Free Essay

# Dual Identity

Submitted By bravoyo
Words 834
Pages 4
! " #\$ % "&\$ ( , :5';8*

'())

! \$ " \$ ., " , % & " % ' ( )

, " " &3

"

A
1

c r
'
4

iv h
" " , % & , # " "
, ,

o e
+ / " & ( "

"

S f
& * , "0 # "

D I
" # ) " !

+1 2 *

1 56'7'8959

185'8'8955

www.SID.ir

, * + " " , "

% & " \$ " " " % = + % " " " % 2 " 2> 0 3 3 " , " " &3 , "0 < , " & , "0 " , "

,

" ,

A
* "

c r
'

iv h
" ) " ) < ?

o e
) " ? "

S f
( "0 / , 3

D I
& " / * 12

3,

2 "

( '

www.SID.ir

" , " , ?\$ " " , " ) , # " ) , > " , " & 2 " 3@ ? '

" ,

> /

A
< , >

c r
& "

iv h
" ) ) >

o e
" 1 " A + > , > ,>

S f
" 1 !

D I
" , " " 0

" &

> *

( ) ) ,B

www.SID.ir

" " = " 2> " ! " ! ,5;7G1 " " " " " " > ) ! " 2 , 3C > , (5D78 , :9':;* " " " , > " C +A,

2 " .,

\$

"

A
< 2

c r
& " "

iv h
3 " \$ " +, = "

) A

o e
" " ) " 2 ' " )

S f
, 3 " " " " , "

D I
E " "

F

31

)

< '

www.SID.ir

+ & 5DD7 5;*,

,(

"

" , 2 3 % & ' " \$ , % & # # ) F ' , F & H " DI55 " F , ! , + % E B & F F ' "

2

2 "

r A
3 " 3 +

h c
F " , " -

' " +

iv
, ) F

o e
< 0 " 2 J

S f
" + " )

D I
2 , ' " ) ,

'

& "

,

3

" &

"

,

, + " 3 2" " "0 % & ,3

, "

" F

www.SID.ir

F " % & # "

, ! 2

3 , " "

, 2 F -

H &, " " ,

-&

J F # , (G7*, " & & + J , "

A
+ 1

c r
, "

2

"

iv h
' 3 " "

o e
' 2 " " " ( *

S f
" 1 ,

F

D I
& + " A ' "

&

3 (KG* 0 "

" 3 (58K*

" , 1 #

www.SID.ir

& &" DI55 " F + % F -C " " ) " , " " ? ? " , ' & F " " / < " + " &

&

" , ( , 5GK*

, " " & " "

r A
* ? " + " L " 1

h c
?( " 0

iv
" " )

o e
, E , " ,;D* " ( 1 2! * ,2 )

"

S f
? ) "

,

D I
& " " ? ( ? , " ?

"

5DD7

3 ( , 5K7*, "

& % & " " F +

,H " ,3( ,58:* - "

www.SID.ir

% E B & F % & , ! " F " " " F & , F / ' " ,F F ) & " F " " ,

" " ,

A

c r
" , M

&

iv h
) & " F "

o e
, , " " + ,

S f
, ) " " 3

D I
, , , < "

"

2

, " + ,E

F

,

www.SID.ir

& + , " " " , , " , " " , " ,E M ,, "

) & ( / F , \$ " & * " F

, F

A

c r
'' " " ''

iv h
& ) , / "

"

o e
, ) 1 " ) ''

S f
" " , "

"

D I

" "

" " ) '' )

''

''

&

www.SID.ir

, & " ( " 5DD7 , 5;7* F

(

* " , & , 2 " " F " & " 2 , 3 + /

0 " " " 3 " F , " & 3J + " +

,

F

\$

A
"

c r
1

iv h
' 2 " " "

/

o e
3 # , F

S f
3 " , " /

D I
% & % & + 2 ) , 2

" ( 8998 ,

69K*,

)

www.SID.ir

, , " % & E " ,? ? & ,,,?( ,589* B & & ' F 0 ? ,( % " , 8998 , 69G*,

" F

' & " & " 1 / '" ,

)

A
"

c r
" F H , ?!

,!

iv h
' F %

o e
" " 0 " ) " " F

"

S f
" " , "

D I
' ' & ,

>

& & ' M ?( ,7D*, " " M ' & '

)

www.SID.ir

" , F # < DI55 & '? ? ( ,5GD* " &M , M , M ' ' . " " 1? E B & ,?( ,;K* '" & )

# " "

, ( ,557* F "

r A
&

h c
+ & ,

iv
"0 1 & !

3 ( , 5;D*,

o e
12 F < C &

S f
F < , C

&

D I
M ,

" ,N "

+ "

+ &

&

www.SID.ir

" , ( , K;* F 1 & &C " F '% & ' , ! F & , & " F 0 " ,H ,F M

"

"

'

/ & , " & , ( , KG* C

% , "

-

r A
" , 2( * "

h c
, " ,

iv
M " )

o e
+ " &

S f
" D'55 M , F "

&"

D I
" " " DI55

+

F " 3 ( ,87*

, ,

" " F

www.SID.ir

) , % # F % & + " 55 , & ' 1 &" & " / & C" , C & & " & " L> " L > " " & & " &, , C , &
! "

" ,F " + " #\$%& \$ ' \$ J ,

E <

B &

" &

"
"

r A
J " ,

h c
L "
"

iv
& " F
)

, ( ,5G:* F

o e
" , J > , "
*

S f
C F F '
*

D I
< " '

L

"

,
\$%

(

F

% & "

,

-

www.SID.ir

F

+ ) " 1 O " , \$ 1 A C" , > ' , 2 " + C ( ,568*, " % & F 1 & F / C %

"

F F "

+ " & 3 "

O

&

> , !

r A

h c

iv
) E "

o e
C B & & , \$ " " 1 "

S f
" "

D I
, / & / " , "

65'68 % &

" "

, E " , " ( ,559*,

www.SID.ir

F + F

+

) & F / + & + " , L & % & ,

" & + L ,

% & F , ,B , F

1 " < & J A

, C C " ,( ,K:*

"0

" F F , 2 B &+ + +

F

A
&C

" ( ,G:*, F

c r
C

iv h
" " F , \$

o e
1 C ,

S f
& " "

&

D I
" =B & E , B & " ,\$

) ,\$

1

"

www.SID.ir

C " F " , , 2H L( ,57;* N F " " ) E ' "0 # F # F + ! + ) ,\$ B & < 3 ( ,558*, ,\$ " A " " # " F

" & ,( ,5;G* " 0 ,

"

% & "

!

r A
" + < O

"

h c
1 /

iv
+ & &

o e
+ ' " , " " " " '

" &

S f
1 " E " , " 2

D I
" B & " , "

12

"

,F #

3 F

% & "

-

" # / ! ,

www.SID.ir

( , K9*, F & & " 1 " + " & F

"

< " ' & ( , 5;6*, &

,

" & F

" " +

"

C

r A
,# , F

h c
< \$

iv
+ &

o e
, \$ " + " DI55

"

"0

S f
& 1 & &

D I
0 & ' "0 " % & C '

/

( , 5G7*,

" 1 ,B

www.SID.ir

, " & " ( , 5:7*, F " ,E & " % & \$ F " ' , & + " ,3 \$ 2 ' " , "

,

" &

#

r A
, O " ) " ,

h c
, " ,

iv
" &

o e
% & + , "

S f
" , "

D I

,

" , >

" & "

F

)

" )

www.SID.ir

-& " " " " " '# " & % & " / ' & ' , # , E & " DI55 F " & 0 , " F " '# " % & , 0 , , / " "

> )

r A
" " F , P 3

h c
' , ,

F

iv
2 " "

o e
# & " 1

S f
, " B & E & 0 " "

D I
, " " ' ,

"

"

#, F

E ' ,

DI55 B &

\$ F ,

www.SID.ir

J P 0+ 1 5;;'GG, F ,3 E H 6 H ,3 J H ,3 J ! J 4 H H J ! J %

(8998* 2-. / , 595,8 169:'65;, \$ J \$ 5 (5DD7* 20 ! , 1(5DD7* 2 , 14 , 5 , #

0

,3

-

(8999* 2 , ,3 " (5D75* 2B & , 56 4

F 22 +

3 +

85

(5;7G* 20 H 0

O F \$
+ ,--

r A
#
\$

(899;* E

h c
% 5 (899G*2 0
\$

iv
%
-

o e
# G9':, , " 1 &
\$

1 F

5 1 F

S f
F , % , & ,

D I
% + , , , /

-

5 ,

-

,

3 E

B &1 F

(5D7K*2% 3 ,-,J

,3 -

# & ;;'7;,

1

2 ++ ,3
*

\$ # B & EB1 \$

(899G* 0 ,

, E

www.SID.ir

\$ E \$ % F 7 / # # % , , ! ,

., ! " J 5 " 2 \$ ( * J

"

(5DD7* 0 ! " ,

\$ % ,3

,

E \$ J

(5DD7* 2 0 , 5G 1 85G'6D, , (899K* = 5 + + \$ +

,

5 ! ,:9D'88, (8997* 3 5 (5D77* , (5D78* 6

+

, 54

& O(5DD7* 0 % 0 ,F

4

r A
/ ,3 % ,

h c
,

iv
(

o e
! " , * ,

/

S f
! " ! " , F " 0 " E

D I
E ! " , 4

B &

QE " ,

1

(5DD8* 2% 2

,

www.SID.ir

### Similar Documents

Free Essay

#### Dual Identity in Mohsin Hamid's the Reluctant Fundamentalist by Daryoosh Hayati

...*Daryoosh Hayati Lecturer of English Language, Lamerd Branch, Islamic Azad University, Iran Journal of Subcontinent Researches University of Sistan and Baluchestan Vol. 3, No.7, summer 2011 (p.p 31-52) East meets West: a Study of Dual Identity in Mohsin Hamid’s the Reluctant Fundamentalist Abstract This essay will present a postcolonial study of how Eastern identity and Western identity clash in The Reluctant Fundamentalist by Mohsin Hamid, the Pakistani- American novelist, and make the character of the protagonist a glocal one, (A mixture of global and local), a term newly coined by Postcolonial scholars to show the ever clashing mixture of global and local dualities in immigrants’ personalities. The basis for this research paper is the postcolonial theories of Edward Said, Fanon and Homi K. Bhabha. The aim is to question simply and sardonically the human cost of empire building, moreover it is discussed how the people in a totally alien culture are faced with different cultural predicaments, dilemmas as well as contradictions threatening their identity. Identity is supposed to be stable, while as this novel indicates, it is more of glocal identity which is at risk due to the cultural conflicts, as a result of which identity and ethnicity are subjected to change for the benefit of the hegemony. In line with Edward Said’s: “the East writes back” it is shown how this novel is a reaction to the discourse of colonization from the Pakistani side (which stands for the......

Words: 7519 - Pages: 31

Premium Essay

#### Erik Erikson

...than a source of pleasure ( Cummings, Braungart- Rieker, & Du Rocher- Schudlich, 2003; Thompson, Easterbrooks, & Padilla- Walker, 2003). The mother’s behavior creates in the infant a sense of mistrust for his or her world that may persist throughout child-hood and into adulthood. STAGE II: AUTONOMY VERSUS DOUBT ( 18 MONTHS TO 3 YEARS) By the age of 2, most babies can walk and have learned enough about language to communicate with other people. Children in the “ terrible twos” no longer want to depend totally on others. Instead, they strive toward autonomy, the ability to do things for themselves. The child’s desires for power and independence often clash with the wishes of the parent. Erikson believes that children at this stage have the dual desire to hold on and to let go. Parents who are flexible enough to permit their children to explore freely and do things for themselves, while at the same time providing an ever- present guiding hand, encourage-age the establishment of a sense of autonomy. Parents who are overly restrictive and harsh give their children a...

Words: 970 - Pages: 4

Free Essay

#### Dual Listing Company

...Lynch The Dual Listings July 2002 EVENT DRIVEN & EQUITY ARBITRAGE SALES FOR INTERNAL USE ONLY Trades Examined: UK - Netherlands Reed Elsevier NV (REN NA) vs Reed Elsevier Plc (REL LN) Royal Dutch Petroleum (RDA NA) vs Shell Transport & Trading Co Plc (SHEL LN) Unilever NV (UNA NA) vs Unilever Plc (ULVR LN) UK - Australia BHP Billiton Ltd (BHP AU) vs BHP Billiton Plc (BLT LN) Brambles Industries Ltd (BIL AU) vs Brambles Industries Plc (BI/ LN) Rio Tinto Ltd (RIO AU) vs Rio Tinto Plc (RIO LN) Introduction: The purpose of this report is to provide a basic overview of the dual-listing environment, highlighting the nature of company structures involved, why the structures were adopted and how they work. Contents: Page 1. Frequently Asked Questions 2 2. Why do Dual Listed Companies Exist? 4 3. Dual Listing Structures 5 4. Currency Risk 6 5. Terminology 7 6. Factors Affecting Performance 8 Appendix 1: Stock Specific Data A.1 Reed Elsevier NV vs Reed Elsevier Plc 10 A.2 Royal Dutch NV vs Shell T&T Plc 12 A.3 Unilever NV vs Unilever Plc 14 A.4 BHP Billiton Ltd vs BHP Billiton Plc 16 A.5 Brambles Ind. Ltd vs Brambles Ind. Plc 18 A.6 Rio Tinto Ltd vs Rio Tinto Plc 20 Glossary of Terms 22 1. Frequently Asked Questions Q. What is a dual listed structure? Where a company is listed on two exchanges it is referred to as a Dual......

Words: 4065 - Pages: 17

Premium Essay

#### Praisesong for the Widow

...R. Sarenka Smith 13 December 2013 Race, Civil Rights, and Literature—Paper #3 Cultural Heritage Through the Creation of Art and Language: Recovering Ancestral Identity in Paule Marshall’s Praisesong for the Widow “People who can’t call their nation. For one reason or another they just don’ know. Is a hard thing. I don’ even like to think about it.” --Lebert Joseph, Praisesong for the Widow Paule Marshall’s autobiographical article “From the Poets in the Kitchen,” published a month before her novel Praisesong for the Widow, describes stories from her childhood that reflect the immigrant experience, addressing the constant presence of the Caribbean and its influence on Marshall’s life while growing up in the United States. Marshall’s mother and her female friends, immigrants from Barbados, would gather in the Marshall kitchen after their days of working in low-paid jobs to chat, gossip, and “tackle the great issues of the time” including the economy, politics, war, and their nostalgia for home. They discussed their adopted home, America—acknowledging both the racism they endured, and also the wealth of possibilities that the country offered. These women and their stories were, for Marshall, the origins of her fiction. She asserts that a writer’s ability to render everyday speech is derived from close listening, and the talk that “filled the kitchen” additionally functioned as a kind of therapeutic catharsis, a release of creative energy. The special kind of...

Words: 2087 - Pages: 9

Premium Essay

#### Conflicts Management

...interdependence and team identiﬁcation ANIT SOMECH1*, HELENA SYNA DESIVILYA2 AND HELENA LIDOGOSTER1 1 2 University of Haifa, Haifa, Israel Emek Yezreel College, Emek Yezreel, Israel Summary The present study explores the dynamics of conﬂict management as a team phenomenon. The study examines how the input variable of task structure (task interdependence) is related to team conﬂict management style (cooperative versus competitive) and to team performance, and how team identity moderates these relationships. Seventy-seven intact work teams from high-technology companies participated in the study. Results revealed that at high levels of team identity, task interdependence was positively associated with the cooperative style of conﬂict management, which in turn fostered team performance. Although a negative association was found between competitive style and team performance, this style of team conﬂict management did not mediate between the interactive effect of task interdependence and team identity on team performance. Copyright # 2008 John Wiley & Sons, Ltd. Introduction In modern organizations, teams have become the method of choice for responding quickly to technological and market changes and thus improving the organization’s chances of survival (Illgen, Hollenbeck, Johnson, & Jundt, 2006; Richter, West, van Dick, & Dawson, 2006). Considerable research effort and human energy have been invested in understanding how to create and develop effective teams (e.g.,......

Words: 11106 - Pages: 45

Free Essay

#### Evolution of Biometeircs

...Evolution of Biometrics kody Saylor Computer security Keisha Nelson December 10, 2013 Biometrics is the use of individual’s physical or behavioral characteristics to uniquely identify them for authentication or identifications purposes. Types of biometrics include: fingerprints, hand geometry, retina and iris patterns, facial recognition, and signature, voice, and keystroke patterns. There has been an evolution between man and machine. Technology has grown in leaps and bounds and today, flesh and machine have been fused together as one. There have been many science fiction novels and movies of chip implantation representing quick identification to a mainframe. Biometric technology has taken the form of this fantasy and turned it into an immeasurable reality. There are potential benefits of an integrated biometrics-based identification system include but not limited to: * The cost of administration. * The reliability of identification. * Access to information held by organizations. * The accuracy and quality of research and statistics. * The level of technical security of communications. In America, there has been a huge debate over whether or not security is taking away our freedom. One instance of security verses freedom is about the recent legislation regarding driver’s licenses incorporating biometric technology. Biometrics is “the statistical study of biological phenomena” (American Heritage Dictionary) or more commonly known as “a......

Words: 1485 - Pages: 6

Premium Essay

#### Comparison of Privacy Laws

...[pic] Data protection and privacy ethical guidelines This document was produced on September the 18th 2009 The version of this document is: 5 Experts Working Group on data protection and privacy Chaired by: Caroline Gans-Combe Special thanks to the Panel Members: Andrew Bottomley, Duarte Carvalho-Oliveira, Costas A. Charitidis, Eva Del Hoyo-Barbolla, Anne Demoisy, Anna Giovanetti, Walter Hannak, James Houghton, David Morton, François Moutou , Jane Lamprill, Antony Lebeau, David Townend, and Mary Sharp. - Very special thanks to the Ethics Team : Isidoros Karatzas, Mihalis Kritikos, Yamina Cheikh, Paulette Matkovic Ramirez, Marie Cocquyt, Marco Michelini, Stefan de Vos and François Hirsch General disclaimer: this document examines the major concepts of data protection and privacy from the point of view of research ethics. It aims at raising awareness about these concepts in the scientific community and at assisting applicants while preparing to submit their project proposals. It does not seek to discuss these concepts in-depth but provides a general overview of their main parameters and some basic suggestions regarding their handling for the purposes of the European Commission's Ethical Review procedure. This document represents an effort to reflect on the experience gained during the operation of the Ethics Review mechanism and to provide some practical guidance, thus it will be regularly updated. The document contains three......

Words: 7265 - Pages: 30

Free Essay

#### A) Based on Marcia’ (1966) and Josselson’s (1971) Psychosocial Perspective, Develop and Present a Set of Questions (an Interview Schedule) as an Instrument to Be Administered to Two Female and Two Male Traditional- Age (

...INSTITUTION: University of the West Indies PROGRAMME: Master of Arts in Higher Education - Student Personnel Administration COURSE TITLE: Introduction to University and College Students' Development Theory EDEA6311 / ED63K MODULE: Course Work ASSIGNMENT: A) Based on Marcia’ (1966) and Josselson’s (1971) Psychosocial Perspective, develop and present a set of questions (an interview schedule) as an instrument to be administered to two female and two male traditional- age (18-21) college/university students. The instrument should seek data on the students’: · Religious choice · Career choice · Attitude towards sex before marriage · The students' opinion on their ideal intimate partner. B). State any identified differences between the responses of the male students and the female students. Analyze the differences (if any) in the responses, based on posits of the two theorists, and any other authors. ©. Based on the findings from the interview, identify the psychosocial development state of each of the four students sampled. Justify your classification with literature. (D) Based on your findings, identify any differences between your findings and the theories that could be a result of a difference in culture. FACILITATOR: Dr. Thelora Reynolds DATE: November 29, 2009 SUBMITTED BY: Marlene......

Words: 4597 - Pages: 19

Free Essay

#### Understand How Individuals and Organizations Make Decisions About the Protection and Usage of Individua

...understand how individuals and organizations make decisions about the protection and usage of individuals' data, and what are the consequences of those decisions. In this document, we report on the economic implications of the protection and revelation of personal data. In particular, we present the evolution of the economic theory of privacy (Section 2), we examine current privacy-related trade-o s for data subjects and data holders (Section 3), and we highlight the current economic debate on privacy protection (Section 4). 1.1 The Boundaries of the Economics of Privacy Before commencing our analysis, we alert the reader of the boundaries inherent to an eco- nomic approach to the privacy debate. First of all, in the rest of the document our focus will be, primarily, on information privacy - that is, on the issues associated with the collection and usage of individuals' personal information (Westin, 1970). We take this approach be- cause, while privacy is a multi-faceted concept, most of the relevant contemporary economic research focuses on consumers' data . Our focus on informational privacy and consumer data, however, should not be construed as a denial of the existence of other dimensions to the pri- vacy debate, which may be more dicult to capture in economic terms (Solove (2006), for instance, distinguishes between privacy issues associated with the collection, processing, or dissemination of personal data, and privacy issues associated with...

Words: 3315 - Pages: 14

Premium Essay

#### Transaction Security Schemes and How to Prevent Them

...Prevent Them Secure Electronic Transaction (SET) was developed to ensure the security of financial transactions on the Internet. It was supported initially by MasterCard, Visa, Microsoft, Netscape, and others. A user is given an electronic wallet and a transaction is conducted and verified using a combination of digital certificates and digital signatures among the purchaser, a merchant, and the purchaser’s bank in a way that ensures privacy and confidentiality. A SET purchase involves three parties: the cardholder, the merchant, and the payment gateway or bank. The cardholder shares the order information with the merchant but not with the payment gateway. He shares the payment information with the bank but not with the merchant. A SET dual signature accomplishes this partial sharing of information: the cardholder makes separate hashes of the order information and the payment information and signs the pair of hashes. Every other party receives the hash of the withheld information and the signature of the pair. Each party can confirm that the...

Words: 3535 - Pages: 15

Premium Essay

#### Corp

...LIFECYCLE OF CORPORATE IDENTITIES Executive Summary The research attempts to explore the need for a change in corporate identity by organizations and to figure-out a pattern, if any, associated with such a change across organizations. As the introduction to the paper we have defined ‘Corporate Identity’, its purpose and elements. In this paper we have limited our case studies to corporate identities that have reflected some kind of a visual change apart from changes in any other element. We have analyzed ten inflexion points ranging from mergers and acquisitions to business re-orientation to changes in organizational culture and how these factors necessitate changes in corporate identity. Based on this we have proposed a model which showcases the growing impact of these factors over time and how the occurrence of World events has intensified the ‘change factors’ which in turn are putting all the more pressure on corporations globally to reconsider their identity. The intensity of these factors would vary from industry to industry, with each industry having a different lifecycle. The model brings out the paradox of shortened lifecycle of corporate identities which itself poses an extraordinary challenge to companies for effectively elongating and managing their identities. Changing ones corporate identity is not only an expensive affair but can also create dissonance in the minds of the stakeholders, if not managed and communicated properly. In order to succeed companies......

Words: 6689 - Pages: 27

Premium Essay

#### Jekyll and Hyde

...Known to be one of Stevenson’s best novels, the novel is about a doctor named Henry Jekyll who struggles with the inner conflict of dual personalities with his hidden evil persona, Edward Hyde. Dr. Jekyll was a prominent doctor who is widely respected in his era. In addition, his friendly demeanor made him well connected and well liked. But despite being so well made, Dr Jekyll was seen spending a great deal of his time battling strong evil urges which he found repugnant for his stature. Believing that two entities were living inside his body, he tries to develop a serum in an attempt to repress such urges, but in doing so, Dr Jekyll unleashed an even more dreadful representation of the pure evil that resided within him, who is known as Mr Hyde. With no moral vindication, Hyde committed heinous acts of brutality and murder with often no remorse. As time went by, Hyde became a larger entity in his body as Jekyll was slowly succumbing to the thrills and immoral freedom that Hyde gave in his rampage. The aforementioned novel was written as a fiction in the Victorian age of the 1800s, but dual personalities are still apparent and very real in today’s context. This behavior is scientifically known as Dissociative Identity Disorder (DID), or better known for its previous appellant, Multiple personality Disorder (MPD). Much like Jekyll and Hyde’s dual personality, these mental disorders are characterized by two or more distinct entities in the mind. People suffering under such......

Words: 1537 - Pages: 7

Free Essay

#### Dr. Jekyll and Mr. Hyde

...deserve the name of literature; it is only a façade.” The Strange Case of Dr. Jekyll and Mr. Hyde, written by Robert Louis Stevenson, reflects Solzhenitsyn’s quote by warning the individual of the evils found in the duplicity of human nature and the threat this may pose to society as a whole. The story of Dr. Jekyll and Mr. Hyde reflects Solzhenitsyn’s belief that literature must inform readers about issues that society faces, or otherwise it is merely a superficial illusion. The story reflects this statement, by exploring the duplicity of human nature, showing how this duplicity can corrupt an individual’s mind, and revealing why humans have this dual nature. The duplicity of human nature is revealed in the book through various aspects of behavior displayed by the characters. The story of Dr. Jekyll and Mr. Hyde reveals the dual nature of humans in the form of an uncontrollable mental disorder. However, Stevenson is not necessarily giving a literal interpretation of this chemically...

Words: 1695 - Pages: 7

Premium Essay

#### Embodying the Gay Self: Body Image, Reflexivity and Embodied Identity

...Copyright © eContent Management Pty Ltd. Health Sociology Review (2010) 19(4): 437–450. Embodying the gay self: Body image, reflexivity and embodied identity DUANE DUNCAN Australian Research Centre in Sex, Health and Society, La Trobe University, Melbourne, VIC, Australia ABSTRACT The emphasis on a sexualised muscular body ideal in gay social and cultural settings has been described as facilitating body image dissatisfaction among gay men. Drawing on a concept of reflexive embodiment, this paper uses qualitative interviews to analyse gay men’s embodiment practices in relation to discourses and norms that can be found across and beyond any coherent notion of ‘gay subculture’. The findings reveal body image to be more complex than a limited focus on subculture or dissatisfaction can account for. In particular, gay men negotiate a gay pride discourse in which the muscular male body generates both social status and self-esteem, and deploy notions of everyday masculinity that imply rationality and control to resist gendered assumptions about gay men’s body image relationships. KEYWORDS: body image; gay men; reflexive embodiment; sociology INTRODUCTION Body image dissatisfaction and gay men Following the shift from individual pathol-ogy to cognitive-behavioural and feminist perspectives in psychology (McKinely 2002; Pruzinsky and Cash 2002), a significant volume of psychological and health research has identi-fied a greater incidence of......

Words: 7590 - Pages: 31

Free Essay

#### Double Faces

...Double Faces A compare/Contrast Essay Ayman Mohammad Writing Studies 101 Ms. Sana Sayed March 12 2014 Double Faces “There is a deep inside each one of us, one ‘belonging’ that matters, our profound truth, in a way, our essence’ (Amin Maalouf, 2012, p. 66). These were some few words explaining what every ones true identities are and how Maalouf strongly believes that each and every one of us must scout deep down inside of ourselves to seek for our true uniqueness and for our pure individualities. This is not an easy task for anyone. Firoozeh Dumas, another author had to face the consequences of her actions when she impersonated dual identities. Although Amin Maalouf and Firoozeh Dumas are similar in having dual identities, they differ becuase Firoozeh moved to America while Amin flew off to France, and because Firoozeh changed her name while Amin kept his. Amin and Firoozeh had to impersonate dual identities in order to fit into their new society. Dumas had to embody another identity for her to be able to meet the requirements of the American society. Trouble was around the corner waiting for her to show up and neither she, nor her family expected that they would ever face problems concerning their names, raise, and origin. For instance, Dumas had to deal with the consisting mockery regarding her awkward name, as the kids in her fifth grade used to call her “Ferocious” instead of Firoozeh. Furthermore, Dumas’s brothers Farshid......

Words: 1013 - Pages: 5