Deadpool And The Hero’s Journey

If the events of the movie or comic book involving Deadpool are taken for surface value, one may think that Deadpool is a villain, or at most, an anti-hero. If you analyze his origin story, one may very quickly realize that every single event that occurs in his origin story is a step in the hero’s journey. Technically speaking, according to online sources, Deadpool is officially considered an anti-hero. An anti -hero is someone who’s shows the attributes of a hero, does good things to benefit others, and all the other things a standard run of the mill hero would do. The key difference here though is that an anti-hero, while doing things that a hero would do, winds up harming people in the process of helping people. An example of something like this would be, for example, a car chase. Say the good guy in this case is chasing after the bad guy in a car. While the good guy is trying to stop the bad guy, he also manages to cause several car accidents that injure innocent people. Despite him being an anti-hero, his story contains all the steps to the hero’s journey.

The first step in the Hero’s Journey, the Ordinary World, is probably one of the driest portions of the journey (and especially Deadpool’s backstory). His backstory fits the first step because it is very clearly outlined in the beginning of the movie. It is described as follows; Deadpool, or Wade Wilson, lives in New York City and works as a sort of not so permanent hitman, that scares people that do something wrong, and gets paid for it. His normal cycle is to his job, go to the bar and drink, and pick up women and or prostitutes. Within the ordinary world, he meets a prostitute named Vanessa, and they wind up falling in love with each other. Towards the end of this phase, Wade asks Vanessa to marry him and she says yes (Deadpool, 2016).

Our writers can help you with any type of essay. For any subject

Order now

The next phase of the Hero’s Journey, the Call to Adventure, occurs when Wade gets a diagnosis that changes his life. Going by the movie timeline, very shortly after the two get engaged, Wade is diagnosed with a type of cancer that is very far through its progression, and the odds of it being cured are very slim. It sends him into a complete downward spiral, in which he is having a hard time coming out of. It stops him from doing his normal hitman-ish activities, and he is no longer his joking self. While this may not seem like a huge “adventure” per say, it is enough to disrupt his ordinary world, so it counts as his call to adventure (Deadpool, 2016).

A very important part of the Hero’s Journey is the Refusal of the Call. This is the portion of the journey in which the hero denies his call and tries to remain in his/her little world. In Wade Wilson’s case, his refusal of the call comes in a couple different forms. The first form of his refusal is when he denies the use of any modern medicine or any method to slow down the progression of his cancer, and just live with the fact he will die. The second refusal is when he is initially approached by a man that offers him a cure, along with super powers. At first, Wade laughs at the man and to keep things relatively clean, tells the man to get out of his face. All this denial is since Wade is extremely frightened by the diagnosis of cancer (Deadpool, 2016).

The next step to the journey, is Meeting the Mentor. In Wade Wilson’s case, his mentor winds up being the villain that Deadpool will later have to face in the final steps of the Hero’s Journey. At this point in the story, however, a man named Ajax (the guy who tried convincing Wade to take an experimental treatment that would also give him super powers) finally gets into Wade’s head. In the cover of darkness, he packs a bag, and sneaks out of his apartment, leaving Vanessa behind. He shows up to a building that initially does not look like anything official. This is the first thing that made him wary about what he was getting himself into (Deadpool, 2016).

The phase of Crossing the Threshold happens very shortly after Wade’s arrival to the building where Ajax is. They put him through all these tests, and experiments to activate his “mutant gene”. None of these experiments initially work, and it begins to frustrate his “mentor”. The subject Wade to a gross amount of torture and tests that a standard human being would not be able to handle. All of this was to activate the gene that would essentially “cure” his cancer, along with give him super powers. Wade finally crosses the threshold when they lock him into a tank that deprives him of oxygen then restores it when he is about to pass out. During this test, Wade’s mutant gene is finally activated, and receives a super human healing factor, along with a slew of other powers, with the only downside being is that it turned his skin into a disgusting mess of wrinkles and redness. So, to summarize this entire ordeal, the moment that Wade crosses the threshold is when his mutant gene activates and gives him his powers and makes him look gross (Deadpool, 2016).

To combine several of the next steps, because they are relatively small, Wade Wilson, now known as Deadpool, must go through several tests along the way, along with meeting allies, preparing for his final fight, having his final fight, and returning with the elixir. To begin with, the tests he goes through, only pertains to the people he fights leading up to his final fight with Ajax. He was mentally tested in the scene in which he initially finds Vanessa in the strip club but could not talk to her. His main allies are Al, Weasel, and the two X-Men. They teach him useful knowledge and provide him with physical and mental support when needed. His preparation for his final fight, is extremely quick, only consisting of one scene. In this scene all he does is grab a duffel bag, and stock it with every single gun he has in his possession. His final fight, while strung out significantly in the movie, is exactly what one would expect. The hero fights his story long enemy, and defeats him, and gets rewarded. The phase of returning with the elixir, is when the hero returns to the ordinary world after going through his journey. In this case, Deadpool returns with elixir when Vanessa forgives him, and they go back to being happy and living with each other (Deadpool, 2016).

In conclusion, one can very clearly see that Deadpool fits the frame of the hero’s journey, despite being classified as an anti-hero. Each phase is detailed throughout the movie, even though it may not be entirely orthodox. Every movie about a lone character and his journey, normally wind up showing the hero’s journey in some way. In this movie, Deadpool shows every step, start to finish.

Health Data Breach Response Plan: A Managed Care Organization’s Comprehensive Plan

Response plan on health data breach


Security imperatives of preventing, responding to, and detecting breaches will finally end with good reason and appropriate rejoinder criteria implemented. Breaches in various companies have become inevitable despite efforts put in place to prevent their continuous occurrence. Once there is an unauthorized disclosure, compromise of protected data, or hacking of information that is protected, an organization is obliged to respond. Putting an effective response plan in place is not a small feat.

Organization’s response to breach

Performing risk analysis is the primary goal in implementing a security and privacy program, and is one of the requirements under the safety rule. From the perspective of preventing unsecured leaks of information, risk analysis is one of the best processes for identifying vulnerabilities and threats in the medical field. Adequate privacy measures are essential in preventing breaches from occurring.

Our writers can help you with any type of essay. For any subject

Order now

Response team

The response team should be selected from the network of stakeholders who have an interest in the organization’s data. The selected team should possess the ability to implement and establish sustainable security responses. Fields such as IT security, physical security, privacy officer, nurse auditor, administration, and health information services are primary when creating a response. In many organizations, internal business operations often operate in isolation, rarely intersecting. However, a team that practices cross-functional operations encourages collaboration, and the coordination of resources through efficient business workflow procedures and policies. This helps eliminate gaps found in the information management process, thereby mitigating data theft risks. The best plan is to ensure that everyone has a monitoring role. Additionally, at some levels, the security response team has to take steps that involve the entire organizational staff, the patient, and business associates in order to effectively mitigate and monitor risk.

Developing security response plan

An effective response to incidents of data breach requires a collective effort from individual victims, security officers, and privacy and HIM professionals. The data breach response plan involves identification of state laws pertaining to breach notification, disclosure, and reporting. Determining the organization’s obligations in terms of reporting and disclosure related to data breach notification is critical to ensuring data security in health organizations.

Family members and individual patients are often the first to learn about a data security breach involving their health information. The organization should ensure that each is aware of how to respond to a suspected breach. Contacting the manager in charge of health information is a crucial step in identifying where the data breach activity occurred. The organization should welcome reports about data security from patients and family members. Reporting mechanisms should be widely known and easy to navigate. Therefore, there should be a system in place where a patient can approach an officer to report a possible breach involving individual’s data.

Three-point system measure

Proper risk analysis involves a three-step process which includes evaluating, identifying, and reducing the impact of the risk. This process incorporates asset prioritization and inventory. Priority should be given to the examination of existing security details to identify threats and vulnerabilities. Identifying vulnerabilities and risks will aid in mitigating all recognized risks. Swift determination of the effects associated with the continued existence of a threat to the organization should be carried out to prevent further threats to the organization.

Security incident response

The security response team is charged with the development of a security response reporting form and checklist that will ensure the safety of data maintained in an organization. The data breach mitigation and checklist should be accompanied by a security incident response form to give the organization the priority of ensuring their data security.

Designating communication coordinator

One person should be appointed to serve as a communication director. This essentially removes the need for involving members of the security incident team, who are left free to mitigate and investigate any data breach incidents. This focal point of communication can serve as the single coordinator between the media and the organization.


Data breach response ensures prompt notification to individuals who guide the response, ensuring a comprehensive action plan for security is taken. An efficient breach notification plan begins with those on the front end involved in administrative and technical safeguards and concludes with a follow-through process that addresses the adverse effects of data breaches. The response plan for a health data breach asserts that the security imperatives of preventing, responding to, and detecting breaches will ultimately conclude with well-reasoned and appropriate response criteria. Despite their best efforts, breaches in various companies have become inevitable. Once there is unauthorized disclosure, a compromise of protected data, or hacking of protected information, an organization is obliged to respond. Establishing an effective response plan is no small feat.

Organization’s response to breach

Performing risk analysis is the primary purpose of implementing a security and privacy program and is one of the requirements under the safety rule. From the perspective of preventing the unsecured leak of information, risk analysis is one of the best processes for identifying vulnerabilities and threats in the medical field. Sufficient privacy determination can prevent breaches from occurring.

Response team

The response team should be selected from stakeholders who have an interest in the organization’s data and demonstrate integrity. The selected team should have the ability to implement and establish sustainable security responses. IT security, physical security, privacy officer, nurse auditor, administration, and health information services are the main streams for creating a response.

Leave a Comment

Your email address will not be published. Required fields are marked *

× How can I help you?