other design features that.
Part 1 Review QuestionsWhat functions constitute a complete infor.docxMARRY7
Part 1: Review Questions
What functions constitute a complete information security program?
What is the typical size of the security staff in a small organization? A medium-sized organization? A large organization? A very large organization?
Where can an organization place the information security unit? Where should (and shouldn’t) it be placed?
Into what four areas should the information security functions be divided?
Part 2: Module Practice
Design three security posters on various aspects of information security using a graphics presentation program and clip art. Describe the methods you used to develop your design.
.
Part 1A persons lifestyle has a significant influence on the p.docxMARRY7
Part 1:
A person's lifestyle has a significant influence on the person's health and development as he or she moves into middle age (and old age). Stability and change are also common factors in an adult's life.
Describe how middle adulthood provides stability in a person's life. Explain some of the factors that would lead to stability in a person's life as he or she moves through middle age.
Describe some of the more common lifestyle issues that have a negative impact on a person's continued development. Explain how a person may be able to reverse some of the lifestyle influences.
On the basis of your readings, describe what is meant by a midlife crisis. Explain why a midlife crisis may or may not be critical.
Part 2:
Erikson, Gould, Helson, and Levinson provide different perspectives on middle age in adulthood.
Describe each of these theories as it relates to middle adulthood.
On the basis of your readings, compare and contrast these theories. Which one gives a better explanation of middle adulthood?
Justify your answers with appropriate reasoning and research from your text and course readings. Comment on the postings of at least two peers, and provide an analysis of each peer’s postings while also suggesting specific additions or clarifications for improving the discussion question response.
.
Part 1 Review QuestionsWhat is the definition of information secu.docxMARRY7
Part 1: Review Questions
What is the definition of information security? What essential protections must be in place to protect information systems from danger?
Define the InfoSec processes of identification, authentication, authorization, and accountability.
Define project management. Why is project management of particular interest in the field of information security?
What are the five basic outcomes that should be achieved through information security governance?
What is a threat in the context of information security? How many categories of threats exist as presented in this chapter?
Part 2: Module Practice
Find an article that talks about relative risk either from inside the organization or form external sources. Once you locate and read it, compose a 1-2 page paper that summarizes your findings and critique the article. Use a word processor to complete your assignment and submit it as a .docx or .doc document.
.
Part 1 Review QuestionsWhat is a security modelWhat are the es.docxMARRY7
Part 1: Review Questions
What is a security model?
What are the essential processes of access control?
Identify at least two different approaches used to categorize access control methodologies. List the types of controls found in each.
What is COBIT? Who is its sponsor? What does it accomplish?
What is the standard of due care? How does it relate to due diligence?
What is baselining? How does it differ from benchmarking?
Part 2: Module Practice
Make a list of at least ten information security metrics that could be collected for a small internet commerce company with 10 employees. For this senario, the company uses an outside vendor for packaging and distribution. Whom should the metrics be reported?
.
Part 1 Listed below are several key Supreme Court decisions that .docxMARRY7
Part 1:
Listed below are several key Supreme Court decisions that resulted in a clarification of inmate rights.
Choose any one
of the cases listed below. Summarize the facts of the case, the issue that needed to be resolved, the court’s decision, and the reasoning behind the decision.
Helling v. McKinney
(1993)
Washington v. Harper
(1990)
Hudson v. Palmer
(1984)
Bell v. Wolfish
(1979)
Bounds v. Smith
(1977)
Estelle v. Gamble
(1976)
Wolff v. McDonnell
(1974)
.
More Related Content
Similar to LIT 229 Module Four 1 Introduction Myth and… .docx
Essay about Psychoanalytic Literary Criticism
Evaluation of The Psychoanalytic Approach Essay
Advantages And Disadvantages Of Psychoanalysis
Essay on Psychoanalysis
Five Key Concepts Of Psychoanalysis
Psychoanalysis : What Is Psychoanalysis?
Psychoanalysis And Cognitive Behavioral Therapy
Metamorphosis Psychoanalysis
Reflection Of The Psychoanalytic Perspective
Objective Psychology and Psychoanalysis Essay
Psychoanalysis And Psychoanalysis
Psychoanalysis In Mary Shelleys Frankenstein
Psychoanalysis In English Literature
A Look Into Psychoanalysis Essay
Outline Of Psychoanalysis
Psychoanalysis Of Psychoanalysis
Similar to LIT 229 Module Four 1 Introduction Myth and… .docx (8)
Part 1.....InstructionsSelect one of the age groups disc.docxMARRY7
Part 1.....
Instructions
Select one of the age groups discussed in this unit (adolescent, adult, or elderly). Create a community health strategy for dealing with intentional and unintentional injuries (motor vehicle accidents, suicide, or violence).Your response should include information on the morbidity and mortality rates and the key factors associated with the injuries.Your APA-Style essay must be at least two pages in length (not counting the title and reference pages). All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Part 2....... Need To Be 1 Paragraph Long
According to the Centers for Medicare Services (CMS), the Affordable Care Act (ACA) was designed to give U.S. citizens improved flexibility and control, allowing them to make more informed decisions about their own health plans and healthcare providers.
Now that the ACA has been in place for several years, do you feel that in fact happened? Discuss the strengths and weaknesses of the ACA today.
.
Part 1 – Add to Website PlanList at least three .docxMARRY7
Part 1 – Add to Website Plan
List
at least three interactive features that could be added to your
site and what purpose each would serve for your site and its visitors.
The form created in Part Two of this assignment can be included as
one of the interactive features.
Part 2 – Refine and finalize your website
Refine
and finalize your website by doing the following:
•
Add a simple web form—such as an order form, a subscription
to a newsletter, or a request for contact.
•
Use division or a table to structure the form elements.
•
Apply JavaScript
®
to validate the form.
•
Finalize a navigation system.
•
Use metadata to increase accessibility and search engine
optimization.
15
WEB/240 Version 1
8
•
Test for functionality and usability.
As in the prior assignment, use only Adobe
®
Dreamweaver
®
or
another HTML editor to refine the homepage developed in Week
Three.
Check
your HTML code using the Markup Validation Service on the
W3C
®
website, (www.w3.org) prior to submitting your web page(s).
A link to this site may be found in the Materials tab on your student
website.
Submit
all website files in a compressed folder.
.
Part 1 True or False Questions. (10 questions at 1 point each).docxMARRY7
Part 1: True or False Questions.
(10 questions at 1 point each)
T
F
A hash algorithm uses a one-way cryptographic function, whereas both secret-key and public-key systems use two-way (i.e., reversible) cryptographic functions.
Answer: _____
T
F
The strongest 3DES (Triple DES) requires the use of three independent keys.
Answer: _____
T
F
When it comes to the ethics of a particular situation, there is only one right answer.
Answer: _____
T
F
Packet filters protect networks by blocking packets based on the packets’ contents.
Answer: _____
T
F
The biggest advantage of
public-key
cryptography over
secret-key
cryptography is in the area of key management/key distribution.
Answer: _____
T
F
In terms of privacy laws, companies have no advantage over the government in terms of the types of data that a company can collect.
Answer: _____
T
F
Intrusion Detection Systems (IDS) provide no protection from internal threats.
Answer: _____
T
F
A Denial-of-Service attack does not require the attacker to penetrate the target's security defenses.
Answer: _____
T
F
AES uses the Rijndael algorithm.
Answer: _____
T
F
A one-time pad is a safe house used only once by an undercover agent.
Answer: _____
Part 2: Multiple Choice Questions. Print
all
the correct answers in the blank following the question; in some cases a fully correct answer may require more than one lettered choice to be selected. (
Each question is worth 2 points.
There is no guarantee of partial credit for partially correct answers.)
If person A uses AES to transmit an encrypted message to person B, which key or keys will A have to use:
a.
A’s private key
b.
A’s public key
c.
B’s private key
d.
B’s public key
e.
None of the keys listed above
Answer(s): ____
From the perspective of
entropy
:
Plaintext will have a higher entropy than the ciphertext
The unequal frequency of characters in human languages tends to reduce the entropy of plaintext messages in that language
Encrypted messages appear to be noise-like
Plaintext requires more transmission bandwidth than ciphertext
None of the above
Answer(s): _____
Protection of a software program that uses a unique, novel algorithm could be legally protected by:
a.
A patent
b.
A copyright
c.
A patent and copyright
d.
Ethical standards
e.
All of the above
Answer(s): _____
Security
threats
include which of the following:
a.
Unlocked doors
b.
Disgruntled employees
c.
Hurricanes
d.
Un-patched software programs
e.
All of the above
Answer(s): _____
Denial of service attacks include:
a.
DNS poisoning
b.
Smurf attack
c.
Ping of death
d.
SYN flood
e.
All of the above
Answer(s): _____
Part 3: Short Answer Questions.
(10 questions at 5 points each)
Alan and Beatrice are both users of PKI. Explain how they use their keys to communicate when Alan sends a private message to Beatrice, and provides proof that he sent the message.
Answer:
Briefly describe the purpose of firewalls and how .
Part 11. Why is it so important in system engineering to become .docxMARRY7
Part 1
1. Why is it so important in system engineering to become familiar with some of the analytical methods?
2. Identify and describe some of the technologies that are being applied in the design process. Provide some examples of typical applications, and describe some of the benefits associated with the application of computerized methods in the design process.
3. How does CAM and CAS relate to system engineering? Describe some possible impacts.
4. How is design review and evaluation accomplished? Why is it important relative to meeting system engineering objectives? Describe some of the checks and balances in the design process.
5. What is included in the establishment of a "functional” baseline, Allocated baseline, and Product baseline? Why is baseline management important?
6. What is configuration management (CM) and how does it relate to system engineering? Define Configuration Identification (CI) and Configuration Status Accounting (CSA).
Part 2
Select a system of your choice, and construct a sequential flow diagram of the overall system development process. Identify the major tasks in system development, and develop a plan/schedule of formal design review. Briefly describe what is covered in each.
Part 3
Discuss some of the problems associated with the application of computerized methods in the design process. Provide examples. What cautions must be observed?
.
Part 1 Using the internet, search for commercial IDPS systems. What.docxMARRY7
Part 1: Using the internet, search for commercial IDPS systems. What classification systems and descriptions are used and how can these be used to compare the features and components of each IDPS? Create a comparison spreadsheet identifying the classification systems you find.
Part 2: What are some of the legal and ethical issues surrounding the use of intrusion detection systems logs and other technology tools as evidence in criminal and legal matters?
Part 3: Write a 2 - 3 page APA style paper summarizing the background, description, and purpose of NIST Special Publication 800-94,
Guide to Intrusion Detection and Prevention Systems
. The last section of your paper should be titled "Author Reflection" and should reflect your critique of the publication examined. You are not expected to read the entire guide, you should be mainly concerned with section two of the report, titled "Intrusion Detection and Prevention Principles" and section three of the report, titled "IDPS Technologies."
Part 4:
Why is it so important in system engineering to become familiar with some of the analytical methods?
Identify and describe some of the technologies that are being applied in the design process. Provide some examples of typical applications, and describe some of the benefits associated with the application of computerized methods in the design process.
How does CAM and CAS relate to system engineering? Describe some possible impacts.
How is design review and evaluation accomplished? Why is it important relative to meeting system engineering objectives? Describe some of the checks and balances in the design process.
What is included in the establishment of a "functional” baseline, Allocated baseline, and Product baseline? Why is baseline management important?
What is configuration management (CM) and how does it relate to system engineering? Define Configuration Identification (CI) and Configuration Status Accounting (CSA).
Part 5: Select a system of your choice, and construct a sequential flow diagram of the overall system development process. Identify the major tasks in system development, and develop a plan/schedule of formal design review. Briefly describe what is covered in each.
Part 6:
Discuss some of the problems associated with the application of computerized methods in the design process. Provide examples. What cautions must be observed?
.
Part 1- Create an outline of the assignment below thenPart 2-1000 .docxMARRY7
Part 1- Create an outline of the assignment below then
Part 2-1000 word assignment
Your fast-food franchise has been cleared for business in all 4 countries (United Arab Emirates, Israel, Mexico, and China). You now have to start construction on your restaurants. The financing is coming from the United Arab Emirates, the materials are coming from Mexico and China, the engineering and technology are coming from Israel , and the labor will be hired locally within these countries by your management team from the United States. You invite all of the players to the headquarters in the United States for a big meeting to explain the project and get to know one another. The people seem to be staying with their own groups and not mingling.
What is the cultural phenomenon at play here (what is it called/ term)?
How do you explain the lack of intercultural communication and interaction?
What do you know about these cultures—specifically their economic, political, educational, and social systems—that could help you in getting them together?
What are some of the contrasting cultural values of these countries?
You are concerned about some of the language barriers as you start the meeting, particularly the fact that the United States is a low-context country, and some of the countries present are high-context countries. Furthermore, you only speak English, and you do not have an interpreter present.
How will this affect the presentation?
What are some of the issues you should be concerned about regarding verbal and nonverbal language for this group?
What strategy would you use to begin to have everyone develop a relationship with each other that will help ease future negotiations, development, and implementation?
.
Part 1 Review QuestionsWhat is the difference between criminal la.docxMARRY7
Part 1: Review Questions
What is the difference between criminal law and civil law?
What is privacy, in the context of information security?
What is intellectual property? Is it offered the same protection in every country of the world? What laws currently protect it in the U.S. and Europe?
What are the three general categories of unethical and illegal behavior?
Part 2: Module Practice
What does CISSP stand for? Using the Internet, find out what continuing education is required in order for the holder of a CISSP to remain current and in good standing.
.
Part 1 Review QuestionsWhat is the difference between authenticat.docxMARRY7
Part 1: Review Questions
What is the difference between authentication and authorization? Can a system permit authorization without authentication? Why or why not?
What is the typical relationship between the untrusted network, the firewall, and the trusted network?
How does a network-based IDS differ from a host-based IDS?
What is a VPN? Why are VPNs widely used?
Part 2: Module Practice
Create a spreadsheet that takes eight values into eight different cells and then applies a transposition cipher to them. Next, create a row that takes the results and applies a substitution cipher to them (substitute 0 for 5, 1 for 6, 2 for 7, 3 for 8, 4 for 9, and vice versa).
.
Part 1 SQLDatabase workScenarioDevelopment of a relationa.docxMARRY7
Part 1: SQL/Database work
Scenario
Development of a relational database system for a food producing company
FoodRU is a Leicester-based food producing company. The company wants to keep details regarding both past and present employees and their assignment to shifts over time. At present, there are three defined shift patterns; the morning shift starts at 6am and finishes at 2pm, the day shift starts at 9am and finishes at 5pm, and the evening shift starts at 4pm and finishes at 12am (midnight). However, management have already indicated that they may need to add further shift patterns in the future (e.g., by adding a night shift to the existing ones so that the company can meet a high user demand for their foods). They therefore require shift details to be stored within a separate Shift table, with attributes that allow the storage of a shift name with its associated start and finish times (use the 24 hour clock for these times).
Past and present employee details are to be kept in the same Employee table, and the details to be kept are the employee’s unique 6 digit reference number, the first name, surname and any other names (if there are any) of the employee, the employee’s gender, contact address and contact telephone, the date on which the employee started his/her employment at the company and the date on which the employee finished his/her employment at the company (should s/he be a past employee). Details regarding staff assignments to shifts include the date that an employee was allocated to work a particular shift, and the date that s/he was taken off the shift (if not still assigned to it). Employees can be assigned to different shifts over time and even to the same shift over different time periods, although they cannot be assigned to more than one shift at any one time. A new employee may not yet be assigned to a shift.
Tasks:
1. Provide the table specifications for the THREE tables that are required by FoodRU to store employee, shift and assignment details. That is, for each of the three tables, you should provide, in a suitable presentation format, the name of the table and a specification of each its attributes to include:
• Attribute name
• Attribute brief description as to its meaning
• a description of the attribute’s data type/integrity (e.g., date field, character field of length 20, number field <= 10, etc. – you can use the Oracle data types within these descriptions if you want to)
• An indication as to whether the attribute is a primary key attribute and/or foreign key attribute
• An indication as to whether the attribute can or cannot take null values
Make sure your design specifies the appropriate links between the three tables. Remember to write down any additional integrity you need to enforce either at a specific table level or across two or more tables, if this is required. Also, remember to write down any justifications for the data types/integrity or for any other design features that.
Part 1 Review QuestionsWhat functions constitute a complete infor.docxMARRY7
Part 1: Review Questions
What functions constitute a complete information security program?
What is the typical size of the security staff in a small organization? A medium-sized organization? A large organization? A very large organization?
Where can an organization place the information security unit? Where should (and shouldn’t) it be placed?
Into what four areas should the information security functions be divided?
Part 2: Module Practice
Design three security posters on various aspects of information security using a graphics presentation program and clip art. Describe the methods you used to develop your design.
.
Part 1A persons lifestyle has a significant influence on the p.docxMARRY7
Part 1:
A person's lifestyle has a significant influence on the person's health and development as he or she moves into middle age (and old age). Stability and change are also common factors in an adult's life.
Describe how middle adulthood provides stability in a person's life. Explain some of the factors that would lead to stability in a person's life as he or she moves through middle age.
Describe some of the more common lifestyle issues that have a negative impact on a person's continued development. Explain how a person may be able to reverse some of the lifestyle influences.
On the basis of your readings, describe what is meant by a midlife crisis. Explain why a midlife crisis may or may not be critical.
Part 2:
Erikson, Gould, Helson, and Levinson provide different perspectives on middle age in adulthood.
Describe each of these theories as it relates to middle adulthood.
On the basis of your readings, compare and contrast these theories. Which one gives a better explanation of middle adulthood?
Justify your answers with appropriate reasoning and research from your text and course readings. Comment on the postings of at least two peers, and provide an analysis of each peer’s postings while also suggesting specific additions or clarifications for improving the discussion question response.
.
Part 1 Review QuestionsWhat is the definition of information secu.docxMARRY7
Part 1: Review Questions
What is the definition of information security? What essential protections must be in place to protect information systems from danger?
Define the InfoSec processes of identification, authentication, authorization, and accountability.
Define project management. Why is project management of particular interest in the field of information security?
What are the five basic outcomes that should be achieved through information security governance?
What is a threat in the context of information security? How many categories of threats exist as presented in this chapter?
Part 2: Module Practice
Find an article that talks about relative risk either from inside the organization or form external sources. Once you locate and read it, compose a 1-2 page paper that summarizes your findings and critique the article. Use a word processor to complete your assignment and submit it as a .docx or .doc document.
.
Part 1 Review QuestionsWhat is a security modelWhat are the es.docxMARRY7
Part 1: Review Questions
What is a security model?
What are the essential processes of access control?
Identify at least two different approaches used to categorize access control methodologies. List the types of controls found in each.
What is COBIT? Who is its sponsor? What does it accomplish?
What is the standard of due care? How does it relate to due diligence?
What is baselining? How does it differ from benchmarking?
Part 2: Module Practice
Make a list of at least ten information security metrics that could be collected for a small internet commerce company with 10 employees. For this senario, the company uses an outside vendor for packaging and distribution. Whom should the metrics be reported?
.
Part 1 Listed below are several key Supreme Court decisions that .docxMARRY7
Part 1:
Listed below are several key Supreme Court decisions that resulted in a clarification of inmate rights.
Choose any one
of the cases listed below. Summarize the facts of the case, the issue that needed to be resolved, the court’s decision, and the reasoning behind the decision.
Helling v. McKinney
(1993)
Washington v. Harper
(1990)
Hudson v. Palmer
(1984)
Bell v. Wolfish
(1979)
Bounds v. Smith
(1977)
Estelle v. Gamble
(1976)
Wolff v. McDonnell
(1974)
.
Part 1 Infrastructure DesignCreate an 8–10-page infrastructur.docxMARRY7
Part 1: Infrastructure Design
Create an 8–10-page infrastructure design document in which you:
Identify the major hardware and software components of your hypothetical e-commerce company's information systems infrastructure.
Design your e-commerce company's hardware (database and proxy servers, network equipment) and software (analytics, big data, API, content management) from a size, scale, type, and interoperability standards perspective.
Document the potential security vulnerabilities and a security design for your e-commerce company.
Use graphical tools to create a data flow diagram (DFD) for your e-commerce company.
Use sources to support your writing.
Choose sources that are credible, relevant, and appropriate.
Cite each source listed on your source page at least one time within your assignment.
Part 2: Updated Gantt Chart
Use Microsoft Project to update the previously created Gantt chart with the major and minor tasks identified in the infrastructure design document.
.
part 1 I attended an international conference on Biotechnology and .docxMARRY7
part 1: I attended an international conference on Biotechnology and one of the sessions I went to was on the subject of bio-engineering a "death gene" that could be introduced into the mosquito population and destroy every mosquito on earth. The discussion that ensued was about the ethics of such a thing. I want you to tell how you feel about introducing such a gene. Look up something about this. Your reference does not have to be about this particular gene, but can be about anything that relates to the discussion. Remember to cite your reference, and write at least 150 words
part 2:
Respond to another student
respond to this
I think that with regulation of the mosquito communities would be a good thing. Mosquitos carry many dangerous diseases and if we can lower the population we can slow the rate of transmission of these diseases. This could save many many lives around the world. I would be hesitant though to release the genetically engineered mosquitos into the environment. In the article I read they releases sterile male mosquitos into the environment. This I feel is a safer way to regulate because we are not altering any genes we are just regulating a naturally occurring issue in nature. Sterile males cannot pass on the genes and also male mosquitos are not the ones who would be likely to pass on the diseases. The article stated that only females bite and therefore males would not be capable of spreading the diseases. With sterile males being released there will be less mosquitos due to lack of repopulation. This will still allow organisms relying on mosquitos for food to still be able to survive with less risk to humans. They are an invasive species so it would help to eliminate the spread of mosquitos to different areas. This will keep the spread of disease throughout areas. I do not think it is right to alter the genes for human use though. It is not how nature had intended. If the gene pops up naturally in the population then it should not be taken out but we should not introduce it due to humans "playing God" with genetics. "Mosquitoes Engineered To Kill Their Own Kind." NPR. NPR, n.d. Web. 22 July 2014. .
.
Part 1 Chapter 7 Summary plus end of chapter discussion of Alfred.docxMARRY7
Part 1:
Chapter 7 Summary plus end of chapter discussion of Alfred Marshall, should be 100-250 words
Part 2: The discussion on the first 7 pages is a satire on the economists (known as the neoclassical economists).
List 4 passages that can be considered satire.
(You need not write the entire passage.
Simply show clearly where the passage begins and ends.)
.
Parent Involvement Plan This week you will create a Parent Involve.docxMARRY7
Parent Involvement Plan
This week you will create a Parent Involvement Plan in response to the following scenario:
Imagine you are working with infant, toddler and preschool aged children in a child care center. The majority of the children has special needs and receives early intervention or are on an IEP. Many of the children’s parents work two jobs and have a difficult time participating in the center's activities. Whenever the center plans an event, the parental involvement is lower than desired. The center has tried to increase parental involvement through such methods as calling to remind parents and sending home notices, but is not having any luck.
Your assignment is to create a Parental Involvement Plan to encourage better participation from parents. Follow these steps to develop your plan:
Step 1:
Identify the issue, discuss your beliefs about the situation, and formulate conclusions and offer suggestions to the director of the child care center.
Step 2:
Create a Parent Involvement Plan that your director can copy and paste into the employee and parent handbook. Your plan should include:
The importance of early intervention and individual educational plans
Ways to assist students and their families
The importance of parent involvement
Please use the template provided and your rubric as your guide to completing this assignment.
.
Parenting Practices Over GenerationsGeneration 1 Years children.docxMARRY7
Parenting Practices Over Generations
Generation 1: Years children were raised (19XX-XXXX)
Generation 2: Years
Generation 3: Years
Parenting Practice 1: Education
Parenting Practice 2:
Parenting Practice 3:
Parenting Practice 4:
.
ParamsThe interface must be pleasing to look at (a basic form wit.docxMARRY7
Params:
The interface must be pleasing to look at (a basic form with the four fields listed below, a playlist queue (checked listbox) and media player will suffice).
There must be a separate file that will contain information about each soundtrack in your system. That information will be:
Title;
Artist;
Note area;
Type; and
Anything else that you wish to include on each record.
There must be a way to add data to this file.
There must be a way to delete data from this file.
There must be at least one report using data from the file.
There must be a queue to allow you to play selected music tracks in sequence (like two in a row) without manual intervention.
There must be a way to show the data in at least two different sequences (by title, by artist, etc.).
There must be documentation explaining how your Jukebox works (how you add songs, play songs, etc.).
Currently there is a Text file that contains the information about the wav files to be played, several wav files that the text file references. I have also made an access database from the text file.
.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
LIT 229 Module Four 1 Introduction Myth and… .docx
1. LIT 229 Module Four 1
Introduction: Myth and…
Given its nature as the wellspring of our knowledge about
ourselves and the world, myth
should be found in all our ways of knowing, and it is. The
phrase “ways of knowing” is
shorthand for those collections of beliefs, assumptions,
discourse, values, and practices that
offer their own approaches for understanding the world and our
place in it. This description
of ways of knowing sounds much like myth because myth itself
is a way of knowing. The
point here is not to overlay myth onto all ways of knowing but
to illuminate the relationship of
myth to them. For this module, we will analyze the role of myth
in three prominent ways of
knowing: psychology, religion, and science. These three operate
on a deeper layer than
particular genres for myth like art, literature, and film (will
explore the latter two later) and
thus promise to illuminate myth by their own lights.
Myth and Psychology
At the heart of psychological ways of knowing sits a story. It
2. is—like our most profound and
provocative stories—erotic, strange, traumatic, and Greek.
Oedipus is the son of Laius and
Jocasta, the king and queen of Thebes. A prophecy declares that
the young Oedipus will
grow up to commit the most horrible crimes imaginable—the
murder of his father and incest
with his mother. Desperate to forestall these events, King Laius
binds the boy’s feet
(Oedipus means “swollen foot”) and leaves him to die on a
mountainside. As fate literally
would have it, shepherds find the boy, rescue him, and take him
to the king and queen of
Corinth, who raise him as their own. Oedipus eventually hears
the prophecy himself from the
Oracle at Delphi and leaves his known family at Corinth and
heads, fatefully, to Thebes. On
the way there, he quarrels with a man who refuses to give way
on the road, eventually killing
the man. Unknown to Oedipus, this man is Laius, his father.
Upon arriving at Thebes, he
answers the riddle of the Sphinx, who is terrorizing the city,
and is rewarded with the throne
of the dead king and his wife Jocasta, who is Oedipus’s mother.
Upon hearing that the
prophecy had indeed been fulfilled, Jocasta commits suicide,
and Oedipus blinds himself
and goes into exile.
2 LIT 229 Module Four
3. Freud Gives Birth to a Way of Knowing
In this myth, Sigmund Freud saw the central drama of the
human psyche and by extension a
primal feature of the new discipline of psychology. He writes in
his Interpretation of Dreams
that Oedipus’s:
destiny moves us only because it might have been ours—
because the Oracle laid the
same curse upon us before our birth as upon him. It is the fate
of all of us, perhaps, to
direct our first sexual impulse towards our mother and our first
hatred and our first
murderous wish against our father. Our dreams convince us that
this is so. (295)
Without delving too deeply into Freud’s Oedipus complex, we
can see that the myth provides
a story—Freud would say the story—for human thought and
behavior by doing what any
good story does, namely, creating tension through conflict and
then releasing it through
some kind of resolution. The tension is created when the infant
becomes aware of his
gender difference from his mother and similarity to his father,
and that awareness connects
to his emotional and physical dependence upon his mother,
which Freud understands as
erotic. The father, then, becomes a competitor for the mother’s
love, but because he is
stronger, he always wins. The infant’s desire is for the mother,
but jealousy and fear are
4. directed at the father who competes with the infant for the
mother’s love. These emotions
are surging in the what Freud called the id, the unconscious area
of the psyche that
operates according to pure pleasure, but the turbulent features
of the id cannot be sustained
in the ego, the aspect of the psyche that operates according to
the reality principle, much
less the superego, where societal norms come to bear. Tension
abounds within and without
as the child deals with these contradictory impulses. It can be
released by two mechanisms:
repression, which offers only a temporary solution since the
emotions reappear elsewhere in
other forms such as dreams; and identification, where the child
founds his identity in the ego
and superego and thus conforms to the reality principle and
society’s norms (Freud 53).
Freud’s application of the Oedipus myth as a way of knowing is
a unique phenomenon in
Western culture, exposing, as it does, the process of using one
myth to answer most
questions about human nature and behavior. While Freudian
analysts are increasingly hard
to find (not least because they are expensive and treatment lasts
for years), Freud’s theories
are psychology’s creation myths, and almost all practicing
psychologists employ some
version of Freud’s “talking cure” to move from repression to
identification.
5. LIT 229 Module Four 3
The Student Becomes the Master
It might appear that no one could engage myth as deeply as
Freud, but a meeting he had in
1906 produced a collaboration with another psychologist who
took the application of myth in
a vastly different but equally profound direction. Carl Gustav
Jung was 30 when he met with
Freud in Vienna, and they talked for most of the day without
pause. Jung would agree with
Freud about the importance of the unconscious to the
development of the human psyche,
but instead of seeing it populated with repressed desires
generated by the id, Jung saw a
deeper level of the unconscious that was made of archetypes or
symbols shared by all
human beings in what he termed the collective unconscious.
Jung also would modify Freud’s
Oedipal complex to apply to female infants in what he termed
the Electra complex.
Though the archetypes consist of many images, a few are
especially potent in Jung’s
psychology: the persona, the shadow, the anima, the animus, the
great mother, the wise old
man, the hero, and the self. Even though you may not recognize
some of these names, it
should be clear that they all have mythological qualities. One
useful but incomplete way to
understand archetypes is to do what we are doing in this class:
reading a lot of myths,
6. looking for common images, and attaching meaning to them that
is consistent with their use.
By moving the psychological applications of mythology beyond
one myth (Oedipus) and one
location (the individual psyche), Jung expanded the influence of
mythology upon psychology
(and vice versa) far beyond Freud.
Much like Socrates and Plato, Freud and Jung inaugurate a new
way of knowing. Unlike
Socrates and Plato, Freud and Jung ground their model in myth.
While there are obviously
entire realms of psychological knowledge that have different
relations or even little relation to
myth, the most common practice in therapy remains
mythological, and that is to tell the
psychologist your story and have the psychologist tell it back to
you. Psychology’s
connection to mythology remains strong.
Myth and Religion
The relationship between myth and religion is sometimes
difficult to untangle. At its deepest
level, religion is about experiencing awe and even fear in the
face of the unknown universe
and connecting that experience to a sense of place in the world.
That description is very
much like that of Campbell’s mystical function of myth.
Religion is also about connecting our
disparate experiences into a way of seeing or knowing that
makes sense and provides
meaning and direction for our lives, echoing again Campbell’s
other functions of myth. On
the more practical and experiential level and in terms of the
7. practice of a particular religion,
4 LIT 229 Module Four
myth typically recedes into the background to do its work,
especially in Western religions for
reasons we have already seen having to do with Plato. Oral
cultures have no reason to hide
their myths, since they are founding stories of the people and
continue to serve all four
functions. Whether implicit or explicit, the relationship between
myth and religion is deep and
broad. Rather than attempt to cover this entire landscape, we
will focus instead on a
particular practice, that of ritual, in part because ritual that has
a unique relationship to myth.
We could describe that relationship in terms of a script (myth)
and a play (ritual). The script
tells the story usually with one narrator; the play acts out the
story with the characters having
their own roles. Scholars have enjoyed arguing about which
comes first, and the myth and
ritual school has argued for the primacy of ritual, like the script
being recorded after the
actors work out the play. For our purposes here, we can view
myth and ritual as two sides of
a singular event, one involving a telling, the other involving a
showing. After focusing on
ritual in terms of religion, we can now focus on one theory of
ritual to see its relation to myth.
8. Three Stages of Ritual
Arnold van Gennep was, like many anthropologists of his time,
actually a folklorist
concerned with understanding the "folkways" of primal cultures.
The idea here was to draw
upon the particulars of ethnographers in the field who were
collecting information on myths,
rituals, and social dynamics, then inductively create a theory
based on those specifics. Van
Gennep's theory was simple and powerful. He wrote in The
Rites of Passage that such rites
have three stages: separation, initiation, and return. Separation
involves removing the
inductee from his everyday world, which is safe, predictable,
and knowable, because change
cannot occur when everything stays the same. Initiation
involves introducing the inductee to
a new world, one that is unsafe, unpredictable, and unknown
and requires the participant to
find his own way, thereby developing individual traits of power,
courage, and self-reliance,
among others. Return involves reintroducing the inductee to his
original community where
he is now a full-fledged member by virtue of his rite of passage
and where he can benefit the
community by his lessons learned in the initiation.
LIT 229 Module Four 5
9. The Monomyth and Ritual
Joseph Campbell recognized the value of van Gennep’s theory
and saw it played out
consistently in the hero myths he had read. Applying this
understanding of ritual, Campbell
developed his own theory of the monomyth, the basic pattern of
nearly every heroic journey.
While Campbell goes into great detail about the various
elements of the monomyth, as you
can see in this accompanying image, the foundational structure
is that of separation from the
known, crossing the threshold into the unknown, and returning
to the known.
While not every myth is enacted in a ritual and not every ritual
is scripted by a myth, the
dynamic between the two, and between myth and religion itself,
is deep and profound.
Myth and Science
In the Eastman story that we read in Module One, the dismissal
of myth as “fable and
falsehood” could just as well have come from a scientist as a
missionary. The beginnings of
the move from muthos to logos, effected by Plato, was actually
inaugurated by philosophers
before Socrates who were the first scientists. It is for these
reasons that myth is popularly
understood as the opposite of science or “mere falsehood.”
The Scientific Method
10. While we want to be careful not to overlay myth onto ways of
knowing that are not
mythological (it would be anti-scientific to do so, for one), we
can look at the functionality of
both to observe similarities. Fortunately, one of the features of
the scientific way of knowing
is precision in the method, which is as follows (Crawford):
http://orias.berkeley.edu/hero/index.htm
6 LIT 229 Module Four
Table 4.1
At the formal level, we can already begin to see that the method
has the features of a quest.
Scientists would be quick to point out that the quests are
usually small (the particular
behavior of a molecule in a specific environment) and often
inconclusive (a null hypothesis).
Still, there is something existential about the process, especially
if we interpret the steps
symbolically with an eye toward the four functions of myth.
Define
• Define a question
Observe
11. • Gather information and resources
Explain
• Form an explanatory hypothesis
Test
• Test the hypothesis by performing an experiment and
collecting
data in a reproducible manner
Analyze
• Analyze the data
Interpret
• Interpret the data and draw conclusions that serve as a starting
point for a new hypothesis
Publish
• Publish the results
Retest
• Retest (frequently done by other scientists)
LIT 229 Module Four 7
The Structure of Scientific Ways of Knowing
A more profound relationship exists between myths and
scientific paradigms. In his
12. influential book titled The Structure of Scientific Revolutions,
historian and philosopher of
science Thomas Kuhn explored why there were such strong
disagreements between social
scientists and natural scientists. He came to the following
conclusion:
Attempting to discover the source of that difference led me to
recognize the role in
scientific research of what I have since called “paradigms.”
These I take to be
universally recognized scientific achievements that for a time
provide model problems
and solutions to a community of practitioners. Once that piece
of my puzzle fell into
place, a draft of this essay emerged rapidly. (Kuhn viii)
A paradigm is a pattern or a model, and looking back through
the history of science, Kuhn
saw not one model but many. His point is painstakingly made
and far too subtle to explicate
here, but we can see briefly how a paradigm is related to myth.
First of all, if we return to the
scientific method and look more closely, we can see that while
it is an excellent tool for
providing answers, it also contains some unanswered questions.
For example: Where do our
questions come from? What counts as data and why? Why do we
choose a particular
hypothesis and not another, and how many possible hypotheses
are there? What beliefs
and assumptions guide our analysis and interpretation of the
data? What assumptions and
beliefs do other scientists bring to our hypothesis? For Kuhn,
13. these questions remain in the
background and are usually unasked, much less answered.
Kuhn's book is an attempt to ask
and answer those questions, and the result is that science
operates under paradigms, a
particular set of scientific practices informed by the beliefs of a
scientific community existing
at a particular point in time. As is evident from this brief
description, a paradigm looks and
acts quite a bit like myth.
Finally, the science of cosmology is a direct competitor of myth
for understanding how the
world came to be and for finding our place in it. That is why
“the myth of the Big Bang” is one
of the creation myths mentioned in the text. The formal and
functional similarities are
striking.
Before he died, Joseph Campbell saw great mythological
promise in the new knowledge
created by the sciences. In fact, he believed that scientific
discovery would provide the basis
for a new mythology, a new paradigm that would advance
human consciousness.
8 LIT 229 Module Four
Conclusion
14. Psychology, religion, and science—arguably our most profound
ways of knowing today—all
have strong connections to and resonances with myth. We
should also note that if we
include myth as another way of knowing, we can see that the
way we know ourselves and
the world resonates with our beginnings in oral culture because
we still draw upon narrative
in one form or another to carry our deepest beliefs and orient
ourselves in the cosmos.
LIT 229 Module Four 9
Works Cited
Campbell, Joseph. The Hero With a Thousand Faces. Princeton:
Princeton University Press, 1968. Print.
Crawford, Susan, and Loretta Stucki. “Peer Review and the
Changing Research Record.” Journal of American
Society for Information Science 41.3 (1990): 223–28. Print.
Freud, Sigmund. The Ego and the Id. Ed. James Strachey. New
York: Norton, 1962. Print.
Freud, Sigmund. The Interpretation of Dreams. New York:
Modern Library, 1950. Print.
15. Van Gennep, Arnold. The Rites of Passage. Chicago: University
of Chicago Press, 1960. Print.
Jung, Carl Gustav. Man and His Symbols. Garden City:
Doubleday, 1964. Print.
Jung, Carl Gustav. The Theory of Psychoanalysis. New York:
Johnson Reprint, 1970. Print.
Kuhn, Thomas S. The Structure of Scientific Revolutions.
Chicago: University of Chicago Press, 1970. Print.