Wednesday, January 29, 2020

Cyberterrorism Essay Example for Free

Cyberterrorism Essay The term cyberterrorism was created in the mid 90’s by combining cyberspace and terrorism. The term has been widely accepted after being embraced by the United State Intelligence Community. Janczewski and Colarik describe cyberterrorism as â€Å"Premeditated, politically motivated attacks by subnational groups, clandestine agents, or individuals against information and computer systems, computer programs, and data that result in violence against non-combat targets† (Janczewski Colarik, 2005, p. 43). Cyberterrorism is a form of terrorism that uses any form of connected source to engage in attacks of information systems, incitement to violence, theft of data, and planning of terrorist attacks (Britz, 2011, p. 197). As an introduction into the topic, the following definition is key to understanding the definition: â€Å"Cyberterrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coercer a government or its people in furtherance of political or social objectives. Further, to qualify as cyberterrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear. Attacks that lead to death or bodily injury, explosions, plane crashes, water contamination, or severe economic loss would be examples. Serious attacks against critical infrastructures could be acts of cyberterrorism, depending on their impact. Attacks that disrupt nonessential services or that are mainly a costly nuisance would not† (Denning, 2000). Cyberterrorism is considered an act of violence or intimidation using cyberspace. It is more complicated than simply hacking into a system to see what damage can be done; it has to stem from a motivational source such as politics, foreign government, or some other rousing source (Gross, 2003). Enemies of the U. S. are strongly motivated by hate. Hate can be a strong motivator when it comes to cyberterrorism, and just terrorism in general. When hate is the driving factor of actions, the consideration for the targeted group is very minimal, and the results of hate crimes are usually violent and gruesome acts. The FBI’s definition isn’t that far off from Denning’s. They have published three different distinct definitions of cyberterrorism: â€Å"Terrorism that†¦initiates attacks on information† – â€Å"the use of Cyber tools† – and â€Å"a criminal act perpetrated by the use of computers (Baranetsky, 2009). Most government agencies that have a response program for cyberterrorism have their own published definition of cyberterrorism. The question rises ‘why does cyberterrorism occur? ’ The answer is that the terrorist want cause specific damage to the target. There are three factors that are considered when this question is asked, the first being the fear factor. It is the most common denominator of the majority of terrorist attacks. The attackers want to create as sense of fear in individuals, groups, or societies – whomever they are targeting (Janczewski Colarik, 2005, p. 45). Perhaps a cyber example of this could be the attack of IT installations. Then there is the spectacular factor. Spectacular means that the attacks are aimed at creating direct losses or resulting in a lot of negative publicity (Janczewski Colarik, 2005, p. 45). An example of the spectacular factor at work was in 1999 when Amazon. com was closed because of a Denial of Service (DOS) attack. They suffered losses from the attack, but the worse affect was the publicity that that was received (Taylor, Calabresi, Krantz, Pascual, Ressner, 2000). The last factor is the vulnerability factor. This is simply when vulnerability of an organization is exposed (Janczewski Colarik, 2005). An example of this could be the vandalism of an organizations webpage. The importance and significance of cyberterrorism is a very debatable topic. Kim Taipale, founder and executive director for the Stilwell Center for Advanced Studies in Science and Technology Policy believes â€Å"cyberterrorism, whatever it is, is a useless term. Taipale believes that, â€Å"terrorists will use any strategic tool they can† so â€Å"cyber† terrorism is no more important then other forms (Baranetsky, 2009). The statements by Taipale are strong, and arguments could be made supporting her, and arguments could be made that go against her beliefs. It is true that terrorism is growing all over the world, and terrorists are beginning to use various outlets to threaten nations, groups, and individuals. So the case could be made stating that cyberterrorism is just an accessible outlet terrorists have, because of the access that is granted to an individual on cyberspace. In conflict with that argument is the argument that cyberspace is not monitored and policed enough, and has little to no restrictions as to what can be done in cyberspace. This is an ongoing debate that will not be discussed in this paper. Different Forms of Cyber Attacks Various types of cyber attacks are used within the terrorist aspect of cyberspace. According to the Center for Strategic and International Studies, cyberterrorism is â€Å"the use of computer networks to shut down critical infrastructure (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population† (Lewis, 2002, p. ). The most commonly used tactics used to neutralize critical infrastructure are attacks known as the Trojan horse, viruses, phishing, Denial of Service (DoS), and Direct Denial of Service attacks. The first of the types of the cyber attacks to be discussed is the Trojan horse. A Trojan horse is a computer program that conceals a harmful code. Relating to the well know tale of the Trojan horse, it allows you into a system, and then leaves an outlet that allows you to get back into the system. In essence, it is software that appears to perform one action while actually performing another (Gohring, 2009, p. 6). A Trojan horse is a program that appears harmless but hides malicious functions. The most common Trojan horse of today’s day and age is NetBus, which was used for illegally breaking into computer systems and, in particular, used to plant child pornography on computers of people of integrity. Viruses are another form of cyber attack. Viruses are programs that â€Å"infect computer files, usually executable programs, by inserting a copy of itself into the file. These copies are usually executed when the infected file is loaded into memory, allowing the virus to affect other files. A virus requires human involvement to spread† (Kuehl, 2012). Virus writers write programs that infect the systems of certain users, but needs direct involvement by the creator or another human source to spread the virus. Very similar to a virus is a worm. The worm works just like a virus, implemented into a system by a creator. The difference between a worm and a virus is the fact that a worm doesn’t need the hands-on human involvement. Back in 2003, SQL Slammer worm spread throughout the cyber world. This was a worm that exploited a buffer overflow vulnerability of Microsoft’s SQL Server. Six months prior to the launch of the worm, the vulnerability was taken notice of and a patch was developed to strengthen the vulnerability. The worm worked by generating random IP addresses, and if belonged to an SQL Server that was not covered by the patch, it was infected and immediately began sending out more copies of the worm to more random IP addresses (Leyden, 2003). There was no human involvement after the worm was created initiated by the creator. It spread itself to random IP addresses, which categorizes it as a worm. Phishing is a form of deception used in cyberspace. Phishing attempts to trick users into giving out their personal data. The techniques used in phishing attempts are emails and websites that are designed to look like legitimate agency websites asking for an individual’s bank and financial account information and passwords (Kuehl, 2012). This method is not used so much by cyberterrorists, but the possibility is there. A more serious cyber attack comes in the form of a Denial of Service (DoS) attack. DoS attacks deny system access to users by overwhelming the target source with messages and blocking legitimate traffic (Kuehl, 2012). It causes a system overload, and can block the ability to exchange data between systems using the Internet. DoS attacks usually target banks, and earlier this year in September, several major banks were attacked using DoS. The websites of Bank of America, JPMorgan Chase, Wells Fargo, U. S. Bank, and PNC Bank all were victims of a DoS attack (Goldman, 2012). The websites were overloaded with traffic directed at them causing them to crash. Most of the time while the cyberterrorists use these attacks to steal information from bank customers, but in this case the motivation was simply to temporarily take down the banks’ public-facing websites, putting them under extreme heat from the public and potentially tarnishing their reputations. There are three levels of cyber capability that need to be taken into thought when considering types of cyberterrorism attacks. The first is simple-unstructured capability. This allows a cyberterrorist to conduct basic hacks against individual systems using tools created by someone else. The organization possesses little target analysis, command and control, or learning capability (Denning, 2000). This level is sometimes not considered to be cyberterrorism, because of the simplicity of the attack. There is slight to no attention focused on the target, which does not reveal any sort of motivation. Referring back to the definition of cyberterrorism, it has to stem from a motivational source to be considered cyberterrorism (Gross, 2003). The simple-unstructured capable individuals are basically the ones who hack into systems just to see what kind of damage they can cause. The second level of capability is the advance-structured level. This is the competence to conduct more sophisticated attacks against multiple systems or networks and possibly, to modify or create basic hacking tools. The organization possesses a straightforward and uncomplicated target analysis, command control, and learning capability (Denning, 2000). These organizations have motivations, but they are not strong enough to cause serious damage to the identified target. The last capability is the complex-coordinated capability. This is the ability for coordinated attacks capable of causing mass-disruption against integrated, heterogeneous defenses. They have the capacity to create sophisticated hacking tools. There is a highly capable target analysis, command control, and organization learning capability (Denning, 2000). Organizations with this type of capability are highly sophisticated with dangerous motivations. These dangerous organizations are the ones that can cause millions of dollars of damage, and also tons of negative publicity, two of the main objectives of cyberterrorist. There are cases when terrorists actually run other forms of terrorisms, such as bombings, with the use of cyberspace. The anonymity and global reach of the Internet has helped facilitate terrorism (Cole Glasser, 2009). â€Å"They put up websites to spread their messages and recruit supporters, and they use the Internet to communicate and coordinate action. However, there are few indications that they are pursuing in cyberterrorism, either alone or in conjunction with acts of violence† (Denning, 2000). There is an example of this from the late 90’s. In February 1998, Clark Staten, executive director of the Emergency Response and Research Institute in Chicago, testified before the Senate Judiciary Committee Subcommittee that it was believed that â€Å"members of some Islamic extremist organizations have been trying to develop a network of hackers to support their computer activities in offensive information warfare attacks in the future† (Denning, Cyberterrorism, 2000). It is the perfect way to recruit, because of the anonymity that is granted to the individual. â€Å"The Internet is the ideal medium for terrorism today: anonymous but pervasive† (Cole Glasser, 2009, p. 95).

Tuesday, January 21, 2020

Accuracy in Epic of Gilgamesh and The Hebrew Bible Essay -- Epic Gilga

There is much debate over the historical accuracy of the Hebrew Bible and The Epic of Gilgamesh. Some claim that to understand a work of literature requires extensive knowledge of the background of this work. The contrary position is that a work of literature can be interpreted solely on it’s content. The meaning of the term classical literature is that it can be applied during any period of time, it is eternal. Yet the conditions surrounding the author might still be of interest to the reader, and of importance to the work. As with many cases, the truth is somewhere in between the two extremes. Both sides have valid arguments about the importance of historicity. To say that historicity is of the utmost importance may seem extreme. Yet to understand a work, it is important to know if these were fantastic, yet true tales, or if they came from the mind of an author. Some may read a deeper significance into a fictional work. The fact that a story was ‘invented’ usually mean that it was created for a specific purpose. An author would be more prone to using certain literary devices, even in the story line, then fate, or whatever one believes creates the true stories. A completely fictional story may have more use of symbolism, and to search for the meaning of this symbolism, it might be important to know the environment in which it was written. On the other hand, a reader may put greater emphasis on the meaning behind stories based on fact. This may be because of a faith in a higher power that controls the events in a story. If one believes in God, or in any higher power, the events of a particular story can take on meaning as an act of this power, or even as a symbolic work from god. Still others may be more inspired by the... ...f a leader. The fact that Gilgamesh is presented as divine in the book ends credence to the possibility that the actual King was believed to be godly. It is in this instance, and others like it that we see another example of the importance of historicity. By studying these works, we can gain insight into ancient cultures, and even hypothesize about the past. If a work is highly historically accurate in other respects, it might lead one to believe that the other accounts in the work are accurate. Through this method, we may discover some of history through works of literature, history that records may not contain. Yet through this method we can only speculate, we cannot be certain of the accuracy of our results. Works Cited: Norman K. Gottwald The Hebrew Bible . Fortress Press, 1985. Sandars, N. K., trans. The Epic of Gilgamesh. London: Penguin, 1972. Accuracy in Epic of Gilgamesh and The Hebrew Bible Essay -- Epic Gilga There is much debate over the historical accuracy of the Hebrew Bible and The Epic of Gilgamesh. Some claim that to understand a work of literature requires extensive knowledge of the background of this work. The contrary position is that a work of literature can be interpreted solely on it’s content. The meaning of the term classical literature is that it can be applied during any period of time, it is eternal. Yet the conditions surrounding the author might still be of interest to the reader, and of importance to the work. As with many cases, the truth is somewhere in between the two extremes. Both sides have valid arguments about the importance of historicity. To say that historicity is of the utmost importance may seem extreme. Yet to understand a work, it is important to know if these were fantastic, yet true tales, or if they came from the mind of an author. Some may read a deeper significance into a fictional work. The fact that a story was ‘invented’ usually mean that it was created for a specific purpose. An author would be more prone to using certain literary devices, even in the story line, then fate, or whatever one believes creates the true stories. A completely fictional story may have more use of symbolism, and to search for the meaning of this symbolism, it might be important to know the environment in which it was written. On the other hand, a reader may put greater emphasis on the meaning behind stories based on fact. This may be because of a faith in a higher power that controls the events in a story. If one believes in God, or in any higher power, the events of a particular story can take on meaning as an act of this power, or even as a symbolic work from god. Still others may be more inspired by the... ...f a leader. The fact that Gilgamesh is presented as divine in the book ends credence to the possibility that the actual King was believed to be godly. It is in this instance, and others like it that we see another example of the importance of historicity. By studying these works, we can gain insight into ancient cultures, and even hypothesize about the past. If a work is highly historically accurate in other respects, it might lead one to believe that the other accounts in the work are accurate. Through this method, we may discover some of history through works of literature, history that records may not contain. Yet through this method we can only speculate, we cannot be certain of the accuracy of our results. Works Cited: Norman K. Gottwald The Hebrew Bible . Fortress Press, 1985. Sandars, N. K., trans. The Epic of Gilgamesh. London: Penguin, 1972.

Monday, January 13, 2020

Obsessive Compulsive Disorder (Psychology)

In Germany, psychiatrists regarded OCD as a disorder of intellect. The German word for â€Å"obsession† is Zwangsvorstellung and was translated as â€Å"obsession† in Great Britain and â€Å"compulsion† in the United States. The term â€Å"obsessive-compulsive disorder† became the compromise term. Over time, the way people view O. C. D. has changed. For example, in the seventeenth century people who suffer from obsessions and compulsions were thought to be religious fanatics or melancholic (Frankel, 2011). It wasn't until the European Renaissance that people first began relinquishing the belief that mental illnesses like OCD were caused by devil or other supernatural forces. Based on this reasoning, treatment involved banishing the â€Å"evil† from the â€Å"possessed† person through exorcism (steward, 2009). OCD can happen to anyone. You could be rich or poor/ black or white. It has happened to people such as Martin Luther (1483-1546) the most important leader of the protestant of reformation in Europe. John Bunyan (1628-1688) the writer and preacher that is famous for his writing Pilgrim's Progress. Dr. Samual Johnson (1709-1784) wrote the first dictionary in the English language. Many people often wonder what causes OCD. Experts don't know what exactly caused OCD, but they suggest that it may be a problem in the way one part of the brain sends information to another. (Peterson, 2001). When your brain doesn't have enough of serotonin (a brain chemical) it causes problems. Experts also believe that problem related to infections, such as: strip throat or scarlet fever can cause or make the disorder worse. Brain scans of people with OCD have shown that they have different patterns of brain activity (Price, 2007). Some cases may even be genetic. OCD isn't caused by family problems or attitudes, but genetics, or stressful events may trigger an episode of the disorder. The symptoms of OCD vary it can be mild to severe and even come and go. The most common symptom of OCD is Anxiety. For example, you feel a sense that something bad is going to happen if a task is left undone, such as check again and again to see whether the flat iron is on. If you fail to check you feel tense or anxious. Obsession symptoms are unwanted thoughts, ideas, and impulses that you have again and again. For example, a fear to hurt yourself or a love one, need to do something perfectly or correctly and a fear of getting dirty or infected (Malik, 2008). Compulsion symptoms are behaviors that you repeat to try to control the obsession. For example: washing, checking, counting, repeating, hoarding and praying. The most common compulsion is washing and checking. Doctors check for OCD by asking about your symptoms and your health past. A physical exam is given to the patient. Mental health assessments are given as well, it is an evaluation of your emotional functioning and your ability to think, reason, and remember. People with OCD live with the condition for years before being diagnosed (Wilkins, 2000). Some people go without treatment because they are embarrassed to talk about their symptoms (Ego). Conditions that co- exist with OCD is Anxiety Disorders, Mood Disorders (Depression and Bipolar Disorder), Attention-Deficit/Hyperactivity Disorder, Eating Disorders and Autism Spectrum Disorders. There are three main questions that a doctor will ask to decide rather you have OCD or not â€Å"Do you have repeated thoughts that cause anxiety and that you cannot get rid of no matter how hard you try? , Do you wash your hands frequently or keep things extremely clean and neat? Do you excessively check things? (Weinstock, 2010). † Also to be diagnosed, the obsessions or compulsions must be time-consuming to the point where it interferes with your daily life. The earlier it is detected the better because there are proper treatments that can improve OCD (Romito, 2007). Treatment for OCD is good, about 50% of patients improve and about 10% recover completely (Abramowitz, 2009). Only 10% get worse in spite of therapy (Abramowitz, 2009). The four R’s you should keep in mind when trying to overcome OCD relabel, reattribute, refocus, and revalue (Segal, 2012). Relabel is Recognize that the intrusive obsessive thoughts and urges are the result of OCD. Reattribute is to Realize that the intensity and intrusiveness of the thought or urge is caused by OCD; remind you that OCD thoughts and urges are not meaningful, but are false messages from the brain. Refocus is when you find ways to work around the OCD thoughts by focusing your attention on something else, at least for a few minutes. Revalue is the key to not take the OCD thought at face value. It is not significant in itself. There are Medication that a doctor can prescribe to you depending on the severity of your symptoms they are known as Selective Serotonin reuptake inhibitors (SSRIs) â€Å"antidepressants† they include Prozac, Luvox & Zoloft (Sadock, 2007). It can take up to twelve weeks before the medicine to take effect after prescribed. Consistency is important for both counseling and medicines. People who don't take their medicines regularly or stop often have their symptoms return (relapse). With therapy, it is important to work with your doctor to find out when, or if, you should stop. Counseling is available as well; cognitive-behavioral therapy called exposure and response prevention is considered the most effective type of counseling for OCD. Your relationship with your therapist is very important. Finding someone who is right for you is critical to your success in overcoming OCD. The therapist for exposure and response prevention counseling would require you to write down all of your obsessions, compulsions, and things you avoid. Doing this you will then rank each of them from highest to lowest. Throughout the sessions you will be exposed to your obsessions, compulsions, and things you avoid in order to help overcome the faulty beliefs (Lewin, 2011). There are home treatments that you can use to reduce overall stress. For example, taking deep breathes, soaking in a warm bath, listening to smooth music, exercise, yoga, etc. In rare cases surgery can be done. Which uses surgically implanted electrodes in the brain, and magnetic stimulation of parts of the brain are done for severe OCD. Deep brain- stimulation and vagus nerve stimulation are possible surgical options that do not require destruction of brain tissue. In one study, 30% of participants benefited significantly from this procedure (Roth, 2010). The procedure only can be performed in a hospital with specialist qualifications. This is done only when you aren't responding to any other treatment or procedure (Williams, 2010). OCD is usually confused with two things Obsessive–compulsive personality disorder (OCPD) and an addiction. OCD is ego dystonic, meaning that the disorder is incompatible with the sufferer’s self- concept. While OCPD is ego syntonic, it is the behaviors, values, feelings, which are in harmony with or acceptable to the needs and goals of the ego, or consistent with one's ideal self-image (Morse, 1998). Addiction can be explained as the fact or condition of being addicted to a particular substance, thing, or activity. OCD is different from behaviors such gambling and overeating ddiction. People with these disorders typically experience at least some pleasure from their activity. OCD sufferers do not actively want to perform their compulsive tasks and experience no pleasure from doing so (Marlatt, 2008). Therefore, OCD is a long- term condition that can be improved over years of medication and/or therapy. In the United States, about 1 in 40 adults and 1 in 100 children have OCD. According to the World Health Organization, OCD is one of the top 20 causes of illness-related disability, worldwide, for individuals between 15 and 44 years of age (Smith, 2012).

Sunday, January 5, 2020

The Importance Of Being A Doll s House - 1627 Words

The Importance of being a Doll. â€Å"She s only a bird in a gilded cage. A beautiful sight to see. You may think she is happy and free from care she’s not, though she seems to be†. (Lamb) The Importance of Being Earnest and A Dolls House have been subjects of controversy since their creation. How the plays characterize the parodies of society as a gilded cage are directly related to the writers and how they were treated in their real lives. From the standpoint of the importance of being earnest the main characters, male and female, cope with their understanding of society’s view of marriage and the implied roles they must play. While the play A Doll’s House has a different thought on the roles of men and woman Oscar’s Wilde and Henrik Ibsen plays are similar in many ways, especially on how society prevents the characters from being able to live the life they want. How the playwrights were treated by society directly effects the way they represented society in their plays. First, The Importance of Being Earnest was written by Oscar Wilde who had a clandestine life that many people would have never deduced. On the outside Oscar’s life was perfect, beautiful wife, healthy kids, and a job that he really loved. On the other hand Oscar’s life was a gilded cage because he preferred the company of men and if this had been discovered Oscar knew his career would be over. (Beckson) At the time society did not accept and would even mistreat people for having homosexual thoughts. HavingShow MoreRelatedA Doll s House By Henrik Ibsen1291 Words   |  6 Pages A Doll s House by Henrik Ibsen, is a play that has been written to withstand all time. In this play Ibsen highlights the importance of women’s rights. During the time period of the play these rights were neglected. Ibsen depicts the role of the woman was to stay at home, raise the children and attend to her husband during the 19th century. Nora is the woman in A Doll House who plays is portrayed as a victim. Michael Meyers said of Henrik Ibsen s plays: The common denominator in many of IbsenRead MoreLars s Life Of The Doll955 Words   |  4 Pages After his father s death , his brother rebuilt the house. Karin and Gus married, Karin was pregnant. Karin is a warm and cheerful woman. She often invited him into the house of the family dinner. But Lars always refused Karin because he enjoys alone. Lars from his colleagues know the people selling inflatable doll online, and then he ordered an inflatable doll to itself. Lars treated the doll as his girlfriend, and he talks to doll every day. He even believed that the doll is a real woman. HeRead MoreWomen s Rights By Henrik Ibsen1481 Words   |  6 Pageswomen s rights by creating female characters that represent the struggle for freedom from their restricted roles. After years of playing the role of a superficial doll, Nora converts into an assertive and determined woman. The true cause of Nora s transformation starts with a revolution within her. Ibsen dramatizes Nora s discovery of identity by means of various literary techniques. By the finale of the play, Nora has survived a deconstruction of a false sense of identity, by being a â€Å"doll†, andRead MoreSymbolism In Ibsens A Dolls House1187 Words   |  5 PagesMarquez Ford Almeida, Gilbert English Composition II 10/19/17 Symbolism in A Doll House Introduction In a drama, symbolism is one of the important literary devices that is commonly employed by many play writers. It imparts the play’s hidden meaning and portrays emotions and conflicts in the characters. Equally, Ibsen’s play, A Doll House makes an extensive use of symbols which does not only make the play captivating but also enables the reader to get a deeper understanding of the underlining ideasRead MoreGender And Gender Roles Have Radically From The Time Henrick Ibsen s A Doll House1203 Words   |  5 Pages The idea of gender and gender roles have evolved minimally from the time Henrick Ibsen â€Å"A Doll House,† was first published. In the late 1800s, just before the beginning of the first wave of feminism in the United States and Europe, women were looking for ways to gain independence from their â€Å"duty† to marry a man, have children, and live a life to home and yearned for the freedom to choose what kind of lives they wanted to live, what they wanted to do, etc. In the beginning of the play, the viewsRead MoreSymbolism In Ibsens A Dolls House1173 Words   |  5 Pagesconflicts in the characters. Equally, Ibsen’s play, A Doll House makes an extensive use of symbols which does not only make the play captivating but also enables the reader to get a deeper understanding of the underlining ideas. Indeed, Symbolism is a literary device that is evident throughout Ibsen s play. Examples of symbolism in the play include the Christmas tree, the images of the stove, macaroons, visiting cards and lighting lamb. Perhaps Ibsen s play is one of the plays from the 19th century whichRead MoreHenrik Ibsen Thesis Paper1049 Words   |  5 Pagesattendants are stressed by one of the mid to late 1800 s best problem play authors, Henrik Ibsen. Ibsen spend most of his writing career exploring the human mind. He had a passion for the truth, and due to this he conveyed his thoughts through writing. His time period offered many scenarios for him to write about which still apply to today s society. One of these scenarios is the societal roles that given to people. Ibsen stressed the importance of societal and gender roles in his writing, hoping toRead MoreHow Writers Represents Relationships Between Characters1019 Words   |  5 PagesGodfrey that was kept in secret. This is when he decide to change and father this little girl. Eliot shows Silas` transformation from sad and miserable man, with love of money as the only value for him to a loving and caring father who gives no importance to wealth after he adopts the little girl Eppie, before meeting the girl it was gold that was the most important for him: `The money had come to mark off his weaving into periods, and the money not only grew, but it remained with him. He began toRead MoreA Feminist Criticism A Doll s House1372 Words   |  6 PagesBarros 1 Diane Barros English 102 A1W November 11,2014 A Feminist Criticism A Doll House A Doll’s House, written by Henrik Ibsen examines the controversial point of persuasion of love and marriage that emphasis marital vows and women’s roles, during the nineteenth century. Where feminism lurks throughout the entire play. Through this play, I shall show you what I perceived what the writer Ibsen presumption of the equivalence among men and woman, and the idea of feminism. Where Women haveRead MoreAnalysis Of A Doll House 846 Words   |  4 PagesDoll house Nora’s marriage has been a sham ever since the start. By the standard of modern day, she has legitimate ground to leave her husband Torvald. Because Torvald only cares about his image, he treats Nora as an object rather than a wife, Nora has never been taken seriously by her husband, and Torvald only loves her for her appearance. Torvalds image is of great importance to him considering now he is a bank manager, and he will not allow anything standing in his way to ruin this image