How does Giddens solve the problem of agency versus structure?

Question
in an essays of at least 600 words respond, How does Giddens solve the problem of agency versus structure?

To answer this question, you need to explain Gidden’s theory of structuration. Your essay should integrate the following concepts:

The knowledgeability of actors
Unintended consequences and unacknowledged conditions
Recurrent social practices
The duality of structure


 

PLACE THIS ORDER OR A SIMILAR ORDER WITH homework handlers TODAY AND GET AN AMAZING DISCOUNT

get-your-custom-paper

The post How does Giddens solve the problem of agency versus structure? appeared first on homework handlers .

Prepare the consolidated statement of financial position for Cobb Bhd as at 31 December 2011. (Show all workings).

Prepare the consolidated statement of financial position for Cobb Bhd as at 31
December 2011. (Show all workings).

Question 1 (Total: 30 marks)
On 1 January 2011 Cobb Bhd acquired 80% of Eatwell Bhd’s equity shares in a
share exchange of two shares in Cobb Bhd for every one share in Eatwell Bhd. The
market prices of Cobb Bhd’s and Eatwell Bhd’s shares at the date of acquisition
were RM4.00 and RM5.00 each respectively. In addition, Cobb Bhd agreed to pay a
further amount on 1 January 2012 that was dependent upon the post-acquisition
performance of Eatwell Bhd. At the date of acquisition Cobb Bhd assessed the fair
value of this contingent consideration at RM10 million, but by 31 March 2012 it was
clear that the actual amount to be paid would be only RM8 million (ignore
discounting). Cobb Bhd has recorded the share exchange and provided for the
initial estimate of RM10 million for the contingent consideration.
On 1 July 2011 Cobb Bhd also acquired 35% of the equity shares of Daly Sdn Bhd
paying RM3.00 in cash per acquired share and issuing one 7% loan note with face
value of RM180 for every 100 shares acquired in Daly Sdn Bhd. This consideration
has also been recorded by Cobb Bhd.
Cobb Bhd has no other investments. The summarised statements of financial
position of the three companies at 31 December 2011 are:
Cobb
Bhd
Eatwell
Bhd
Daly
Sdn Bhd
RM’000 RM’000 RM’000
Non-current assets
Property, plant and equipment 80,000 51,000 42,000
Investments 124,480 Nil Nil
204,480 51,000 42,000
Current assets
Inventory 45,000 20,000 10,000
Trade receivables 20,600 4,000 6,000
Total assets 270,080 75,000 58,000
Equity and liabilities
Equity
Equity shares of RM1 each 100,000 15,000 11,000
Share premium 32,000 Nil Nil
Retained earnings
– at 1 January 2011 32,400 43,000 25,000
– for year ended 31 December 2011 22,000 3,000 10,000
186,400 61,000 46,000
Sunway University Business School Sample ACC3054 Final Examination
3
Non-current liabilities
7% loan notes 29,000 4,000 Nil
Current liabilities
Contingent consideration 10,000 Nil Nil
Other current liabilities 44,680 10,000 12,000
Total equity and liabilities 270,080 75,000 58,000
Additional information:
i. The fair values of the net assets of Eatwell Bhd at the date of acquisition
were equal to their carrying amounts with the exception of an item of plant
which had a carrying amount of RM8 million and a fair value of RM15
million. The fair values of the plant have not been reflected in Eatwell Bhd’s
financial statements. This plant had a remaining life of five years (straight-line
depreciation) at the date of acquisition of Eatwell Bhd. All depreciation is
charged to cost of sales.
ii. Also at the date of acquisition, Eatwell Bhd had an intangible asset of
RM1,000,000 for software in its statement of financial position. Cobb Bhd’s
directors believed the software to have no recoverable value at the date of
acquisition. Eatwell Bhd wrote it off shortly after its acquisition.
iii. At 31 December 2011 Cobb Bhd’s current account with Eatwell Bhd was
RM6.8 million (debit). This did not agree with the equivalent balance in
Eatwell Bhd’s books due to some goods-in-transit invoiced at RM3.6 million
that were sent by Cobb Bhd on 29 December 2011, but had not been
received by Eatwell Bhd until after the year end. Cobb Bhd sold all these
goods at cost plus 50%.
iii. In addition, Eatwell Bhd transferred some goods to Cobb Bhd for cash of
RM2.1 million in November 2011. This transfer price has been marked up by
20%. At the end of the financial period, Cobb Bhd has sold 80% of these
goods to unrelated customers at market price.
iv. Cobb Bhd’s policy is to value the non-controlling interest at fair value at the
date of acquisition. For this purpose Eatwell Bhd’s share price at that date
can be deemed to be representative of the fair value of the shares held by
the non-controlling interest.
v. Impairment tests were carried out on 31 December 2011 which concluded
that the value of the investment in Eatwell Bhd was not impaired but, due to
poor trading performance, consolidated goodwill was impaired by RM6.5
million.
vi. Assume all profits accrue evenly throughout the year and ignore the effect of
deferred taxation on all necessary fair value and consolidation adjustments.
Sunway University Business School Sample ACC3054 Final Examination
4
vii. Assume the market price of Cobb Bhd’s shares is a reliable indicator of the
purchase consideration transferred to acquire Eatwell Bhd.
Required
(a) Prepare the consolidated statement of financial position for Cobb Bhd as at 31
December 2011. (Show all workings).
(23 marks)
(b) Explain what “non-controlling” is and the accounting implications it has on the
preparation of the consolidated financial statements. Critically discuss whether
the non-controlling interest of a group should qualify as equity or a liability with
reference to the Framework for the Preparation and Presentation of Financial
Statements.
(7 marks)


 

PLACE THIS ORDER OR A SIMILAR ORDER WITH homework handlers TODAY AND GET AN AMAZING DISCOUNT

get-your-custom-paper

The post Prepare the consolidated statement of financial position for Cobb Bhd as at 31 December 2011. (Show all workings). appeared first on homework handlers .

Describe basic information systems security issues and concerns.

CMGT/442 Information Systems Risk Management Copyright ©2015 by University of Phoenix. All rights reserved. SYLLABUS Course Description This course identifies and defines the types of risks that information systems professionals need to consider during the development and implementation of computer-based information systems. This course will survey remedies and prevention techniques available to address the risk areas presented. Organizational policies, project management, and procurement considerations will also be examined relative to development, implementation, and use of computer-based information systems. Course Dates Aug 04, 2015 – Sep 07, 2015 Faculty Information • Academic Policies • Instructor Policies University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Academic Resources • Course Software Instructions Check the Course Software link to see if this course requires additional software. We do not recommend trial software versions because they expire. SupportingMaterial Course Software • Virtual Organizations Instructions Access The Virtual Organizations link. SupportingMaterial Virtual Organizations • The College of IS&T Website Instructions Access the College of IS&T Website link. SupportingMaterial The College of IS&T Website Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents (both located on your student website): Policies Name : CRAIG MC CORMICK (PRIMARY) Email Address : Phone Number : See Policies Get Ready for Class • Familiarize yourself with the textbooks used in this course. Instructions Crouhy, M., Galai, D., & Mark, R. (2014). The essentials of risk management. New York, NY: McGraw-Hill. Laudon, K. C., & Laudon, J. P (2014). Management information systems. Boston, MA: Pearson. Pressman, R., & Maxim, B. (2015). Software engineering: A practitioner’s approach (8th ed.) New York, NY: McGrawHill. Raydugin, Y. (2013). Project risk management. Hoboken, NJ: Wiley. Schwalbe, K (2014). Information management: Project management (7th ed.). Boston, MA: Course Technology/Cengage Learning. • Review the Read Me First Instructions Review the Read Me First. SupportingMaterial Read Me First Course Materials All electronic materials are available on your student website. Week1 Aug, 04 – Aug, 10 Enterprise Information Systems Risk Management 1.1 Recognize the importance of Information Systems Risk Management. 1.2 Identify organizational issues and concerns. 1.3 Describe basic information systems security issues and concerns. Objectives/Competencies Required Learning Activities • Learning Team Instructions: Learning Team Charter Resource: Learning Team Toolkit Complete the Learning Team Charter. Learning Team Charter Support Material Instructions • Learning Team Instructions: Risk Assessment McBride Financial Services, one of the Virtual Organizations, is currently opening offices in Boise, Idaho and Sioux Falls, South Dakota. Select one of the locations and prepare a comprehensive risk assessment (following the “Learning Team Assignment Outline” for McBride’s management team. The risk assessment should identify potential risks that could impact the operation of the business, including its technological operations. The written assessment should be 8 to 10 pages in length and will be submitted to the instructor during Week Five. In addition, the Learning Team will prepare a 10 slide Microsoft® PowerPoint® presentation of the project which will also be submitted to the instructor during Week Five. In preparing the risk assessment, be sure to consider critical assets/services, common information technology risks and the following: • The use of toxic chemicals in the vicinity of the business by manufacturing processes industrial solvents, blue print Instructions machines, etc. • Public transportation facilities that might handle the carriage of dangerous or hazardous substances, which could be involved in major accidents • Potential targets of criminal activity • Potential targets of terrorist activity such as government offices, law enforcement agencies, or politically sensitive businesses or services Virtual Organizations Learning Team Assignment Outline Support Material • Toolwire® Student Desktop: Microsoft® Excel®; Visio®; PowerPoint® Access to Toolwire® Student Desktop: Microsoft® Excel®; Visio®; PowerPoint® Instructions • Ch. 1, “Risk Management: A Helicopter View”, of The Essentials of Risk Management. Read Ch. 1, “Risk Management: A Helicopter View”, of The Essentials of Risk Management. Instructions • Ch. 2, “Corporate Risk Management: A Primer”, of The Essentials of Risk Management. Read Ch. 2, “Corporate Risk Management: A Primer”, of The Essentials of Risk Management. Instructions • Ch. 8, “Securing Information Systems”, of Management Information Systems. Read Ch. 8, “Securing Information Systems”, of Management Information Systems. Instructions • Supporting Activity: Risks of Undigitized Data What special issues must be considered for corporate data which are not fully digitized? What are the risks associated with the loss of these data? What recovery procedures do you recommend for these situations? Instructions • Supporting Activity: Risk of the Web What special issues must be addressed for a risk management strategy that supports user-facing, web-based systems? What are the risks associated with disruption of these systems? Instructions • Supporting Activity: Risk Mitigation Strategy Craft an email to your CIO making the case for one of the four risk mitigation strategies (avoid, transfer, mitigate, and keep.) Defend your recommendation. Instructions • Supporting Activity: Research Find a current article about outsourcing and discuss its relevance to this week’s individual assignment. Instructions Assignments See the student website for additional recommended learning activities that may help you learn this week’s concepts. Title Type Due Points Week One Participation Instructions:Participate in class activities. Individual Aug 10, 2015 11:59 PM 4 Outsourcing risks Instructions: Assignment Preparation: Activities include completing the SkillSoft courses, the PowerPoint review, independent student reading, and research. • Complete the Skillsoft course, “CISSP 2012 Domain: Information Security Governance and Risk Management.” • Complete the SkillSoft course, “Managing Software Project Outsourcing: Dealing with Risks.” • Review “How to add narration to a presentation.” Click on the PowerPoint help icon and search. Assignment: Prepare a 6-10 slide narrated PowerPoint presentation that identifies the possible risks to an organization in each of the following outsourcing situations: • The use of an external service provider for your data storage. • The use of an enterprise service provider for processing information systems applications such as a payroll, human resources, or sales order taking. • The use of a vendor to support your desktop computers. • The use of a vendor to provide network support. The presentation will include a risk mitigation strategy for each situation. One mitigation strategy, because of personnel and facility limitations, cannot be proposed, because it eliminates the outsourcing by bringing the situation in house. SupportingMaterial:Week 1 Individual Assignment Rubric Individual Aug 10, 2015 11:59 PM 10 Learning Team Charter Complete and submit a learning team charter Instructions: Complete and submit a learning team charter. One student from each team to submit the file. Learning team Aug 10, 2015 11:59 PM 1 Week2 Aug, 11 – Aug, 17 Project Management of Risk 2.1 Recognize how Project Management can aid in risk management. 2.2 Compare risk management practices. 2.3 Formulate a risk management and mitigation plan. Objectives/Competencies Required Learning Activities • Ch. 2, “The Project Management and Information Technology Context,” of Information Technology Project Management. Read Ch. 2, “The Project Management and Information Technology Context,” of Information Technology Project Management. Instructions • Ch. 11, “Project Risk Management,” of Information Technology Project Management. Read Ch. 11, “Project Risk Management,” of Information Technology Project Management. Instructions • Ch. 35, “Risk Management,” of Software Engineering: A Practitioner’s Approach. Read Ch. 35, “Risk Management,” of Software Engineering: A Practitioner’s Approach. Instructions • Supporting Activity: Risk Appetite Discuss the possible differences in risk appetite between IT departments in a start-up smartphone app development company and a traditional Fortune 500 firm. Instructions • Supporting Activity: List of Risks Your consulting organization has been hired to develop computer systems for the United Nations in the Middle East. Develop a list of man-made and natural risks that might apply to this particular situation. Explain each risk in detail. Instructions • Supporting Activity: Research Find a current article about risk management and discuss its relevance to this week’s individual assignment. Instructions Assignments See the student website for additional recommended learning activities that may help you learn this week’s concepts. Title Type Due Points Week Two Participation Instructions:Participate in class discussion. Individual Aug 17, 2015 11:59 PM 4 Learning Team: Risk Assessment Task List Instructions: Submit the following items to your facilitator: Create a project task list for your Learning Team that identifies all of the tasks that your Learning Team needs to complete for the project, assignments of appropriate team members to project tasks, and due dates when tasks need to be completed for team review and integration into your Learning Team project. Refer to the assignment description and “Learning Team Assignment Outline” in week 1. Learning team Aug 17, 2015 11:59 PM 2 Risk Information Sheet Instructions: Assignment Preparation: Activities include completing the SkillSoft® courses, the Microsoft® PowerPoint® review, independent student reading, and research. • Complete the Skillsoft® course, “Identifying project risks.” • Complete the Skillsoft® course, “Performing risk analysis.” • Complete the Skillsoft® course, “Risk management planning.” • Complete the Skillsoft® course, “Risk response and control.” Assignment: The Stevens Company is converting from the SQL Server database to the Oracle® database. Using the sample shown below, create a Risk Information Sheet for at least five risks that might be encountered during the conversion. Risk Information Sheet Risk id: PO2-4-32 Date: March 4, 2014 Probability: 80% Impact: High Description: Over 70% of the software components scheduled for reuse will be integrated into the application. The remaining functionality will have to be custom developed. Refinement/Context: • Certain reusable components were developed by a third party with no knowledge of internal design standards. • Certain reusable components have been implemented in a language that is not supported on the target environment. Mitigation/Monitoring: • Contact third party to determine conformance to design standards. • Check to see if language support can be acquired. Management/Contingency Plan/Trigger: • Develop a revised schedule assuming that 18 additional components will have to be built. • Trigger: Mitigation steps unproductive as of March 30, 2014 Current Status: In process Originator: Jane Manager SupportingMaterial:Access to SkillSoft® Courses; Modules; eBooksToolwire® Student Desktop: Microsoft® Excel®; Visio®; PowerPoint®Week 2 Individual Assignment Rubric Individual Aug 17, 2015 11:59 PM 10 Week3 Aug, 18 – Aug, 24 Risk Model Overview 3.1 Examine the risk control process. 3.2 Compare and contrast various risk control models. 3.3 Create a risk assessment matrix. Objectives/Competencies Required Learning Activities • Ch. 2, “Main Components of a Risk Management System,” of Project Risk Management. Read Ch. 2, “Main Components of a Risk Management System,” of Project Risk Management. Instructions • Ch. 3, “Adequacy of Methods to Assess Project Uncertainties,” of Project Risk Management. Read Ch. 3, “Adequacy of Methods to Assess Project Uncertainties,” of Project Risk Management. Instructions • Supporting Activity: Risk Management Process Might an effective risk management plan be considered a process that may restore all systems, businesses, processes, facilities, and people? What are the major issues to consider? Instructions • Supporting Activity: Security Risks Supporting Activity Preparation: Activities include the Service Request review. • Review Service Request SR-HT-001 for Huffman Trucking Company. Supporting Activity: Discuss the considerations necessary to address the possible security requirements and the possible risks associated with the Benefits Elections Systems being requested by the Service Request. Instructions • Supporting Activity: Research Find a current article about risk assessment and discuss its relevance to this week’s individual assignment. Instructions Assignments See the student website for additional recommended learning activities that may help you learn this week’s concepts. Title Type Due Points Week Three Participation Instructions:Participate in class activities. Individual Aug 24, 2015 11:59 PM 4 Learning Team: Risk Assessment Week 3 Project Report Instructions: Submit the following items to your facilitator: A team progress report to your instructor explaining what your team accomplished during the week, challenges your team faced, and potential approaches to the Final Learning Team Project Learning team Aug 24, 2015 11:59 PM 2 Risk Assessment Matrix Instructions: Assignment Preparation: Activities include watching the Lynda.com videos, the figure reviews, independent student reading, and research. • Watch “Envisioning: Project Selection and Design: Deriving your risk management approach” of the Lynda.com “Agile Project Management” video. • Watch “Exploring: Managing the Building Process: Managing issues and risks” of the Lynda.com “Agile Project Management” video. • Watch “Planning a project: Identifying risks” of the Lynda.com “Project Management Fundamentals” video. • Review Figure 3.2 of Project Risk Management. • Review Figure 35.1 of Software Engineering: A Practitioner’s Approach. Assignment: Create a risk assessment matrix for the purchase and integration of six new web servers for a start-up Internet firm. – Begin with RAM Template (with example) Exel file attached here to the assignment desription. Populate with at least five risks of your choosing. – Based on a template from the course texts or your research, create a matrix of your own, which lists risks, probability and impact (scores 1 for low through 5 for very high), and then multiple the two numbers for each risk to attain a a risk score. Add a column to your matrix to summarizing mitigations for each of the risks. – Wite an approximately one and one-hlaf to two page summary explaining why your risks were placed where you’ve placed them on the grid and any additional considerations for risk priorities. Submit the Excel file with the RAM grid, your RAM (with scores and overall risk rankings..) and Word document. SupportingMaterial:Access to Lynda.com® – videosWeek 3 Individual Assignment RubricRAM Template Individual Aug 24, 2015 11:59 PM 10 Week4 Aug, 25 – Aug, 31 Deterministic and Probabilistic Methods 4.1 Examine deterministic risk assessment methods. 4.2 Examine probabilistic risk assessment methods. 4.3 Create a Monte Carlo simulation. Objectives/Competencies Required Learning Activities • Ch. 4, “Uncertainty Identification,” of Project Risk Management. Read Ch. 4, “Uncertainty Identification,” of Project Risk Management. Instructions • Ch. 8, “Risk management Tools,” of Project Risk Management. Read Ch. 8, “Risk management Tools,” of Project Risk Management. Instructions • Ch. 9, “Risk-Based Selection of Engineering Design Options,” of Project Risk Management. Read Ch. 9, “Risk-Based Selection of Engineering Design Options,” of Project Risk Management. Instructions • Ch. 13, “Preparations for Probabilistic Analysis,” of Project Risk Management. Read Ch. 13, “Preparations for Probabilistic Analysis,” of Project Risk Management. Instructions • Supporting Activity: Decision Tree Use Microsoft® Visio®, PowerPoint®, or Word to create a decision tree diagram for the selection of a cell phone. Address risk in your decision tree. Toolwire® Student Desktop: Microsoft® Excel®; Visio®; PowerPoint® Support Material Instructions • Supporting Activity: Risk Breakdown Structure The University of Phoenix has funded a project to revise the online classroom. Develop a list of risk breakdown structure (RBS) categories for this purpose. Justify each category within your RBS. Instructions • Supporting Activity: Unknown Unknowns What defines room for unknown unknowns? Instructions Assignments See the student website for additional recommended learning activities that may help you learn this week’s concepts. Title Type Due Points Week Four Participation Instructions:Participate in class activities. Individual Aug 31, 2015 11:59 PM 4 Learning Team Assignment: Risk Assessment Week 4 Project Report Instructions: Submit the following items to your facilitator: A team progress report to your instructor explaining what your team accomplished during the week, challenges your team faced, and potential approaches to the Final Learning Team Project Learning team Aug 31, 2015 11:59 PM 2 Monte Carlo Method Instructions: Assignment Preparation: Activities include completing the SkillSoft® courses, watching the Lynda.com® videos, independent student reading, and research. • Complete the Skillsoft® course, “Basic Statistics and Graphical Methods for Six Sigma.” • Complete the Skillsoft® course, “Risk Management: Assessing Risk.” • Watch the Lynda.com video, “Up and Running with Excel What-If Analysis.” • Watch the Lynda.com video, “What do you need to know to be an analytics professional?” • Watch “Performing Monte Carlo Simulation” of the Lynda.com “Up and Running with Excel What-If Analysis,” video. Assignment: Recreate the simulation presented in the “Performing Monte Carlo Simulation” video. Submit the Microsoft® Excel® spreadsheet along with a 1- to 2-page explanation on how the Monte Carlo tool can be used in risk assessment. SupportingMaterial:Access to SkillSoft® Courses; Modules; eBooksAccess to Lynda.com® – videosWeek 4 Individual Assignment Rubric Individual Aug 31, 2015 11:59 PM 10 Week5 Sep, 01 – Sep, 07 Procurement Risk 5.1 Identify procurement uncertainties. 5.2 Examine methods for managing procurement risks. 5.3 Apply risk management methodologies in situational cases. Objectives/Competencies Required Learning Activities • Ch. 12, “Project Procurement Management,” of Information Technology Project Management. Read Ch. 12, “Project Procurement Management,” of Information Technology Project Management. Instructions • Ch. 10, “Addressing Uncertainties through Procurement,” of Project Risk Management. Read Ch. 10, “Addressing Uncertainties through Procurement,” of Project Risk Management. Instructions • Supporting Activity: Procurement Risks The University of Phoenix has funded a project to revise the online classroom. Use the Microsoft® Visio® Brainstorming Diagram Template to visually depict possible sources of procurement risk. Toolwire® Student Desktop: Microsoft® Excel®; Visio®; PowerPoint® Support Material Instructions • Supporting Activity: Procurement Decisions Supporting Activity Preparation: Activities include the figure review. • Review Figure 9.1 of Project Risk Management. Supporting Activity: Design a quantitative bid evaluation template for making a procurement decision for the selection of laptops across four vendors. Use Figure 9.1 as an example. Ch. 9, “Risk-Based Selection of Engineering Design Options,” of Project Risk Management. Support Material Instructions • Supporting Activity: Research Find a current article about procurement and discuss its relevance to this week’s Learning Team assignment. Instructions Assignments See the student website for additional recommended learning activities that may help you learn this week’s concepts. Title Type Due Points Week Five Participation Instructions:Participate in class activities. Individual Sep 07, 2015 11:59 PM 4 Learning Team: Risk Assessment Project Instructions: Finalize and submit the risk assessment. SupportingMaterial:Learning Team Assignment Rubric Learning team Sep 07, 2015 11:59 PM 18 Learning Team: Risk Assessment Presentation Instructions: Finalize and submit the Microsoft® PowerPoint® presentation. SupportingMaterial:Learning Team Assignment Rubric Learning team Sep 07, 2015 11:59 PM 5 Your Career Instructions: Assignment Preparation: Activities include completing the SkillSoft® courses, independent student reading, and research. • Complete the Skillsoft® course, “Planning Project Procurement.” • Complete the Skillsoft® course, “Managing Procurements.” Assignment: Write a 1- to 2-page paper discussing what professional organizations you might join, and websites you might visit, that would provide insight into a career that includes responsibility for risk management? SupportingMaterial:Access to SkillSoft® Courses; Modules; eBooksCMGT442 Individual Assignment Rubric Individual Sep 07, 2015 11:59 PM 10 All trademarks are property of their respective owners. University of Phoenix® is a registered trademark of Apollo Group, Inc. in the United States and/or other countries. Microsoft®, Windows®, and PowerPoint® are registered trademarks of Microsoft Corporation in the United States and/or other countries. All other company and product names are trademarks or registered trademarks of their respective companies. Use of these marks is not intended to imply endorsement, sponsorship, or affiliation. Trademark


 

PLACE THIS ORDER OR A SIMILAR ORDER WITH homework handlers TODAY AND GET AN AMAZING DISCOUNT

get-your-custom-paper

The post Describe basic information systems security issues and concerns. appeared first on homework handlers .

Discuss this character’s neurotic needs and trends

Television provides us with many interesting examples of interpersonal and neurotic behaviors. In this assignment, you will delve into the life and actions of some of your favorite television characters and analyze them using Horney’s coping strategies.

Interestingly, Horney’s three coping strategies for one’s neurotic needs correlate very well with three of Adler’s different personality types:

Horney’s moving-toward strategy—Adler’s getting or leaning type Horney’s moving against—Adler’s ruling or dominant type Horney’s moving away from—Adler’s avoiding type Using Horney’s theory of coping with neurotic needs with three different interpersonal orientations, select a TV program of your choice containing a character that Horney would identify as exhibiting neurotic behaviors. As you watch a full episode of this show, focus on this character and tally each instance of moving-toward, moving-against, and moving-away behavior.

Research Horney’s theory using your textbook, the Internet, and the Argosy University online library resources. Based on your research, respond to the following:

Discuss this character’s neurotic needs and trends. What do you think has happened in his/her life that has led to these behaviors? In addition to general life events, how has gender and culture influenced the character’s neurotic needs and behaviors? How do these interpersonal orientations impact the way this character interacts with others and develops relationships? Write your initial response in 4–5 paragraphs. Apply APA standards to citation of sources.

Second Assignment

Assignment 2: Case of Anna O

One of the very first cases that caught Freud’s attention when he was starting to develop his psychoanalytic theory was that of Anna O, a patient of fellow psychiatrist Josef Breuer. Although Freud did not directly treat her, he did thoroughly analyze her case as he was fascinated by the fact that her hysteria was “cured” by Breuer. It is her case that he believes was the beginning of the psychoanalytic approach.

Through your analysis of this case, you will not only look deeper into Freud’s psychoanalytic theory but also see how Jung’s neo-psychoanalytic theory compares and contrasts with Freud’s theory.

Review the following:

The Case of Anna O.

One of the first cases that inspired Freud in the development of what would eventually become the Psychoanalytic Theory was the case of Anna O. Anna O. was actually a patient of one of Freud’s colleagues Josef Breuer. Using Breuer’s case notes, Freud was able to analyze the key facts of Anna O’s case.

Anna O. first developed her symptoms while she was taking care of her very ill father with whom she was extremely close. Some of her initial symptoms were loss of appetite to the extent of not eating, weakness, anemia, and development a severe nervous cough. Eventually she developed a severe optic headache and lost the ability to move her head, which then progressed into paralysis of both arms. Her symptoms were not solely physical as she would vacillate between a normal, mental state and a manic-type state in which she would become extremely agitated. There was even a notation of a time for which she hallucinated that the ribbons in her hair were snakes.

Toward the end of her father’s life she stopped speaking her native language of German and instead only spoke in English. A little over a year after she began taking care of her father he passed away. After his passing her symptoms grew to affect her vision, a loss of ability to focus her attention, more extreme hallucinations, and a number of suicidal attempts (Hurst, 1982).

Both Freud and Jung would acknowledge that unconscious processes are at work in this woman’s problems. However, they would come to different conclusions about the origin of these problems and the method by which she should be treated.

Research Freud’s and Jung’s theories of personality using your textbook, the Internet, and the Argosy University online library resources. Based on your research, respond to the following:

Compare and contrast Freud’s view of the unconscious with Jung’s view and apply this case example in your explanations. On what specific points would they agree and disagree regarding the purpose and manifestation of the unconscious in the case of Anna? How might they each approach the treatment of Anna? What might be those specific interventions? How might Anna experience these interventions considering her history? Write a 2–3-page paper in Word format. Apply APA standards to citation of sources.


 

PLACE THIS ORDER OR A SIMILAR ORDER WITH homework handlers TODAY AND GET AN AMAZING DISCOUNT

get-your-custom-paper

The post Discuss this character’s neurotic needs and trends appeared first on homework handlers .