This website uses cookies to ensure you have the best experience. Learn more

Victim Vs Creator Essay

721 words - 3 pages

Cemarcia Green
Housatonic Community College
DS099
Professor Audia

Creator vs Victim

It is not what happens to each of us that determines how much we enjoy life, but rather our reaction to what happens. Though we may have no choice in unexpected events that happen to us, we most certainly have a choice in how we interpret what happens, and in what we choose to do about it. We can always choose to be either a Victim or a Creator. This key choice makes all the difference in how much joy we experience in life.
Each of us is faced with challenges every day of our lives. And with each challenge, we make choices in how we react. By choosing to become more conscious of how we react to challenges, we can shift our actions towards creating what we really want in our lives. Rather than following habitual, reactive patterns which cause us to behave like victims, we can recognize and transform old habits to create the life we really want. Yet to do this, we ...view middle of the document...

Or you may blame yourself for all your problems, thus internalizing your victimization. The essence is that victims feel a need to blame someone for all their problems, whether it is themselves or others, because that someone is ruining their lives and world. And the truth is, your life is likely to stay that way as long as you feel a need to blame and make yourself or others wrong.
Those who choose to be creators look at life quite differently. They know that there are powerful individuals and groups who might like to control their lives, but they don't let this get in the way. They know that they have their weaknesses, yet they don't blame themselves when they fail. Creators feel no need to blame anyone as they know that whatever happens, they have choice in the matter. When Gandhi and Martin Luther King, Jr. were put behind bars, they used that opportunity to meditate and pray, to write letters and books, and to inspire their communities to stand up and make a difference in the world. They prayed not only for themselves and their supporters, but even for those who jailed them and despised their work. They were unstoppable, powerful creators who continued to have joy and meaning in their lives until the day they died.
Victims relish in anger, revenge, guilt, and other emotions and behaviors that cause others – and even themselves – to feel like victims, too. Creators consciously choose love, inspiration, empowerment, and other qualities which inspire not only themselves, but all around them to continually create the lives and world they want to live in. Victims and creators live in the same physical world and deal with many of the same physical realities, yet their experience of life is worlds apart.
In reality, all of us play the victim and all of us play the creator at various points in our lives. Yet few people realize just how much choice we have in which role we play at any given time. None of us is perfect. We all have made and will continue to make mistakes and bad choices in our lives. When we fail, there is no need to blame ourselves or anyone else. We can choose to simply accept that we didn't do what we had intended and then work to understand why, so that we might do better the next time.

Other Papers Like Victim vs Creator

Principles of Information Security Essay

3241 words - 13 pages and quickly went through. Then, the second perpetrator waited behind the target until the target placed his/her computer on the baggage scanner. As the computer was whisked through, the second agent slipped ahead of the victim and entered the metal detector with a substantial collection of keys, coins, and the like, thereby slowing the detection process and allowing the first perpetrator to grab the computer and disappear in a crowded walkway

Computer System Security Essay

3291 words - 14 pages unsuspecting target and quickly went through. Then, the second perpetrator waited behind the target until the target placed his/her computer on the baggage scanner. As the computer was whisked through, the second agent slipped ahead of the victim and entered the metal detector with a substantial collection of keys, coins, and the like, thereby slowing the detection process and allowing the first perpetrator to grab the computer and disappear in a

Freedom And Responsibility

2141 words - 9 pages Built within the Constitution of the United States are specifically defined freedoms that are guaranteed to all citizens. Conversely, with every constitutional freedom there comes a corresponding responsibility. On September 25, 1789, the state legislature’s twelve proposed amendments were transmitted by congress, the first two dealing with congressional representation and congressional pay. The following numbers three through twelve were

Hate Crime Laws

2348 words - 10 pages Rodney king could happen again. Hate Crime Charges Should be higher than other similar charges. Christopher Heath Wellman mentioned that “If Ally and Barry both murder someone, for instance, and the only different between the two is that Ally chooses her victim for monetary gain (suppose she is paid ten thousand dollars to kill someone she has never met) whereas Barry is motivated solely by hatred for the group of which his victim belongs

Rational Emotional Behavior Therapy Case Study Conceptualization And Treatment Plan

2140 words - 9 pages Rational Emotional Behavior Therapy Case Study of Sarah: A Conceptualization and Treatment Plan Rational emotive behavior therapy, REBT, was developed by Albert Ellis and holds the central belief that the events in our lives do not cause our disturbances but that they are instead caused by our view of the events (Murdock, 2009). Murdock (2009) states that “people are seen as responsible for their behavior” (p. 279) but, because they are

Holidays In Albania

1636 words - 7 pages Have you ever thought about having exciting and incredibly cheap vacations? Albania might be the right choice. According to My Travel Guide, Albania is ranked the fourth among ten places worth visiting in Eastern Europe (“Top 10 Eastern European Destinations”). One can encounter three kinds of vacations in this Mediterranean country: winter, summer, and cultural. The ideal places to spend your winter vacations are the Albanian Alps. They are

A Heart Of Darkness

1748 words - 7 pages emphasizing the two images of Kurtz: a barbarous and savage man of an uncivilized society vs. refined gentlemen from civilized Europe. The manager of the ivory company in Africa is essentially the scoundrel of the plot. He is the dark force indirectly responsible for the corruption and decadence in the Congo. Setting is also relevant to the overall theme of the novel. As the plot opens up, Marlow begins to compare the Thames River to the Congo. He

The Aspects Of Vulnerability Among The Exploited In Medical Research

2287 words - 10 pages Essentially, everyone is in some state of vulnerability. However, some of us are more susceptible to harm due to our vulnerabilities. The susceptible are the individuals with the greatest risk. These individuals risk the loss of their autonomy, and maybe even their lives. Vulnerable populations can be found in every subset of society. However, as previously mentioned, there are some vulnerable populations that are at an even greater risk than

The Hitchhiker’S Guide To The Galaxy

1171 words - 5 pages The Hitchhiker’s Guide to the Galaxy As the human race makes life-changing discoveries, it is made apparent that there is always more to learn as the universe, instead of becoming familiar, is becoming absurd. The Hitchhiker’s Guide to the Galaxy, written by Douglas Adams, as well as the 2005 film adaption, portrays absurdity to be an all-encompassing system in the universe. Through the introduction and attempt to understand lack of reason, the

The Ford Motor Company Wage Increase Of 1914 And The Theory Of Incentives And Efficiency Wages

1252 words - 6 pages ‘It’s not the employer who pays the wages. Employers only handle the money. It is the customer who pays the wages’ (Henry Ford, cited in Johnson and Weinstein 2004, p. 2). When the Ford Motor Company announced that it would more than double the wages of its workers in January 1914 to a ‘five-dollar day’ minimum, was this a contradiction to Henry Ford’s statement? If customers are actually the ultimate payers of wages, then more than

Historical Analysis Of The Economical Breakthroughs Of The Industrial Revolution

1396 words - 6 pages A Historical Analysis of the Economical Breakthroughs of the Industrial Revolution During the Industrial Revolution, many elements of society experienced huge breakthroughs that would change the way they functioned forever. Economics were definitely one of them. With many new inventions and many factories appearing, many, many, more resources were being created than ever before. Also, all of the revenue from these resources was being given to

Related Essays

Education: Private Vs Public Essay

1707 words - 7 pages Engl-100-03-2015 Barbara Myers Sr. An Nguyen Education: Private vs. Public     Education plays an important role in society. The whole world tries to improve its educational system as much as possible. “Education is simply the soul of a society as it passes from one generation to another” (Chesterton).Another wonderful opinion is “Education is more than a luxury; it is a responsibility that society owes to itself” (Cook

Evidence Collection Essay

2876 words - 12 pages impact of the malicious activity on the victim, and assess the intent and identity of the perpetrator Computer Forensic Methodologies Computer forensic tools and methodologies are major components of an organization’s disaster recovery preparedness and play a decisive role in overcoming and tackling computer incidents. Due to the growing misuse of computers in criminal activities, there must be a proper set of methodologies to use in an

Computer Tricks Essay

3238 words - 13 pages victim and prevent the host from sending a TCP/RST packet to the victim. The attacker predicts sequence numbers the remote host is expecting from the victim and then hops into the communication. This method is used extensively to exploit the trust relationships between users and remote machines. Session Hijacking 1-5 Simple IP spoofing is fairly easy to do and is used in various attack methods. To create new raw packets, the attacker

Principles Of Information Security Essay

3291 words - 14 pages unsuspecting target and quickly went through. Then, the second perpetrator waited behind the target until the target placed his/her computer on the baggage scanner. As the computer was whisked through, the second agent slipped ahead of the victim and entered the metal detector with a substantial collection of keys, coins, and the like, thereby slowing the detection process and allowing the first perpetrator to grab the computer and disappear in a