Hollywood has created an image of sharks that portrays them as senseless killing machines. Many people believe that sharks will attack, and even consume, a human at any chance possible. The more I researched sharks and their behavior, the more I learned that they have been falsely portrayed. Knowing this, I then wanted to learn why it is that sharks attack humans on rare (very rare) occasions. I had grown up assuming that if a shark was nearby, it would most likely attack me. However, I have learned that this is not necessarily true.
Given that there are over 375 different species of sharks, for the most part I will be discussing the White shark, also known as the Great White. With a large dorsal fin, large, triangular serrated teeth, and having gray-black white coloration, the Great White shark can reach up to five meters in length at maturity. The Great White, like all sharks, has a cartilage skeleton. While many species of shark are oviparous (11), the Great White is live bearing (1). Great Whites are predatory animals and generally feed on animals with high quantities of blubber such as sea elephants, sea lions, seals. Often times Great Whites will scavenge on floating carcasses.
Sharks go back through the fossil record about 400 million years, and Great Whites alone have remained unchanged for the last 60 million years (2). Some early species of sharks even predate trees (11). Thus, some physiological characteristics of sharks seem highly evolved, among these being their senses. Sharks' eyesight has been a topic of controversy in the scientific community. It was once believed that sharks have poor eyesight, but studies have shown that sharks' eyes are much more sensitive to light than human eyes, making hunting at night easy. Great Whites have a pair of nostrils, used only for smelling, rather than for breathing. The Great White has an incredible sense of smell that it uses to sniff out prey. Another interesting sense of the Great White is the ampullae of Lorenzini, tiny pores in the skin that are highly sensitive to electrical discharges. These pores can sense charges as little as 0.005 microvolts. This "sixth sense" is useful in tracking prey's movement from long distances (3). In fact, they can feel disturbances in the water from up to a mile away (2).
If Great White sharks have such developed senses, and could eat anything they like, particularly fatty animals why do they attack humans that are relatively low in fat? Little is known about shark behavior, but there are many theories as to why sharks attack humans. Of about 375 species of sharks, only 32 have been documented to have attacked humans, and the three species that have been identified repeatedly in attacks are the great white, tiger, and bull sharks (4).
Sharks, like any animal, will defend themselves if they feel threatened or if they're territory is invaded (5). How a shark will react when threatened ultimately depends on the kind of shark. Many will simply swim away, or some will attack very quickly. The great white tends to attack quickly, catching the victim off guard.
One theory of attack on humans is mistaken identity. Often times divers, surfers, and even kayakers appear like seals or sea lions swimming at the surface of the water. Studies have been done where researches have equipped a surfboard with an underwater camera (6). The camera shows that the great white swims along the bottom of the sea at first, so as not to be seen, then launches a quick, vertical attack. Some scientists believe that great whites do not use their keen sense of sight when hunting prey, but rather, senses a familiar image swimming at the water's surface and assumes it is some kind of prey.
Another theory is that sharks attack as purely inquisitive testing. Researchers say that 96% of all shark attacks are single strikes, or "hit and run" attacks (5).In this type of attack, the shark might bump or slightly graze the victim with the jaws, often times
Correctional Health Care Increasing Staff Motivation and Satisfaction MGMT 591: Leadership and Organizational Behavior Professor Brett Gordon December 17, 2012 The organization that will be the topic of discussion in my final project paper is Georgia Health Sciences Universities (GHSU), Georgia Correctional Healthcare (GCHC) division. GHSU is both a hospital and teaching institution based in Augusta, Georgia. GHSU was founded in 1828. Georgia Health Sciences University is home to…
companies use shady accounting practices to enflate revenue or hide losses, the public can’t get an accurate picture of what they are investing in. The public demanded that something be done, so in 2002 the U.S. govt passed the Sabex-Oxly act. For my term paper I will examine some the corporate scandals that led to the creation of the act. Deragulation was lobbied for hard on wall street during the Bush Presidency. The public was lead to believe that loosing the rules on corporate practices would lead…
Learning activity Term Paper Test for Hidden Bias The Implicit Association Test, tests for unconscious biases. I chose this learning activity to see if I have any hidden biases. I have always believed that I was a straight shooter never putting on a facade or giving a false presentation of myself. To prepare for taking this activity, I made sure that I was in a quiet room, away from any distractions. I concentrated on each activity as they appeared on my computer screen. I chose six categories to…
who understand these concepts grow as well. These talented individuals can be looked at from several different viewpoints and depending on who that person may be could in fact determine whether it is a positive viewpoint or a negative one. In this paper I will prove why it is necessary to have Ethical Hackers in today’s security models and how they have come a long way to improve how our information systems operate in a more secure manner. Hacker’s for years have been able to do things that the…
issues that occur there are many that people may not be aware of, but the ones that will be discussed to explore ethical situations are Unauthorized Access related to software, hardware, network, internet web mining, IT freedom and hacking. This paper examines how each unauthorized access should be handled and provides examples of each related area of security. Security – Unauthorized Access Unauthorized access is known as the act of gaining access to a network, system,…
The Emancipation Proclamation and the Death of an American Hero. Students Name Professor’s Name History 150 Online 10 March 2014 There were many different events that happened during the time of President Abraham Lincoln and the Civil War. President Abraham Lincoln came up with the Emancipation Proclamation which was an effort to help end slavery, eventually leading to the thirteenth amendment to abolish slavery altogether. Sadly his life was cut short. John Wilkes Booth assassinated him…
Progressive Roots - In the beginning of the 1900s, America had 76 million people, mostly in good condition. Then before the first decade of the 20th century, the U.S. would be influenced by a “Progressive movement’ that fought against monopolies, corruption, inefficiency, and social injustice. 1. The purpose of the Progressives was to use the government as an agency of human welfare. - The Progressives had their roots in the Greenback Labor Party of the 1870s and 1880s and the Populist Party…
Community Organization September 16 2013 Compare and Contrast Community Organizations The two community organizations that I choose to compare and contrast is Do-All,Inc and United Way. I have worked with both of these organizations in the past, and they are both really good organizations, and do a lot of improve the overall community. Do-All, Inc. evolved from a dream for a better life for people with disabilities. Do-All, Inc was formed in 1952 by the Bay County Association of Retarded Citizens…
Pediatric Oncology Nursing Did you know that one in one hundred new nurses will become a pediatric oncology nurse? Pediatric oncology nursing is a very demanding and heartwarming career. To be a pediatric oncology nurse means to be a primary care coordinator for the management of patients with cancer. A pediatric oncology nurse will assess patient needs, implementing a plan with appropriate tasks for the patient to gain progress. Not only will the pediatric oncology nurse help with the patient…
Introduction Software as a Service (SaaS) has the potential to transform the way information-technology (IT) departments relate to and even think about their role as providers of computing services to the rest of the enterprise. The emergence of SaaS as an effective software-delivery mechanism creates an opportunity for IT departments to change their focus from deploying and supporting applications to managing the services that those applications provide. A successful service-centric IT, in turn…