¶ … Crepeau (2000) entitled "Reconstructing Gloria" attempts to unsettle rather than describe or confirm existing healthcare paradigms by using a narrative analysis of the team meetings of hospital workers at a mental health facility. Rather than choosing several examples or even a representative example, the author chose a single individual to analyze specifically because the patient elicited such negative responses from the staff. Over the course of the meetings, Crepeau records that Gloria was criticized for refusing to attend group sessions and was seen as being deliberately nonresponsive to treatment.
Throughout her essay, Crepeau criticizes the staff for what she sees as their inability to put their own needs and egos aside and to realize that Gloria's refusal to comply with treatment is itself a symptom of mental illness. "Their comparison to Robin Leach reflected the staff's disregard of Gloria as a person suffering from mental illness and was clearly illustrated in this interchange" (Crepeau 2000: 773). Gloria is viewed as malingering and refusing to participate out of stubbornness. There is talk of how Gloria is 'writing her ticket' to the state hospital because of her refusal to submit to treatment or participate in group activity. The negative bias of the team members results in a negative outcome for Gloria; based upon the 'story' they have chosen to tell about the patient's intractability.
Rebecca Rogers' article "Through the eyes of the institution: A critical discourse analysis of decision-making in two special education meetings" initially takes a more dispassionate tone, although Rogers concludes that the special education meetings she analyzed through discourse analysis did little to serve the child in question and reflected racist…
Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met
Linguistic analyses of conversational patterns indicate that most pauses can be predicted by linguistic structures, such as clause or sentence breaks" (Levitt, 334) by eliminating some of the non-verbal factors that may tend to undermine these silences, I would find that the interviewee was far more comfortable with the nature of the interview and its opportunity for a free and informal discussion relating to treatment experience, personal history and
" (Halpin and Burt, 1998) DuBois states: "The history of the American Negro is the history of this strife -- this longing to attain self-conscious manhood, to merge his double self into a better and truer self. In this merging he wishes neither of the older selves to be lost. He would not Africanize America, for America has too much to teach the world and Africa. He would not bleach
This is why companies tend to invest large amount of money in training programs for the employees, as well as in motivational schemes that can increase their efficiency in the workplace. Finally, the outcomes in the organization greatly depend on the external environmental factors, in other words on the situation that occurs at a certain point or other. Despite excellent planning and organizing, things can go wrong and the outcome
To make sure that the prisoner's viewpoint is observed, review boards must consist of at least one inmate or inmate representative when examining such research (Kluge, 2010). Children In researches dealing with kids, government laws require that guardians or parents to give authorization. In most cases, the child may assent whenever possible. Parent's authorization is one factor of the "special protections" provided to this vulnerable segment. The need to obtain assent
Cyber Bullying and School Supervision The article reviews the policy vacuum that currently exists when it comes to the legal expectations and obligations of schools to supervise and monitor discourse that occurs online and at the same time balance the safety of students, education and the way they interact in virtual space. The author clearly illustrates using examples how cyber bullying is something very anonymous hence it is very difficult to
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now