Verified Document

Education And Identity In His Term Paper

With Kim's help, I saw that I had a knack for helping people. I was able not just to be supportive of others, but I could really connect with people and help them. I also had a great knowledge of course planning for almost every major at UConn, because I liked to read through the course booklet and see what kinds of classes were out there and see the different majors and what the requisites were for each. Also, I realized that I often helped my friends with their course selections and major planning before they went to their own advisors. Therefore, I decided to major in Human Services, where my concentration was in academic advising. Thus, in my own way, I was able to travel through each of the seven vectors identified by Chickering and elucidated by Reisser,...

Education and Identity. San Francisco: Jossey-Bass, 1969.
Straub, C. And Roberts, R.F. "An Exploration of Chickering's Theory and Women's

Development." Journal of College Student Personnel, 1986, 27, pp. 216-224.

Reisser, L. "Revisiting the Seven Vectors." Journal of College Student Personnel, 1995, 36, pp.

Sources used in this document:
References

Chickering, a.W. Education and Identity. San Francisco: Jossey-Bass, 1969.

Straub, C. And Roberts, R.F. "An Exploration of Chickering's Theory and Women's

Development." Journal of College Student Personnel, 1986, 27, pp. 216-224.

Reisser, L. "Revisiting the Seven Vectors." Journal of College Student Personnel, 1995, 36, pp.
Cite this Document:
Copy Bibliography Citation

Related Documents

Identity Management and Security Awareness
Words: 1839 Length: 6 Document Type: Corporate Writing

However, the security awareness training plan highlights the prominence of auditing and security maintenance of the classified information, since data integrity is the key ingredient of existence for any organization. The questions like who, what, when and where with respect to the changes made in the operating system is essential when auditing the operating system. These questions ensure that the employees are accountable to the changes they make, as a

Education and Sociology Over the Last Several
Words: 1542 Length: 5 Document Type: Essay

Education and Sociology Over the last several years, the education system has been continually facing a variety of challenges. This is because many schools are lagging behind in academic achievement in comparison with most developed nations. To make matters worse, teachers are not creating an environment that will help students to learn the social skills they need to survive inside the society and the workplace. This makes it harder for them

Education Richard Rodriguez and Mike Rose Both
Words: 949 Length: 3 Document Type: Essay

Education Richard Rodriguez and Mike Rose both write about their education. In "I Just Wanna Be Average," Mike Rose recounts his experience in Catholic school as an Italian-American from a working class family background. Because of a school error, he was placed in the vocational tract at school. The experience taught Rose a lot about the low expectations place on students, the lack of effective role models in the classroom, and

Education System Dr. Piper Outlines
Words: 1293 Length: 4 Document Type: Term Paper

While one must applaud a sentiment such as, "... success in such matters comes from having determined their own identity, recognized their own distinct strengths, and sharing those strengths with the world," one must also question the hint of ambiguity that this presents when related to a desire to break down cultural barriers and promote discourse. This concern comes from my own experience of the way in which most modern

Identity Theft in America and
Words: 2851 Length: 10 Document Type: Term Paper

Pharmers now not only small local servers operated by Internet service providers (ISP) but they also target the 13 servers on which all other DNS servers depend. Implications Businesses & Large Organizations: Among large scale businesses that get affected includes the financial sector other than individuals. Electronic banking services have been greatly affected by these criminals who are euphemistically called hackers or crackers who conduct phishing or pharming. They not only

Identity Theft Using the Knowledge
Words: 2712 Length: 8 Document Type: Thesis

Spyware runs automatically without the user's knowledge and transmits vital information. Spyware can also record your keystrokes and one might end up revealing all usernames, passwords and other details to identity thieves. (Atlantic Publishing, 2008); (Schwabach, 2005) Identity thieves have also found novel ways to steal and use identities. For instance, cyber criminals recently hacked Facebook, a popular social networking site, and changed a user's page asking people to help

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now