Wednesday, October 30, 2019

Effect of Bullying in Childhood on the Future of a Person Essay

Effect of Bullying in Childhood on the Future of a Person - Essay Example The difference between the children influences them towards such activities and there is an every chance to become an irresponsible adult. This is an unwanted scenario in the children and it has to be avoided to save the future of them and to carve them as a responsible citizen. There are some causes for the children to become bully. The family relations and gender differences as well as humiliations affect their psychology. The influences of the friends' psychology also attract the children and it affects their behavior as an adult. Another reason that affects them is humiliation through bullying. Some of them are being humiliated by the people in the environment and being bullied will be hurt and psychologically became more bully than the other children and they want to take revenge on the society. The above aspect results in affecting the behavior of the person in the future. Hence demographics can be taken as third variable that depends on parents, friends as well as all the peop le in society and decides the humiliation with which the child meet as part of his daily activities (Hee-Soon Juon, 2006). Hence, the variables considered are; environment, age, demographics The children considered in this paper are the ones investigated by academic researchers from Washington and Indiana Universities. According to a study, the children who are witnessing the violence at home become bully by themselves. The quarrellings between the parents or siblings influence the children and in turn affect their behavior as an adult in future. Lead researcher Dr. Narissa bauer opines that the children imitate the elders and they also want to behave like them and this brings out the reasons for the peculiar behavior in children. Hence, in this case the first variable environment plays the major role in children being bullied. One can have an assertion that imitation attitude in children may lead to abnormalities of their behavior in future and this aspect consolidates the fact that the environment is an variable to consider as imitation depends on it. Parents are role models for the children and as a result they follow their behavior. If once they believe or attracted towards violence they will walk in that path only to enjoy themselves. They may think that 'If daddy is beating mummy and bring her to his control I too can beat my friends and they also will become obedient to me and I can control them'. As a result the child turns to be a bully in the future and tries to control everything and everybody by bullying. The study came to conclusion that the 97% of the bullish children were victims of the home violence and as a result, one can blame the environment for bullying the children. The affect of bullying on children according to environment and age even considers the demographics as the affects are studied according to the people the children faced in their daily life (Alexandra Lupu, 2006). Bullish Impact on the Future of Children of Different Ages According to the study of Duncan B. Clark the behavior of children who are subjected to bullying is completely different than the other sober children and depends on age. They behave rudely in future if they are bullied in teenage and may turn into cowards or introverts if

Sunday, October 27, 2019

A Study Of Computer Ethics Violation

A Study Of Computer Ethics Violation There has been a widespread use of ICT in teaching and learning process. Computer is one of the most technologies used in learning activities by students in universities throughout the world. It is a mean to facilitate learning, improve academic success, provide access to many resources and give opportunity for communication (Kay Lauricella, 2011). Even though the computers provide students with advantages, they might also lead to several ethical problems. There is extensive unethical usage of computer among students. Kuzu (2009) stated some of these unethical computer using behaviors such as using unlicensed software, copying files or programs without authorization, contempt of peoples work, accessing personal information of people and publishing this on the Internet without authorization, communicating on the Internet in disrespected way, downloading of others files and e-mails, opening adult web sites and sending viruses. These are some of the unethical practices of computer which lead to the build a big construct that is computer ethics. Martin and Yale-Weltz (1999) stated that there are characteristics caused by computer use namely: new concerns emerge rapidly, computer ethics, and computerized information. The term of computer ethics refers to a part of social and humanistic studies of computing (SHC) which is theoretical of the way in which different forms of information technology shape these computer ethics which have been developed to address individuals or social systems (Breij, 2001). On the other hand, Shelly (2010) is more specific and described the term computer ethics as ethical guidelines that lead people to the right way of using computers and information systems. Moreover, Barnard, de Ridder and Pretorius (2003) state that computer ethics is the study of behavioral activities of IT professionals that is useful for all of society. Baase (2003) definition is quite closely to Barnards definition and describes computer ethics as a list of professional ethics same as medical, legal, teaching and accounting ethics. Computer ethics aim is to make decisions that depend on criteria of ethics, and then to provide more generalized ideas in terms of theoritical evaluation, ethical insights, normative standards, educational programs, legal advice and so forth (Floridi Sanders, 2002). Ethical issues are very essential in every society. The increased growth of computer usage has been generated a lot of questions of what is good and is not good ethics regarding the activities of computer use. Therefore, there are some organizations that pay attention in social and ethical results of extensive computer usage such as Association for Computing Machinery (ACM), Institute of Electrical and Electronics Engineers (IEEE) Computer Society, the Data Processing Management Association (DPMA). ACM is one of these organizations which is special interest group that address the side effects of using computer and its aim is to raise awareness about the impact that technology has on society (ACM, 2012). In this case, AC M has established a code of ethics and professional conduct in 1992. It is clearly that computer has become a part of the educational environment which students use it as research and communication tool. At the same time, using computer has created ethical problems and violation of computer ethics is on the rise (Maslin, Zuraini Ramlah, 2009). In other word, there are different practices that students do and relate to the use of computer unethically. As Frestone and Mitchell (2004) stated that downloading music, movies and software is unmoral due to the copyright issues. Moreover, students are generally more tend to pirate software and other intellectual property (Kini, Ramakrishn Vijayaraman, 2004). Intellectual property is mind creation, names, designs, etc. It is divided into two types: industrial property and copyright which includes poem, films, designs, music and games. Maslin, Zurainy, Rashidah, Ramlah and Norshidah (2010) found that a round more than half of students are aware of abuse of computer ethics in terms of intellectual property and privacy. Therefore, there are a lot of discussed sites of computer and networks. Information privacy, intellectual property rights, code of conduct and green computing are some examples of those sites (Shelly, 2010). In addition, Namlu and Odabasi (2007) build an unmoral computer using behavior scale (UECUB) to define unethical computer behaviors. A factor analysis of the related items discovered that the factors can be categorized into five groups; intellectual property, social impact, safety and quality, net integrity and information integrity. Based on the experts in the field of computer security, universities are one of the lowest secure places (Maslin Zuraini, 2008). Furthermore, academic dishonesty in these days technology is classified as an issue for higher education (Underwood Szabo, 2003). Scheyvens, Wild and Overton (2003) found that the level of plagiarism is in high level in graduate students more than in undergraduate students because of the high degree of demand for critical and analytical writing. Therefore, different groups of people whether they are organizations or individuals have become more concerned about ethical issues caused by interconnected world (Martin Woodword, 2011). IIUM is a unique university all over the world. It integrates traditional and moral values in the all modern areas of disciplines. The essential aim of establishing IIUM is to generate international center which can combines beneficial knowledge and Islamic values in all types of disciplines which can lead to the right way of Ummahs leading role in variety fields of knowledge (IIUM philosophy, 2012) According to Tun Sri Mohd Sidek Hj Hassan (The president, IIUM Community), IIUM must be highly ethical even as it strives excellence (IIUM Code of Ethics, 2008). Concerning this, As an Islamic- oriented institution, IIUM students are expected to be ethical concessionaires at all time. IIUM has established the IIUM Student Code of Ethics which is a code of practices depending on the strong basic of Islamic values with a view to gaining a high level of morality in commitment with IIUMs core values namely, Integrity (trustworthiness), Justice and Fairness, Adab and Professionalism. IIUM Code of Ethics defines integrity (Istiqamah) as trust (Amanah) and stresses the need for sincerity, accountability, justice and transparency in all academic conduct (IIUM code of Ethics, 2008). Besides that, IIUM is committed to supplying a wide range of internet services to all its population and facilities by providing access to broadband and wifi to all its members whether they are students or staff as well as providing them with a number of computer laboratories in each Kullyah. Based on these services, students use computers whether they are university computers or their personal computers in their university or personal lives. In IIUM, There are several Kulliyyahs the Kulliyyah of Information and Communication Technology (KICT) is one of its kullyyahs which was opened in November 2001. Since that time, KICT has produced knowledge workers who have a variety of ICT skills and knowledge and Taqwa of Allah. KICT offers Cyber Law and Islamic Ethics (INFO 4502) as Kullyyah required course for all students to equipped them with more information of ethical computer use (KICT, 2005). At the same time, the Institute of Education (INSTED) is one of Malaysias top education schools in IIUM. It offers a wide range of undergraduate and postgraduate courses in different specialization. INSTED provides the strategies that reduce the gap between theory and practice (INSTED, 2012). Unlike the KICT, INSTED does not offer Cyber Law and Islamic Ethics as an Kulyyah required course. In this case, students are not familiar with the ethical practice of computer use. Recently, some studies have conducted in IIUM related to assess the ethical behaviors in terms of academic integrity practice and computer ethics among IIUM students. To clarify, Moshood (2010) conducted his study to examine the IIUM students perceptions toward academic integrity practice. Integrity practice in the IIUM campus was determined by two important sub- constructs (awareness of academic integrity policy and commitment to academic integritys implementation). On the other side, Maslin, et al. (2007) investigated the awareness of computer use among undergraduate computer science students from UTM and IIUM. Generally, many researches have been done in computer ethics field. The large number of these studies conducted to investigate students awareness and perceptions of computer ethics and ethical beliefs (Adebayo, 2005; Akbulut, Usal, Odabasi Kuzu, 2008; Acilar, 2010; Jabour, 2011; Maslin Zuraini, 2008; Maslin, Zuraini Ramlah, 2009; Molnar, Kletke Chongwatpo, 2008; North, George North, 2007; Perryer Jordan, 2002; Peterson, Rhoad Vangght, 2001; Virginiam, Kelly Kathleen, 2011; Teston, 2008). Furthermore, these studies investigated the impact of gender, computer experience, age and program of the study on ethical judgments and ethical awareness. STATEMENT OF THE PROBLEM It is obviously that universities and educational organizations pay a huge attention in providing computers to their students or members. Despite the increased using of computer and its applications such as Internet and shared resources in human lives activities all over the world, however some users of computers such as students do not practice the code of computer ethics due to their ignorance of these ethics or due to their lack knowledge regarding these ethics. In addition they are not familiar with the idea that ethical issues related to computer use might be of importance to them in their future career as computer professional (Namlu odabasi, 2007) Therefore, they do not aware of the side effects of violation of computer ethics. It is noteworthy that in Malaysia, computer ethics is not offered as an individual subject, but rather the topic integrated in some related courses such as Management Information Systems or Cyber Law and Ethics course (Maslin, et al, 2009). In IIUM, KICT offers the course of Cyber Law and Ethics as a required course for all students to equip them with more information of ethical computer use (KICT, 2005). On the other hand, INSTED does not require this course for the students who are under this institution. Therefore, on the absence of computer ethics guidelines as a subject or chapter in the INSTED courses, there is a need to assess students violation of computer ethics and make comparison between KICT as-they have at least background about computer ethics- and INSTED students. In addition, According to IIUM website, the philosophy of the university is to create international center of educational excellence which integrate Islamic Knowledge and values in all disciplines. Furthermore, In IIUM, integrity (Istiqamah) is recognized as the essence of the university code of ethics. IIUM Code of Ethics (2008) requires students to the code of ethics strictly in their academic works and general lives. This code of ethics contains many core values such as piety, honesty, trustworthiness, responsibility, sincerity, accountability, justice and transparency. With this code of ethics, IIUM students practices are expected to be ethically (IIUM Codes of Ethics, 2008). In addition, IIUM requires integrity practice to be able to produce ethically outstanding scholars in various fields of studies (Moshood, 2010). As a result, it requires firm commitment to the implementation of academic integrity policies. Consequently, IIUM administrators and faculty are expected to be comm itted to implement the integrity policies in campus. Therefore, this study firstly will examine the level of students violation of computer ethics in two different Kullyyahs with the existence of Islamic values in the university. Moreover, the researcher will investigate if there is any relationship between students violation of computer ethics and the level of IIUM faculty and managements commitment to the implementation of academic integrity policy from students perspective. Finally, there are some researches were conducted in the field of computer ethics. The large number of these studies conducted to investigate students awareness and perceptions of computer ethics and ethical beliefs (Adebayo, 2005; Akbulut, Usal, Odabasi Kuzu, 2008; Acilar, 2010; Jabour, 2011; Maslin Zuraini, 2008; Maslin, Zuraini Ramlah, 2009; Molnar, Kletke Chongwatpo, 2008; North, George North, 2007; Perryer Jordan, 2002; Peterson, Rhoad Vangght, 2001; Virginiam, Kelly Kathleen, 2011; Teston, 2008). Furthermore, these studies investigated the impact of gender, computer experience, age and program of the study on ethical judgments and ethical awareness. In IIUM context, there are only one study was conducted in terms of academic integrity practice and one study in term of computer ethics. To clarify, Moshood (2010) conducted his study to examine the IIUM students perceptions toward academic integrity practice. On the other hand, Maslin, et al. (2007) investigated the awareness of computer use among undergraduate computer science students from UTM and IIUM. After examine the literature, It is clear that there is a lack of studies which conducted to evaluate the real violation of computer ethics among students. To add, there is no study investigate whether there is any relationship between students violation of computer ethics and the level of IIUM faculty and managements commitment to the implementation of academic integrity policy from students perspective or not. Therefore, this research aims to assess the level of students violation of computer ethics, examine any significant difference between KICT and INSTED student violation of computer ethics and to investigate if there is any relationship between students violation of computer ethics and the level of IIUM faculty and managements commitment to the implementation of academic integrity policy from students perspective. Conceptual framework The study of Peterson , Rhoads Vaught (2001) revealed that age as a factor has an effect on ethical behavior. They found that older people have high level of ethical behavior than younger. In term of investigating different program on students ethical computer use, Akbulut, Uysal, Odabasi Kuzu.(2008) investigate the effect of program on unethical computer using behavior. They found that there is no significant difference among different programs of study. By contrast, Maslin, Zuraini Ramlah (2009) found that there were some significant differences in ethical awareness of computer use among undergraduate computer science students from different universities (UTM and IIUM) In addition, Maslin, et al. (2009) have developed this model of ethical awareness of computer use: In IIUM, Integrity (Istiqamah) is recognized as the essence of the university code of ethics (IIUM Code of Ethics, 2008). Academic integrity, according to the Center for Academic Integrity (International Center for Academic Integrity, 2011), is defined as a commitment, even in the face of great difficulties, to five basic core values: honesty, trust, fairness, respect, and responsibility. Based on these values, principles of behaviors come into being that help academic communities convert these ideals into practice. Based on previous studies and model, in present study, the researcher will investigate the effect of age and program of study (Kullyyah) on students violation of computer ethics. The model will be as following: The extent of faculty and managements commitment to the implementation of academic integrity policies from students perspectives. Age Program of the study (Kullyyah) Violation of computer ethics PURPOSE OF THE STUDY The purpose of this study is to assess the level of computer ethics violation among IIUM students whether they are undergraduate or postgraduate students in two different Kulyyahs and to find if there is any significant difference between KICT and INSTED students in their violation of computer ethics. Moreover, this study aims to examine if there is any relationship between students violation of computer ethics and the extent of faculty and managements commitment to the implementation of academic integrity policies from students perspectives. RESEARCH QUESTIONS This study designed to address the following questions: What is the level of violation of computer ethics among IIUM students? Is there any statistically significant difference between KICT and INSTED students in their violation of computer ethics? Is there any relationship between IIUM students violation of computer ethics and the extent of faculty and managements commitment to the implementation of academic integrity policies from students perspectives? Is there any statistically significant difference between different groups of students ages in their violation of computer ethics? DELIMITATION Conducting this study will not generalize to all universities in Malaysia. It will be limited to IIUM only. Specifically, this study will focus on only two Kullyyahs (KICT and INSTED). Although there are several aspects of students misconduct behavior, however this study will be restricted to find out the level of computer ethics violation. Furthermore, this study will find out only the effect of faculty and managements commitment to the implementation of academic integrity policies from students perspectives on students violation of computer ethics. However, there are others factors affect students violation of computer ethics. SIGNIFICANCE OF THE STUDY The results from this study will make a meaningful contribution to our knowledge concerning computer ethics violation in our University. Moreover, this study will provide data about the level of IIUM students unethical practice of using computer that could help the lecturers to be informed about their students violation of computer ethics and help them to find what they think that help their students if the level is low. Furthermore, the leaders of the KICT and INSTEAD will be awarded about the level of students violation and make their decisions of how the level of ethical practice in using computer be improved if the level is low. Finally, this study will give a clear picture about the nature of the relationship between students violation of computer ethics and the extent of faculty and managements commitment to the implementation of academic integrity policies from students perspectives which helps the policy makers of IIUM to take more notice on academic integrity practice in IIUM campus. DEFINITION OF TERMS Computer ethics: Moral guidelines that govern the use of computers and information system. In this study computer ethics will only cover intellectual property, privacy and shared resources (adapted from Shelly, 2010). Intellectual Property: A broad category of materials, inventions and original works that are legally recognized as proprietary assets of an individual or organization which cannot be used without permission or legal licensure (Adapted from Techopedia.com, 2010) Privacy: The degree to which personal information, digital communication and digital devices can be accessed and shared by individuals (Adapted from your Dictionary.com, 2012) Shared Resources: Known as network resources, refer to computer data, information, or hardware devices that can be easily accessed from a remote computer through a local area network (LAN) or enterprise Internet (Techopedia.com, 2012). IIUM: International Islamic University Malaysia. IIUM is a unique university either in Malaysia or on a broader plane of the world. Since its inception English is used both as its medium of instruction and the language of its administration. It blends harmoniously modern and professional disciplines with traditional values and moral virtues. Its students originate from more than 100 countries representing nearly all regions of the world. IIUM has spared no effort to ensure that it provides the best tertiary education possible in all branches of knowledge. 6. KICT: Kullyyah of Information and Communication Technology in IIUM. 7. INSTED: Institute of Education in IIUM. 8. Violation: an act that disregards an agreement or a right (AudioEnglish.net, 2006). 9. Academic integrity: refers to the extent that core ethical values ( honestly, sincerity, piety, quality and originality) are transparently observed and strictly implemented in all academic pursuits. This is expected to facilitate the attainment of comprehensive excellence in the academic process as highlighted in the IIUM fundamental mission for learning. 10. Commitment to Academic Integritys Implementation It contains four indicators that measure the extent of the university administrators and facultys commitment to the implementation of academic integrity policies. The four observed variables include (Code of ethics is well implemented in IIUM; Academic integrity practice is adequated emphasized by lecturers at the beginning of each course; Consequences of dishonest practices are well discussed in most of my classes; and Defaulters of academic integrity rules are given appropriate sanctions in IIUM.

Friday, October 25, 2019

Meningitis Essay examples -- Health, Diseases

In nineteenth century Geneva, a family came down with a strange disease— one that had never previously been diagnosed. In a short time, many people in their town were infected and thirty-three people were left dead. This strange disease was later determined to be meningitis. In 1806, the United States saw its first outbreak of meningitis in Massachusetts. It was not until 1887, however, that Professor Anton Weichselbaum was able to determine a cause of meningitis: a bacterium called Neisseria meningitides. Penicillin was first used to combat meningitis in 1944, and in 1978, a vaccine became available. The usage of vaccines was detrimental in the battle to gain control over the spread of meningitis (7). Even with these vaccines, however, meningitis continues to infect individuals today. Meningitis is the swelling of the meninges that surround the central nervous system. The tri-layered membrane is composed of the dura mater, arachnoid mater, and pia mater, which protect the brain and spinal cord. Meningitis is contagious to other people. It can be spread through exchange of saliva, as well as from coughing and sneezing (4). Everyone is at risk for catching meningitis—even people in good health. It is especially common in young people living in close proximity to each other, such as in college dorms (6). Meningitis can be caused by several things. The more common causes include bacteria, viruses, and fungus. Other, less common causes of meningitis can be cancer, brain surgery, drugs, and chemicals (3). Bacterial meningitis is the most severe form and one must seek medical attention immediately (8). Bacterial meningitis is capable of killing a person in just one day (6). At least thirteen strains of such bacteria exist (15). The ... ... causes swelling of the meninges surrounding the spinal cord and the brain. Meningitis can be caused by several things- the most common are bacteria, viruses, and fungus. Symptoms are comparable to that of the flu; therefore people may not initially realize that they have this disease. The earlier a person seeks treatment, the better the outcome. Most people survive their battle again meningitis, but some come away with lasting affects. Meningitis has been around for hundreds of years, and in that time period, there have been many advances made in the handling of the disease. With the invention of modern vaccines, meningitis is under better control and the occurrences of infection are much lower than they were in the past. With continuing research, there is still hope to make more gains in the prevention and treatment of meningitis and potentially save more lives.

Thursday, October 24, 2019

Environmental Ethics Essay

Suppose that putting out natural fires, culling feral animals or destroying some individual members of overpopulated indigenous species is necessary for the protection of the integrity of a certain ecosystem. Will this actions be morally permissible or even required? Is it morally permissible or even required? Is it morally acceptable for farmers in non-industrial to practice- slash and burn techniques to clear areas for agriculture? Consider a mining company witch has performed open pit mining in some previously unspoiled area. Does the company have moral obligation to restore the landform and surface ecology? And what is the value of a humanly restored environment compared and to consume a huge portion of the planet’s natural resources. If that wrong, it is simple because a sustainable environment and to consume a huge portion of the planet’s natural resources. If that is wrong, is it simple because a sustainable environment is essential to present and future well-being? Or such behavior also wrong because the natural environment and or its various contents have certain values in their own right so that these values ought to be respected and protected in any case? These are among the questions investigated by environmental ethics. Some of them are specific questions faced by individuals in particular circumstances, while others are moral global questions faced by groups and communities. Yet others are more abstract questions concerning the value and moral standing of the natural environment and its nonhuman components. In the literature on environmental ethics the distinction between instrumental value and intrinsic value( meaning non-instrumental value) has been of considerable importance. The former is the value of things as means to further some other ends. A set of rules outlining human responsibility concerning environmental ethics defines the relationship towards ‘’the surroundings, both biotic and abiotic’’ collective called the environment’’ (Blackmore,1977) Any person who has ever given a though to the need to protect and develop the environment has either implicit or explicit code of ethics regarding these issues that determines everyday behavior patterns. In the same way, I also have my own values and ethics regarding environmental issues that define my responsibility to the natural environment. Although at times I can violate these values when the situation proves to be challenging, I nevertheless hold them in high steem. First of all , my Ethical approach is grounded in the belief that ‘’we must recognize the inherent rights of nature and natural system to survive intact (Blackmore,1997) . All too often human beings view nature and natural system as a pleasant surrounding for their leisure time or a resource for economic activity. This is a dangerous point of view since it leads to the destruction of natural habitats through over-using, rampant pollution, depletion of resources, and the extinction of wild flora and fauna. I believe that people in their activities should recognize preservation of natural systems as an important priority that has to be considered Along with economic efficiency and at times even override it. The Earth has suffered too much from the influence of humans, and it is time to give it a rest and let it recuperate from the damage. Accordingly environmental problems will consist in problems either for human interest or for the interest of the non-human animals, and an acceptable environmental ethic would have this individual interest as its grounds. Indeed those who believe that only sentient or conscious creatures have interest and that having interest is necessary for warranting moral consideration will hold that nothing else has interest on witch environmental problems could turn. Problems for ecosystems are thus held to turn invariably on the interest of sentinel or conscious individuals, and within such and ethic, priority is liable to be placed on averting, suffering premature death for vulnerable individuals, whether is best done by the introduction of humane methods of farming, by abstaining from eating meat by curtailing human interventions in the natural order, or even possibly by intervening to reduce the suffering inflicted by predators on prey. Millions of people are influenced by such ethic, and their approach to environmental problems would often follow the general pattern just mentioned. Others, However, suggest that environmental ethics must start somewhere quite different. Thinking about the environment involves taking much greater account of ecological systems than such an individualist approach can do, and if we fail to understand the natural system of our planet we are likely to generate ecological catastrophes, either by neglect or through seeking to rescue individuals while the system on witch we depend is crumbling. By the time we have understood such systems, our focus will no longer be on the individual suffering or, since far more is at stake, such as the survival of whole species, and the health of the whole ecosystems We need to prioritize the Preservation and rehabilitation of species and of ecosystems. New and modern ’’Green technologies and the conservation of natural resources Oil, Gas, Land ect will have to be more regulated in as universal Ethics in our global economy. Bibliography Abram,D. , 1996 The spell of the sensuous, New York : vintage books Michael Walzer, interpretations and social Criticism ( New York: Basic Books,1988} J. Bair Callicutt, In defense of the land Ethic ( Albany: State of New York press, 1989) Eugene Hardgrove, Foundations of environmental ethics ( Englewood Cliffs: Prentice hall, 1989) Samuel Hays, Conservation and the gospel of efficiency ( Cambridge, MA: Harvard University press,1959)

Wednesday, October 23, 2019

Why I Want a Wife

Weddings are often a time of celebration, especially for my family. This past summer, as we prepared for my sister Gini’s wedding, the festivities extended to good-natured teasing of the bride- and groom-to-be. For example, WITH knowing smiles, my parents–self-proclaimed experts on marriage courtesy of their own wedding almost thirty years ago–dispensed advice about everything, including how to improve her cooking skills beyond instant rice and grilled cheese. Gini’s typical responses included â€Å"That was a long time ago,† â€Å"Things are different now; times have changed,† and â€Å"Jason can do a lot of things for himself. † It was with particular delight that my family took to rubbing in one of Jason’s smoother moves. He waited until a few short weeks before the wedding to inform Gini that his Mom had always done his ironing for him, and now he expected Gini to take over that task—after all, he couldn’t wear wrinkled clothes to his new job, could he? Poking fun at the responsibilities involved in marriage is similar to the attitude presented in Judy Brady’s 1971 essay, â€Å"Why I Want a Wife. † In â€Å"Why I Want a Wife,† Brady offers hypothetical criteria for an ideal wife in a satirical commentary on how the work of wives is often taken for granted. The humor of the essay lies in its structure: on the surface it seems to accept the criteria it puts forth, while the meaning actually operates in the recognition that the narrator is being sarcastic. Using writing as one of her tools for activism, Judy (Syfers) Brady has established herself as a supporter of the women’s movement since she began more than thirty years ago. In â€Å"Why I Want a Wife,† she narrates a setting that mocks the situations and obligations wives find themselves immersed in. The narrator draws on her own experiences to present examples of how â€Å"good† wives are expected to behave. The satirical critique emerges as the narrator thinks through her reasons for wanting a wife. The language used has a satirical edge evident in both the author’s emphasis on certain modifiers (indicated by italics) and in the surface structure of the sentences, which belies the underlying criticisms. The audience should recognize the sarcasm from the language and attitude of the narrator. Now let's consider all the elements supporting her satirical point, beginning with the author's long history with this style of writing. Judy (Syfers) Brady has established herself as a supporter of the women’s movement, and critics point to this essay as typical of her career. â€Å"Throughout the article, [Brady] lists characteristics that she would like in a wife†¦She never comes out and says that the way that women are treated in family situations is wrong. She implies it by sarcastically creating her ideal wife. This technique works because it forces readers to realize it for themselves† writes Diego Vasquez on a webpage titled â€Å"A Rhetorical Critique of ‘Why I Want a Wife. â€Å"2 Vasquez’s analysis includes the supposition that the essay first appeared in pamphlet form, and suggests that Brady was a â€Å"†¦radical feminist writing for other radical feminists. † Vasquez also notes that Brady is reported to have said, â€Å"I am married, am a housewife, and have two female children; all three of those factors keep my anger alive,† and that â€Å"[Brady] t ried to persuade other housewives to take a step back and look at how they were being exploited. † Judy Syfers Brady, who was born in 1931 and later studied at the University of Iowa, now lives in San Francisco. In 1972, â€Å"Why I Want a Wife† appeared in the first issue of â€Å"Ms. â€Å"3 Although at that time, few critics expected the magazine to last4, almost twenty years later it (re-) featured â€Å"Why I Want a Wife. â€Å"5 Another decade later, almost thirty years after the essay first appeared in Ms. , Ms. Brady is still active in women’s movements. Her more recent work can be found in â€Å"Greenpeace Magazine†6 and in the â€Å"Women’s Review of Books. â€Å"7 Through all these works and critical commentary on it, we can see her personal focus on making a strong case for the feminist cause. Much as her personal life informs her recent article in the â€Å"Women’s Review of Books,† Judy Brady appears to have drawn on her own experiences when she wrote â€Å"Why I Want a Wife. † In the essay, the author/narrator drives home the amount and type of work expected of wives both by situating herself as involved in some it and by listing qualifications. In my reading, the setting of the over-worked housewife will take the form of the narrator both being such a wife and of describing such as wife through mimicry. To indicate this setting, I will use actions to reinforce the narrator’s words. For example, at the beginning, in the clause â€Å"while I was ironing,† the narrator slips in that she thought through her argument while engaged in domestic labor. When I read that line, I will direct a look at the audience that conveys just how thrilled I am to be pressing clothes. Which is to say, my look will suggest that yet again, while I was doing one of my many thankless jobs, I was thinking about that â€Å"poor† guy. A second way I intend to suggest the setting is to give the audience a withering look while I use my right hand to pick up and put away imaginary things as I read the lines â€Å"I want a wife who will keep my house clean. A wife who will pick up after my children, a wife who will pick up after me. I want a wife who will keep my clothes clean, ironed, mended, replaced when need be, and who will see to it that my personal things are kept in their proper place so that I can find what I need the minute I need it. Later, to show the perfect wife being the perfect hostess, I will offer up imaginary hors d’oeuvres with a graceful sweep of my hand when read the clause â€Å"I want a wife who takes care of the needs of my guests so that they feel comfortable, who makes sure that they have an ashtray, that they are passed the hors d’oeuvres, that they are offered a second helping of the food, that their wine glasses are replenished when necessary, that their coffee is served t o them as they like it. The gracefulness of the movement will hopefully reinforce the wife-seekers conception of feminine social skills in addition to suggesting and mimicking an actual setting where hors d’oeuvres are being offered. Also, to follow up that line and to show that the coffee is just right, I will bring up my right hand, holding my fingers folded down, except for my thumb and index finger, which will be touching at the imaginary point of perfection. This movement will signify the (anal) expectations about a wife’s responsibilities. In all these ways the author's relationship to the setting supports the point of the essay through a performance of the character's satirical tone. As a character, the narrator has chosen to view these (anal) expectations in a humorous, satirical light. To show this mark of a sharp mind and wit, I will read every line in light mockery. This sweet little wifey has a biting way of deftly masking her meaning in false agreement. The criticisms of the narrator aren’t malicious, but they are satirical, and I hope to project that satire in my reading. I imagine the narrator as someone with self-confidence and poise, dignified even in undignified circumstances, and I plan to portray that by standing upright, neither puffed with arrogance nor slumped with despair. That is how I will stand, too, when I read the brief paragraph on replacing the hypothetical wife (â€Å"If, by chance, I find another person more suitable as a wife than the wife I already have, I want the liberty to replace my present wife with another one. Naturally, I will expect a fresh new life; my wife will take the children and be solely responsible for them so that I am left free. â€Å") For that paragraph, I will assume the tone of a martyr, as if the wife-seeker is sacrificing him(/her)self for the well-being of the universe. Also, to show the narrator as parodying the self-centered concerns of a wife-seeker, I will gesture toward myself, occasionally laying my hand below the base of my throat, throughout my reading. This movement will direct attention to the self who is self-centered and will be a trifle melodramatic, as can be expected of someone who is over-acting to make fun of another person’s selfishness. And, to further express the overall satire of the essay, I will try to keep the hint of a smirk (a dubious, critical smirk-not a self-satisfied one) on my face. This smirk should put a sarcastic edge on my reading as the character considers all the benefits of having a wife which she would like to enjoy. Thinking about and sarcastically expounding on the thankless duties expected of â€Å"good† wives is how I envision the development of this piece’s â€Å"action. † I plan to show this action of â€Å"Thinking† in several ways. One way is to pretend as though I, the narrator, think some of my ideas are super, such as â€Å"I want a wife who is a good nurturant attendant to my children, who arranges for their schooling, makes sure that they have an adequate social life with their peers, takes them to the park, the zoo, etc. â€Å"). I will try to keep a fake, bland smile on my face to suggest how nice, easy, and convenient it must be to be able to rely on someone else for such tasks. Another way I will demonstrate the narrator’s thought processes will be to act as though some of my ideas have just occurred to me, including the somewhat random â€Å"I want a wife who will type my papers for me when I have written them. † I will pause before that line and try to look thoughtful before coming to the revelation that that would be quite handy. An additional way to indicate the narrator’s thinking will be to vocally (not verbally) suggest that some of my ideas are onerous duties I have long since grown tired of doing, such as â€Å"When I meet people at school that I like and want to entertain, I want a wife who will have the house clean, will prepare a special meal, serve it to me and my friends, and not interrupt when I talk about things that interest me and my friends. † I will adopt a haughty, superior tone to deliberately imitate how I have been told, in effect, to lower myself. Showing this process of reflecting on the expectations for wives will help to foster the sense of mockery the narrator employs throughout her satirical litany. This satire and sarcasm is evident in the language used even at the beginning of the piece, and I plan to play it up. For example, when I read the second line (â€Å"I am A Wife. â€Å"), I will say â€Å"I amm†Ã¢â‚¬â€œholding the â€Å"M† slightly longer than necessary for emphasis-before I punctuating â€Å"A Wife† with a demure smile to indicate the sublime pleasure I derive from the this, the most fulfilling of feminine roles. Also on â€Å"A Wife,† I will lower my voice to further emphasize the depth and fullness of my appreciation for my position. I plan this obviously exaggerated infusion of wife-dom with positive connotations to set up the satirical attitude toward â€Å"wife† in the rest of the piece. . Some other ways I plan to use the language of the essay to drive home the narrator’s voice is to take advantage of the author’s locations of emphasis. In two places, the author has italicized â€Å"my† when she writes â€Å"my physical needs† and â€Å"my sexual needs. In those two places I will particularly stress â€Å"my† to reflect the intensity of the selfishness being described, and I will gesture toward myself. The author has also italicized the â€Å"good† in â€Å"I want a wife who cooks the meals, a wife who is a good cook. † I will vocally stress the â€Å"good† and I will make an â€Å"Mmmm† face (quick raising of my eyebrows while smiling with my lips closed) to reflect the author’s intentional emphasis. These actions should help to make the satirical intention of the speaker clear to the audience. Making the sarcasm/satire of the narrator clear to the audience will be an essential part of my performance. To introduce the sarcasm in the opening, I will look over the audience’s heads, almost at an imaginary star that represents how dreamy my life as a wife is and how happy I am at my good fortune of being married when I read the lines â€Å"I belong to that classification of people known as wives. I am A Wife. And, not altogether incidentally, I am a mother. Of course, this dreamy look will be an act on behalf of the narrator, who is making fun of anyone who actually believes that that is the sum of how she feels. In the next paragraph, I will look at the audience as I brace them for my diatribe. I will be giving them a semi-serious look, with my eyebrows raised in a quizzical way, that matches the narrator’s dry tone. From this look, the audience should infer that the narrator actually judges her friend, or people like the friend, much harsher than the words bein g used would imply. Further into the essay, there is the paragraph about sexual needs (â€Å"I want a wife who is sensitive to my sexual needs, a wife who makes love passionately and eagerly when I feel like it, a wife who makes sure that I am satisfied. And, of course, I want a wife who will not demand sexual attention when I am not in the mood for it. I want a wife who assumes the complete responsibility for birth control, because I do not want more children. I want a wife who will remain sexually faithful to me so that I do not have to clutter up my intellectual life with jealousies. And I want a wife who understands that my sexual needs may entail more than strict adherence to monogamy. I must, after all, be able to relate to people as fully as possible. â€Å") When I begin that paragraph, I will give the audience a saucy, playful look. Then, I will look eager (chin and eyebrows raised, expectant smile) when I speak of making love eagerly, and I will look stubborn (eyebrows lowered, negative shake of my head) for when I am â€Å"not in the mood. † Although I will have maintained appropriate eye-contact throughout the reading, at the end, with the final sentence (â€Å"My God, who wouldn’t want a wife? ), I will pin the audience with a piercing look, looking them straight in the eye, as if to say, â€Å"Well, duh! ,† when the narrator’s true voice finally speaks. These actions should connect the audience directly to the progression of thought and satire as the speaker leads up to and makes her strong concluding statement. Judy Brady has strong opinions about what shouldn’t be automatically presumed as a wife’s obligations. Her opinion influenced her essay â€Å"Why I Want a Wife†, wherein she introduces the reader to an overworked housewife’s reasons for wanting a wife of her own. This housewife/narrator cleverly uses language to comment on the condition of wives by verbally condoning what she actually despises. Because the audience will be able to pick up on her sarcasm, they will understand her unsaid message. Although it might be possible to construe Brady’s essay as a bitter diatribe against the injustice of the way some wives are subordinated, I prefer to read this piece as the humorous product of a sharp wit, almost like Jonathan Swift’s â€Å"A Modest Proposal. Usually, when I read over this essay, a smirk finds its way to my face-the same kind of smirk I feel starting when I think back to the proud phone call my family received after my newlywed sister Gini succeeded in making meatloaf all by herself. Maybe Gini was right in those days before her wedding when she anticipated that things would be different for her and Jason, and that the two of them would share household responsibilities. They seem to be equally experiencing the hazards o f cooking. Recently, Gini told us about a kitchen disaster that involved them both. Ace-chef that she is, Gini failed to notice that some fresh-from-the-freezer sauerkraut was burning one of her (wedding gift) pans. Jason came to the rescue, though, convinced that he could save the day with his superior knowledge that only inorganic chemicals can clean up burned organic materials. And so, he set about â€Å"desperately† trying the salvage the pan using Gini's nail polish remover. It does my heart good to know that the two of them work so well together in the kitchen. Although now I am torn about what to get them for Christmas: new cookware? Who knows, maybe I'll get them a restaurant gift certificate.