...PROTOCOLO I. Framework a. Background The idea of this extended essay was chosen taking into account the following aspects; first, reason of personal interest in Stalin´s dictatorship focusing primarily on the insights presented in George Orwell allegoric novel “Animal Farm”. Another key to the choice of this idea was the oppression of human rights in society during Stalin´s dictatorship. After researching the history of a single- party state it was found that they failed to remain true to the principles that they proclaimed when they were seeking power. Since this particular topic has already been researched, it is an advantage because it has many resources to investigate, including books, articles, speeches form Stalin, etc. In order to develop this extended essay, it requires a general understanding of Stalin’s dictatorship and the novel “Animal Farm”. Different sources have been consulted that have helped raise awareness about the idea and topic to analyze. b. Justification This extended essay will analyze an important historical fact of Stalin’s dictatorship and some insights presented on the allegoric novel “Animal Farm” by George Orwell; Specifically, the oppression of human rights in society during Stalin’s dictatorship. c. Identification of the problem 1. Definition of the problem: - Comparing and contrasting Stalin’s dictatorship to George Orwell´s allegoric novel to reflect the oppression of human rights in society 2. Delimitation ...
Words: 556 - Pages: 3
...The Development of Political Party Models in Western Europe: Katz and Mair’s Approach to Modern Party Organization Introduction In recent years more than ever, it has become clear that European party systems and European politics itself are characterized by an extensive change. With the economical, cultural and social changes in most of the countries and with the rapid expansion of the European Union, parties face a big number of alterations according to which they have to adjust their focuses and structures. The long term consequences of these changes are varied; some parties quickly emerge, others suddenly decline, the level of volatility is rising and it is evident that generally the vulnerability of political parties is constantly growing. The changes also shape the electorate’s behaviour as is demonstrated by the falling levels of party identification since the 1990s. The increasing number of effects of socio-economic, cultural and technological developments appear to have eroded the once steady cleavage structures in most European societies, on which voting loyalties were based and not only reformed the structures of political parties but also redefined the relationship between them, the states and societies (Mair&Smith:1990:1). This change has resulted in the demand for attention in recent years to be turned towards the research of political party organization and the study of different party models both with regard to the theoretical importance of them and...
Words: 3756 - Pages: 16
...Essay 16 Local Area Networks Marshall D. Abrams and Harold J. Podell Local area network (LAN) communications security is addressed in this essay. LANs are introduced as providing: (1) a private communications facility, (2) services over a relatively limited geographic area, (3) a high data rate for computer communications, and (4) common access to a wide range of devices and services. Security issues pertinent to LANs are discussed. For example, LANs share many security problems and approaches for their solutions with point-to-point conventional communications systems. In addition, LANs have some unique problems of their own: (1) universal data availability, (2) passive and active wiretap threats, (3) end-to-end access control, and (4) security group control. Countermeasures include physical protection, and separation by physical, logical, and encryption methods. Trusted Network Interface Units, encryption, and key distribution are also discussed. Examples are discussed to illustrate the different approaches to LAN security. The examples in this essay are a composite of several existing product features, selected to demonstrate the use of encryption for confidentiality, and trusted system technology for a local area network. Local area network technology/topology overview This essay addresses LAN security from the viewpoint of open systems interconnection (OSI). That is, we focus on the seven-layer OSI protocols (illustrated in Figure 1); in fact, we concentrate on...
Words: 7286 - Pages: 30
...able to adjust the mix of electives and requirements that make up each major to more fully meet program goals. Other matters, such as grading standards or individual course requirements may also come up for discussion during the review of student portfolios. Thus, your particular portfolio will help shape the future of the online MBA program as well as help you review your own education. This course will also develop your career and professional aspirations via a career workshop and advisement session to prepare you for the next step in your professional life, which varies from student to student. ADMIN 995 Course Overview There are four components to the course which you must complete: 1. Portfolio of Academic Work 2. Reflective Essay 3. Career Development Activities 4. Exit Survey NOTE: You must pass all 4 parts of the course in order to graduate. Course Criteria • Grading: Credit / No Credit Important Contact Information |Name |Email / Web Address |Phone number |Office | |Dr. Vipin Gupta...
Words: 3481 - Pages: 14
...Innocence at Stake: Possibility of DNA Collection from Arrestees in Canada Md Washim Ahmed ABSTRACT Followed by a decision of the Supreme Court of the United States, which approved the collection of a defendant’s DNA upon arrests under the Fourth Amendment, the Minister of Justice, Peter MacKay indicated in an interview with the Globe and Mail that he and his Ministry are considering a similar model for Canada. This paper examines the possibility of a similar legislative framework in Canada and argues that although collection of DNA upon arrests was found justified under the Fourth Amendment, it does not necessarily mean that it will be found justified under the Canadian Charter of Rights and Freedoms. While s.8 of the Charter seems to give similar protection as the Fourth Amendment, they have very different requirements for judicial authorization, reasonableness and standard of “probable cause”. Scrutinizing those different requirements and standards, this paper holds that the process of DNA collection is highly intrusive and would be a serious violation of s.8 of the Charter as it could reveal an excessive amount of private information about an individual over which he/she has a strong reasonable expectation of privacy. Furthermore, it will deprive people from their right to be presumed innocent, which is protected under s.11 (d) and significantly impact socially marginalized groups. Finally, this paper conducts an analysis of the violations under s.1 of...
Words: 7373 - Pages: 30
...methodology has become a “buzzword” and at its base has become a cornerstone for every developmental project in developing countries. According to Fung (2002), participation is the active involvement of the community, particularly the disadvantaged groups such as women, children, elderly, disabled and the poorest of the poor, in the decision making, planning, implementation, and evaluation of their own development activities The concept of community participation however, has remained a contested terrain. This paper considers participation in development programmes and assesses its relevance both in theory and practice. A definition of development and community participation will give a clear insight of the applicability of the methodology. The essay also stresses the strengths and weaknesses of the approach with the aid of case studies from developing nations. The concept of community participation in development became the common currency of exchange in development discourse in the 1970s and since then literature on the subject has grown dramatically. What was initially a radical critique of development has relatively quickly become a staple for development practice in the world. The incorporation of the locals in development projects has become a common phenomenon that almost every organization talks about. The concept originated after it was realized that the top-down approach to...
Words: 2847 - Pages: 12
...University Business School Assessed Coursework Coversheet For use with individual assessed work 200975766 Student Identification Number: Module Code: LUBS _____5002M_____________ Module Title: __Information and Organisation Design __ Module Leader: Andrew Robinson Declared Word Count: ____1492________ Asymmetric Information and Its impact upon the Market Function Introduction Financial market functioning is based on certain fundamentals and technical principles. Information about the market scenarios and the background activities are stated as the fundamental aspects of the financial market movements. If a deal is being carried out between two entities and one entity possesses additive information over another then this scenario reflects the actualization of an unfair financial transaction. The possession of additive information by one entity over another in the financial market is stated as information asymmetry or asymmetric information (Hughes, Liu and Liu, 2007). The current discussion includes the overall assessment of various theories that had been presented over the period of time and their practical application into the financial market in context of asymmetric information. In addition, the discussions carried out in the current essay also elaborate the impact of asymmetric information over the financial activities that are carried out in the financial markets. ...
Words: 1645 - Pages: 7
...Essay Questions (Ch 9) 1. Identify and briefly discuss the four distinguishing characteristics of a mature (well-functioning) group. The distinguishing characteristics includes (1) a clear purpose and mission, (2) well-understood norms and standards of conduct (3) a high level of group cohesion (4) a flexible status structure. Stating the purpose in terms specific goals enhances productivity over and above any performance benefits achieved through individual goal setting. Behavioral norms for high performance and productivity set above organizational norms characterizes high performing work groups. Smaller groups tend to be more cohesive than large groups, and cohesion based on attraction results in effective control over members with respect to important performance norms. Successful resolution of authority issues within a group result in a well understood status structure. This contributes to group functioning. 2. Describe the five stages of Tuckman's Group Development Process. What individual and group issues are addressed in each stage? Forming Storming Norming Performing Adjourning Individual How do I What's my What do the How can I Whta's issues fit in? role here? Others expect best perform next? ...
Words: 5127 - Pages: 21
...Test Bank for Organization Development & Change Chapter 1 General Introduction to Organization Development Multiple Choice Questions 1. Which of the following is included in the definition of OD? a. OD applies to an entire system b. OD is based on behavioral science knowledge c. OD is concerned with planned change d. OD encompasses strategy, structure, and process changes e. all of the above ANS: e 2. Organization development distinguishes itself from organization change and change management by which of the following characteristics? a. addressing the effective sequence of leadership issues that produce organization improvements b. focusing narrowly on cost, quality, and schedule c. focusing on the transfer of knowledge and skills to help the system manage future change d. taking a broadly focused approach that can apply to any kind of change e. none of the above ANS: c 3. Which of the following is not one of the “stems” of OD? a. laboratory training b. environmental analysis c. action research/survey feedback d. participative management and quality of work life e. strategic change ANS: b 4. The first “T-group” was formed a. to facilitate decision making b. to work on group projects c. to make the group more cohesive d. as people related to data about their own behavior ANS: d 5. The assumption underlying the use of survey feedback in OD is a. surveys are the best way to collect data b. surveys...
Words: 14422 - Pages: 58
...Information Technology Essay Current online marketing strategies deliver immense benefits to the modern global firm by way of better market reach, cheap and convenient transaction possessing, multiple online payment options and real time consumer data management. Marked benefits are commonly discernible in the area of internet based business-to-business or B2B, and business-to-consumer or B2C e-commerce models. These online commerce models rely on digital marketing for their success, which in turn in essentially a remarkable success of information technology and data management techniques. However, the growth of digital marketing is getting severely affected by the misuse of technology by criminals and unscrupulous persons in various ways. Such misuse of technology encompasses identity theft, data loss and other data security breaches. Increasing information security breaches and cases of identity theft in recent times threaten the marketing of products and services either online or offline like never before. This paper attempts to understand issues and outcomes of identity theft, data loss and security breaches on the present and future global marketing environment by examining several secondary sources of information. 2. What is identity theft? We can help you to write your essay! Professional essay writers Our writers can help get your essay back on track, take a look at our services to learn more about how we can help. Essay Writing Service Essay Marking Service Place...
Words: 3128 - Pages: 13
...able to deal with difficult situations. Lewicki et al. (1985:249) states that people and countries will act sensibly when they have used up all other available possibilities. In any negotiation situation, expert power is the most standard type of power that is applied. Expert power consists of the persuasive nature of the information itself. It pertains to the amassing of information and how it is presented and is used with the intent of changing of how a counter party views the issues. It is the contention of Lewicki et al. (1985:251) that expert power is a unique kind of information power. Information power can be applied by any individual who has studied and prepared their position prior to the start of a negotiation. According to Lewicki et al, expert power is rendered to any individual who are perceived as having mastered and organized a great abundance of information. Lewicki et al. believe that there are processes that a negotiator can use to establish their expertise in the mind of the other party: By quoting facts and figures. By 'name dropping'. By referring to documented...
Words: 4419 - Pages: 18
...adoption of human process interventions, which helps in team building and the completion of tasks to make an organization more effective. The institution of team building allows members to detect group problems and solve them in a collective way. Changes in structural design that focus on division of labor, which defines who is to do which work is also vital. Apples Inc. also needs to move from the traditional way of division of labor to modern division of labor. This can help in improving Apple Inc.’s effectiveness. Apple Inc. should also change from rapid launching of new technology to the market and start gradual introduction to make sure that customers understand one brand before they introduce another to avoid any confusion between the models. Addressing such changes and development follows organizational development strategies such as human process intervention Introduction Apple Inc. represents a multinational cooperation in America whose headquarter is in Cupertino, California. It designs and develops the sales of different electronic items. Some of these include computer software, iPad tablets, iPhone Smartphone, iPod music player, iTunes, Mac laptop, and desktop computers among others. The company came into existence in 1976 as Apple Computer Inc, which later changed to Apple Inc 1977....
Words: 1738 - Pages: 7
...possible in order to improve target advertising and deliver tailored content to their clients. Hence the information of a single browsing user is highly demanded due to the fact that it can provide insights into different online behaviors and optimize online campaigns. In 2006, the EU calculated that the value of open data in Europe (i.e. releasing all government information for free) would be € 27 billion (Dekkers) that is € 55 per European citizen. With a valuation of around $ 100 billion, the value that Facebook holds in 2012 is roughly $ 120 (€ 90) per active member. (NY Times) Personal data online is tracked by cookies, which are small pieces of code placed on the browser that remember the user and its information with a unique identification. Legislation in a lot of countries is unclear on their privacy and cookie laws, leaving the user unaware of the ways their information is stored and also the value of their browsing data. A study by Princeton Survey Research Associates in 2009 that was using a random sample of 1,000 people found that 69 percent thought that the United States should adopt a law giving...
Words: 1745 - Pages: 7
...THE PROTOCOL ON THE RIGHTS OF WOMEN AND PEACE BUILDING IN AFRICA Protocol refers to an international agreement that adds to an existing international instrument. Ratification refers to a formal action under international law that makes a state a party to particular treaty and indicates a state’s consent to be bound by the treaty The African union protocol is an African law made by Africans for Africans and it does among other things call for: * An end to all forms of violence against women in all its forms and in all situations * It promotes the use of corrective measures (Affirmative action) for women’s equal participation and representation. In elected and appointive offices * It clearly provides for the reproductive health rights of women and girls * It provides for remedies for any woman whose rights and freedoms are violated and denied * It also entitles her to seek and obtain redress through accessible government and non governmental agencies mechanisms and services Defending women’s human rights is often seen by state authorities, and even by communities, as a challenge to culture, tradition and a way of life. Through their work, many directly or indirectly challenge social stereotypes regarding the proper role and status of women. As a result, women activists not only face repression by governments, but also by their families and other community members. Ongoing armed conflicts on the continent place women at even further risk of violence...
Words: 7060 - Pages: 29
...final agreement on the introduction of automation and relevant working practices. The strained relations of both sides reveal the sensitive and complicated employer-employee relationship. Since the employee plays a vital role in the management, how to deal with the mutual relationships and ease the contradictions in order to make the relations go on the track of sound progress becomes an urgent issue. Through the Royal Mail case, if Royal Mail had balanced the modernization, the redundancy of employees and stabilization, the strike action could have been prevented. Now, both sides have to face a long period of negotiation for the sake of mutual interests. The essay is writing to identify and analyze the relationship of both sides in order to get to the crux of this relation dispute. On behalf of employee’s right, the essay also puts forward a series of suggestions to find alternatives to defuse the contradiction and resolve the conflicts. Case Description The Royal Mail industrial dispute is a long-running dispute in the United Kingdom between Royal Mail and members of the Communication Workers Union (CWU) which began in this summer. The failure in reaching any agreement between both sides made CWU initiate a national ballot for nearly 121,000 postal workers. Owing to the support of most postal workers, it was announced that a national strike would be held on 22nd and 23rd October. After further dialogue failed, more national strikes were announced to happen from 29th October...
Words: 3070 - Pages: 13