Tuesday, December 24, 2019

Public Schools Should Not Be The Place For Religious...

One of the many foundations of the United States as a nation was religion. When people fled their homes in search of a new place, one of the many reasons was due to religious freedom. Almost immediately conflicts arose between religions, and their belief systems. No problems seem to arise with teaching religion to children in school until the 1900 s. That is when the courts decided religious instructions in public schools would be deemed unconstitutional. Court cases started around the country with people fighting against religious instruction in public schools, many accusing teachers of putting their beliefs in their teachings. The young, and impressionable minds of children should not be exposed to another persons religious beliefs because they can easily be swayed in a certain direction. This is why religious practices, such as prayer, and the teachings of creationism should not be allowed in public schools. Public schools should not be the place for religious practices for many r easons. Firstly, there a several different ways in which having those practices in public schools goes against the Constitution, and the Establishment Clause, which does not allow public schools to endorse any religion. Secondly, as children are minors in age, so are their minds. Children can easily be swayed in a certain direction if they witness an authority figure expressing a certain belief. Having religious practices in public schools also goes against many science classes with theShow MoreRelatedReligious Accommodation For Public Schools1128 Words   |  5 Pagesmanifest beliefs and practices and the right to be free from state coercion or constraint in matters of religion ().† One of the most controversial places in which freedom of religion manifests itself is the public school. In order to protect freedom of religion, it is important to make sense of how a school must treat religion so the school does not compromise its role within society. This paper will establish current rulings on religion in public school and then explore what a religious accommodationRead MoreReligious Accommodation For Public Schools Essay955 Words   |  4 Pagesmanifest beliefs and practices and the right to be free from state coercion or constraint in matters of religion ().† One of the most controversial places in which freedom of religion manifests itself is the public school. In order to protect freedom of religion, it is important to make sense of how a school must treat religion so the school does not compromise its role within society. This paper will establish current rulings on religion in public school and then explore what a religious accommodationRead MorePrayer in Public Schools Essay1440 Words   |  6 Pagestype of school students attend, organized prayer is mandatory, allowed, or banned. In the United States, organized prayer in public schools is prohibited because it goes against the Constitution’s separation of church and state (Jinkin s 123). The United States promises religious freedom, but is yet to define the degree and limitation of that liberty. However, American citizens have been debating for many years, whether organized prayer should be an option or obligation in public schools. Some peopleRead More Religion Has No Place in Public Schools Essay1020 Words   |  5 Pagesseparation of church and state, which has resulted in many debates over the limitations of religion in the public schools (Hamburger). There is research that supports both the arguments that students can benefit academically from the influence of religion and from keeping religious teachings separate from public schools. Early in Americas history, when it first became a country, public schools were administrated by Protestants. As a result, Protestant prayers and services became incorporated intoRead MoreSchool District V. Schempp1618 Words   |  7 PagesAbington School District v. Schempp is a 1963 Supreme Court Case that challenged religious prayer and teachings in Pennsylvania public schools. The Pennsylvania law made it a requirement for schools in all districts to read from the Bible (at least 10 verses) every day before class began. There was also a clause included in the state action that allowed for any child to be excused from the reading with specific permission from their parent or guardian. The question that this case asks is if it isRead MoreFreedom of Religion in Public Schools1748 Words   |  7 Pagesindividual practice of religion in school has become a very controversial topic. There are many different views on this matter and even more opinions on how it should be handled. There are people on both sides of the spectrum, there are those who believe that it should be taught and allowed in school, and there are those who believe it should not be taught or practiced in school. There have been cases brought to court about how religion should be taken out of schools, or if it should be allowed.Read MoreReligion in Public Schools Essay1131 Words   |  5 PagesReligion in school is the practice of any personal religious beliefs in a place of education. Introduction: In recent years teaching or the individual practice of religion in school has become a very controversial topic. There are many different views on this matter and even more opinions on how it should be handled. There are people on both sides of the spectrum, there are those who believe that it should be taught and allowed in school, and there are those who believe it should not be taughtRead MoreReligion in School: Publicized or Privatized? Essay example1353 Words   |  6 Pagesaround the world (Wilson, 2006, p.11). Having religion included in the public school system is one of the most difficult issues to debate. When should the separation of church and state come into play? The fact that not everyone holds the same religious faith brings up the question of whether religion should be either public or privatized in schools. This essay will explain the history and background of religion in public schools, viewpoints of conservative and liberal elites on religion, and whetherRead MoreCase Summary 3 Essay899 Words   |  4 PagesLaurel Palm Middle School was considered to be a successful school. It was one of the top ten performing schools. For three successive years, it had been awarded a National Distinguished School Award. The school had had a strong culture of teaching and learning. Parents were engaged in planning school programs and improving all aspects of the school and its operations. Ms. Avery, the principal instituted specific curriculum goals and objectives that aligned with the school district. She organizedRead MoreReligion in Schools Today1253 Words   |  6 PagesAmerican Religious Experience In America today we all have choices to make in regards to our religious beliefs. Many young children are brought up today confused about religion and the significance it plays in their lives. There are many sanctions and rules now on what can and can t be thought or displayed to people on public property, but it wasn t always like this. In this paper I will be discussing the American religious experience in regards to the impact religion has in the public schools

Monday, December 16, 2019

“The Invisible Leash” The Patty Hearst Case and the Crazy Things Victims Do Free Essays

In April 1974, roughly two months after they kidnapped Patty Hearst, the Symbionese Liberation Army (SLA) released a photo of Hearst as evidence that she was no longer a kidnap victim but a willing member of their group. In the photo, Hearst is pictured alone (no other members of the Symbionese Liberation Army are evident). She stands off centered in the photo (to the left) in front of the Symbionese Liberation Army’s symbol, a seven-headed cobra (â€Å"Symbionese Liberation Army†). We will write a custom essay sample on â€Å"The Invisible Leash†: The Patty Hearst Case and the Crazy Things Victims Do or any similar topic only for you Order Now Her stance is aggressive: her legs are apart as if she is braced and ready to shoot; her gun is pointed (not at the viewer, but off to the viewer’s right); and her finger is on the trigger. The gun itself is a serious weapon, a carbine. And Hearst’s attire is militaristic and revolutionary: she wears pants, tight, military-type clothing, and a beret of the same sort worn by revolutionary Che Guevera, in the famous photo of him snapped by Alberta Korda (â€Å"Che Guevara†). Moreover, the background color in the photo of Hearst is red, a color that suggests violence and aggression. In the lower right corner of the photo, another machine gun rests against the wall, only the upper portion of the gun is visible (its barrel), and it’s pointing upward, toward the top of the photo. While this photo is meant to depict Hearst as a willing member of the SLA, it isn’t quite successful. That is, it suggests a more complex truth: that people sometimes play roles that do not fully describe them and in which they are not at home. A close look at the photo reveals that Patty Hearst, though she assumes the stance of a guerrilla, is anything but that. Her gaze is not directed violently at the viewer; instead, she looks to the side, transforming herself into the object of the gaze rather than being the gazer. This is in sharp contrast to Korda’s famous photo of Che Guevara, whose hat style Hearst has adopted. In his photo, Guevara faces the audience squarely and audaciously (â€Å"Che Guevara†). Hearst’s posture may be audacious, but the direction of her gaze reveals submission. Other details in the photo also suggest that she is less than at home in her role as aggressive warrior. Her gun, for example, is pointed to the side – just as is her gaze. She’s not threatening the viewer with the gun; she’s exposing herself to the viewer. Plus, though none of the SLA members are present in the photo with Hearst, the unmanned, projecting gun in the lower right corner of the photo draws the eye and reminds the viewer that just off stage lurks a threat. With her glance to the side, Hearst seems almost focused on this threat. Indeed, a quick look at her eyes reveals dark circles under them. Her mouth is pinched and drawn. These are indicators that she may be uncomfortable, even stressed in her new role. In fact, the photo, along with an audio communication from Hearst on which she called her father a â€Å"corporate liar† and explained that she was joining the SLA and taking a new name (â€Å"SLA: Tania†), caused her fiance and her parents to â€Å"[speculate] that Hearst had been brainwashed or coerced. † They did not believe that the Patty Hearst they were seeing and hearing was the â€Å"real† Patty Hearst (â€Å"SLA: Patty Hearst). And, indeed, Patty Hearst, granddaughter of newspaper tycoon William Randolph Hearst, seems to have changed over the course of her kidnapping. Compare, for example, two of her communiques with her parents. The first was received February 12, only 9 days after armed gunman kidnapped her from her fiance’s apartment on the night of February 4, 1974 (â€Å"Radically†). In this communique, she says: Mom, Dad, I’m OK. I’m with a combat unit that’s armed with automatic weapons. And these people aren’t just a bunch of nuts. They’ve been really honest with me but they’re perfectly willing to die for what they’re doing. And I want to get out of here but the only way I’m going to is if we do it their way. And I just hope that you’ll do what they say Dad and just do it quickly. And I mean I hope that this puts you a little bit at ease and that you know that I really, really am alright. I just hope I can get back to everybody really soon. (â€Å"The Patty Hearst Tapes†) Here Hearst focuses almost entirely on her own situation, telling her parents who has taken her and what her parents need to do to free her. She mentions that her captors are serious but says very little about their political agenda. She sounds, in fact, very much like one might expect a kidnapped, 19-year-old to sound. By day 59 of Hearst’s captivity, her communiques reveal that her focus has changed from herself to the SLA’s cause. Mom, Dad. Tell the poor and oppressed people of this nation what the corporate state is about to do. Warn Black and poor people that they are about to be murdered down to the last man, woman, and child. Tell the people that the energy crisis is nothing more than a means to get public approval for a massive program to build nuclear power plants all over the nation. The message goes on in this vein and culminates with the following: â€Å"I have chosen to stay and fight. I have been given the name Tania after a comrade who fought alongside Che in Bolivia. It is in the spirit of Tania that I say, ‘Patria o Muerte, Venceremos’† (â€Å"The Patty Hearst Tapes†). The Latin phrase means â€Å"Fatherland or death: We shall overcome† (Cox), and it suggests Hearst’s transformation from heiress to warrior. Clearly Hearst had changed, and after she was caught on video camera robbing a bank with the SLA only a few months after she’d been kidnapped (Ramsland), Americans caught up in the story were left to debate whether a person is always responsible for his or her own actions. In an article published in the National Review during Hearst’s 1976 trial, one commentator gave specific voice to the questions many people were asking themselves: When given the opportunity, why didn’t Hearst â€Å"reassert her own individuality and [try] to escape? And, even more succinctly, the commentator asks: â€Å"Is Hearst guilty? † (â€Å"What Is Guilt? † 258). Hearst was eventually sentenced to 7 years in prison for helping the SLA with their criminal activities (including bank robberies), but President Carter had her released after only 22 months (Chua-Eoan), and, in 2001, President Clinton pardoned her (â€Å"Radically†), wiping her record clean. President Clin ton’s pardon suggests that Hearst was not responsible for what she did. It suggests that under specific conditions, a person can behave in ways for which she must not be held responsible. In a nutshell, it suggests that those who have endured traumatic experiences (victims) are not necessarily accountable for what they do. And, indeed, by most accounts, Hearst’s experience was traumatic. During the first several weeks of her captivity (prior to her participation in the first of several bank robberies), she was (according to her own accounts) kept in a dark closet. She was â€Å"sexually assaulted† (â€Å"Truth† 201). She was told that her parents were â€Å"insects† and that she was a member of a class of people that was â€Å"sucking blood† from the commoners. When her father visited San Quentin (as part of a ransom demand made by the SLA), and he reported that the conditions of the prisoners there was fine, Hearst’s captors reportedly told her that her living conditions (in the cramped, dark closet) were similar to those of the San Quentin prisoners. The take home message for Hearst was that her â€Å"tiny cell, stale air, and gloomy walls were [considered by her father to be] an acceptable environment for his daughter. † Her captors led her to feel increasingly alienated from her old life and from her family (â€Å"Tania’s World†). Subject to severe trauma, a person may not behave rationally or in keeping with what might be expected. For example, in 2007, when police found and liberated Shawn Hornbeck, a boy who had been abducted 4 years earlier (when he was only 12), one of the questions that surfaced repeatedly was: why didn’t he run? During at least the last two or three of his years of captivity, his captor (Michael Devlin) allowed Shawn a tremendous amount of freedom. Shawn went to school, rode his bike, and had multiple opportunities to report his situation to authorities, but he didn’t (Tresniowski, Grout, and Finan). Shawn’s attorney speculates that an â€Å"invisible leash† kept Shawn from running (qtd. in Tresniowski, Grout, and Finan). And C. Robert Cloninger, a medical doctor at the Sanson Center for Well-Being in St. Louis, indicates that victims may â€Å"[bond] with their abductors† in order to â€Å"feel safe†: Once you’ve begun to identify with your captor, you don’t have to fear them anymore, because you’re in harmony with them†¦We see this in hostage situations, where the emotional brain short circuits the rational brain. (qtd. in Tresniowski, Grout, and Finan) It was this same â€Å"invisible leash† that made Hearst do the seemingly crazy things she did: rob banks, hide from the law, remain with the SLA. A close look at her history and a careful look at the now infamous SLA photo of Hearst reveal the truth: she may have pretended to be Tania, but that was a temporary role, assumed under extreme circumstances to protect herself. Her transformation from â€Å"an apolitical rich girl† to a â€Å"gun-toting radical† (â€Å"Radically†) tells us more about the events that she was caught up in than about who she was. How to cite â€Å"The Invisible Leash†: The Patty Hearst Case and the Crazy Things Victims Do, Papers

Sunday, December 8, 2019

ICT Service Management

Question: Describe about the ICT Service Management. Answer: USB and FireWire: The USB and Fire Wire are the controllers for the computers. As stated by Bhuasiri et al. (2012), users can implement the communication system between computer and a device through the USB and Fire Wire. It has been observed that users have used the USB and Fire Wire as general purpose controllers. Generally, the USB and Fire Wire are the port of the computer. The USB and Fire Wire are used in the CPU to communicate with the external storage devices (Yu et al. 2012). Bus Hardware standard: The bus is a bidirectional universal switch, and is used in between the central processing unit and main memory of the computer. The bus communication systems are generally of two types, such as parallel communication and serial communication. As stated by Livingstone (2012), the parallel communication system allows several communication paths to transfer bits simultaneously. On the other hand, in the serial communication system, the bits are transferred one after through the single communication path. Summarize of the two resources: It has been observed that the modern smart phones run on different operating system such as Android, Windows and iOS. User Interface and Kernel are two components in the operating system. The User Interface is a communication between the device and user. There are two types of user interfaces such as text based (Shell) and Graphical User Interface (GUI). As stated by Habib et al. (2012), the user interface acts as an intermediately between the Users and the operating system of Kernel. Kernel: The Kernel is a performance based required functions. There are different options available in the Kernel such as File manager, Device drivers, Memory Manager, Scheduler and Dispatcher. As stated by Livingstone (2012) , Kernel helps the users to create a directory and a directory path. The directory is a user-created bundle of files and other directories. The directory path is a sequence of directories within directories. As stated by Katsaros et al. (2012), Kernel allocates space in the main memory for storing the data. Sometimes Kernel creates illustration in the main memory system. It has been observed that Kernel creates virtual memory by playing a shell game in which blocks of data are shifted back and forth between the main memory and mass storage. Cloud service provider SaaS: The SaaS is a computing cloud which provides storage to the users so that they may store data. The network cloud is connected to three different components such as corporate data centre, AWS IaaS data centre and the Google Mail application. The users have stored the data in the network cloud system (Guo et al. 2012). It has been observed that SaaS is interfacing with the Google Software as a cloud service provider. The SaaS is a Cloud Service Provider which implements their own application named as SaaS. Cloud Service Provider IaaS: It has been observed that IaaS has provided the Network cloud service to the users. The IaaS is connected with the corporate data centre. IaaS has its own server and cloud storage space. Moreover, it has provided storage facility to the individual users, virtual client and organization. As stated by He et al. (2012), the clients have got the opportunity to share their data with others. Character encoding standards: The encoding standards depend on the categories. The categories of the ASCII codes are divided into different segments such as upper-case letters, lower-case letters, digits, punctuation and control codes. Apart from this, the encoding systems can be of varied types such as encoding text as ASCII, conversion binary to decimal, encoding decimal to binary, binary encoding for number of alternatives and voice encoding (Ahlgren et al. 2012). The conversion process from Binary to Decimal depends on the seven positional exponents such as position value in decimal, decimal number, decimal representation, position value in decimal and binary numbers, equivalents decimal and representation of decimal numbers. The encoding process from the decimal numbers to binary numbers is based on different values such as the binary position, the binary value, where step 0: Decimal number= 11, step 1, step 2 and step 3 and final binary number. As stated by Mann et al. (2012), the microphone is a converter which converts the human voice from analog to electrical signal. In the contemporary world of globalization, social engineering attacks on human judgment have been a major concern for a considerable time. The social engineering attacks refer to forcing the victim to act against personal or organizational interests by trick. The major attack on human judgment includes the Phishing attacks (Tran et al. 2012). The phishing attacks are nothing but a sophisticated online trickery for acquiring sensitive information by authentic looking e-mails or websites. There are many examples of such kinds of attacks such as credit card number theft as well as identity theft. On the other hand, as stated by Gerstel et al. (2012), another most critical attack is hacking which refers to accessing the computer resources internationally. This access is mostly conducted without authorization of those resources or in access of the authorization. The person who is performing the hacking activity is called as the hacker. Mostly, the hackers are known for using viruses such as Trojan horse as well as Malware which are illegal programming for damage. The two sided network connection is the example of the optical fiber connection between the users and the hosts. This network design is based on the requirements of speed. The speed is different in the two directions. It has been noticed that most transmission lines are symmetric in speed. Therefore the higher-speed is transmitted through the lines (Chang and Ju 2012). On the other hand, the three site traffic is the another network connection among the users and host. It has been observed that there are three sites connected by the two links. Moreover, it has been observed that more than 300 Mbps connecting speed is required for the three site connections. However, there are some uneven speed distributions such as 45 Mbps and 2 Gbps. As stated by Bhuasiri et al. (2012), the link between the two sites must carry the flowing traffic. However, it has been found that each pair of sites is connected with lines which carry traffic only between paired sites. Knowledge Management System Knowledge Management (KM) system is an IT system that stores and retrieves information, improves collaboration, locates sources of knowledge and in some other ways enhances KM processes. This system also helps to acquire, create, save, and distribute knowledge. This system mainly collects internal knowledge and experiences within the organization and spreads it among the employees so that they can access it. This system also creates links with external sources of knowledge. However, according to Katsaros et al. (2012), there are several factors of failure in this such as lack of higher management support, organizational culture, individual budget are resistance to chance. Customer Relationship Management system According to Ahlgren et al. (2012), customer relationship management system or CRM includes all the tools, technologies and processes to enhance and improve sales. It also helps to enhance customer relationship and relationship with the business partners. The CRM software serves to consolidate customer information and documents into a single CRM database (Tran et al. 2012). Thus business users can easily access the data and can manage it. Some common and useful features of CRM tool are marketing automation, sales force automation, contact center automation and geolocation technology. The biggest four companies that use this software are Salesforce.com, Microsoft, SAP and Oracle (Chang and Ju 2012). A good project manager who wants to minimize any risks related to ICT failure must have the trait to provide action oriented tasks. Besides, in the same scenario a project manager must be a result driven person. He must have the skills to focus on his goals and the goals of his organization. In any situation, he should not be distracted, which is the main reason of ICT failures (Chang and Ju 2012). He will have to face the unpleasant parts of the project, as most of the project team members will avoid this part. A project manager must apply his experience and knowledge to command with authority and respect. A perfect project manager will set realistic deadlines for team members and will dictate clearly, what should be done. He will also describe the available resources to the team members so that they can understand how to use them in order to achieve the project goal (Gerstel et al. 2012). Another important skill that a project manager must have is vision. A visionary project manager should have the ability to see the big picture and he must have the ability to understand any future trouble that might occur. Therefore, a project manager will be able to break down larger goals into smaller ones which will be more manageable. In the contemporary world, it can be found, that outsourcing is experiencing failure. There are several important underlying reasons for this progressive failure which have been identified. According to Katsaros et al. (2012), exposure of the confidential data is the most critical cause of failure. As the outsourcing process involves the end user system, which uses there third party applications, the risk involved with the process is the exposure of the confidential information of the organizations. On the other hand, Bhuasiri et al. (2012), illustrated that vague outsourcing objectives is another vital reason for the continuous failure of the outsourcing business. Although outsourcing is based on the basis of cost reduction, the business does not need to make it their sole reason. It has been observed, that the organizations tend to grasp cost reduction as their sole objective rather than welcoming the bonus. This scenario compromises the quality of the product and service which in turn reduce the business scope. The project manager plays a significant role in respect of success of the entire project. There are several attributes of the manager which can prevent the failure most impressively. As identified by Chang and Ju (2012), the major attributes of the project manager include good communicator, effective leadership skills, good decision maker, and clear and effective vision developer as well as have sound technical knowledge. This attributes help the project manager to conduct the entire project in a single handed fashion. At the same time, Mann et al. (2012) disclosed that the project manager must thrive under pressure. Moreover, the negotiation skills will impact the project in a positive way. Added to that, it has been also revealed that the project manager must be emphatic. Enthusiasm will pave the pathway of the successful project. It is evident that these attributes are capable of turning the tide of the trend of contemporary project management in a most substantial manner. Reference list: Ahlgren, B., Dannewitz, C., Imbrenda, C., Kutscher, D. and Ohlman, B., 2012. A survey of information-centric networking.Communications Magazine, IEEE,50(7), pp.26-36. Bhuasiri, W., Xaymoungkhoun, O., Zo, H., Rho, J.J. and Ciganek, A.P., 2012. Critical success factors for e-learning in developing countries: A comparative analysis between ICT experts and faculty.Computers Education,58(2), pp.843-855. Chang, J.Y. and Ju, P.H., 2012. An efficient cluster-based power saving scheme for wireless sensor networks.EURASIP Journal on Wireless Communications and Networking,2012(1), pp.1-10. Gerstel, O., Jinno, M., Lord, A. and Yoo, S.B., 2012. Elastic optical networking: A new dawn for the optical layer?.Communications Magazine, IEEE,50(2), pp.s12-s20. Guo, S., Xie, H. and Shi, G., 2012. Collaborative forwarding and caching in content centric networks. InNETWORKING 2012(pp. 41-55). Springer Berlin Heidelberg. Habib, B., Zaharia, G. and El Zein, G., 2012, April. Hardware simulator: Digital block design for time-varying MIMO channels with TGn model B test. InTelecommunications (ICT), 2012 19th International Conference on(pp. 1-6). IEEE. He, X., Lee, P.P., Pan, L., He, C. and Lui, J.C., 2012. A panoramic view of 3G data/control-plane traffic: mobile device perspective. InNETWORKING 2012(pp. 318-330). Springer Berlin Heidelberg. Katsaros, K.V., Fotiou, N., Vasilakos, X., Ververidis, C.N., Tsilopoulos, C., Xylomenos, G. and Polyzos, G.C., 2012. On inter-domain name resolution for information-centric networks. InNETWORKING 2012(pp. 13-26). Springer Berlin Heidelberg. Livingstone, S., 2012. Critical reflections on the benefits of ICT in education.Oxford review of education,38(1), pp.9-24. Mann, V., Gupta, A., Dutta, P., Vishnoi, A., Bhattacharya, P., Poddar, R. and Iyer, A., 2012. Remedy: Network-aware steady state VM management for data centers. InNETWORKING 2012(pp. 190-204). Springer Berlin Heidelberg. Tran, T.T., Shin, Y. and Shin, O.S., 2012. Overview of enabling technologies for 3GPP LTE-advanced.EURASIP Journal on Wireless Communications and Networking,2012(1), pp.1-12. Yu, F., Li, P., Song, P., Wang, B., Zhao, J. and Han, K., 2012. An ICT-based strategy to a colorimetric and ratiometric fluorescence probe for hydrogen sulfide in living cells.Chemical communications,48(23), pp.2852-2854.

Sunday, December 1, 2019

Mary Shelleys Frankenstein an Example of the Topic Personal Essays by

Mary Shelleys Frankenstein Every literary piece that a writer creates is unique in its own way. This uniqueness could be attributed from the writer's style of writing, the topic being explored, and most especially the inspiration or driving force that enables the writer to create a particular work. Inspiration could come from many means and one dominant factor that influences a writer is his/her family background and experiences in life. This thinking holds true in the situation of Mary Shelley. Need essay sample on "Mary Shelley's Frankenstein" topic? We will write a custom essay sample specifically for you Proceed Mary Shelley is the author of the famous book Frankenstein that is responsible for her instant popularity as a writer. The driving force that aids her in the creation of this book is based upon her interaction with the people around her. The influences of her parents way of thinking as well as her husband inspired her to the creation of Frankenstein. To be able to fully understand this, a narration of her life and a summary of the novel are needed. Mary Shelley is born on 30 August 1797 at Somers Town, Great Britain. She is the only daughter of two popular personalities, the feminist Mary Wollstonecraft and the philosopher William Godwin who have been well-known thinkers during their time. Her mother died due to complications after giving birth to her. This is the reason why she was raised by her father and her stepmother whom she hated very much. She acquired education primarily at home where she follows her father and mother's ideologies. Besides the formal instruction that she had, she also experience interacting with her father's famous friends. Intellectuals ranging from poets and philosophers to scientists (The Literature Network). During the age of sixteen she met the poet Percy Bysshe Shelley, who has been a loyal fan of his father's philosophical beliefs. Percy Shelley later on became her romantic interests despite her father's contentions about it because of the fact that Percy was already married to someone else. The two eloped and went to Europe with Mary's step sister in tow. They returned in September 1814. Mary Shelley still feels the wrath and disapproval of his father for what she did. The situation was even aggravated by the fact that she was unmarried and pregnant. Years later, when she returned to England after staying in Italy, Mary still bears the disapproving looks of other people because of her actions that are against the usual norms back then (The Literature Network). In the year 1816, the couple went abroad again in Geneva to meet with Byron. During their stay there, Byron suggested that they all write a ghost story. It is during this time that the story of Frankenstein was born. This story that Mary Shelley wrote was later published as a novel. Later on at that same year, Percy's wife committed suicide by drowning herself, which is why Percy and Mary's wedding took place in December. The last years of Mary's married life are characterized by tragic incidents. She lost her half sister as well as two of her children. This eventually becomes the reason of her depression but the born of Percy her only son and surviving child helped in making her condition better. The married couple moved to Italy. Unfortunately, Mary's husband died during a sailing trip. In order to keep the memory of her husband alive, she published several editions of his writings. She also continued creating her own novels but none equalled the popularity that her Frankenstein novel achieved (Mary Wollstonecraft Shelley). Mary spends the last years of her life with her son and two good friends. She tried to live a simple life that could give her the freedom she never experienced by having such popular parents. She still holds dear her liberal perspective about life but she toned it down to be able to fit in a conservative society that she is in (Mary Wollstonecraft Shelley). Mary Shelley's Frankenstein revolves around the story of a young Swiss student named Victor Frankenstein who discovers how to give life to inanimate objects through his meticulous studying and experiments. He was able to produce a creature by assembling various body parts of different people. This entity that he made was almost similar to a human being but it is far bigger and stronger. Upon the moment that this creature opened his eyes, Frankenstein realized that he actually created a monster. It was also this same demon who murdered his brother, which made Frankenstein realized the mistake he has done (Frankenstein). The creature has to endure a very cruel life after he left Frankenstein laboratory. He experienced being insulted, attacked, and mob by the villagers who were terrified by his grotesque appearance. After experiencing such cruelness, he decided to look for his creator. In doing so, he met his younger brother. After establishing the man's relation with his creator he strangled him to death. When the monster and his creator meet once again, the only request of the creature was for Frankenstein to create a female being with that would be his companion. Frankenstein was hesitant at first but the monster managed to convince him. As he was in the process of creating the monster's female counterpart he started questioning the choice that he made. He was afraid that these creatures might produce a whole race of monsters. When the monster returned to update his progress, he decided to destroy his female creation. The monster cries out in rage and promised that he would be present at Frankenstein's wedding day (Frankenstein). Frankenstein believed that during his wedding day the monster would kill him. However, he was mistaken as her soon to be wife, Elizabeth was the one murdered by the monster. He vowed revenged and started his search for the monster until he found himself in the Arctic region. It is in this place that he met Walton whom he narrated all the incidents that took place. Frankenstein asked Walton to kill the monster if ever he failed to do so due to his worsening condition. Eventually, Frankenstein died due to his illness. After his death, Walton found the monster at the side of Frankenstein's body wherein the creature tells the hardships that he had encountered. The death of his creator made the monster realized that it is also time for him to rest in death as well. Finally, he left the side of creator and disappears in the darkness (Frankenstein). The novel Frankenstein is a product of the literary lifestyle of Mary Shelley in a sense that her life heavily influences the creation of this novel. Shelley's home schooling that greatly focused on the literary works of both her parents enabled her to put their philosophical views in her work. William Godwin, Mary Shelley's father is one of the forerunners of anarchism. He believes in the idea that the evil actions of human beings are only influenced by the corrupt environment that they are in. There is no such thing as innate values or vices; these are just merely acquired through the experiences of human beings in their life history. Being the case, if inpiduals would act accordingly to what they deem as right this would eventually be beneficial for the whole community as well (William Godwin). This is greatly seen in Frankenstein. She points out that the state of the society during the time of the monster's creation greatly influenced who he has become. He was exposed to the cruelties and harshness of society. They immediately judged him based on his appearance and was treated badly because of it. He was not even given the chance to prove himself or established the kind of identity that he wants. Being the case, he acquired this inhumane treatment that he saw in his surroundings and thus also influenced him to commit murderous acts. Shelley also highlighted the idea that it is not the creature's fault that he eventually became a monster but rather the blame should be upon its creator. Frankenstein has too much expectation upon his creation that was not met by the monster when it came to life. Then, he just decided to leave him and eventually the monster has to wonder on his own in the unfamiliar world that he is in. Lacking the guidance or direction of his creator the monster eventually acquires the wrong doings of the people around him. Similarly, Mary Shelley also experienced the same thing because of the high expectations that she has to endure by having two well-known people as her parents. Moreover, the death of her mother also affects her growth. During her childhood nobody guided and nurtured her because her father didn't really have time for her and she resented her stepmother. Losing her mother was also one of the reasons why she felt confused during the early parts of her life. The feminist perspectives of her mother also influenced Shelley to make the importance of females in our society felt in her book. This is seen in her novel through the reaction of Victor Frankenstein while his creation was coming into life, which is very similar to the idea of giving birth. This symbolizes the miscarriages that Shelley has to go through. This also evoked the guilty feeling within her because of the death of her mother due to giving birth to her. Another point that Shelley emphasizes is the idea that ones' identity could be lost when he/she is overpowered by his/her environment. The creature was called by various names by the people around him like monster or the demon. He did not have a name of his own that is uniquely his. This symbolizes the idea that the identity of a person of who he or she would become is often dictated by the society. The norms, values, perceptions, and even the biases and stereotypes that are present within it could very much influence a person. This is exactly what happened when the creature eventually became the monster that the people think he is. Furthermore, the novel also served as a warning in the inpiduals' maximization of potentials through rational thinking. It is during the age of industrial revolution that this novel was made. The lesson that it wants to impart is that people's over utilization of science could in fact have adverse consequences just like what happened to Victor Frankenstein and the monster that he created. Lastly, this novel embodies Mary Shelley's liberalism. She also put into discussion different contemporary issue like the industrial revolution, the corrupt society, as well as the feminist idea that gives due importance to women. Being the case, Mary Shelley proved that she indeed goes beyond societal norms. This is not only reflected in her written works but its very embodiment is seen in her way of life. The kind of lifestyle that fights for what she wants like what she did when she eloped with Percy Shelley and is again proven when she stand up against the disapprovement of the people around her. Mary Shelley tries to be what Frankenstein's creation failed to do and that is to establish ones' identity amidst the dictate of society. The life of a writer affect the outcome of his/her work. Mary Shelleys life history enabled her to create not only a popular novel through Frankenstein but also a narration of her own experiences. This book holds in it a piece of Mary Shelleys very existence. Works Cited Frankenstein. 2008. My Hideous Progeny: Mary Shelley's Frankenstein. 19 May 2008 Merriman, C. D. Mary Wollstonecraft Shelley. 2006. The Literature Network. 19 May 2008 Mary Wollstonecraft Shelley. 2008. My Hideous Progeny: Mary Shelley's Frankenstein. 19 May 2008 . William Godwin. 20 May 2006. Stanford Encyclopedia of Philosophy. 20 May 2008 http://plato.stanford.edu/entries/godwin/>.