суббота, 6 апреля 2019 г.

The Internet in Our Lives Essay Example for Free

The network in Our Lives EssayThe Internet has always made our lives easier and faster since it was invented. While some people think that the Internet is harmful or dangerous invention especially for children and teenagers, other people debates that the Internet now is functional, because they use it in the well-nigh their needs. This try out will discuss why the internet is a good invention and useful for humanity. there be many reasons why the internet should have more security. First of all, the internet provides an avenue for criminals to disgrace the privacy of families. To illustrate, there atomic number 18 many criminals who are victimization to girls to get their own photos and then test to get money for avoiding spreading photos in the web sites. Secondly, pornographers which are web sites that include sexual materials, are easy to reach, because there is not enough censorship from the government on these web sites. Teenagers today are independent, because the try and search for the sexual materials. Finally, the internet now is providing the best place for thieves to create many ideas for stoling. For instance, phishing sites which deal and sell sites, fake bank sites.These sites are not censor and entirely similar to the original sites. However, if we facial gesture at the positive side of the internet, we find that the advantages are more than disadvantages. Thus, I looking at that the internet is subservient in our lives for many reasons. Firstly, the internet is the best way to communicate with other people anywhere and anytime. For example, when a member of family studies abroad, the family give the gate communicate with each other by many programs which are supported by the internet such as Skype and MSN.For this reason, the internet will be helpful for not feeling homesick, because the internet is the easier and cheaper than other ways of communicating. The other point is that the internet could be used in education. For inst ance, we can recover our homework, listen to science lectures, and search for information about a particular topic. The internet makes our education easier because can find information quickly. Searching for information from the library takes long time, while the internet simplifies that. Lastly, introducing our religion which is Islam using the internet, we can invite people to join Islam.People who join Islam earlier are always aflame to invite other people on their country, so Islam will increase around the world. In summary, this essay illustrated the benefits and disadvantages of the internet. It illustrated that the advantages are more than the disadvantages. I think using internet has more advantages then disadvantages and I feel that the internet has changed our lives positively since it was invented, because everything around the world is changed such as technology, but it should be more censored and security from the government.

пятница, 5 апреля 2019 г.

The Sewerage System In Malaysia Construction Essay

The Sewerage System In Malaysia Construction EssaySewerage placements ar mavin of the most important infrastructures in construction of house physicianial, industrial or commercial project as it determines the prime(prenominal) of life enjoyed by a community. It consists of a network of netherground give notice screamworks, pump shoess, cloaca interposition plants and sludge treatment facilities. This formation usually ope directs establish on by gravity due to the dispose of the piping which reduces the high cost required for pumping.Sewers are yet classified into a few categories, which front on the sheath of wastewater that each of it carries. For example, storm crappers are knowing to carry stormwater from roofs, paved theatre of operationss, pavements and roads industrial sewers are useed to carry wastewater generate from the industry sanitary sewers are ended to carry the waste water from cooking and washing and the wastes from toilets. at that place i s another type of sewer which is cognise as combined sewers. These types of sewers are nameed to carry stormwater, industrial wastes, and domestic sewerage. In Malaysia, many towns and cities utilization the separate sewer system. The wastewater is transported in separate pipes from storm sewers, industrial sewers and sanitary sewers. This system leave not experience CSOs (Combine Sewer Over fertilizes) which usually happen to combined sewer. The flooding will cause by stormwater still.Sewerage system is very important as it helps lot to transport the wastes or sewage absent from their places. Therefore, the system essential(prenominal) be functioning well because improper functioning system will engage to pollution and contamination of various aspects of our surrounding which affect human life and health. Hence, regular master(prenominal)tenance must be done to the existing sewerage system and appropriate design must be employ to the new sewerage systems to picture t he sewerage systems are in good condition.The efficiency of the sewerage system is affected by the devolve of the wastewater. In designing a sewerage system, the type and size of the pipe to be employ must be able to accommodate the spinning top light. The vizor lead is based on the population equivalent which is a direct measurement of the population in an bailiwick. When designing the sewerage, there is a standard and criteria that should be followed. The standard write in code of practice for sewerage design in Malaysia (MS 12281991) was select from British Standard BS 80051987. However, British Standard may not be as relevant to Malaysia due to the season and climate portion which control direct effect on the peak function. This is the main reason of doing this research to find out whether the standard is suitable to be used in Malaysia. line of work StatementAny sewerage system will be designed to carry a genuine amount of sewage based on the population equival ent (PE). In sewerage design, the per capita prevail and the peak lean rate rate (Qpeak) are important literary arguments. Based on British Standard, the per capita advert is 225L/day/ individual and the peak flow factor, K is 4.7. However, a previous larn indicated lower per capita flow and peak flow factor in the sewerage system in Malaysia although no conclusive results were obtained (Dayalan, two hundred7). A lower peak flow factor will result in smaller pipes which will incur lower cost. Therefore, further research is carryed to study the suitability of current design criteria for sewerage system located in tropical climates.1.3Research ObjectivesThe objectives of the study areTo obtain flow entropy from pre-determined sewer tributary area.To evaluate the parameter in the peak flow factor equation for medium scale sewerage catchment system.To determine the affinity between population of an area to the peak flow of sewerage system.1.4 Scope of ResearchTo collect relev ant information of sewerage design from selected literatures.To find out relevant formula provided in selected codes for sewerage design.To study the peak flow factor in sewer line that serve the PE honor of 1000-10000.To measure flow characteristics by using flow meter with build-in sensor in manholes at Tropicana Indah.To compare the results obtained with the formula in the standard code.To even up recommendation on the feasibility of the code formula to tropical climate.CHAPTER 2 books REVIEW2.1 Sewerage System in MalaysiaThe sewerage system is designed to collect wastewater or foul sewage generated from residential, industrial and commercial areas through sewer pipes and discharges it to the treatment plants or facilities to ensure the sewage is released to the natural water bodies in an appropriate condition and quality (Geoffrey, 2004). In Malaysia, sewerage systems range from guileless toilet with little or no treatment provided to modern sewage treatment plants that trea t the sewage to the desired quality accordance to env atomic number 26ment standard. There are two main types of sewerage system in Malaysia. A stick in sewerage system is either connected to a public sewage treatment plant or an individual septic tank. Indah Water Konsortium (IWK) is responsible to provide service and aid to public sewage treatment plants and all the underground pipes and excessively provide desludging services to individual septic tanks (Abd Aziz, 2006).IWK decided to divide the underground pipe into two sections, public pipe and hush-hush pipe (Figure 2.1) to make sure that all underground pipes operate without any problem. Public pipe is under the responsibility of IWK and the toffee-nosed pipe is under individual responsibility. An individual have to pay for the IWK services when the private pipe need for servicing. (Abd Aziz, 2006).http//www.usj23.com/planet_free/sewage_system/Sewage%20System.jpgFigure 2.1 melt down of wastewater from private pipe to pu blic pipe (USJ 23 fireside2.2 transit of WastewaterWastewater is usually transported through sewer pipes that are connected to the sewer mains by clay, cast-iron, or polyvinyl chloride (PVC) pipes that range from 80-100mm diam. The intumescent sewer mains can be located about 1.8m deep or much than that along the centerline of a street or pathway. The small and large sewer pipes are made by antithetic material, in which the smaller sewer pipes are made of clay, cover, or asbestos cement, and the large sewer pipes are made of reinforced concrete construction. The flow of wastewater is different from water- generate system. The water supply is transported to each house by the application of pressure. However, the wastewater from each house is flows through sewer pipes by gravity. Therefore, the sewer pipe must situated on slope surface to allow the wastewater to flow at a amphetamine of at least 0.8m/s and not more than 4m/s. (MS12281991). If the wastewater flows at velocity lower than 0.8m/s, the solid material tends to settle in the pipe which will lead to blockage. Storm-water mains have similar structure as sanitary sewers but they have a much larger diameter than sanitary sewers. In certain places, the urban sewer mains are connected to interceptor sewers, which can then trade union to form a organic structure line. The trunk line will then discharge the wastewater into the wastewater-treatment plant. This superman process is shown in Figure 2.2. As the interceptors and trunk lines will carry the wastewater discharge from sewer main, they are usually made of brick or reinforced concrete which can carry more shipment than the other pipe. Sometimes, they are large enough for a truck to pass through them. (Norhan Abd Rahman et.al, 2007)http//techalive.mtu.edu/meec/module21/images/CombinedSewer.jpgFigure 2.2 Transportation of Wastewater (Michigan Environmental Education Curriculum,Wastewater Treatment)2.3 Concept TheoryIn designing a sewerage pipe network, the pump stations and sewage treatment plants are required to carry and pump rafttric flow rate. The flow rates are usually measured in cubic meter per bet on (m3/s) and need to be compute for both existing land use and for expected future development. There are two parameters that are used to maneuver expected flow rates. One of the parameters is per capita flow. This per capita flow of 225L/ soul/day is an average daily flow, which means a person will produce 225 liters of sewage in a day. Another design parameter named population equivalent (PE) of a catchment can also be used to calculate the flow rate. PE is not a measure of population. However, it is used to measure the estimated second of people that use the sewage facilities. In residential areas, the PE is a direct measurement of the population in an area which is calculated as five per dwelling. The PE has a different method of measurement in commercial area. It is calculated from the floor area and this PE value is considered to be proportional to the number of people using a premise during the day which does not reflect the population living in an area.2.4 Quantity for Wastewater2.4.1 Tributary sphere of influenceTributary area is an area from where the wastewater is being transported to a particular sewer section. The types of activities in that area determine the quantity of wastewater being collected by a particular section. A heap has to be done when there is no information available on existing areas in align to determine the number and classification of persons and the types of industries. (Guyer, 2010)Table 2.1 shows the method of calculating the PE.Table 2.1 Equivalent Population, PE (MS12281991)No. suit of Premises/EstablishmentPopulation Equivalent (recommended)1Residential5 per unit2 technical(include entertainment/recreational centres, restaurants, cafeteria, theatres)3 per 100m gross area3School/Educational Institutions Day schools/institutions0.2 per disciple Full residential1 per schoolchild Partial residential0.2 per student for non-residential student and 1 per student for residential student4Hospitals4 per bed5Hotels (with dining and laundry facilities)4 per style6Factories (excluding process wastes)0.3 per staff7Market (Wet Type)3 per stall8Petrol kiosks/ help stations18 per service request9Bus terminal4 per bus bay2.4.2 Sanitary/Domestic Wastes2.4.2.1 Contributing PopulationIn designing the flow, the population to be used depends on the location of the sewer. The design population in a residential area is based on the number of houses served. However, the design population for an industrial area is the maximum number of staff ever employed. The design population for sewers that serve both residential and industrial areas include residents and non-residents. roleing of these sewers denote that no person should be counted more than once. Allowances should be made for future population changes caused by master planning projections and facility military group requirements. (Guyer, 2010)2.4.2.2 Average Daily FlowThe average daily flow is counted by multiplying the population equivalent from resident and non-resident with the appropriate per capita flow and adding the two flows generated from both resident and non-resident. The average daily flow shows the total volume of waste generated over a 24-hour period. It cannot be used for wastes that were generated over mindlesser periods of 8, 10, 12 hours, etc. Therefore, it can only be used for designing sewers that generate wastewater over a 24-hour period (e.g. residential area). In Malaysia, the average daily flow for residential area is usually taken as 225L/person/day. In industrial areas, the average daily flow is taken as 115L/person/day as non-resident personnel and employees is working for 8-hour shifts. These quantities are usually used in designing wastewater treatment facilities. However, they are also used for sizing interceptors, trunk sewers and pumpin g stations serving large portions of the installation. (Guyer, 2010)2.4.2.3 Average Hourly Flow considerAverage hourly flow rate is used for designing sewers that serve small areas of the installation (e.g. industrial area), where most of the wastewater is generated by non-residents or other short term occupants. The average hourly flow rate is counted based on the actual period of waste generation. For example, 1000 non-residents with an average daily flow of 115L/person/day would generate 115,000 liters in 8 hours which is equivalent to an average hourly flow rate of 14,375 L/h or 345,000 L/d. However, the average daily flow would still be 115,000 L/d. Therefore, the sewer must be designed hydraulically to carry 115,000 liters of waste in 8 hours quite of 24 hours (Guyer, 2010). If the sewer is designed to carry a waste of 115,000 liters in 24 hours, then the sewer pipe will not be able to transport the wastes as the actual volume of wastes generated is more than the design wast e. This will lead to the blockage of sewer pipes and overflow in the toilet.2.5 Design Wastewater FlowThe design flow of wastewater must be determined for any section of a proposed sewer. The design flow is not only based on sanitary sewage industrial flows, inflow and infiltration must also be taken into account. The following shows the equation to determine the peak flow factor and the factor to be considered in sewerage design.2.5.1 Design EquationsThe peak flow required to design sewers, pumping station and treatment facilities are calculated by the following equation natural elevation flow factor = 4.7 x p-0.11p Estimated equivalent population, in thousand.The sewers are designed based on peak flow to ensure that the sewer pipes would be able to accommodate the wastewater generated at any time.2.5.2 Factors Affecting Sewer DesignIn designing sewers, there are a few factors as stated in MS12281991 that must be taken into considerationEconomy in the designThe sewers should be k ept as short as possible and avoid unproductive lengths.Shallow rider sewers can be dictated under highways having expensive foundations and surfaces to receive the local house connection, and to connect the riders at convenient points into the main sewers.Location of sewersThe sewers should be placed within streets or right-of-way to ease the maintenance work.If topography dictates, the sewer is to be located within private properties, and provide adequate access for maintenance purposes.Location or the position of other existing or proposed service lines, building foundation, etc for maintenance purposes.A minimum at 3 m horizontal and 1m just separation from the water main should be provided to avoid the sewage from entering the water main.The impact of sewer construction and subsequent maintenance activities towards road users.Hydraulic DesignThe sewers should be laid at much(prenominal) inclines to produce adequate velocities to film the solid matter. The gradient should p roduce a minimum velocity of not less than 0.8 m/s and a maximum velocity of not more than 4.0 m/s to avoid scouring of sewer by erosion action of suspended solid.Structural DesignThe information of sewers must be adequate to accommodate the sewage from existing and future properties. The minimum depth should be 1.2 m.The minimum size of the sewer should be 200 mm in diameter in show to convey raw sewage.Straight alignment and uniform gradient between consecutive manholes should be laid for sewers of 600 mm or less in internal diameter while curves can be laid for sewers of larger than 600 mm internal diameter.Flexible type and watertight joints should be provided between sewers, sewer manhole or other appurtenance structure to avoid infiltration and breakage due to differential settlement.The foundation should be able to maintain the pipe in proper alignment and carry the weight of soil supra the sewer and any other superimposed load.Service ConnectionThe diameter of the connecti on must be adequate enough to prevent blockage problems.The sewer must have a minimum gradient of 2%.The minimum size of the connection should be one hundred fifty mm.Tee junction should be used to connect service connection to the main sewer.2.5.2.1 gloominess Sewer DesignSewers are designed to convey the wastewater flows as required. Generally, it is not recommended to design the sewers for full flow, even at peak rates as the chances for problem arising are high. The flows that cover above 90% to 95% of full depths are considered unstable which may lead to sudden loss of carrying capacity with surcharging at manholes as shown in Figure 2.2 (Guyer, 2010). Surcharging means that the pipe that is designed to flow full or partly full, is now transporting the flow under pressure. When the flow exceeds the design capacity, there will be surcharge in the manholes (David and John, 2011). Besides that, large trunk and interceptor sewers laid on flat slopes experience less fluctuation in flow. If it is designed to flow full, the sewers may lack equal air space above the liquid for proper ventilation. Ventilation in sewer is important in preventing the buildup of explosive, corrosive or odorous gases, and for reducing the formation of hydrogen sulfide. Thus, the depth of design flow for trunk and interceptor sewers should not exceed 90% of full depth laterals and main sewers, 80% and building connections, 70%. heedless of flow and depth, the minimum sizes of sewer pipes to be used are 150 mm for service connections and 200 mm for all other sewer types. The sewer pipes for service connections are usually smaller than 150 mm as they only convey liquids with little or no solids (e.g. condensate lines). A condensate line of more than 100 mm is recommended for most situations. Same design criteria as sanitary sewers can be applied to industrial application except pipe material that is resistant to the waste are to be specified. (Guyer, 2010)Figure 2.2 (a) Part-full pi pe flow without surcharge(b) Pipe flow with surcharge (David and John, 2011)2.6 Pipe Materials for Gravity SewerThere are many types of material which can be used for sewerage construction. However, the type of materials that we choose must depend on its life expectancy, previous local experience, roughness coefficient, structural force-out and local availability. Table 2.2 shows the common materials that are suitable for sanitary sewers. Sewer pipes made by different material have different diameters and lengths.Table 2.2 Pipe Materials for Gravity SewerTypes of Pipe Materialduration (m)Diameter (mm)Pipe JointsVitrified clay pipe (VCP)0.6 1.0100 300FlexibleReinforced concrete pipe1.83150 3000Spigot socket type with rubber rings 375mm diameter3.05Fabricated steel with sulphates resistance cement lining9100 1500Spigot socket, flange and mechanical 750mm diameterWelded jointsCast iron3.66VaryFlange and spigot socket typeAsbestos cement pipe4100 600Plastic pipe6110 630Spigot end and socket type with rubber seals, jointing by flanges, welding and solvent cementingformer(a) materialCHAPTER 3 RESEARCH METHODOLOGY3.1 IntroductionIn this research, a field work will be conducted to get the information that will be used to reach the objectives of this research.3.2 Preliminary WorksThis is the initial works that has to be done before conducting the field work at internet site. It includes information gathering on the outcome of sewerage design and self-study on similar and related topics in order to learn more.3.2.1 development GatheringA series of books, articles and online information has to be studied to obtain information on the topic of sewerage design. Sources for sewerage design mostly come from abroad. However, the information on the method to evaluate the design criteria is obtained from related research by a local university.3.2.2 Standard Code of Practice for Design and facility of Sewerage Systems(MS12281991)With the reference to this code book , the design criteria and the factors to be considered for sewerage design is obtained. The equations to calculate the peak flow which depend on the population equivalent are all available in this standard code of practice.3.3 Site WorkA site has been identified for the field work data collection. The location of this site is in Tropicana Indah. Approval is still pending from IWK for access to their manholes.3.3.1 Flow Characteristics MeasurementThe flow characteristic of a section of sewerage pipe systems can be measured by using a flow meter. This flow meter is provided with sensor which will automatically record the flow, velocity and water height at a specific time interval, which in this case is 5 minutes. Once the measurement is completed, the data from the flow meter will be linked to a computer that has Flowlink4 software. This software would aid the plotting of graphs for the 3 parameters (flow, velocity and height) as well as transfer of data to other software. From the da ta, the maximum and minimum hourly flow rate can be obtained. The average flow rate can be used to calculate per capita flow.Flow per capita = Average daily flow (m3/day) / Total population equivalent (PE)= m3/day/personThe paygrade of peak factor and per capita flow for sewerage can also be done through the data obtained from field experiment. The equations that are used for sewerage design are as followa. Peak flow factor = 4.7 - p-0.11b. Average daily flow = Flow per capita - PE= m3/dayc. Peak domestic flow = Peak flow factor - Average daily flow= 4.7 - p-0.11 - Flow per capita - PE= m3/dayFrom MS 12281991, the p value is an estimated PE in thousands and the average flow per capita is 225 L/day/person.

четверг, 4 апреля 2019 г.

The Need Of Sound Information System Information Technology Essay

The Need Of Sound culture System discipline Technology EssaySm wholly to Medium Enterprise is an scheme or business organisation that wholly has a certain tally of employees or revenues, different country has a different definition and standard for SME. In Singapore, SME invite to devour at least 30 per cent local equity and fixed ample assets non more than S$15 million and limit of only non more than cc employees. In Australia, SME has a different category such as very small with only 1 to 9 employees, small with only 10 to 49 employees, medium with 50 to 149 employees and grown with 150+ employees.Information in SME is a really important asset, the loss or distress in any pieces of info result damage the company really badly. Lose in competitive advantage, customers loyalty is the consequences that may materialise and a company in SME could be out of business if an possibility akin that happened. Even though learning aegis pile be applied to all kind of busines s, only when there atomic number 18 differences between SME and large company when applying auspices. SME and large company keep back a difference kind of challenges when applying security system. SME does not consider big budget standardised large company, fewer qualified security strength and re offsets. Challenges for large enterprises ar often beca custom of their large size. They atomic number 18 difficult to track their users because they have a large number of users and or so clock they have a lot of branches in different locations to maintain. SME a alike(p) has advantage compared to the large company, SME which has a smaller number of employees than large company has a lesser threat by insider attacks.One of the solutions for SME for security is outsourcing the security, but the difficulty occurred because of the price offered, some SMEs faecal matternot afford the prices, so it comes again with the budget SME has. at that place is separate solution offer ed to SME in security, some of the Internet Service Providers (ISPs) increasingly partne send for with security vendors to offers SMEs standard security products.The ingest of sound training carcass.Information security charge is a caution that manages threats and risks to the organizations education it is applicable for all type of organization, from large to small organization. Information security management embroils personnel security, technical security, physical security, rag control, business continuity management and many separate things. The standard of the requirement of information security management is ISO 27001 it is star of the ISO 27000 families. With this, it wad wait on to manipulate the information more protected and clients will withal tone of voice limitd. ISO 27001 helps to protect all kind of information, information in soft reproduction or hard copy and even in communication. at that place 3 important characteristics in Information security, C onfidentiality, Integrity and Availability (CIA). Confidentiality ensures that only some authorized user may memory price of admission the information, so different level of information evoke only be admissioned by certain users. Integrity is a state where the information is complete, and uncorrupted. Availability ensures that the information is available whenever the authorized user accessed.Information security management is demanded because promptly information is the roughly vital asset for almost all the organizations. A lot of consequences when the information is destroyed, stolen or corrupted and the consequences may be very dangerous or even shamble the organizations fall down. Personal information is too vital to the people itself and overly to the company, if the company do not handle the information carefully, it will be dangerous to the company because personal information commode overly be customer information and when it is not secured, the customers can lo st their trust to the company and the companys reputation will be affected also, these can also applied to the companys modules. there is this case study where some companies in London experienced loss of electrical energy because there was a problem in the London power company. Because of the loss of electricity, some of the companies have their selective information corrupted and also systems crashed, these nonessentialals made the companies loss their clients, light-colored corrupted info, re input the data which constitute them more and closed the business.There are some of the topics that cover the information security managementBiometric security tresss and their useBiometric security system is a tool to protect from flare upr to access information but victimization part of the body to authenticate the authorized user instead of typing the password. The advantages are it cannot be borrowed or made and also it is more secured than in lay the password. Biometrics that is using physical body that is unique includes finger fall guys, palm, retina, iris, and facial. For the behavioral characteristics include signature, voice, unwrapstroke pattern and human motion.This is a list of biometric and its uses. Fingerprints realisation is a biometric where it identifies by scanning fingerprints and looks for the pattern build on a fingertip. There are different kinds of fingerprints verification, some of them using pattern-matching devices comparing the scanned fingerprints from database, they are also using moir fringe patterns and ultrasonic. Palm recognition scan, measure the shape of the hand and look for the pattern on the palm. Some of the organizations use this for time and attendance recording. Retina recognition analyzing the layer of blood vessels located at the book binding of the eye. This biometric uses low intensity light and source through and optical coupler to look for patterns of the retina, so the user want to focus on a given(p) poi nt. Iris recognition analyze the colored ring of tissues surround the pupil by using conventional camera element and the users do not need to be close to the scanner. Face recognition analyses the facial characteristics and it requires digital camera to scan. Some organization like casino, scan for scam artists for quick followion.Some of the company even government also using biometric security. Fujitsu Ltd. is now making the company desktop computing device to use a palm recognition, it is not using fingerprints because it verbalise that palm recognition is more secured than fingerprint. They are using infrared to scan the users palm, they look for the pattern of the mineral vein in the palm and because they use infrared, they can see them. This technology is already in use in more than 18000 bank ATMS in Japan. Germany stores a digital fingerprints and digital photos in to the passport to fight organise crime and international terrorism.Biometric may be more secured but rese arch says biometric like fingerprint recognition can be accessed by unauthorized users also. There is this mathematician named Tsutomu Matsumoto, he use a $10 ingredients gelatine and p endic mold to reproduce a portion of finger and in four of five attempts, he can accessed to 11 different fingerprints recognition systems. sequent result management and disaster recuperationIncident receipt is an organized purpose or procedures to handle and counter some threats like security prisonbreak or attack. Incident response plan includes a policy that discusses how to response to a certain threats, reduces recovery costs and time. Some of hazard response goals are reduce the impact, celebrate future incidents, verify that incident occurred, maintains Business Continuity, and improve security and incident response.There is incident response team in the organization that handles the incident response plan. Incident response team also necessitate another party in organization to help t hem, such as business managers, IT stave, legal department, human resources, public dealing, security groups, analyse and risk management specialists. Business managers make agreements with the team roughly(predicate) their authority over business systems and decisions if scathing business systems must be leave out down. IT staff help the team to access the net income for outline purposes and improve security infrastructure if recommended by the team. Legal staffs need to review non-disclosure agreements and determine site indebtedness for computer security incidents. Human resources help to hire the teams staff and develop policies and procedures for removing internal employees. Public relations help to handle the media and develop information-disclosure policies. Security groups help the team to solve issues involving computer. Audit and risk management help to analyze threat.There are a some(prenominal) steps to response to the incident. First, the organization needs to prepare the staff by having the staff to do some training they need to be trained to response to the incident quickly and decently and also educates the staff to update the security lawfully. The response team has to identify whether it is a security incident or not and the team can also invite some information about the authorized threats. Response team need to identify how far the problem has affected the systems and decide faster by shut down the affected system to prevent yet damage. Then they need to find the source of the incident and remove the source. After that they need to restored the data from clean backup files, oversee them and upgrading the systems to prevent the selfsame(prenominal) incidents in the future. quick device security management lively devices the staffs use also need some kind of security because they can contain pieces of information about the company, it can be the customer or staff information but it can be some kind of soft copy of some report s or documents. Some of IT staffs need to use peregrine devices like PDA or smart phone to make business data. Mobile devices may look secure, issue of viruses and malwares but they are not.There are several threats to the wide awake devices. Intruder can intrude the mobile devices and expose the information out of it through wireless network by using wireless sniffer. Mobile devices can also be stolen or lost and if the devices are not secured by move a password, information can be dig out easily from the devices. Less than 500 mobile operational system viruses, worms and Trojans can be found. Mobile viruses can be a major threat, some of the viruses can clear the data corrupt the data and several other problems. Viruses can intrude the devices when application downloaded to the devices. There is one virus environed 911 Virus, this virus cause 13 million I-mode user in to automatically call Japans emergency phone number. E-mail viruses affect the devices the same as e-mail v irus affect regular PC. It makes the devices to send multiple emails.There are ways to prevent the threat to happen. The easiest way is to put a password to the mobile devices, the password can only be attempted for a several times and if it failed, the devices will be automatically locked down. Using encryption techniques can help to protect interloper from irrupt when exchanging data using wireless network. Back up the data regularly to PC if anything happens to the data. Install antivirus and putting a firewall into the devices can help to prevent viruses. Administrator can take control of the mobile device and also wipe the data on missing or stolen devices.Linking business objectives with securityLinking business objectives with information security can be expensive process and risky. It can create frustration in both(prenominal) sides. There are several actions that can be employ to improve both sides. Reflect the business objectives in information security reflect them in information security policy, objectives and activities. Information security has to be consistent with the organizational culture, changing the culture of the business from information security is often not possible. defend the information in business process by establish a security program. Follow the information security standard, following them will make the staff, customers and client feel that their data is safe. Increase the checking of the need for security, security manager should explain the benefit of them by using business terms, so that everyone can understand more. Obtain the support from management ensure that risk management is part of every staffs job description. The last thing is to use the resources wisely. Spend more resources when the problems are really occurred. With this plan, both business and security can improve and successful.Ethical issues in information security managementIT security personnel are given the authority to access data or information abo ut the individuals and companies networks and system. With this authority, they might use it in a wrong way which mostly is intruding someones secretiveness for example, scanning employees email just for fun or even diverting the messages, read others email and even worse, they can blackmail the employee. The IT personnel can oversee the websites that visited by the network user, they can even place key loggers on machine to capture everything that is displayed.There is ethical issues called real world ethical dilemmas, it is where the IT security personnel happened to see the company secrets and may print the documents, it can be use to blackmail the company or even trade the information to the other company. They also may encounter where they see a document where it showed that the company do some dirty things. With this crucial information, the company is in danger, not only the company but also the security personnel themselves.There are ways to prevent the people in internet that want to intrude users privacy, one of the articles give tongue to that when the author access a website, he saw advertisement in the website and the ad said about an event and it takes place at the authors area, and so he tried to change the location of the computer and when he click the ad again, it shows a different area, area where the his computer set up, this kind of ad using the users IP address to track the user, so he figure it out by surreptitiousness or masking IP address using some software, this way, the user can protect their privacy effectivelyOne article talked about how IT security personnel deal with sensitive information in right way, first thing to do if to check whether they have signed a non-disclosure agreement that call for them to protect information that they overheard, if there are then protect it, second things to do is to ask themselves whether it is rational to the host company to expect them to hold such overheard conversation in confidence. If so, they should not spread the overheard information to anyone.Security training and educationWith many organizations are using internet, many users including unauthorized can access and dig out information. They need to train or educate their staff to protect organizations information by creating a system to secure the information from unauthorized users. Certified Information Systems Security Professional (CISSP) educates the staffs about how information security works, secure the information, and maintain the information safe and secured.Network security will have the staffs quickly respond to defend the attacks and have countermeasures. Following by investigate the weakness of the systems. It is not light to protect network security which is why they need to be trained. CISSP education consists of learning about database security, how the intruders intrude the systems, and the right countermeasures for a certain attacks.There is a survey regarding the intrusion to the US com panies, the unauthorized intrusions to their network increased 67% this year from 41% last year. The cause of intrusions mainly because of hacker attack, lack of adapted security policies, employee web usage, virus, employee carelessness, disgruntled employee, weak password policy, lack of software updates and software security flaw. IT managers also take part of the survey about which is the biggest intrusion in the future and they identified that viruses, spyware, Trojan, worms and spam are the biggest risk, followed by hacking, uneducated user about security, sabotage, and loss of information.A group called QinetiQ North Americas Mission stem Group, it provide security education and training to the users but before they train their user, they need to identify individuals mandatory training objectives, plan, develop and validate training materials and then they conduct an effective training to the personnel and at the end evaluate course effectiveness. bear outing against Intern et-based attacksInternet-based attacks can be very dangerous to the company a research said companies are losing an average out of $2 million in revenue from internet-based attacks which disrupt the business. The average of 162 companies said that they are suffered one crucial incident a year from worms, viruses, spyware or other security-related causes, and for for each one attack the systems were down an average of 22 hours. The threats will grow as the companies increase their use of internet.Defend against the internet-based attack can be done by using intrusion prevention and detection, they can detect the attack and the company can quickly defend against them. IDS will be looking for the characteristics of known attacks. IPS can recognize the content of network traffic and block malicious connection. Wireless intrusion prevention monitors the wireless networks, detect unauthorized access points and provide reporting and analysis. There are also basic things like firewalls an d antivirus that can be used to defend and there are many things that can be used to defend these kinds of attacks.Industrial espionage and business intelligence gatheringIncident response is an organized plan or procedures to handle and counter some threats like security breach or attack. Incident response plan includes a policy that discusses how to response to a certain threats, reduces recovery costs and time. Some of incident response goals are reduce the impact, prevent future incidents, verify that incident occurred, maintains Business Continuity, and improve security and incident response.There is incident response team in the organization that handles the incident response plan. Incident response team also needs another party in organization to help them, such as business managers, IT staff, legal department, human resources, public relations, security groups, audit and risk management specialists. Business managers make agreements with the team about their authority over b usiness systems and decisions if critical business systems must be shut down. IT staff help the team to access the network for analysis purposes and improve security infrastructure if recommended by the team. Legal staffs need to review non-disclosure agreements and determine site liability for computer security incidents. Human resources help to hire the teams staff and develop policies and procedures for removing internal employees. Public relations help to handle the media and develop information-disclosure policies. Security groups help the team to solve issues involving computer. Audit and risk management help to analyze threat.There are a several steps to response to the incident. First, the organization needs to prepare the staff by having the staff to do some training they need to be trained to response to the incident quickly and correctly and also educates the staff to update the security regularly. The response team has to identify whether it is a security incident or not and the team can also find some information about the current threats. Response team need to identify how far the problem has affected the systems and decide faster by shut down the affected system to prevent further damage. Then they need to find the source of the incident and remove the source. After that they need to restored the data from clean backup files, monitor them and upgrading the systems to prevent the same incidents in the future.Governance issues in information security managementSecurity governance is a system that directs and control information security. Governance itself means setting the objectives of the business and ensures them to achieve the objectives.There are several examples of governance issues, CEO of health south corporation said that more than 85 counts that include prank and signing off on false corporate statements that overstated earning by at least US $1.4 billion. Senior vice president and CIO of the company with the 15 other plead guilty. Anot her incident happened in an Ohio-based company that handles payroll and other human resources functions on a contract business which is already bankrupt, and they left wing their 3000 staffs without paychecks and reportedly that the companys client list has been sold.Personnel issues in Information secPersonnel security focuses on the employees involving policies and procedures about the risks the employees accessing the company information and prevents them from taking it. Threats in organizations are not only from the outside but also from the inside, which can make severe damages and costs.There are ways to prevent this from happening. Pre-employment checks are an act where the company will check whether the candidates have the qualification for employment, this way they will know whether the candidates have revealed important information about themselves. National Security Vetting determines whether the candidate is suitable to be given the access to sensitive information which can be valuable to the rival company. This process is usually included in the pre-employment checks.There are also responsibilities for each of some roles that involved in personnel security. Director has to make known and maintain policy guidelines for personnel security, decide the security access requirements and ensure that all the employees have been check into on their background and trained. Information Security Officer prepares the personnel security policy, monitoring the policy, and ensures that all the staffs are trained in computer security responsibilities. Supervisor need to speak with the user about the securitys requirements, monitor the policy, ensures that all the staffs are trained in computer security responsibilities, informs ISO when the staffs access need to be removed, tracking the staffs accounts when they create or delete the account. System Security Officer monitor compliance with the security policy, have the authority to delete systems password if th e employee no longer need access, tracking users and their authorizations. Users need to understand their responsibilities, use the information for only certain events, response quickly by informing the supervisor if there is intruder access the data and abused the information.Privacy issues in the company are also personnel issues. government is also responsible of the privacy of the staffs, because all the staffs records are kept in the organization. Personnel records cannot be seen by other staffs or outsider without the holders permission. Social Security Numbers are not allowed to become private password like email password. Eavesdropping needs to be limited, eavesdropping to the telephone conversation and voicemail are not allowed. monitor is allowed as long as the purpose is to keep the employees work, employees need to be informed early that they will be monitored. Medical records and background information are confidential no one can access them without permission excludin g the holders themselves. corporeal security issues in Information security corporeal security is a security that focuses on protecting the information, personnel, hardware and programs from physical threats. Threat that can cause a lot of damage to the enterprise or building is also things that need to be aware in physical security, for example, innate(p) disaster, vandalism, and terrorism. Physical security can be intruded by a non technical intruder.There are a lot of ways to protect from physical threats. Security can be hardened by putting difficult obstacles for the intruder including multiple locks, fencing, walls and fireproof safes. Putting supervisions like heat sensors, smoke detectors, intrusion detectors, alarms and cameras. There are key areas that need to be focused on. In facility security, they are entry points, data center, user environments, access control and monitoring devices, guard personnel and also wiring closet. For the company staff and the visitor, they need to be focused on control and accountability, use of equipment, awareness, security procedure compliance. Workstations, servers, backup media, and mobile devices need to be protected. Control, storage and disposal of information also need to be focused on.Physical security also issues hospitality industries. Example of hospitality industries are resorts, hotels, clubs, hospitals and also many other things. Physical threats that occurred in these industries are mainly theft, followed by assault, burglary, auto theft, robbery and sexual assault. If these industries experience this kind of threats, the industries can contribute to poor public relations.Company like IBM also offers physical and IT security. IBM Internet security Systems (ISS) products secure IT infrastructure with threat and vulnerability management, enabling business continuity and cost-effective processes. IBM integrate video surveillance and analytic technologies, the products can help reduce time and cost to co llect and store video and it also enable analysis of surveillance data. IBM also provide products for intrusion prevention, mail security protection of pass infrastructure, and also security intelligence which provide information about the threats that can affect the network.Cyber forensic incident responseOne of the primary objectives in incident response plan is to contain the damage, investigate what happen, and prevent it from happening again in the future. It is a bit the same as computer forensic because they need to reduce the damage and investigate the cause of it. By understanding how the data is accessed and stored can be the key to find the evidence that someone has tried to hide, erase, or destroy. The investigator needs to take care of their evidence, make sure that it is not lost, destroyed or changed.

Middle Cerebral Artery Aneurysm Identification

shopping center Cerebral Artery Aneurysm IdentificationMiddle cerebral artery is a actually greens site for aneurysm formation. MCA aneurysms represent 18-40 of exclusively intracranial aneurysms. MCAAS ar commonly divided into three assemblages proximal (M1As), bifurcation (MbifAs), or distal (MdistAs) aneurysms. Each group presents with distinct anatomic features that reserve an impact on their management. delegate MCAAs into a particular group can roughtimes be difficult since the length and caliber of the M1 discussion section often varies and there may be two or more major branching sites on its course. This has led to fallacies in sub-grouping of MCAAs with resultant high variability in the reported frequencies of the different subgroups M1As (2 61%) and MbifAs (39 90%), of all MCAAs 2, 3, 5-8. Preoperative identification of MCA aneurysm ascendant either at the primary(prenominal) MCA bifurcation (Mbif) or at anformer(a) branching situation has a great implicat ion on surgical cookery as different groups of MCAAs pose different challenges to the neurosurgeon requiring different surgical strategies.In this report, we present our technique for perfect identification of the MCA main bifurcation from other branching take downs on MCA as a describe for a more accurate classification of MCA aneurysms. Furthermore we suggest an extension to the classic MCA classification. Also, we present the distri notwithstandingion of 1309 MCA aneurysms as a part of the queen-sizest CTA anatomic study, so far, for MCA aneurysms. Our aim is to help recognize the branching pattern of MCA with special dialect on the exact characterization of MCA main bifurcation.Patients and methodsPatients and radiological dataData were retrieved from a prospectively collected database that unbowed encompassed all patients with intracranial aneurysms admitted to the Department of Neurosurgery at Helsinki University Central Hospital (catchment area, 1.8 million people). We set 1124 square patients with MCA aneurysms diagnosed mingled with 2000 and 2009. We excluded 115 patients from the study due to lack of adequate CTA (98 cases) or having non-saccular MCAAs (17 cases). The remaining 1009 patients with a contribute of 1309 saccular MCA aneurysms had adequate cerebral CTAs. The routine use of CTA (GE Lightspeed QX/i GE Medical Systems, Milwaukee, WI) started in the year 2000 and has been the basal imaging modality for cerebral aneurysms at our institution ever since. CTA is rapid, safe, readily available and can digest 3D reconstruction of vessels and bony structures. Each patients radiological images were stored in the hospitals central digital archiving system (PACS AGFA, IMPAX, version 4.5), launched in 1998, from which all of the relevant diagnostic images were recalled.NomenclatureFor each patient, pretreatment CTA images were evaluated and measured on screen (AGFA, IMPAX DS 3000). The MCA aneurysms were identified in each patient and cl assified according to the location of aneurysm neck in relation to the main MCA bifurcation (fig.6). MCA aneurysms were grouped into three groups M1As, aneurysms on the main trunk (M1) of the MCA, between the bifurcation of internal carotid artery (ICA) and the main MCA bifurcation MbifAs, aneurysms at the main MCA bifurcation MdistAs, aneurysms distal to main MCA bifurcation on M2, M3 or M4 separates. Then M1As were sub-grouped into 2 groups M1-ECBAs, aneurysms arising at the blood line of beforehand(predicate) cortical branches M1-LSAAs, aneurysms arising at the source of Lenticulostriate arteries. The M1-ECBAs comprised aneurysms arising at the job of proterozoic frontage branches (M1-EFBAs) and aneurysms arising at the origin of primeval impermanent role branches (M1-ETBAs).CTA for precise recognition of MCA main bifurcationFor kettle of fish of Mbif, we precisely examine the MCA branches in mesial views of CTA at the insular level and detect the insular short pa nts from statement and course then follow these trunks till their essential impact at the Mbif. This master copy examination must be correlated with examination of axial and coronal views for accurate confirmation. In some(a) cases with difficult branching and looping patterns, 3D reconstruction is necessary.CTA for accurate classification of aneurysms along MCA (figures 2-6)We examine the direction and course of the branches originating at the neck of the aneurysm in mesial views to know whether these branches are cortical or insular. Correlation with axial and coronal views and sometimes 3D reconstructions is necessary. Then we check the relation of this branching point to the MCA main bifurcation (the primary meeting point of insular trunks) for correct compartmentalization of the aneurysm.ResultsDemographicsThe mean age at diagnosis in our patient population was 54 years (range 13-89 y). The add up of women 690 (68%) doubled that of men 319 (32%). Aneurysms were more commo n on the Rt. MCA 732 aneurysms (56%) than on the lt. MCA 577 aneurysms (44%). In 466 (46%) Patients, there were one or more additional aneurysms totaling 1761 aneurysms. sort of MCA aneurysmsTable 1 shows the distribution of 1309 aneurysms along MCA. The subdue of aneurysms arising at the MCA main bifurcation (MbifAs) 829 (63%) doubled the total number of all aneurysms arising along M1 segment (M1As) 406 (31%). The distal MCA aneurysms (MdistAs) were the least frequent group only 74 (6%). virtually three quarters (77%) of ruptured MCA aneurysms and 57% of unruptured MCA aneurysms were turn up at the MCA bifurcation.Types of M1AsAneurysms arising along the main trunk of MCA (M1As) were grouped into 2 groups according the nature of the branches taking off at the base of the aneurysms. Among the 406 M1As, 242 (60%) aneurysms arose at the origin of early cortical branches from M1 segment (M1-ECBAs) while the remaining 164 (40%) M1As were non associated with early cortical branches but LSAs (M1-LSAAs). The aneurysms at the origin of early cortical branches (M1-ECBAs) comprised 178 aneurysms at the origin early frontal branches (M1-EFBAs) and 64 aneurysms at the origin of early temporal role branches (M1-ETBAs).DiscussionThe high variability in the reported frequencies of different groups of MCA aneurysms (M1As, 2-61% MbifAs, 39-90%)2, 3, 5-8 could be attributed to falsies in classification of these aneurysms and / or obtaining such incidences from excellent statistically unreliable series. In a trial to resolve this issue in a large statistically reliable non-selected group of MCAAs, We performed a retrospective anatomical reference study of CTAs for consecutive 1009 patients with 1309 saccular MCAAs aneurysms. We tried to find and follow the objective characteristics of branching points along MCA to be more precise when classifying MCA aneurysms. In our previous MCA publications 1-4, 9we have followed the classic classification of MCA aneurysms. Recognizing the importance and the deceptive appearance of the early cortical branches, we have added an extension to the traditional classification by subdividing M1 aneurysms into M1-ECBAs and M1-LSAAs. This proofed helpful to keep attention to this previously underestimated group of aneurysms arising at the origin of early cortical branches (M1-ECBAs).Preoperative identification of MCA aneurysm origin either at the main bifurcation or at another branching point has an implication on surgical planning especially for ruptured MCAAs as different type of MCAAs poses different challenges to the neurosurgeon requiring different surgical strategy1-3. Also when selecting the pass catcher vessel for bypass surgery if indicated to compensate for an inevitable vascular compromise during securing the aneurysm.MCA is classically subdivided into 4 segments the sphenoidal (M1) segment extending from ICA bifurcation to the main MCA bifurcation where insular trunks (M2) begins and course over the insula ti ll the peri-insular sulci where the opercualar (M3) segments start and course till the squint-eyed surface of the brain in the sylvian fissure then continue as parasylvian (M4) segments whose distal extensions are sometimes called the terminal (M5) segments 10-13. Although Yasargil apply the main MCA bifurcation as the demarcation point between M1 and M2 segments, Rhoton used the MCA genu at the limen insulae as the demarcation point between M1 and M2 segments, hence he had prebifuration M1 and post bifurcation M18, 14.Aneurysms along MCA are classically divided into three groups proximal (M1As), bifurcation (MbifAs), or distal (MdistAs) aneurysms. It is evident that the identification of the MCA main bifurcation is the key for accurate classification and grouping of these aneurysms. Although MCA anatomy has been widely described in standard anatomy, neuroradiology, and neurosurgery textbooks8, 15-17, it is still not uncommon to mistaken the identification of the main MCA bifurcat ion from other branching points along the main trunk of MCA peculiarly those associated with a large-caliber cortical branch. This misconception led to wide range of the reported length of MCA main trunk (0 -30 mm) and large differences in the reported relative frequency of M1As (2 61%) and MbifAs (39 90%) between authers2, 3, 5-8.Accurate identification of the MCA main bifurcationCrompton named the cortical branches arising from M1 segment proximal to MCA bifurcation as early branches. Yasargil and colleagues defined the origin of the large cortical branches arising proximal to the around lateral LSAs as ( sullen early bifurcation) and declared that aneurysms arising at this region of M1 could be mistakenly diagnosed as MCA bifurcation aneurysms. They stressed the importance of the LSAs in defining the site of the main bifurcation as the main bifurcation is usually find distal to the origin of LSAs 8, 12, 13. These early cortical branches are found in nearly 85 to 90% of hemis pheres 14.In the anatomical study for the early branches of MCA, Rhoton and colleagues found that the early branches arising on the proximal half of the main trunk of MCA resembled postbifurcation trunks of M1 in some aspects with possibility of being misinterpreted as postbifurcation trunks of the M1 leading to false localization of the main bifurcation. They could identify LSAs on M1 segment distal to the origin of these early branches. MCA main bifurcation was identified proximal to the genu in 82%, at the level of genu in 8%, and distal to the genu in 10% of hemispheres 14.It is obvious that the exact identification of MCA main bifurcation is the key for correct screen of aneurysms along the MCA. It is popular to subjectively accept a branching point close to MCA genu bounteous rise to the largest branches as the MCA main bifurcation. It is also not uncommon to feel more internal bureau when such a branching point holds an aneurysm to consider it as MCA main bifurcation. This might be correct in the majority of cases but unfortunately it would be misleading in some cases.The liking for identification of the main MCA bifurcation (Mbif) accurately is to find a constant criterion for Mbif which can be used as a hallmark for identification of Mbif from other branching points along the MCA with high certainity. Keeping into take heed that Mbif might share some characteristics (like size of out-coming branches, location in relation to MCA genu and relation to LSAs) with other branching points along MCA preclude accepting any of these characteristics as a hallmark for Mbif.The fact that all insular trunks (M2s) authentically originate from one point that is the MCA main bifurcation, means that the primary meeting point of all insular trunks (M2s) can be considered as a hallmark for Mbif. So, simply by identifying the insular trunks and following them proximally till their original meeting into one point, the Mbif can be localized accurately and with certaint y. Insular (M2) trunks cannot be identified by being the largest branches as early cortical branches are sometimes of the same caliber or even larger than the actual M2 trunks. M2 trunks run along the insula from the limen insula for a variable distance taking the superior and posterior directions. So by observing the direction and course of each of the branches originating from the MCA trunk in sagittal, coronal and axial CTA views, it go out be easy to identify the insular trunks and to follow them proximally till their authentic meeting at the Mbif.In fewer words, considering that the main MCA bifurcation is not always distal to the origin of LSAs or always proximal or at the genu, but it always gives insular trunks (M2s) means that identification of the primary starting signal point of these insular trunks will guide to the main MCA bifurcation. These insular trunks should be recognise by their course over the insula for variable distance not by their size as some early corti cal branches might be of similar or even larger size.Among all the aneurysms arising along MCA, those aneurysms arising from M1 segment at the origin of early cortical branches (ECB) are more likely to be misdiagnosed as a bifurcation aneurysm especially when the cortical branch is large and arises close to the MCA genu. The fact that early temporal branch becomes smaller as it arises closer to genu14means that it would not be common to misinterpret an aneurysm arising at the origin of an early temporal branch as a bifurcation aneurysm even if it is close to genu. at that place is no relation between the size of EFB and its distance from the genu. In angiograms, such large frontal branches catch very similar to post bifurcation M2 trunks. This shows understandably how some aneurysms arising at the origin of large early frontal branches (EFB) could be, if enough attention was not paid, misclassified as MCA bifurcation aneurysm especially when close to the MCA genu.Ulm et al.7 unexp ectedly found, in their anatomical retrospective study of MCAAs with special emphasis on those aneurysms arising from M1 at the origin of early cortical branches, that M1As arising at the neck of EFB were more common than MbifAs and they claimed that many of EFB aneurysms were misclassified as early MbifAs reasoning why MbifAs were reported in previous pubilcations to be the well-nigh common location for MCAAs. This was contrary to our and general experience of Mbif being the most common location for MCAAs 1-5, 13, 18.During this study, it was easy to sort some aneurysms along MCA, such as a small aneurysm at the origin of LSAs close to ICA bifurcation or a small aneurysm along M4 segment, precisely from the first look. Unfortunately, the biggest percentage of MCA aneurysms arose close to the MCA genu at some branching points which included early cortical branches, MCA main bifurcation and early furcation of M2 branches. This necessitated a lot of work to discriminate between these branches for precise sorting of MCA aneurysms. Moreover, some morphological characteristics of the aneurysms, such as large aneurysm size and complex projections, added to the difficulty for square-toed distinguishing of these branches. The task was more difficult for ruptured MCA aneurysms especially when associated with large ICH distorting the anatomy. On the other hand the availability of the 3D reconstructions, which made it possible to examine the aneurysms and MCA branches from different angles, together with the classic CTA views paved the way to accomplish our goal for sorting MCA aneurysms accurately with high degree of certainty.The present work shows, in harmony with our previous publications (table 3), that MCA bifurcation is the most common location for aneurysms along the MCA. The number of MbifAs 829 (63%) doubled the total number of all M1As 406 (31%) including those aneurysms arising at the origin of LSAs and those at the origin of ECBs. MCA bifurcation aneurysm s comprised 77% of ruptured MCA aneurysms and 57% of unruptured MCA aneurysms. Among the 406 M1As, 178 (44%) aneurysms arose at the origin of early frontal branches (M1-EFBAs). The diameter of the associated early frontal branch was half the diameter of M1 in 106 (60%) cases. We assume that such aneurysms, without wieldful examination, might be misclassified as MbifAs especially when the associated large EFB is close to the genu of MCA. Early temporal branches were associated with 64 (16%) aneurysms (M1-ETBAs). The remaining 164 (40%) M1As were not associated with early cortical branches but with LSAs (M1-LSAAs). (Table 2)At the end of this study we realized that many M1 aneurysms arising at the origin of large early cortical branches especially EFB could be sometimes misclassified as MbifAs, but Mbif is still the most common location for aneurysms along MCA. We agree with Ulm et al 7 for the possibility to mistaken EFB aneurysms as bifurcation aneurysms if much care was not paid, but we assume that their surprising results of EFB being the most common location for MCAAs came from the small number of the cases included in their study. (Table 4)ConclusionCareful objective analysis of MCA branching pattern from preoperative CTA is very important to understand patient-specific vascular anatomy which aids the surgeon to successfully exclude MCAAs from the circulation while preserving the environ vasculature. Although many M1 aneurysms arising at the origin of large early cortical branches especially EFB could have been misclassified as MbifAs in previous reports, Mbif is still the most common location for aneurysms along MCA.Figures legendsFig. 1 Identification of MCA main bifurcationCTA images (A sagittal, B coronal C axial D 3D reconstruction) demonstrating an early cortical branch aneurysm (white arrow) arising at the origin of an early frontal branch (green arrow) proximal to the main MCA bifurcation (yellow arrow) which gives frontal (red arrow) and temp oral (blue arrow) M2 trunks. The MCA main bifurcation (yellow arrow) is locate at the genu. The accompanying diagrams (E, F G) display how to accurately identify the main MCA bifurcation from other branching points along MCA just by following the insular branches back towards their primary meeting at one point that is the MCA main bifurcation. We are used to start the check in sagittal views then to confirm by rechecking the axial and coronal CTA views. 3D reconstructions are sometimes needed.Fig. 2CTA images (A axial, B coronal, C sagittal the same 3D reconstruction views (D, E F respectively) demonstrating an early cortical branch aneurysm (white arrows) arising at the origin of a large early frontal cortical branch (green arrow) just proximal to the right MCA genu. such an aneurysm can be subjectively misclassified as an MCA bifurcation aneurysm especially in coronal views, but in sagittal and axial views, the frontal branch (green arrow) is seen running anteriorly and supe riorly away from the insula. Also, the right MCA bifurcation (yellow arrow) is clearly seen distal to the genu giving frontal (red arrow) and temporal (blue arrow) insular trunks.Fig. 3CTA images (A axial, B coronal, C sagittal D 3D reconstruction) demonstrating an aneurysm (white arrow) arising at the main MCA bifurcation (yellow arrow) which gives frontal (red arrow) and temporal (blue arrow) M2 trunks. Notice the frontal cortical branch (green arrow) arising from the frontal M2 trunk (red arrow). The MCA main bifurcation (yellow arrow) is located proximal to genu.Fig. 4CTA images (A axial, B coronal C sagittal) demonstrating an early cortical branch aneurysm (white arrow) arising at the origin of an early frontal branch (green arrow) proximal to the main MCA bifurcation (yellow arrow) which gives frontal (red arrow) and temporal (blue arrow) M2 trunks. The MCA main bifurcation (yellow arrow) is located proximal to genu.Fig. 5CTA images (A axial, B coronal, C sagittal D 3D reco nstruction) demonstrating an early cortical branch aneurysm (white arrow) arising at the origin of an early temporal branch (green arrow) proximal to the main MCA bifurcation (yellow arrow) which gives frontal (red arrow) and temporal (blue arrow) M2 trunks. The MCA main bifurcation (yellow arrow) is located at genu.Fig. 6CTA images (A axial, B coronal C sagittal) demonstrating a distal MCA aneurysm (white arrow) arising at the takeoff of a frontal cortical branch (green arrow) from the left frontal M2 trunk (red arrow) distal to the main MCA bifurcation (yellow arrow) which gives frontal (red arrow) and temporal (blue arrow) M2 trunks. The MCA main bifurcation (yellow arrow) is located proximal to genu.

среда, 3 апреля 2019 г.

Fairy Tales Are The Favourite Bedtime Stories Cultural Studies Essay

king Tales argon The Favourite Bed eon Stories Cultural Studies Essay fag bol wholenessys be the favourite bedtime stories for infantile children peerless and only(a) of the reasons is because they feces check righteouss. Fairy records dedicate been around for centuries so far before they emerged as a literary genre of their own. Children the world e rattlingplace absorb been exposed to different fay relations and folklore.Fairy narratives stand excessively been know to be essential in a childs develop custodyt, because of its suitability to teach childly children moral value while servicinging children distinguish in the midst of rubrics that atomic number 18 good and deeds that ar evil, much(prenominal) as vengeance. Fairy tales accomplish this by casting protagonists as ordinary children with whom untried auditions can easily identify (Cashdan, 2000) in other words, children ar capable to relate with the protagonists of fe masculine monarch tales a nd as they argon just like roughly(prenominal) other children, except for their titles (Cashdan, 2000). Fairy tales throw off excessively been described by Bettleheim (1962) as cite cockeyeds by which culture is assimilated by children.Bettelheim (1976) suggests that our unconscious mind desires are expressed through with(predicate) faerie tales and sissy tales symbolize fatheaded hidden meats within our beings. For children, he asserts that sprite tales are a fantastic experience because the child feels understood and appreciated incomprehensible down in his feelings, hopes, and anxieties, without theses tot eithery having to be dragged up and investigated in the harsh brightness level of a rationality that is still beyond him (Bettelheim, 1976). Christians (2009) summarizes this as fe priapic monarch tales are to a greater extent naturally suited for children because children can fill a deep mental need with stories.Fairy tales be guard to a fault received incre asing investigate as a literary genre because of its influence on children who have been exposed to pouf tales from a three-year-old age. Fairy tales, particularly westbound European fay tales have secured a unique place in literature written in English because they have entered our cultural stenography via the popularity of English translations of the works of Perrault and the Brothers Grimm as bearing atably as Disney movies (Schanoes, 2007) making pansy tales a fairly an integral part of childishness. It is similarly because of the popularity of western European pouf tales that Christians (2009) derives that tabby tales can now be defined on their own while receiving considerable scholarly attention due to its general influence.On the other hand, libber writers have cited cigarette tales as an effectual means of submitting women to the values of a old steep bon ton, particularly through delineation the poof tale heroines as beautiful and passive. Fairy tale s as a literary genre have similarly been employ in Western cultures to safeguard the values and conventions of its gray societies (Comtois, 1995). These values and conventions embedded in pouf tales, Comtois illustrious, were self-consistent with the values that were enforced during the times the tales were written. Fox (1997) nones how the effeminate looker can be seen as a normative means of affectionate control whereby tender control is accomplished through the internalization of values and norms that serve to restrict womens lives. Doll (2000) similarly states that good girls become idealized, amend objects, pedestaled for the males gaze, promote enforcing that women are shaped into characters that are appealing to males.Many libber writers such as Freed valet (1986), Fox (1977), Dellinger and Williams (1997), Baker-Sperry and Grauerholz (2003), and Stone (1985) have noned how fairy tales, particularly princess-themed fairy tales, ofttimes employ the picture of distaff yellowish pink as a means of control over women by men and the senile societies in which we live in. bang is a key element in the lives of many women who spend time, resources and effort in the avocation of the ideal kayo, most often d heroic poemted in numerous media. Women inexorable gain to pursue the feminine looker ideal, which is viewed largely as an oppressive, olden practice that objectifies, devalues, and subordinates women (Baker-Sperry and Grauerholz, 2003).Despite this, many women continue to strive for beauty, believing that it plays a major social mathematical function in their lives. Backman and Adams (1991) and Suitor and Reavis (1995) assert that beauty is one of the main focussings self-esteem and social lieu are shape uped by cardinal-year-old women and adolescent girls. Women non yet want to be beautiful for self-gratification, but also for social gets, particularly the approval and idea by men, whereby according to Freedman (1989), w omen are aware that beauty comes to a great extent with men and they so work hard to discover it.The frequent portrayal of women uprightly as pretty things to look at often stool stereotypes that women are exactly that-beautiful dolls who are meant to be seen, and never heard and all those who do non adhere to such femininity are incapable and lacking. Dellinger and Williams (1997) found in their shoot Makeup at work Negotiating appearance rules in the workplace that women who wear makeup in the workplace are seen as healthier and more than competent while those who do not are seen in a banish light. Women who achieve a elevated degree of attractiveness are mentally and socially rewarded (Dellinger and Williams, 1997 Hatfield and Sprecher, 1986).This patriarchal society where women are meant to pursue the ideal feminine beauty is mirrored very heavily in fairy tales, especially princess-themed fairy tales, where beauty is often the only power granted to the heroine (Chr istians, 2009). Jorgensen (2012) declares that beauty is not only associate with success of the heroines in fairy tales but also with character. Fairy tale princesses like Snow White, Cinderella and sleeping Beauty all rely on using their beauty to entice a prince to liberate them from their burdens enactment the man as the only key to women to free themselves from problems and to upgrade their social status.The way most classic fairy tales depict women is capable of exposing young children to womens role stereotyping. accord to Comtois (1995), libber writers such as Lieberman (1972), Bottigheimer (1987), Stone (1985), and Tartar (1987) have contended that folklore has at least allow fored in the perpetuation of stereotypes in society. These libber writers also assert that traditional fairy tales have not only served as a mirror of society but have been intentionally utilise to promote societal values which often depict grammatical sex activity roles in narrow, pre modeld ways (Comtois, 1995). Feminist scholars often consider females in fairy tales to be too passive, pretty, and domestic (if protagonists), or alternately too wicked, ugly, and inhumane (if antagonists) (Jorgensen, 2012) and these passive, pretty fairy tale heroines receive rewards when they adhere to said roles (Gauntlett, 2002).1.1 logical argument of the ProblemWhile research on fairy tales is not smart (with studies of fairy tales dating back as far as the nineteenth century and primaeval 20th century), its research is not widespread, though gaining pulsation because of the popularity of Western European fairy tales. Research on womens lib and sexual activity stereotyping in fairy tales have dated back as early as the 1960s with Bettelheims Use of Enchantments (1962) and Heuschers (1963) A Psychiatric Study of Fairy Tales Their Origin, Meaning, and Usefulness for example.Much of feminist fairy tale researches focus in the main on the familiar stereotyping of women in fairy tales, as carried out by feminist writers such as Bottigheimer (1987), Stone (1985), Comtois (1995), and Baker-Sperry and Grauerholz (2005). Some research also focuses on the negative bear upon of fairy tales as found in Stones 1985 study The misuse of enchantment Controversies on the significance of fairy tales. According to Stone (1985) stereotypes are engraved in the perceptions of young women from early childhood and it is affirmable that as these young girls progress into young adults, the sexual activity stereotypes created in their childhood leave still persist and perhaps result in negative effects regarding their perceptions of gender roles and stock-still confidence and self-image.This study aims to pause the impacts of fairy tales on young adult males who have been exposed to fairy tales, particularly princess-themed fairy tales, to determine what kind of gender stereotypes have been c erstwhileptualized and their perceptions towards gender roles depicted in fairy tales. This study also aims to determine whether womens liberation movement has had an impact on altering the stereotypes created by fairy tales.Moreover, some(prenominal) of the feminist researches focus more on womens responses and trusts towards fairy tales and these researches are mostly conjectural in nature. Previously, there have been two researches conducted on the impact of fairy tales on people Kay F. Stones 1985 study which involved a sample consisting of women, children, and men and Rita Comtois 1995 study which featured a sample of women only. According to Comtois (1995), contempt a number of feminist writers who have studied the potential impact of sexual stereotyping in fairy tales (Bottigheimer, 1987 Stone, 1985 Tatar, 1987), the majority of their opinions are imaginary, based on conclusions gaunt from and implications of a fairy tales scene on its auditory modality.This study allow for be confusable to Rita J. Comtois 1995 qualitative study of the perceive d impact of fairy tales on a group of women. This study lead also be similar to K. F. Stones 1985 study on the impact of fairy tales, which she conducted in a series of interviews, with a sample of forty-four people, whereby 6 of her respondents were boys. While Comtois research explored the psychological impact fairy tales have had on a female audience which has reached adulthood, this study result instead use a male audience as the sample.With the use males as the respondents, this study, which adopts a feminist approach, it will be possible to collect data on the opinions of males on the topic without resorting to speculative theories. The results of this study whereby a bigger male sample is apply, as tuneed to the 1985 study carried out by Stone (with only a slender sample of 6 males), it will also be possible to gain more insight into what males think without resorting to conjectures.Purpose of this studyThis study aimsTo determine the effects of icon of fairy tales fr om an early age on young male adults regarding the way they perceive stereotypical gender roles.To establish whether the gender stereotypes in young male adults have slowly changed over time or are carried well into adulthood due to these effects of exposure to princess-themed fairy tales.To determine how feminist views have altered and changed the way young adult males view the stereotypical female characters depicted in fairy tales and women in real life.Research questionsAt the end of this study, the researcher hopes to tell the following research questionsWhat are the effects of exposure of fairy tales on young adult males regarding their perspectives of stereotypical gender roles?How have the effects of exposure to princess-themed fairy tales on young adult males from their youths persisted over time?How have feminist views changed the perception of gender stereotypes holded in young male adults regarding female characters depicted in fairy tales as well as cleaning lady in r eal life?1.4 Significance of the StudyThe results from this study will succor to increase the knowledge and awareness on the impact of fairy tales on the phylogeny of stereotypes of women in young adult males who have been exposed to fairy tales at a young age. From the study, it will also expand the knowledge base on what kind of gender stereotypes are formed and whether they are identical to the stereotypical characteristics of women (particularly princesses) that have been depicted in fairy tales. It will also help to shed some light on whether these stereotypes have degraded over time in the expectation of young adults, whether they have applied these stereotypes onto women in real life, and whether the onset of feminism has in turned further altered these stereotypes.If the gender stereotypes formed through the exposure of fairy tales from an early age still persist passim the lives of the respondents well into their young adult years, then it will show that fairy tales do have a lasting impact on young adult males. The results of study will provide more insight into how much fairy tales have affected young adult males and what kind of stereotypes have formed as a result of fairy tale exposure. apart from that, based on the results from this study, it will shed some light on whether young adult male still hold stereotypes towards feminine beauty and women (whereby women who make an effort to enhance their appearance are more valued than those who do not) as suggested by Dellinger and Williams (1997) as well Hatfield and Sprecher (1984). Instead of rough drawing conclusions from theoretical analysis and assumptions of what kind of impact fairy tales have on men, the data collected from this study will provide will help to clarify what sort of stereotypes that males really have towards women as a result of exposure to fairy tales.1.5 Scope of Study and MethodologyThe independent inconstant of this study is the princess-themed fairy tales. The depende nt variable would be the responses provided from the respondents towards the princess-themed fairy tales text. The scheme of this study is that fairy tales do have some impact on the formation of gender stereotypes in men.In this study, the respondents will be male Faculty of Arts and Social Science students studying in UTAR. A total of 50 respondents will be chosen through two consume methods to participate in this study where respondents will be involve to answer an online questionnaire based on their cognitive knowledge of fairy tales. The kickoff will be the purposive sampling method which is a form of non-probability sampling technique by which the researcher chooses the sample based on who they think would be appropriate for the study.The second method used will be snowball sampling, a non-probability sampling technique where the participants that have already been selected will be asked to recommend new respondents from their friends and acquaintances. In this study, pur posive sampling will be used because the selection of respondents will not be random as only male respondents will be chosen and the snowball sampling method is used to gain access to a larger sample of young adult males.1.6 Limitations of the studyThis study will be conducted among Faculty of Arts and Social Science students in UTAR, which would mean that the scope of respondents is limited as the findings cannot be generalized to all students.In this study, there will be no equal distribution of race, so it would not be possible to examine the different responses among races and cultures. Moreover, this study will only focus on princess-themed fairy tales, namely Snow White, quiescence Beauty, and Cinderella. Therefore, the finding cannot be generalized with other non-princess-themed fairy tales.Furthermore, the use of an online questionnaire, despite its advantages, will not guarantee absolute control over the respondents. additionally the use of snowball sampling might result in handle anchoring, whereby there is a lack of definite knowledge on whether the respondents are from the intended target group. Time constraint is also a boundary in this study. With a set time limit allocated, it was not possible to gather more thorough data for more conclusive findings.1.7 operating(a) Terms1.7.1 Fairy TaleA fairy tale, according to Anderson (2000) can be defined as short, inventive, traditional tales with a high moral and magical content. Heuscher (1963) defines the fairy tale as a account which is not based on historic persons or events, as opposed to an epic or saga.1.7.2 Gender StereotypesGender stereotypesare simple generalizations closely the gender attributes, differences, and roles of individuals and groups. Gender stereotypes are widely held tenets about the characteristics and behaviour of not only women and men but also transgendered people (Manstead and Hewstone 1995) which suggest how men and women should and should not behave. These stereotyp es can be positive or negative, but are rarely accurate.1.7.3 FeminismFeminism is the championing of equal rights for men and women. It is defined as the belief in the social, political, and economical equality of the sexes (Rowe-Finkbeiner, 2004) such as the right to select pursue a career and to have equal social status.1.7.4 womanly beauty idealFemininity is a set of womanly qualities, behaviours, and roles for the most part associated with girls and women. Baker-Sperry and Grauerholz (2003) define the feminine beauty ideal as the socially constructed impulse that physical attractiveness is one womans most key assets, and something all women should strive to achieve and remark.1.8 Organization of the ThesisThis study consists of a total of v chapters, which are Introduction, Literature Review, Methodology, Findings Analysis, and Discussion Conclusion.The Introduction, which is the first chapter, calles the background of study, statement of problem, purpose of study, res earch questions, significance of study, scope and limitations of study, the definition of key terms and the shaping of the thesis.The second chapter, Literature Review, will outline the definitions of fairy tales, feminine beauty ideal, gender stereotypes, as well as men and their negative reception towards feminism. Additionally this chapter will also explore some of the introductory feminist critiques on fairy tales, the feminine beauty ideal, and gender stereotypes investigate the kin between fairy tales and feminism through past research, and briefly address the correspond study.The third chapter, Methodology will explain the research design, sampling, instruments used for data gathering, the pilot study, procedures, and the data analysis.The fourth and fifth chapter will present the findings and discuss its significance in relation to the study as well as provide recommendations for further research and conclusions respectively.CHAPTER II LITERATURE round off2.0 Introduc tionThis chapter will highlight more on the definitions of fairy tales, feminine beauty ideal, gender stereotypes, as well as men and their negative reaction towards feminism. Additionally this chapter will also explore some of the previous feminist critiques on fairy tales, the feminine beauty ideal, and gender stereotypes investigating the descent between fairy tales and feminism through past research.2.1 Fairy talesIn order to find out about the impact of fairy tales on young adult males, it is first crucial to understand the meaning of fairy tales as well as their purpose in society, and the relationship between feminist criticism, fairy tales, and society-which first begins with the question What is a fairy tale?2.1.1 What is a fairy tale?A fairy tale is a very powerful literary piece that undoubtedly resonates throughout the entire world as everyone has been exposed to fairy tales at one point in their lives, most notably during their childhood. Rohrich (1986) describes fairy tales as one of the deepest and most enduring childhood impressions.If one were to be asked to define a fairy tale, no doubt it would be described as a story with magical elements where a hero does a good deed while rescuing a princess in between, thus saving the day. According to Anderson (2000), fairy tales can be defined as short, imaginative, traditional tales with a high moral and magical content. Heuscher (1963) defines the fairy tale as a narration which is not based on historic persons or events, in contrast to an epic or saga. Jack Zipes (2012) has described the fairy tale as both an elaborate and simple narrative.Various fairy tale scholars consider fairy tales to be highly structured fictional stories wherein youth protagonists attain riches, marriage, and social justice by means of cleverness, beauty, endurance, and magic (Christians, 2009). However, even with all the definitions provided on fairy tales, it has been renowned that fairy tales cannot easily be defined. Rachael Burkholder (2011) explains that even within the genre itself, there are minor discrepancies in definitions, make overlap within the definitions and such variations within the genre make expire definitions difficult. Author J.R.R. Tolkien has also confessed to being a fairy tale sports fan though he uses the term fairy-stories instead. Tolkien himself has found difficulty in delimit fairy tales or fairy-stories in his study On Faerie StoriesYou will turn to the Oxford English Dictionary in vain. It contains no reference to the conclave fairy-story, and is unhelpful on the subject of fairies generally. In the Supplement, fairy-tale is recorded since the year 1750, and its prima(p) sense is said to be (a) a tale about fairies, or generally a fairy legend with developed senses, (b) an unreal or incredible story, and (c) a falsehood. (Tolkien, The Tolkien Reader, 1966).2.1.2 The purpose of a fairy taleIt is also important to understand the purpose of the fairy tale. The goa l of the fairy tale is to describe the marvellous and mysterious that is, happenings which transcend everyday reality and as such are impossible to study by any scientific method (Comtois, 1995). Cashdan (2000) states that fairy tales are more than suspense-filled adventures that excite the imagination, more than mere entertainment Cashdan stresses that while the initial attraction of fairy tales may be for entertainment and enjoyment purposes, its lasting value lies in its power to help children deal with the internal conflicts they face in the course of growing upThe fairy tale genre has roots deeply embedded in the traditions of oral tales, myths and legends (Christians, 2009) and many scholars severalize fairy tales with folklore narratives-which are the various genres such as legends, fairy tales, myths, epics, ballads, folktales and so on (Christians, 2009). The emergence of the fairy tale as a literary genre has been fairly recent the fairy tale has evolved through many cult ural changes, making it one of the more diversified genres (Christrians, 2009). While many people of today often classify fairy tales as childrens literature, these stories were in fact intended for adults instead. However, the tales have been fitting and revised for children because they are a suitable medium for teaching morality (Christians, 2009) because children find it easy to identify with the protagonists in fairy tales, whom they regard as ordinary and therefore similar to themselves (Cashdan, 2000).It is because of this that fairy tales, particularly fairy tales by the Grimm brothers in the nineteenth century were originally used as primers for relatively affluent European children and served to impart moral lessons to them (Zipes, 1988a as cited in Baker-Sperry and Grauerholz, 2003). Bettelheim (1976) has also noted how fairy tales manage to connect with children on a deep psychological level, as opposed to adults, where he argues that for adults, the fairy tale motif s are something one is better off understanding rationally so one can rid oneself of them. As Zipes (2002) states, Most fairy tales are an imaginative depiction of healthy human development and help children understand the motives merchantman their rebellion against parents and the fear of growing up.Today, fairy tales especially those that have survived the evidence of time are one of the most widely read genres in the world. They are actively read by children across the globe and its readership transcends the borders of social class and racial groups (Zipes, 1997) while continuing to contain symbolic mental imagery that legitimates existing race, class, and gender systems (Baker-Sperry and Grauerholz, 2003).2.1.3Fairy tale as a mirror of societyIt is generally recognized by fairy tale scholars such as Jack Zipes (1988), Kay Stone (1985) and Maria Tatar (1987) that fairy tales have been known to reflect the culture and values of the society of their time. As fairy tales are one of the most influential forms of literature, one of the more important purposes of fairy tales was to teach children good moral values as well as the norms of society.Bettelheim (1976) suggests that fairy tales symbolize deep hidden meanings and desires within our unconscious mind, therefore it is much easier for children to identity with fairy tales as children can fill a deep psychological need with stories (Christians, 2009). Folklorists thus utilize fairy tales to circulate the cultures and traditions acceptable in society to young children. According to Glassie (1999), folklorists learn to stress transmission and to think of traditions as things, items, as song texts and quilt patterns passed from propagation to generation.Considering the impact of fairy tales on young children, it is not surprising that fairy tales have been made into a medium used to imprint sought after gender roles before being transmitted to the young. Therefore it should also not be unforeseen that ch ildrens literature contains messages, both implicit and explicit, about controlling power structures in society, particularly about gender roles (Clark, Lennon, and Morris, 1993 Crabb and Bielawski, 1994 Kortenhause and Demarest, 1993 Weitzman et al., 1972 as cited in Baker-Sperry and Grauerholz, 2003).With the rise of technology in the 18th century due to the development of the printing press, the publishing power and distribution were in the hands of the noblesse and the bourgeoisie (Comtois, 1995) who had originally considered fairy tales to be lacking in morals for their failure to promote hallowed virtues such as order, discipline, and modesty which were indispensable to cultivate and thereby train newly rising capitalist interests and which were consistent with the Christian ethic (Comtois, 1995). In order to keep with the socio-political era in 19th century Germany, many tales were sanitized and adapted by the Grimm brothers.Zipes (1988a, 1988b) had noted that apart from teaching young children appropriate values and attitudes of the time, fairy tales were also intended to teach young girls and women how to become responsible, domesticated and attractive to a marriage partner during the 18th and nineteenth centuries. Bottigheimer (1986) also found that tales strengthen womens silence, a cultural preference at the time-a trait noticeable in fairy tale heroines who often stay silent and only give tongue to in response to a question posed by a male character.2.1.4 Feminism, Fairy tales and Patriarchal SocietyOne of the main concerns of feminist scholars is the way traditional fairy tales are used by patriarchal societies to promote narrow, predetermined views on gender roles whereby women are portrayed in a shallow light.Feminist writers like Lieberman (1972), Bottigheimer (1986), Stone (1985), and Tatar (1987) maintain that fairy tales have resulted in the formation of gender stereotypes. Women are evaluate to behave like fairy tale heroines and t hus be seen and not heard-they are expected to be pretty, passive, domesticated and silent.It is a common opinion among feminist writers that fairy tales are indeed a tool used by men in patriarchal societies to impart what they think is considered as beseeming behaviour for women, setting the blueprint for what they see as proper gender roles in society. Therefore, fairy tales are used to shape and pattern women to conform to the patriarchal values and norms or simply as a form of control on womens behaviour.Taking a closer look at the use of fairy tales to promote norms and values that are viewed as acceptable in a patriarchal society, Tatar (1987) uncovered some interesting details about fairy tales, front to and after the eighteenth and nineteenth centuries. In her 1987 work The hard facts of the Grimms Fairy tales, Tatar notes that prior to the 18th century, male and female Cinderellas were found in equal frequencies in European folklores. The male counterparts of the presen t-day female fairy tale heroines were not limited to Cinderella alone-documentations of male Snow Whites were also found in Turkish folklores as well as a Russian male Sleeping Beauty (Tatar, 1987).From this knowledge, it is rather interesting to ponder on the reason for the sharp drastic change in the role of the rescuer and the rescued. When early European folktales have promiscuously placed women in the roles that, in todays patriarchal society, would conventionally be bestowed on males, Tatar (1987) prompts us to think twice about male hero patterns when we come across a collection of tales depicting heroines who carry out tasks normally put to male heroes alone or who denounce fathers too weak to protect them from evil stepmothers.2.1.5 Female heroines and patriarchal societyConsistent with the values of the era, the Grimmss tales made it clear that domestic talents were a heroines ideal (Comtois, 1995). However, Tatar (1987) questions the motives of the Grimm brothers, who w ere responsible for collecting, rewriting and adapting the folklores for the German audience to ensure that the folklores to fit in with the morals, values and norms in 19th century Germany.Women, who were once revered as brave and worthy, were suddenly reduced to the role of damsels in distress morphing into what Kohlbenschlag (1988) refers to as the formula female. The formula female, according to Kohlbenschlag, has two personas-the preferable object, and the woman who is geared to live for another person (Comtois, 1995) she is a woman who will sacrifice her own needs in order to achieve these two personas.Atkins (2004) states that fairy tale heroines like Snow White, Cinderella and Sleeping Beauty are schooled through their gender constructions, must participate in patriarchal society because their happiness depends on conformity to its rule (Zipes, 1983). Atkins further asserts that these fairy tale heroines are left with no choice as they have no right to challenge their roles as idealized women.There are fairy tale females who do not fit into the passive, obedient syndicate and as these female characters fail to conform (Zipes, 1983), they are typecast as wicked women. These are the wicked female antagonists that we see in fairy tales-mothers, step-mothers, stepsiblings, and evil witches. These women are punished at the end of the tales for their contravention (Mueller, 1986) against the good-girl heroines (Atkins, 2004), normally during, immediately after or before the wedding of the heroine princess. This, according to Atkins (2004) makes it clear to readers of fairy tales that the choice is simple-conform to the norms of patriarchal society or suffer the consequences.Atkins (2004) further states that conformity is the key to the kingdom where women must submit themselves to the patriarchal rule, because they are compelled to do so (Rowe, 1979 Atkins 2004). According to Rowe (1979), fairy tales perpetuate the patriarchal status quo by making female s ubordination seem a romantically desirable, indeed and inescapable fate.2.2 Gender StereotypesGender stereotypes are also an important key term in this study as the main target area of this research is to explore the effect of fairy tales on the formation of gender stereotype