Thursday, December 26, 2019

GSK Economics Essay - 942 Words

EC229 Economics of Strategy Introduction 1. GlaxoSmithKline (GSK) is a global healthcare company specialized in the research, development, manufacturing and marketing of pharmaceutical and consumer health-related products. The company has operations in 120 countries, with products being sold in over 150 countries. (Description) 2. As a dominant player in the pharmaceutical industry, GSK operates in an oligopolistic market. It is highly cash generative, with increased sales growth and shareholder returns. (Oligopoly) 3. Its main competitor is American pharmaceutical giant, Pfizer. Financially, GSK is not the best performer (with $108 bn compared to Pfizer’s $161 bn), but it manages to differentiate itself, which is the key to†¦show more content†¦This is critical to differentiating its products and maintaining growth. a. Its 5-year partnership with McLaren is one of the more notable marketing strategies. 4 b. Divestment has also helped GSK raise profits in 2012, as it refocuses on its core brands. The graph shows the impact of advertising on profits. 3. (Collusion) The ViiV healthcare, a collusion between GSK and Pfizer, helps both companies reduce costs in the race in HIV RD, one of the most expensive public health programmes. In an oligopoly, the explicit collusion of two firms will pay because it enables the players to jointly charges monopolist prices and earn monopolist profits. However, it is for the same reason that there is an incentive to cheat. 5 4. (RD) Ultimately, if oligopolists want to achieve and enhance supernormal profits, they need to erect barriers to entry to protect their competitive advantage. This is why the ultimate strategy lies within RD. It ensures that GSK remains a sustainable business. a. Over the past 4 years, GSK has had 16 new drugs and vaccines approved in the USA, more than any of its competitors. It has also sustained late-stage pipeline of around 30 assets. b. RD is a long run investment that allows GSK to enjoy reduced MC, which further extends its profits. Nonetheless, it is essential that it protects these assets through patents, in order to achieve monopoly powers over these assets. 6 5.Show MoreRelatedFinancial Position Of Hikma Pharmaceutical Plc And Glaxosmithkline Plc3479 Words   |  14 Pagesperformance of both firms. The report will then provide a financial ratio analysis of both firms in order to determine with certainty the best firm for investments The economic pressures including global crisis, price rise and increased rate of inflation and the general instability in the Eurozone affect both firms. The social, political and economic factors have a direct impact on the operating activities of both firms as well as their long-term growth decision plan. Finally After a careful examination ofRead More India Risk Analysis Essay3459 Words   |  14 Pagescommon place in the expanding economy. With expanding economic growth, tourism and leisure also increase. The Government of Kerala has identified this future need and is actively pursuing FDI in the building of a new International Convention Center, as well as the surrounding businesses and support industries that are required. This investment has been targeted primarily to Foreign Direct Investment as well as local capital investment. Economic and Financial Forces India has a stable financial foundationRead MoreGsk a Merger Too Far1158 Words   |  5 PagesCase study C: GSK, a merger too far? 1- Derive three opportunities and three threats for GSK by first making the PESTEL analysis of the macro-environment surrounding the pharmaceutical industry. (9 points) * PESTEL analysis of the pharmaceutical industry: Political: Since the creation of healthcare insurance, companies have to conform themselves to two kinds of systems: 1) The universal system applied for example in France, with less demand in new technologies. 2) The very selective anglo-saxonRead MoreHrm at Glaxosmithkline Pakistan1565 Words   |  7 Pagesexplain Human Resource Management and its tactics with our exclusive discussion of HRM at GlaxoSmithKline (GSK). In our meeting with the Assistant Manager of Recruitment at GSK, Mr. Sufyan Ismail, we discussed the HRM policy being implemented in the organization. This term report shall be covering the points highlighted in our discussion that include the following HR procedures being undertaken at GSK: 1. Recruitment 2. Training and Learning 3. Corporate Culture Read MoreEffectiveness Of Glaxosmithkline s Corporate Governance Essay1702 Words   |  7 Pagesand return on equity to assess how well GSK maximizes shareholders demand. However, GSK has neglected the demand of the other stakeholders of the company, Regardless, this report positive recommendation can be summarized into two themes. Firstly, irrespective of the depressed economy and market overload, GSK continues to have strong financials, as well as having ideas for diversification into other markets. Secondly, with regards to its corporate governance, GSK has the opportunity to reform its governanceRead MoreU.s. Foreign Corrupt Practices Act817 Words   |  4 Pagesworked under the reformed Healthcare system. U.K. Bribery Act of 2010 The GSK case is attributed to the U.K. Bribery Act of 2010 (2016) because of the offenses as a result of bribing another person(s), and the offenses as a result of being bribed (Legislation.gov.uk, 2016). This is the law from the United Kingdom as it relates to GSK being the representative U.K. company. Criminal Law of the People’s Republic of China The GSK case used Article 5, 91, 163, and 164 under the CLPRC, which specify China’sRead MoreGlaxosmithkline s Financial Performance : Glaxosmithkline1166 Words   |  5 PagesGlaxoSmithKline’s Financial Performance. GSK is the 2nd largest pharmaceutical firm in the world, and the largest in the UK by sales and profits, it is responsible for 7% of the worlds pharmaceutical market, and has its stocks listed both in UK and US (O Rourke, 2002). The origin of the so called blockbuster model, is partly linked with Glaxo (as it was previously known). In the early 80’s, then Glaxo brought to light their first blockbuster drug, Zantac, which was an anti-ulcer drug, which wasRead MoreThe Us Transfer Pricing Regulations951 Words   |  4 Pagesincluding advances pricing agreements, arms length standard, and methods allowed to determine comparable prices. - 60 The US transfer pricing regulations, as outlined in Section 482 of the Internal Revenue Code, are similar to the Organization for Economic Co-operation and Development (OECD) guidelines. They have a commitment to the arm s length principle, as do many other countries worldwide who use it as a basis for bilateral treaties between governments. US Guidelines say that in the case of anyRead MoreSwot Analysis of the Glaxosmithkline.1477 Words   |  6 Pagesto do more, feel better and live longer. (Gsk. 2009). Let start SWOT analysis of Glaxosmithkline from strengths. First of all the company has got many well-known brands and top world products like smoking cessation product NiQuitin CQ as well as many medicine staples, including Panadol, Zantac, Zovirax, Augmentin, Solpadeine, Aquafresh and Sensodyne. GSK’s Nutritional Healthcare arm encompasses the notorious drinks brands Lucozade, Ribena and Horlicks (Gsk. 2009). Another good side of the firm isRead MoreGlaxoSmithKline In China CaseAnalysis Essay1718 Words   |  7 Pagescreated in New Zeeland merged with SmithKline, which was also a Pharmaceutical, firm in the United Kingdom. Several years after the merger, GlaxoSmithKline (GSK) became one of the largest drug manufacturers around, with an estimate of $22.5 billion in global sales and had over one hundred thousand employees worldwide (Quelch Rodriguez, 2013). With GSK being one of the largest manufacturers of pharmaceuticals, they have different sites around the world. One of their sites is in China after China joint

Tuesday, December 17, 2019

Young Good Brown by Nathaniel Hawthorne Book Report/Review

Essays on Young Good Brown by Nathaniel Hawthorne Book Report/Review The paper "Young Good Brown by Nathaniel Hawthorne" is a wonderful example of a book review on literature. Young Good Brown is a canon written by Nathaniel Hawthorne. The prolific uses both symbolism and imagery to relay the exciting piece of literature. Brown, who is the protagonist in the story, leaves his wife Faith to go to an unknown destination. Brown, who is young and naive, is persuaded his wife to stay home through the night. However, he does not hide to his calls and instead leaves unceremoniously to the darkness (Hawthorne, 2005, p.1). In the last paragraph of page 8, Brown is initiated in what seems to appear as a cult that practices devil worshipping. Shockingly, he discovers that his lovely wife is in the evil activity that is widespread among the local community. He is convinced that Faith is part of the wicked ratchet of devil worshipers because of the ribbon that she has which symbolizes the membership of the cult. Brown is disgusted given that it seems that he had not learned his wife prior to marrying her. Out of the disbelief of the unfolding events, he shouts his wife's name loudly. He remains unsure about his wife’s reaction after having discovered that he was in the middle of a dream (Hawthorne, 2005, pp.8-13). Coincidentally, the next morning, Mr. Brown meets the religious leader he had dreamt the previous morning. The head seemed to be preparing for the sermon for the day. Brown resented him because he felt that he was preaching water while at the same time drinking wine. During the day, he see med he behaved like a saint but in the night he practiced devil worshiping and witchcraft. The bad dream Brown haunts him while attending the church service. According to the piece, religion has become so much hypocritical with people using religion as a cover-up for their evil deeds (Hawthorne, 2005, pp.8-13).

Monday, December 9, 2019

Encyclopedia of Cryptography and Security †MyAssignmenthelp.com

Question: Discuss about the Encyclopedia of Cryptography and Security. Answer: Introduction Cloud security is the wide range of approaches and strategies of securing data and information with the help of cloud computing. Several technologies are utilized in this process. These technologies and strategies are given to the user to secure their data perfectly and safely. The infrastructure of cloud computing is also involved in this security procedure (Rong, Nguyen Jaatun, 2013). It is the sub part of information security and network security. The Department of Administrative Services or DAS gives various services to the Australian State Government. The services are procurement, payroll, human resource management, personnel management and contractor management. Due to the recent changes in the policies of the government, Department of Administrative Services is shifting to a new approach known as the Shared Service approach (Almorsy, Grundy Mller, 2016). This particular approach means that a fixed number of services will be controlled by DAS for the benefit of the Whole of G overnment (WofG). DAS has to follow various strategies and tasks. The following report outlines a brief description about cloud security for the case study of Department of Administrative Services or DAS. The report provides a privacy strategy proposal for DAS. It includes the collection and control of applied personal data, utilization and security of various digital identities, securing and accessing personal data, rectifying personal data and proper recommendations to control and secure data with cloud computing (Liu, 2012). The report also covers a strategy to secure and protect personal data with proper recommendations. The description of the above discussion is given in the following paragraphs. Department of Administrative Services or DAS gives various services to the Australian State Government. The services are procurement, payroll, human resource management, personnel management and contractor management. Due to the recent changes in the policies of the government, Department of Administrative Services is shifting to a new approach known as the Shared Service approach (Behl Behl, 2012). This particular approach means that a fixed number of services will be controlled by DAS for the benefit of the Whole of Government (WofG). DAS has to follow various strategies and tasks. DAS gives the integrated services to the remaining agencies and departments of the government. There is another policy of the government, which is the Cloud First approach. This is utilized for upgrading and obtaining various services. The various tasks that are to be done by DAS are purchasing a personnel and HR management application. This particular application will give a human resources suite, prov iding a perfect management of performance (Lee, 2012). The employees of DAS will store the information directly into this particular application with the help of a secured URL. A secured application of transferring data will upload huge amount of data. It is the responsibility of DAS to check whether the data entered in correct or not. There will be a new application known as the Commercial Off The Shelf or COTS will control the public cloud section. All the authenticated credentials of the authorized users are uploaded to enable the users to access the payroll of the agency. It is noticed that authentication is done only by utilizing the agency ID credentials of the users (Aljawarneh, 2012). All the agencies in the Whole of Government are required to utilize the Active Directory Federated Services of ADFS for federation to the Azure AD instance for authorization and authentication. Privacy Strategy for Personal Data Department of Administrative Services or DAS will have to secure their personal data through a good quality of privacy strategy. There are various steps to protect their personal data (Tsai et al., 2012). The most important step is to manage their personal information so that it is not accessible by hackers or unauthorized people. The steps to secure the personal data of DAS are as follows: Secured Browser: Utilization of a safe and secured Web browser is the first and the foremost step in managing the personal data (Tianfield, 2012). This can help to prevent from entering into the unauthorized websites and all sorts of virus attacks. Passwords: Utilization of several passwords is another important step to prevent all types of data hacking (Kulkarni et al., 2012). DAS should keep specific passwords in all of their private information and they should change those passwords on a regular basis. Collection and Management of Solicited Personal Information a) Logging Out: This is an important step to secure the data form hacking. Every time the users should log out from the system so that other people are not able to access their data. b) Anti Virus: This is the most basic and the easiest way to secure personal data. DAS should install antivirus software in their cloud to protect their personal data from virus attacks (Chou, 2013). DAS can secure their personal information by blocking the access to the systems and personal websites (Suresh Prasad, 2012). The disclosure and utilization of personal information can lead the organization into serious security problems. Use and Security of Digital Identities A digital identity is data of an organization that is utilized to depict an external representative (Iankoulova Daneva, 2012). This particular representative can be an individual, an organization or an application. Digital identities has several advantages. The main advantages of digital identities are as follows: Security: The main advantage of digital identity is its security. The data is extremely safe and secured with the help of digital identity. Data Integrity: The integrity of the data is not lost because of digital identity. This is another important advantage of digital identity. Simple: Digital identity does not require many complexities and time to get implemented (Salah et al., 2013). This is extremely simple and thus this is another important advantage of digital identity. Fast: Digital identities are extremely fast and this is another important advantage of digital identity. However, implementing digital identities in DAS can sometimes turn to be risky. These digital identities should be safe and secured so that there exists no loopholes of hacking in the data. The utilization and security of digital identities are the most important step to secure the cloud. Limited Access to Systems: All the users should not be allowed to use all the systems (Malik Nazir, 2012). DAS should allow and unauthorized users to access their computers and systems. Private WiFi Connection: DAS should install a private wireless connection for internet access. Security and access to personal information is another important step to save the privacy. The information should be secured so that the unauthorized access to various information is mitigated (Hamlen et al. 2013). Department of Administrative Services should secure their personal information by limiting the access to their personal information from unauthorized users. Quality and Correction of Personal Information The quality and the correction of personal information is another important step to keep the privacy of the data. DAS should focus on the quality of their information so that there exists no loopholes in the privacy (Liu, 2012). Moreover, the information should be corrected from time to time to avoid all sorts of errors in the information. DAS is dealing with several dangerous information that are highly confidential. There are various ways to mitigate these risks (Von Solms Van Niekerk, 2013). It is recommended that Department of Administrative Services should focus on their security of personal information. The three ways to mitigate the privacy risks of information are as follows: Encryption: The procedure of encrypting or encoding a particular message to maintain its security without changing the inner meaning is known as encryption. It encodes the entire message into a cipher text, which is only readable by the receiver. When a sender sends a message, he sends it in an encrypted form (Stallings Brown, 2012). This saves the message from getting theft and thus security is maintained. There are two main algorithms used for encryption. They are the Symmetric Key Algorithm and the Asymmetric Key Algorithm. The symmetric key algorithm is extremely simple. The sender and the receiver are provided with a key. The sender while sending a message with encodes the message with the key. Once, the receiver receives the message, he is able to decode the message with that particular key only. No other unauthorized users will get the access of the data and thus the data is absolutely secured through encryption (Van Tilborg Jajodia, 2014). The unencrypted message is known a s the plain text while, the encrypted message is known as the cipher text. The main advantage of encryption is that it is extremely secured. The second algorithm for encryption is the asymmetric algorithm. Here, the case is different from symmetric key algorithm. Here the sender and the receiver have two different keys to encode and decode the message. The sender encrypts the message with a particular key and the receiver decrypts the message with a different key. The main advantage of symmetric key algorithm is that it is extremely simple as both the keys are same. However, it has one disadvantage as well (Stallings Brown, 2012). Both the keys are same in symmetric key algorithm. Thus, if any one of them loses the key, there is a high chance that the data cannot be recovered any more. This can lead to major problem for any organization. The main advantage of asymmetric key algorithm is that the security is double than symmetric key. Since, there are two keys; there is no need to e xchange keys between the sender and the receiver. This helps to keep the keys safe and secured. However, there is a disadvantage as well. The main disadvantage of asymmetric key algorithm is its complexities. Both the keys are different and this makes it much complex than the symmetric key (Buchmann, 2013). Another disadvantage of asymmetric key algorithm is that the time consumption is more as the complexity is higher. It is highly recommended for DAS to opt for encryption, as encryption would secure their personal information. Digital Authentication: This is the second most basic and important recommended strategy to secure the data for DAS. The procedure of getting confidence in the identities of users digitally is known as digital authentication (Hamlen et al. 2013). The word authentication means to an electronic procedure, which enables any type of electronic recognition of a legal person. Authentication also saves the integrity of the data and thus it can be claimed as another strategy for privacy of data. The main advantage of digital authentication is that it mitigates the chance of data theft and fraud. In a digital authentication, the identities of the user are given to a particular information system electronically (Buchmann, 2013). There are three main factors of digital authentication. They are as follows: Knowledge Factors: These factors are nothing but the confidential knowledge of a user like the password, pin number. Ownership Factors: These factors are those that the user possesses like a credit card, one-time passwords. Inherence Factors: These factors are those factors that an user has got in inherence like the biometric identifications (Stallings Brown, 2012). Fingerprint and face recognitions are two famous inherence factors. Digital Signatures: This is the third important strategy to reduce the privacy risks is the implementation of digital signatures. DAS can protect their data by implementing this very safe and secured data security strategy in their organization. this is nothing but a digital code, which is created by public key encryption and is utilized to verify an users identity (Kahate, 2013). It also verifies the contents of the message that are sent over the network. DAS should implement digital signatures for their private cloud. The main advantages of digital signature are the speed, cost, security, authenticity, imposter prevention, time stamp and tracking. These advantages will help DAS to protect their data and thus the privacy should be secured. However, digital signatures do have some disadvantages (Salomaa, 2013). The disadvantages of digital signatures include expiry of the signatures, need for verification software, compatibility, need for implementation of digital certificates. In sp ite of these disadvantages, digital signatures are one of the famous strategies for privacy of data. It is highly recommended for DAS. Personal Data Protection Strategy Department of Administrative Services or DAS is having problems in securing their personal data. This type of data should be secured and safe on immediate basis. There is a high risk that the data will be lost and the hackers and the unauthorized users will be able to access them (Salah et al. 2013). The access should be authorized so that the integrity of the information does not get lost. This will create a major problem as every data and information are important for DAS. The access and disclosure of the personal information should be authorized so that there exists no chance of hacking and modification of personal information (Salomaa, 2013). There are several ways to stop this hacking like installing antivirus, firewalls. The procedure to prevent the identity of personal data is known as de-identification of personal data. There are several ways to stop the identification of the personal data of DAS. They will have to adopt certain measures to mitigate or reduce the hacking of data (Liu, 2012). The best ways to prevent identification of personal data is the antivirus, security policies and firewalls. Implementing these techniques can help DAS to prevent their data identification. Digital identities are an important solution to their problem. A digital identity is data of an organization that is utilized to depict an external representative. This particular representative can be an individual, an organization or an application (Ali, Khan Vasilakos, 2015). There are various advantages of digital identities. The advantages of digital identities are as follows: Security: The main advantage of digital identity is its security. The data is extremely safe and secured with the help of digital identity. Data Integrity: The integrity of the data is not lost because of digital identity. This is another important advantage of digital identity. Simple: Digital identity does not require much complexities and time to get implemented. This is extremely simple and thus this is another important advantage of digital identity. Fast: Digital identities are extremely fast and this is another important advantage of digital identity. Security of Personal Data Security and access to personal information is another important step to save the privacy. The information should be secured so that the unauthorized access to various information is mitigated (Katz Lindell, 2014). Department of Administrative Services should secure their personal information by limiting the access to their personal information from unauthorized users. Securing and archiving personal data is an important step to secure the personal information. DAS should implement various strategies to secure their personal information as it is important for their business (Ali, Khan Vasilakos, 2015). Personal data are protected and secured through several strategies. Three strategies are recommended for Department of Administrative Services. They are as follows: Periodic Back up and Recovery: Personal information should be recovered periodically and back ups should be taken time to time (Peltier, 2016). This will help Department of Administrative Services to recover their lost data and to will not lose their confidential data any more. Remote Data Movement: Real time and non real time movement of data from a particular storage to another secured storage is another strategy for protecting data and information. There is always a high chance of losing of data and information if they are stored for longer period of time (Ali, Khan Vasilakos, 2015). The system or the storage may be damaged and thus the data can be lost. Two popular forms of data movement are the replication and the remote copy. These two techniques will help DAS to save their data and to save the storage system. Data Lifecycle Management: DLM or Data Lifecycle Management is the automatic movement of data to offline and online storage (Von Solms Van Niekerk, 2013). The major features of data lifecycle management are keeping the data in a particular storage that is read easily and cannot be modified. These three strategies will help DAS to secure their personal information and the information will not be lost. Conclusion Therefore, from the above discussion it can be concluded that, Department of Administrative Services or DAS gives various services to the Australian State Government. The services are procurement, payroll, human resource management, personnel management and contractor management. Due to the recent changes in the policies of the government, Department of Administrative Services is shifting to a new approach known as the Shared Service approach. This particular approach means that a fixed number of services will be controlled by DAS for the benefit of the Whole of Government (WofG). DAS has to follow various strategies and tasks. They have to secure their data and information through various ways and strategies. The report provides a brief description on how to manage and control personal information, utilization and security of digital identities, security and access to personal information, quality and rectification of personal information. The report also provides perfect recommenda tions on several strategies to secure the privacy of personal information in DAS. The report further covers a personal data protection strategy for DAS with the ability to control the unauthorized access to the personal information. Proper recommendations are also provided to mitigate the security risks for the protection of data. References Ali, M., Khan, S. U., Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges.Information Sciences,305, 357-383. Aljawarneh, S. (2012). Cloud security engineering: Avoiding security threats the right way.Cloud Comput. Adv. Des. Implementation, Technol., 147. Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Behl, A., Behl, K. (2012, October). An analysis of cloud computing security issues. InInformation and Communication Technologies (WICT), 2012 World Congress on(pp. 109-114). IEEE. Buchmann, J. (2013).Introduction to cryptography. Springer Science Business Media. Chou, T. S. (2013). Security threats on cloud computing vulnerabilities.International Journal of Computer Science Information Technology,5(3), 79. Hamlen, K., Kantarcioglu, M., Khan, L., Thuraisingham, B. (2012). Security issues for cloud computing.Optimizing Information Security and Advancing Privacy Assurance: New Technologies: New Technologies,150. Iankoulova, I., Daneva, M. (2012, May). Cloud computing security requirements: A systematic review. InResearch Challenges in Information Science (RCIS), 2012 sixth international conference on(pp. 1-7). IEEE. Kahate, A. (2013).Cryptography and network security. Tata McGraw-Hill Education. Katz, J., Lindell, Y. (2014).Introduction to modern cryptography. CRC press. Kulkarni, G., Gambhir, J., Patil, T., Dongare, A. (2012, June). A security aspects in cloud computing. InSoftware Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference on(pp. 547-550). IEEE. Lee, K. (2012). Security threats in cloud computing environments. InInternational Journal of Security and Its Applications. Liu, W. (2012, April). Research on cloud computing security problem and strategy. InConsumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on(pp. 1216-1219). IEEE. Malik, A., Nazir, M. M. (2012). Security framework for cloud computing environment: A review.Journal of Emerging Trends in Computing and Information Sciences,3(3), 390-394. Peltier, T. R. (2016).Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Rong, C., Nguyen, S. T., Jaatun, M. G. (2013). Beyond lightning: A survey on security challenges in cloud computing.Computers Electrical Engineering,39(1), 47-54. Salah, K., Calero, J. M. A., Zeadally, S., Al-Mulla, S., Alzaabi, M. (2013). Using cloud computing to implement a security overlay network.IEEE security privacy,11(1), 44-53. Salomaa, A. (2013).Public-key cryptography. Springer Science Business Media. Stallings, W., Brown, L. (2012). Computer security.Principles and practice (2 nd ed). Edinburgh Gate: Pearson education limited. Suresh, K. S., Prasad, K. V. (2012). Security issues and security algorithms in cloud computing.International Journal of Advanced Research in Computer Science and Software Engineering,2(10). Tianfield, H. (2012, October). Security issues in cloud computing. InSystems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on(pp. 1082-1089). IEEE. Tsai, H. Y., Siebenhaar, M., Miede, A., Huang, Y., Steinmetz, R. (2012). Threat as a service?: Virtualization's impact on cloud security.IT professional,14(1), 32-37. Van Tilborg, H. C., Jajodia, S. (Eds.). (2014).Encyclopedia of cryptography and security. Springer Science Business Media. Von Solms, R., Van Niekerk, J. (2013). From information security to cyber security.computers security,38, 97-102.

Monday, December 2, 2019

The Chrysalids The Importance of Telepathy Chrysa Essay Example For Students

The Chrysalids: The Importance of Telepathy Chrysa Essay lids The Chrysalids: The Importance of Telepathy Some people dream about having an ability to communicate through mental telepathy. Some even claimed to have this ability but it played an important role in the novel The Chrysalids. The author created an interesting environment. There was no communication and the only people who could communicate between each other were the ones that had the power of telepathy. Because in some areas the land was so dangerous because of the radiation that people were cut of from another and left on a small piece of land. They could not communicate. Though-shapes not only developed the plot of the story but greatly affected the lives of some characters and might affect Waknuk. We all know that people in Waknuk were very superstitious but did it actually help the plot to develop? On page 91 through 103 finally and idea gets out about some people being able to communicate through thought-shapes. When Katherine and Sally got caught and tortured they final ly tell some of the names to the inspector. This forces David, Rosalind and Petra to runaway to the fringes, and they established some kind of contact with a woman from Sealant (Zealand, On page 134). The help that the sealant woman promised is on their way to the fringes. The plot is greatly influenced, David learns more things as the time goes on. He discovers who is the Spiderman(Gordon) and where is Sophie. He meets them and learn what it is like to live in the fringes. When the sealant woman rescues David, Rosalind and Petra they are brought to a big, developed city like the one in Davids dreams. Because of the telepathy David discovers that such a city really exists but most of all through Petra they establish contact with a more civilized people than they are. Because of the conflicts in the story it leads the main characters to discover the sealant city. Telepathy not only affects the plot of the story but also the main characters in the novel. The most obvious thing is that David, Rosalind and Petra are saved. They have a chance to learn, experience new things they never saw or heard before. Mike and Rachel stays behind but hopes to come to the big city were things are different. Some characters died in the final chapter when the helicopter makes a landing killing everything that moves around it. The characters that died where: the spiderman (Gordon), Davids father, Sophie and all the people from the fringes and Waknuk that where near the helicopter. Waknuk might be affected by the discovery of the sealant city because the reader finds out (in the final chapter) that the sealant city is very developed and people are better educated. They are also civilized and understand that Waknuk is a village cut off from the surroundings because of the radiation. If Waknuk will be helped as predicted it may become a big, civilized city like Zealand. The natives in Waknuk will stop thinking that Tribulation was sent by God and that all deviations are devils creatio n. They might understand that the radiation might be the remaining of a nuclear bomb or nuclear war. The sealant people might help Waknuk in education and they themselves may build the machines like todays, and grow more productive crops. The entire thinking and appearance of Waknuk might change. On the other hand when the radiation will go away after a while the sealant people might go deeper and deeper into the surrounding land. Waknuk might be taken over by other cities because it could not and/or would not know how to compete with the cities. This also might depend on how are the Zealand people like. If they are so understanding and educated they will probably help Waknuk to develop, but if the people wont help then the `negative point could be true. Many things can affect the plot of a story, the characters or the surroundings in a story. In this novel these three points were influenced by mental telepathy. This type of story could be an example how people were in the past (in the really .u80d9720cc19894b9825a6867d43828d0 , .u80d9720cc19894b9825a6867d43828d0 .postImageUrl , .u80d9720cc19894b9825a6867d43828d0 .centered-text-area { min-height: 80px; position: relative; } .u80d9720cc19894b9825a6867d43828d0 , .u80d9720cc19894b9825a6867d43828d0:hover , .u80d9720cc19894b9825a6867d43828d0:visited , .u80d9720cc19894b9825a6867d43828d0:active { border:0!important; } .u80d9720cc19894b9825a6867d43828d0 .clearfix:after { content: ""; display: table; clear: both; } .u80d9720cc19894b9825a6867d43828d0 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u80d9720cc19894b9825a6867d43828d0:active , .u80d9720cc19894b9825a6867d43828d0:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u80d9720cc19894b9825a6867d43828d0 .centered-text-area { width: 100%; position: relative ; } .u80d9720cc19894b9825a6867d43828d0 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u80d9720cc19894b9825a6867d43828d0 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u80d9720cc19894b9825a6867d43828d0 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u80d9720cc19894b9825a6867d43828d0:hover .ctaButton { background-color: #34495E!important; } .u80d9720cc19894b9825a6867d43828d0 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u80d9720cc19894b9825a6867d43828d0 .u80d9720cc19894b9825a6867d43828d0-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u80d9720cc19894b9825a6867d43828d0:after { content: ""; display: block; clear: both; } READ: One Hell of a System Essay We will write a custom essay on The Chrysalids: The Importance of Telepathy Chrysa specifically for you for only $16.38 $13.9/page Order now