Education And Identity In His Term Paper

PAGES
6
WORDS
1737
Cite

With Kim's help, I saw that I had a knack for helping people. I was able not just to be supportive of others, but I could really connect with people and help them. I also had a great knowledge of course planning for almost every major at UConn, because I liked to read through the course booklet and see what kinds of classes were out there and see the different majors and what the requisites were for each. Also, I realized that I often helped my friends with their course selections and major planning before they went to their own advisors. Therefore, I decided to major in Human Services, where my concentration was in academic advising. Thus, in my own way, I was able to travel through each of the seven vectors identified by Chickering and elucidated by Reisser,...

...

Education and Identity. San Francisco: Jossey-Bass, 1969.
Straub, C. And Roberts, R.F. "An Exploration of Chickering's Theory and Women's

Development." Journal of College Student Personnel, 1986, 27, pp. 216-224.

Reisser, L. "Revisiting the Seven Vectors." Journal of College Student Personnel, 1995, 36, pp.

Sources Used in Documents:

References

Chickering, a.W. Education and Identity. San Francisco: Jossey-Bass, 1969.

Straub, C. And Roberts, R.F. "An Exploration of Chickering's Theory and Women's

Development." Journal of College Student Personnel, 1986, 27, pp. 216-224.

Reisser, L. "Revisiting the Seven Vectors." Journal of College Student Personnel, 1995, 36, pp.


Cite this Document:

"Education And Identity In His" (2008, February 04) Retrieved April 23, 2024, from
https://www.paperdue.com/essay/education-and-identity-in-his-32479

"Education And Identity In His" 04 February 2008. Web.23 April. 2024. <
https://www.paperdue.com/essay/education-and-identity-in-his-32479>

"Education And Identity In His", 04 February 2008, Accessed.23 April. 2024,
https://www.paperdue.com/essay/education-and-identity-in-his-32479

Related Documents

However, the security awareness training plan highlights the prominence of auditing and security maintenance of the classified information, since data integrity is the key ingredient of existence for any organization. The questions like who, what, when and where with respect to the changes made in the operating system is essential when auditing the operating system. These questions ensure that the employees are accountable to the changes they make, as a

Education and Sociology Over the last several years, the education system has been continually facing a variety of challenges. This is because many schools are lagging behind in academic achievement in comparison with most developed nations. To make matters worse, teachers are not creating an environment that will help students to learn the social skills they need to survive inside the society and the workplace. This makes it harder for them

Education Richard Rodriguez and Mike Rose both write about their education. In "I Just Wanna Be Average," Mike Rose recounts his experience in Catholic school as an Italian-American from a working class family background. Because of a school error, he was placed in the vocational tract at school. The experience taught Rose a lot about the low expectations place on students, the lack of effective role models in the classroom, and

While one must applaud a sentiment such as, "... success in such matters comes from having determined their own identity, recognized their own distinct strengths, and sharing those strengths with the world," one must also question the hint of ambiguity that this presents when related to a desire to break down cultural barriers and promote discourse. This concern comes from my own experience of the way in which most modern

Pharmers now not only small local servers operated by Internet service providers (ISP) but they also target the 13 servers on which all other DNS servers depend. Implications Businesses & Large Organizations: Among large scale businesses that get affected includes the financial sector other than individuals. Electronic banking services have been greatly affected by these criminals who are euphemistically called hackers or crackers who conduct phishing or pharming. They not only

Spyware runs automatically without the user's knowledge and transmits vital information. Spyware can also record your keystrokes and one might end up revealing all usernames, passwords and other details to identity thieves. (Atlantic Publishing, 2008); (Schwabach, 2005) Identity thieves have also found novel ways to steal and use identities. For instance, cyber criminals recently hacked Facebook, a popular social networking site, and changed a user's page asking people to help