Studyspark Study Document

Education and Identity in His Term Paper

Pages:6 (1737 words)

Sources:3

Subject:Education

Topic:College Education

Document Type:Term Paper

Document:#86736738


With Kim's help, I saw that I had a knack for helping people. I was able not just to be supportive of others, but I could really connect with people and help them. I also had a great knowledge of course planning for almost every major at UConn, because I liked to read through the course booklet and see what kinds of classes were out there and see the different majors and what the requisites were for each. Also, I realized that I often helped my friends with their course selections and major planning before they went to their own advisors. Therefore, I decided to major in Human Services, where my concentration was in academic advising.

Thus, in my own way, I was able to travel through each of the seven vectors identified by Chickering and elucidated by Reisser, ultimately arriving at the final point: the development of purpose in my life and the simultaneous development of integrity in choosing to apply my skills and experience towards helping others who may not have been so lucky as me.

References

Chickering, a.W. Education and Identity. San Francisco: Jossey-Bass, 1969.

Straub, C. And Roberts, R.F. "An Exploration of Chickering's Theory and Women's

Development." Journal of College Student Personnel, 1986, 27, pp. 216-224.…


Sample Source(s) Used

References

Chickering, a.W. Education and Identity. San Francisco: Jossey-Bass, 1969.

Straub, C. And Roberts, R.F. "An Exploration of Chickering's Theory and Women's

Development." Journal of College Student Personnel, 1986, 27, pp. 216-224.

Reisser, L. "Revisiting the Seven Vectors." Journal of College Student Personnel, 1995, 36, pp.

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Identity Management and Security Awareness

Pages: 6 (1839 words) Subject: Education - Computers Document: #40671153

However, the security awareness training plan highlights the prominence of auditing and security maintenance of the classified information, since data integrity is the key ingredient of existence for any organization. The questions like who, what, when and where with respect to the changes made in the operating system is essential when auditing the operating system. These questions ensure that the employees are accountable to the changes they make, as a

Studyspark Study Document

Education and Sociology Over the Last Several

Pages: 5 (1542 words) Sources: 2 Subject: Teaching Document: #25578788

Education and Sociology Over the last several years, the education system has been continually facing a variety of challenges. This is because many schools are lagging behind in academic achievement in comparison with most developed nations. To make matters worse, teachers are not creating an environment that will help students to learn the social skills they need to survive inside the society and the workplace. This makes it harder for them

Studyspark Study Document

Education Richard Rodriguez and Mike Rose Both

Pages: 3 (949 words) Subject: Teaching Document: #76107639

Education Richard Rodriguez and Mike Rose both write about their education. In "I Just Wanna Be Average," Mike Rose recounts his experience in Catholic school as an Italian-American from a working class family background. Because of a school error, he was placed in the vocational tract at school. The experience taught Rose a lot about the low expectations place on students, the lack of effective role models in the classroom, and

Studyspark Study Document

Identity Theft in America and

Pages: 10 (2851 words) Sources: 10 Subject: Education - Computers Document: #97579054

Pharmers now not only small local servers operated by Internet service providers (ISP) but they also target the 13 servers on which all other DNS servers depend. Implications Businesses & Large Organizations: Among large scale businesses that get affected includes the financial sector other than individuals. Electronic banking services have been greatly affected by these criminals who are euphemistically called hackers or crackers who conduct phishing or pharming. They not only

Studyspark Study Document

Education System Dr. Piper Outlines

Pages: 4 (1293 words) Sources: 1+ Subject: Teaching Document: #79423325

While one must applaud a sentiment such as, "... success in such matters comes from having determined their own identity, recognized their own distinct strengths, and sharing those strengths with the world," one must also question the hint of ambiguity that this presents when related to a desire to break down cultural barriers and promote discourse. This concern comes from my own experience of the way in which most modern

Studyspark Study Document

Identity Theft Using the Knowledge

Pages: 8 (2712 words) Sources: 8 Subject: Education - Computers Document: #68375775

Spyware runs automatically without the user's knowledge and transmits vital information. Spyware can also record your keystrokes and one might end up revealing all usernames, passwords and other details to identity thieves. (Atlantic Publishing, 2008); (Schwabach, 2005) Identity thieves have also found novel ways to steal and use identities. For instance, cyber criminals recently hacked Facebook, a popular social networking site, and changed a user's page asking people to help

Join thousands of other students and

"spark your studies".