Monday, September 30, 2019

Prevention of Terrorist Acts by Private Security Essay

Introduction The local public law enforcement agencies are aware and have recognized the fact that singly, they cannot cover the vast geographical area of their respective jurisdictions and enforce effective policing duties. They are limited in numbers, expertise and resources. For this reason, they have employed the services of the private sector specifically the members of the communities and forged with them agreements for assistance and collaboration in crime fighting and public disorder. In fact, the 1990s marked the emergence of a new mode of delivery of services in the public sector—law enforcement area. This mode of service delivery gave law enforcement an opportunity to employ resources and expertise which were not otherwise available to them before under the collaborative partnership and shared responsibilities with the private sector and communities (Morabito and Greenberg, 2005). Even the government has recognized the importance of assistance from the private sector. Thus, this growing recognition was no longer limited locally but has spread across the states and the federal government. With financial support from the U.S. Department of Justice, Office of Justice Programs’ Bureau of Justice Assistance (BJA), the Association of Chiefs of Police (IACP), National Sheriffs’ Association, and American Society for Industrial Security International joined efforts for the state and local to start a partnership with the private sector, specifically the private security organizations denominated as â€Å"Operation Cooperation† (Morabito and Greenberg, 2005). This partnership however, was limited to crime fighting and public disorder. A growing success was noted in these partnerships and continued efforts are exerted to thresh out some identified problem areas. The September 11 terrorist attacks brought a new awareness and rekindled the imperative need for local law enforcement and private security organizations to work together to fill the gap for homeland security and in preventing terrorism (Morabito and Greenberg, 2005). By reason of the success rate in the partnership between the private sector and the law enforcement in terms of peace and order, private sector was again requested to pitch in its efforts to help in combating terrorist attacks. After the summit in 2004, private security organizations were called upon to organize and develop as community counterparts in assisting law enforcement agencies. The U.S. Department of Justice holds the opinion that community policing has the same direct effect on counter terrorism strategies. â€Å"These include the use of crime mapping with GIS systems, data collection and analysis protocols, and technologies that may be used as platforms for gathering intelligence to assess terrorism vulnerability. In addition, the community partnerships formed by police in the course of community-oriented problem solving provide a ready framework for engaging citizens in helping police to identify possible threats and implement preparedness plans† (Docobo, 2005). Community policing affords the opportunity for law enforcement agents to have knowledge of activities in their respective territorial jurisdictions which can assist in counteracting terrorist activities. These crime prevention partnerships has proven effective through the years and for which reason, this has inspired a similar idea with respect to terrorism especially after the September 11 terrorist attack. Thus, public law enforcement-private security partnerships are now thought of as being replicated as to apply to homeland security and counter terrorism. For instance in New York, Area Police/Private Security Liaison was created to enhance mutual cooperation between law enforcement and private security primarily for exchange of information. This gives the New York Police Department a vast network and thus facilitating information reports on security updates and terrorists news bulletin (Morabito and Greenberg, 2005). Terrorism in the United States is characterized by inflicting harm and damage to a great number of people all at once. For this reason it is crucial to forge partnerships and mutual collaboration with private security organizations to be able to cover that large territory. The country’s infrastructure is protected by private security organizations while the law enforcement agencies receive information regarding threats thus either one cannot protect alone (Morabito and Greenberg, 2005). Infrastructure as defined by the 9/11 Commission as to include telecommunications and communication networks, buildings, energy facilities, etc. (9/11 Commission, 2004). Based on statistical estimates made by 9/11 Commission in its Final Report, at least 85% of the infrastructure is owned by the private sector and is protected by a number of private security agents which far exceed the number of law enforcement officers and agents (9/11 Commission, 2004). Private security organizations can perform civic duties in providing assistance in evacuation, food and transport in emergencies (Morabito and Greenberg, 2005). There is also information sharing and close coordination with other private security practitioners and law enforcement agents which leads to exchange of information, access to others, exposure, training, and familiarity with the needs of each sector, i.e. private security and public law enforcement (Morabito and Greenberg, 2005). There is a more creative manner of solving problems and a marked reduction in response time to disasters. There were many advisory committees both public and private institutions that embarked on studies to find out how to protect the U.S. homeland security. There was uniformity in their findings that there is lack of homeland security strategy, defects in â€Å"governmental organization and processes in dealing with threats to national security† (Parachini, Davis, Liston, 2003). After the September 11, President Bush created the Office of Homeland Security and also established the Homeland Security Council as an inter agency coordinating body. In 2002, the legislation H.R. 5005 or the Homeland Security Act of 2002 was approved by the U.S. Congress and was signed into law by the President (Parachini, Davis, Liston, 2003). The Department of Homeland Security was established with plans and programs it is supposed to implement through he discharge of the powers and functions which the law mandates it to exercise (Parachini, Davis, Liston, 2003). Directives and orders have been issued from that time to harness the various areas for counter terrorism from state, federal and local enforcement level. The Bureau of Justice Statistics shows that â€Å"there are 16,661 state, local, and county law enforcement agencies in the United States, and they employ a total of 677,933 sworn officers. Studies on private security staffing indicate there may be as many as 10,000 private security agencies employing slightly less than 2 million private security officers in the United States† (Morabito and Greenberg, 2005). These numbers can be a good indicator of the extent of the large number that can assist public law enforcement agencies. A security organization has various functions, thus a security practitioner may be a director of security services of a large corporation or a manager of contracted security personnel at the place or office of a client or an investigator with expertise on computer crimes (Morabito and Greenberg, 2005). There are two kinds of private security services, i.e. 1) â€Å"proprietary or corporate security;† and, 2) â€Å"contract or private security firms† (Morabito and Greenberg, 2005). â€Å"Corporate security generally refers to the security departments that exist within businesses or corporations. Contract security firms by contrast sell their services to the public, including businesses, homeowners, and banks† (Morabito and Greenberg, 2005). Public policing on the other hand, deals with the state, local law enforcement including sheriffs’ offices. Primarily these officers are responsible for peace and order and street crimes and have no concern with corporate internal operations or private economic interests (Morabito and Greenberg, 2005). The advantages of private security organizations over the public law enforcement agencies are these agencies have vast resources and expert knowledge in the field. Moreover, insofar as headcount, the number of private security officers far exceed those in law enforcement which enables them to cover and protect effectively a small geographic area (Morabito and Greenberg, 2005). It has been criticized for lack of certification, regulation standards, lack of rigorous pre- selection recruitment process and trainings with a high turn over of officers (Morabito and Greenberg, 2005). On the other hand, law enforcement agents are subjected to rigorous screening process before acceptance in the service and the officers are subjected to background checks. They are trained and are subject to regulations. The enforcement powers given them are greater both in scope and strength. Most of the law enforcement agents and officers stay in their jobs for a long time as these jobs are considered careers (Morabito and Greenberg, 2005). This enables them to establish trust with the inhabitants of the area and exchange information. However, the downside is that law enforcement work on limited resources and budget. During heavy call load days, response time most often is delayed because of the volume of incidents they respond to (Morabito and Greenberg, 2005). The main problem which was identified in the public law enforcement and private security organizations partnerships is a weak information sharing. The private security organizations man private companies which are by nature organized for profit. Often, these private companies are reluctant in sharing information which may be detrimentally used against them thereby losing profits. In an interview with John Cohen, president and chief executive of PSComm LLC, he said that â€Å"A number of corporate security people are hesitant to share information with the government because they’re concerned that of the threat becomes public that could impact the value of the company’s stock. Businesses want to be sure that their information is handled in a way that doesn’t affect them from a business perspective† (Pelland, 2002). On the other hand, public law enforcement also is reluctant to share or give away information to the multi national companies who are headed by foreigners (Morabito and Greenberg, 2005). This lack of trust can be attributed to the fear that these foreigners may be more inclined to protect their respective country’s interests than that of the United States. Conclusion Public law enforcement agencies in their discharge of their functions have made efforts towards proper and effective policing by eliminating crime in their respective jurisdictions through the â€Å"creation of effective partnerships with the community and other public and private-sector resources, the application of problem-solving strategies or tactics, and the transformation of agency organization and culture† (Docobo, 2005). It is on account of this that the concept of partnerships was adopted to be replicated in counter terrorism programs of the government. Even with the current declaration of homeland security, community policing in respect of crime prevention, is seen as to overlap with counter terrorism objectives (Docobo, 2005). With these partnerships, strategies become more philosophical as these are impressed in the mission and goals of the law enforcement agency. The public department itself undergoes an organizational transformation. The officers who are lower in rank are empowered to make their own decisions and take responsibilities for their acts. Thus, decision-making is decentralized and officers are given a chance to tap their creativeness in problem solving (Docobo, 2005). The idea and concept of partnership and collaboration has been widely accepted by the respective sectors. It is noted however that there is a need to increase their effectiveness in order that the purposes for which these partnerships were created would not be frustrated. The goal in these partnerships is collaboration in which their missions may overlap but they achieve the same goals through sharing resources and information. It gives many benefits for both sectors such as â€Å"creative problem-solving, increased opportunities for training, information data, and intelligence sharing, ‘force multiplier’ opportunities, access to the community through private sector communications technology, and reduced recovery time following disasters† (Morabito and Greenberg, 2005). The benefits and advantages from the forged partnerships are countless. It is however important to address the weak information sharing between the groups. Working together is crucial. Communication lines also should be open with free exchange and discussion of limitations, scope of powers, lines of authority and functions of each sector is imperative so that an effective partnership can materialize. There must be a clear understanding of roles and the usefulness and necessity of the partnership, where leaders are identified. These leaders must develop trust for each and every sector executive considering that the weak information sharing was observed to be attributable to lack of trust between both sectors. By making both sectors fully and deeply aware of the roles they have to play and its importance to each of the sectors, trust may be developed. The essences of these partnerships are mainly communication, cooperation, collaboration and coordination (Morabito and Greenberg, 2005). Communication refers to exchange of ideas and information while coordination requires knowledge of goals. Cooperation means sharing of personnel and resources for the accomplishment of the goal. Collaboration is based on clear understanding of the partners’ goals and the formulation of policies to achieve said goals which although may overlap, strengthens the partners (Morabito and Greenberg, 2005). The Department of Homeland Security issued guidelines on how to improve the collaboration with the private sector in its report â€Å"Office for Domestic Preparedness Guidelines for Homeland Security† (DHS, 2003). It suggested among others that there be a clear understanding of the need to prevent terrorist acts; a clearing house for received information on terrorism; interpretation of this information; clear definition of tactics and strategies to counter terrorism; definition of funding priorities; formulation of assessment and procedures; and the preparation of written coordination agreements such as memorandum of agreement between public and private sectors that should contain clear delimitations of scopes of powers of each, facilitation of information, and the formulation of processes and procedures (DHS, 2003). The formalization of the coordination agreement signifies the institutionalization of the homeland security collaboration. These guidelines also identified areas which private security organizations can collaborate with the public enforcement agencies, i.e. â€Å"networking, information sharing; crime prevention; resource sharing; training; legislation; operations; and research and guidelines† (Connors, Cunningham, Ohlhausen, Oliver, and Van Meter, 2000). By entering into formal memorandum of agreement or understanding, each sector’s role, duties, and scope of powers are properly delineated to fit into the priorities and policies. Such formal agreements will give both sectors direction and clarity with respect to the procedures to be properly taken and implemented. Networking refers to discussion and meetings with the private sector to thresh out possible solutions to problems as well as limitations. Information sharing is the central component of the partnership. â€Å"Information sharing includes planning for critical incident response, protecting infrastructure, enhancing communications, minimizing liability, and strategically deploying resources† (Connors, Cunningham, Ohlhausen, Oliver, and Van Meter, 2000). Thus, meeting and conferences between representatives of both sectors is a must. Crime prevention also translates to terrorism. Terrorist acts may include initially lesser crimes to accomplish their goal of terrorism. Clearly, all information gathered from partnerships for crime prevention and peace and order may be very useful for combating terrorism. All information notwithstanding the absence of unlawful activity therefore must be shared such as those which involve unusual and suspicious activities. Technical knowledge and training may be shared by the private security organizations to the public enforcement agencies considering that the latter may lack this. Both sectors must identify legislation and assist the law makers in making these laws more responsive to the present situation. These laws should be modified if need be to be useful to both sectors in combating terrorism† (Morabito and Greenberg, 2005). Both the public enforcement agencies and the private security organization may collaborate in the operational areas. This refers to joint sting operations, investigation of computer crimes and ‘white-collar’ financial fraudulent activities. Research papers and guidelines may be drawn by both sectors with respect to personnel policies and standards of the security personnel. Uniform standards and policies must be made for recruiting, selection, accepting and hiring security personnel. It is also suggested that liaison officers should be carefully trained and picked from the supervisors. They should have a clear and deep understanding of the goals and objectives of the partnership. The problem lies in the selection of those for the private security organizations as it has been recognized that they have the lack of prescreening and training standards. Thus, it was further suggested that an advisory council formulate these standards so that choosing a liaison officer as a representative of the private security sector would not be as difficult as it has been (Morabito and Greenberg, 2005). In sum, the success of these collaborative partnerships rest in the full sharing, cooperation, and coordination from both sectors which may only be achieved when each of the members have reached a deep understanding of the importance of their roles and scope of their powers. By reason of the importance of homeland security and on the part of the government, it has in fact allocated a larger amount of budget to counter terrorism. Partnerships are encouraged so that geographic territory can be covered extensively. Legislation is being addressed by modifying and or by enacting new laws to support the government’s call against terrorism. Representatives from both sectors must also coordinate with the legislators so that problem areas can be identified and can be resolved by means of legislative enactments or amendments to existing laws so that it can be more responsive to the needs and objectives of the existing collaborative partnerships. References Bocobo, J. 2005, Community Policing as the Primary Prevention Strategy for Homeland Security at the Local Law Enforcement Level Homeland Security Affairs. Retrieved on November 6, 2007, from http://www.hsaj.org/?fullarticle=1.1.4 Connors, E., W. Cunningham, P. Ohlhausen, L. Oliver, and C. Van Meter. 2000. Operation Cooperation: Guidelines. Washington, DC: Bureau of Justice Assistance. Department of Homeland Security–Office for Domestic Preparedness. 2003. Office for Domestic Preparedness Guidelines for Homeland Security. Washington, DC: DHS. Morabito and Greenberg, 2005 Engaging the Private Sector: Law Enforcement and Private Security Partnerships, USDOJ. Retrieved on November 4, 2007, from http://www.ncjrs.gov/pdffiles1/bja/210678.pdf. Morriss, A. 2006 The Public-Private Security Partnership: Counter Terrorism Considerations for Employers in a Post 9/11 World. Retrieved on November 4, 2007, from http://www.hastingsblj.org/archive/volume2/files/number2/9_Morriss.pdf. The 9/11 Commission. 2004. The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States, Official Government Edition. Washington, DC: U.S. Government Printing Office. Parachini, J., Davis, L., Liston, T. 2003 Homeland Security: A Compendium of Public and Private Organizations’ Policy Recommendations. Retrieved on November 6, 2007, from http://cipp.gmu.edu/archive/16_Randwhitepaper.pdf Pelland, D. 2002 ‘To help battle terrorism public and private sectors expand information sharing efforts. KPMG’s Technology: Insiders. Retrieved on November 5, 2007, from http://www.itglobalsecure.com/pdf/third_party/020913KPMG_Insider.pdf

Sunday, September 29, 2019

International Integration

International Integration Introduction The ongoing process of international integration is often referred to as ‘globalization'. An organization called the ‘United Nations' (UN) is specifically important as it is contributing to this process by creating a possibility for its members to discuss problems, initiatives and much more. Almost all states are its members and through that an important environment is created for international integration. The question this article tries to answer is; ‘Is international integration an advantage or disadvantage for world peace? ‘.An answer is tried to be found through the exploration of the process of globalization, its link to the UN and the current conflict in Syria. The case study of the current conflict in Syria explores how the UN works in certain situations and the problems it faces for acting on an international level. It will be used as an example to find an answer to the main question. As the UN is almost an unive rsal organization it is the terrain for endless discussion between its members who all have certain interests. But its democratic character may not be truly valid as certain actors have more power than others, influencing the process of equal input.International integration and its features are constantly developing and as will be described the process has multiple consequences, positive and negative ones. Globalization Modern society anno 2012 could be described as an interconnected world where information is shared at a rapid pace through various channels as internet, television and telecommunications. Mankind has evolved a curiosity in everything that happens around him. Nowadays it is possible to acquire the latest news by a single mouse click and we are excited to share even the slightest happenings through our personal domains such as Facebook and Twitter.A global network of intelligence arose with the development of modern day communication resources, one of the reasons for t he process of globalization (Jeffery, 2002). The general understanding of the process of globalization is the increasing international integration of the world caused by mass trade and cultural exchange (Fincle & Govale, 2012). Although opinions also seem to differ about the meaning of the concept it is generally accepted that it is concerned with the growing scope, speed and intensity of interconnectedness worldwide (Goldstein & Pevehouse, 2011).Reasons given for globalization are; freedom of trade, improvements of transportation, labor wages and skills and improvement of communication resources (Fincle & Govale, 2012). Globalization has resulted in increased international trade, transnational corporations, faster and better accessibility of information, freer movement of persons and a greater dependence on the world economy. Opponents of globalization see an expanding gap between the rich and the poor, as wealthy states drain human and natural resources from less developed countri es for unfair compensations (Jeffery, 2002).Several indicators for globalization have been developed over the last decades, relevant are their variables and data they use. One of the first indicators designed and one that is used as reference for many others is the Kearney/FP index which is supported by a database (Lombaerde & Iapadre, 2007). It takes into account; â€Å"[†¦ ] the economic integration in the world economy, the extent of international political engagement, the internationalization of personal contacts of citizens and the use of internet technology. † (Lombaerde & Iapadre, 2007, p. 3).The Modified Globalization Index, by Martens and Zywietz, includes these four variables and adds another two;†[†¦ ] the involvement of a country’s military-industrial complex with the rest of the world, and the intensity of globalization in the ecological domain. † (Lombaerde & Iapadre, 2007,p. 4) Their definition of globalization is; â€Å"[†¦ ] the intensification of cross-national cultural, economic, political, social and technological interactions that lead to the establishment of transnational structures and the global integration of cultural, economic, environmental, olitical and social processes on global, supranational, national, regional and local levels. † (Lombaerde & Iapadre, 2007,p. 4). Another is the Dreher globalization index that builds on the Kearney/FP index and emphasizes on information flows and international integration through economic policy development. Another description of globalization is found in the work of Gibbens, who seems to agree that globalization is a process of cultural, political and economical integration of nation states throughout the globe (Giddens, 2000).Ritzer(2004) introduces, actually prefers, the use of the term ‘grobalization', since he focuses on the imperialistic character of nations and transnational corporations. He pinpoints the will to integrate international ly by those who have the resources required. International integration is a worldwide process with consequences. The process is steered by forces and it is important to mention that these forces are not divided equally across the world but rather are directed from a centre (Iadicola, 2008). Nowadays the United States of America is in this centre of a so-called global empire.It has the most influence on international organizations and the determination of integration on political, economical and societal levels among nation states (Iadicola, 2008). Iadicola(2008)researched this power centre empire idea. A passage concerned with globalization states that;†[†¦ ] globalization is in part a product of the power of empires as a result of conquest and trade and immigration creating patterns of cultural diffusion. â€Å"(Iadicola, 2008, p. 2-3). Globalization started long ago and it intensified during the colonial era.Yet, nowadays it seems globalization has increased in speed a nd reach as could be explained by the intense growth communication means, with internet as key feature. The empire has played a sufficient role in the distribution of capital flows, trade and economic partnership. Integrating more and more states into the world economy does not mean that wealth is equally divided among them, as Iadicola(2008) describes;†[†¦ ] the structure of international flows of income, investments, and royalty payments today does not correspond to any notion of an interdependent world that is mutually benefiting from these flows.In contrast, singular concentration and unidirectional flows towards imperial-based corporations dominates the process of globalization[†¦ ]. â€Å"(Iadicola, 2008). Empires have determined the forces of globalization for ages, The British Empire is a prime example of how trade was used to connect multiple continents. But also the Greek, Ottoman and the European empires as the Portuguese, Spanish and Dutch were all invol ved in international integration as they claimed overseas territories in the form of colonies and motivated international trade(Iadicola, 2008).Maier(2005)sees the empire as a major, leading actor in international integration. The forces needed to influence globalization are found at this actor. Empires are organized by and for those who principally control resources and production and not by those who work for it, as the empire has a class ideology(Maier, 2005). The empire has four essential features that relate to its influence or penetration of those dominated by it. These features can be seen as globalization forces, used to gain more wealth, power and increased global cultures.It uses; military-, economic-, cultural- and political penetration and integration. The USA has used these means with increasing intensity over the last decades to expand their interest (Iadicola, 2008). Globalization can be seen as international integration at multiple levels. Its intensification over th e last decades can be attributed to new and faster ways of communication, increased global trade and the need of the empire for expanding its power. Yet, there is more to describe that will help to discover its limitations, overall developments and influence.Relevant for the increasing international integration is international law. International law can be seen a system of principles, rules, concepts and norms for governing and managing relations among states, intergovernmental organizations(IGO), nongovernmental organizations(NGO), individuals and several other actors in globalization. International law's main sources of creation are custom and treaties(conventions). Customary international law can be seen as law that arises from certain, commonly practiced actions by states. An example is the immunity diplomats enjoy in foreign countries.Custom will most of the time be formalized into a treaty, the most important source of international law (Scott, 2010). These laws are created t o rise expectations, create stability among states and determine how states should interact on international level as well as national. Although states enjoy sovereignty, they are restrained when certain agreements are made between states and adaptation of domestic policy might be required and is sometimes urgent (Shaw, 2008). International law is created by states, IGO's and NGO's and it is made for them.The creation of international law is an outcome of international integration where states work together to set boundaries, create rules and determine what is important. Through international law it becomes clear that globalization influences all involved and will have consequences. The UN is the major actor that creates the environment for the adaptation of international law, what will become clear later in the article. As mentioned, treaties are the main source of international law. It is an agreement that legally binds parties under international law (Scott, 2010).There are bilat eral, two parties involved, and multilateral treaties in where three or more parties participate. The focus on international integration makes it relevant to research multilateral treaties. â€Å"A multilateral treaty is the culmination of what may have been a long political process. [†¦ ]Once the treaty document is in place it provides the central focus for the continuation of the political process that, together with the treaty itself, can now be referred to as a ‘regime'. [†¦ ] a pattern of cooperation[†¦ ]†(Scott, 2010, p. 161-163). According to Krasner(1983) a regime is â€Å"[†¦ principles, norms, rules and decision-making processes around which actor expectations converge in a given issue area. â€Å"(Scott, 2010, p. 163). The described passage provides a reasonable idea of what a regime in international law is. To establish a regime several factors or processes are involved. The first process is that of there being an issue of importance th at concerns three or more states(Scott, 2010). There is a need to manage a common problem. It triggers the process of international integration. This need will be generated by negotiations, the second process.It is in this phase that states or certain parties have the possibility to define, prioritize and recommend. Negotiations happen between states, but also between IGO's and NGO's who are capable of putting certain issues on the agenda of states, such as the Intergovernmental Panel on Climate Change(Scott, 2010). During the negotiations parties are able to hear each other out, trade information or make proposals. The very existence of a variety of parties makes it tempting to think that there are many issues that need attention, much negotiations happen and that there are an enormous amount of multilateral treaties.The last part is a fact, a solid proof of an interconnected world, where cooperation is extensively exercised. Yet, the value of an issue depends on by who it is prese nted. As mentioned before, globalization seems to be steered by an empire and especially from its centre. Scott(2010) does not mention empire, but he uses a different term, ‘hegemon'. â€Å"The theory of hegemonic stability suggests, most basically, that a regime emerges when a hegemon-a state with preponderant power- regards such a regime as being in its best interests.The United States has been a world hegemon since World War II. â€Å"(Scott, 2010, p. 165). A hegemon is a super power who is capable of exercising positive leadership and is capable of making others accept its preferences. Short term costs are seen as a possibility when the hegemon regards the regime to be useful and will pay off in the long run. Phase three and four are closely related. In the event of a conference all parties, or its delegations are presented the basic draft of the treaty in where an issue is tried to be managed.Proposals of laws, measures to be taken or cooperation to be achieved are pres ented and discussed during the conference which will result in a final draft on which all parties agree. Phase four is adoption and ratification of the final draft, legally binding all parties. A regime is established. Globalization is for a large part achieved through treaty making, where parties work together to find solutions, create plans for development and control processes. Besides states working together, individuals can influence its process by creating needs, address problems and inform.The modern means of communication have increased the connectivity between society and those in power as international integration is increasing on all levels. Some multilateral treaties establish an international organization that is concerned with the provisions the treaty entails. The United Nations The most known international organization, made up of states, is the United Nations(UN). It was established via the UN charter, a multilateral treaty, stating its goals, procedures, means and measures and much more on how all participants were to act. It started with 51 member states and it has 193 nowadays.The UN is an organization that reaches all over the globe and it is possible for every member to address a problem during certain occasions(Scott,2008). The UN is as it were an umbrella organization, it established many others to carry out what was agreed upon in the UN charter. The UN has so many organizations that it practically is involved all over the world with all kinds of problems on economical, social and conflict matters(Scott, 2008). The UN charter is made of several articles, divided in chapters, paragraphs and subparagraphs. It is an immense agreement on how states should interact, develop, help and much more.The first article states the UN's main purpose on which it was founded after World War II. Article 1 â€Å"The Purposes of the United Nations are: 1. To maintain international peace and security, and to that end: to take effective collective measures for the prevention and removal of threats to the peace, and for the suppression of acts of aggression or other breaches of the peace, and to bring about by peaceful means, and in conformity with the principles of justice and international law, adjustment or settlement of international disputes or situations which might lead to a breach of the peace; . To develop friendly relations among nations based on respect for the principle of equal rights and self-determination of peoples, and to take other appropriate measures to strengthen universal peace; 3. To achieve international co-operation in solving international problems of an economic, social, cultural, or humanitarian character, and in promoting and encouraging respect for human rights and for fundamental freedoms for all without distinction as to race, sex, language, or religion; and 4. To be a centre for harmonizing the actions of nations in the attainment of these common ends. (UN, 1945) International peace and security, globa l peace and security, a global purpose which states that all members should help to solve and prevent problems as peacefully as possible. By signing the UN Charter a state will become part of an extensive network of rules and procedures which it has to embrace, which have been determined by them and others. The UN has increased its influence due to the creation of an environment for treaty making. Over time the UN has become the world's most important organization for international integration by motivating states to solve problems.Its power has be justified by its members and the agreements between them (Schooyans, 2001). The major organs of the UN are the Security Council, the International Court of Justice, the Economical and Social Council and the General Assembly. For finding an answer to my question the focus will be on the Security Council. The Security Council is an organ that is most known due to the measures it can take. It is made up out of 5 permanent members and 10 non permanent members which will be selected by the General Assembly. Its permanent members are China, The United Kingdom, The USA, France and Russia.In chapter V of the Charter articles are defined to state its purpose. Article 24 â€Å"1. In order to ensure prompt and effective action by the United Nations, its Members confer on the Security Council primary responsibility for the maintenance of international peace and security, and agree that in carrying out its duties under this responsibility the Security Council acts on their behalf. [†¦ ] (UN, 1945). All members should keep the Security Council informed, an obligation to make sure the UN can act if this is required.The five permanent members have a veto right, meaning they can dismiss certain decisions even when they are urgent, generally accepted and majority voted. According to article 42 and 43 of the UN charter the Security Council is able to implement measures as economical and political exclusion, named sanctions. If n o positive result follows, then it is allowed to use article 43 stating â€Å"[†¦ ]it may take such action by air, sea, or land forces as may be necessary to maintain or restore international peace and security.Such action may include demonstrations, blockade, and other operations by air, sea, or land forces of Members of the United Nations. † (UN, 1945). Whenever the Security Council comes to an agreement about what measures should be taken it presents a resolution, a formal statement, extensively describing what is to come, how it is to come and who should be involved. A resolution could form the basis for a military intervention. A problem that needs attention, according to the Security Council is (article 39)†[.. ] any threat to the peace, breach of the peace, or act of aggression[†¦ ]† (UN, 1945).The Security council has presented multiple resolutions with regards to an act of aggression such as resolution 83 and 84, 1950, to use force â€Å"[†¦ ] to repel the armed attack upon the republic of Korea by forces of North Korea. â€Å"(Scott,2010, p. 103). The use of force has been authorized through more resolutions regarding, Kuwait, Somalia and Sudan. Looking back at the main question, it might be tempting to say that an organ, with multiple members, working for a safe and secure world is a definite yes. International integration has reached a point where there is a collective choice.A democratically (up till the veto) determined procedure that takes into account agreed norms and values by almost all states. The vision was formed by 51 founding members and today the charter is almost universal. When a decision to interfere, to use force, to discriminate sovereignty, to ‘ensure' safety and security is made it becomes clear that this world is so interconnected, that it lets an organization decide over life and death. Determining if the use of force is necessary, is not only led by the Security Council, it is allowed to ask help and advice to reach a conclusion.Many international organizations keep track of human rights and they are eager to alarm the security council to act, with sanctions or force, when they think something needs to be changed. Their expertise and resources make them trustworthy, not only for the Security Council but also for the world population. The increasing interconnectedness of the world makes it possible for these organizations to spread their worries and claims faster than ever before due to technological innovations as the internet, smart phones and global broadcast channels.International integration benefits from these technological innovations as problems become more visible and are spread faster. Communication and cooperation between organizations and states can lead to fast decisions and less damage to those under threat. International interventions, approved by the Security council, have increased in numbers since the ending of the cold war. The 1990's can be app ointed as the decade where most international interventions took place. It is also in this period that the idea of diplomacy over the use of force blurred.The use of force, military interventions, became a short term solution that would end the suffering of those suppressed. With regards to the twentieth century Afghanistan and Iraq are the most violent interventions so far. After the 9/11 terrorist attack in New-York, the USA promoted and executed the ‘war on terror'. This replaced the idea behind interventions for humanitarian and conflict reasons to a new enemy; international terrorism and its supporting regimes. The use of violence became a tool to scare off the opponent as well as completely deactivating him.Inner state conflicts that have been addressed increasingly over the past two decades are a relative new symptom for the UN and its Security Council. Shifting from conflicts between states to a state in conflict with itself. The traditional rules for peace keeping did not apply for these kinds of conflicts(Zandee, 2012). International integration reaches to the very integrity of states, as seen with the use of resolutions. Not only in cooperative ways, but also in the form of interventions approved through cooperation between states.The link between globalization and the UN is in its cooperative character, where the United Nations provides a ground for discussion, problem solving, initiatives and the creation of rules. The UN promotes development on different levels and multiple fields and it is to be reached through cooperation between its members (Bertucci & Alberti, 2001). In the year 2000 the ‘UN Millennium Summit' was held for the purpose of the discussion and adaptation of the ‘UN Millennium Declaration'. Over 150 world eaders eventually adopted the declaration, agreeing on the goals it set out to achieve for the upcoming 15 years such as less poverty, better health care and non-violence. Important was the emphasis on better an d more efficient cooperation between its members, an increase of international integration. One of the main points made was to make globalization a positive force for all world's people (Sneyd, 2005). Syria Syria is a state in the middle east neighboring Jordan, Israel, Turkey, Lebanon and Iraq. Its main source of income is the oil- and gas industry and a small sector of tourism can be found at the Mediterranean sea.Syria has had several conflicts over time regarding territory with its neighboring states (Donker & Janssen, 2011). Syria's recent history has been used as one of the many motives for the protests that arose in the spring of 2011. In 1967 the Syrian political party Ba'ath took power by a coupe, overthrowing the government. After this, in 1970, the Ba'athist Hafez al-Assad took power in his own hands via a second coupe. He used his military connections, as he fought in many sections, too establish a loyal security force. Hafez al-Assad appointed many relatives and friends to several high governmental and military functions.In the beginning he was not very popular as he originated from a relatively small community of Alawi. Syria houses a variety of subcultures and religious sects and multiple conflicts between them have passed over time. Yet, the majority of Syria supported him for bringing stability to the economy and its inhabitants. This changed over time as Hafez al-Assads regime became more authoritarian and the economy started to fail. In the 1970's uprisings begun, which became more and more violent under the leadership of the ‘Muslim Brotherhood'.An example is its sniper campaign targeting the government's representatives. Many inhabitants did not support this way of protesting and the increasing awareness of the Brotherhood's intentions gave way for Hafez al-Assad to act brutally in 1982. This was the final standoff between the Islamists and the regime and it took place in Hama. An estimated number of civilian causalities varies betwe en 5000 to 20000. Hafez al-Assad's ruler ship was based on fear and showed severe consequences for those trying to destroy it. The media was state controlled and still is in present day (Donker & Janssen, 2011).To gain stability after the uprisings Hafez al-Assad assigned more political positions to other sub group members of Syria. In response to the Brotherhood, any political form of Islam was strictly forbidden. During the late 1980's and 1990's Syria underwent, as many other states due to ending of the cold war, economic liberation. Policies developed actually improved the position of political elites who had the resources to engage in exclusive economic deals. The tension between state, now seen as corrupt, and its society grew. In July 2000 Bashar al-Assad succeeded his father and he has been the leader of Syria ever since.His attitude and means concerned with ruling Syria do not vary that much from his father; society's voice and politics are still not coherent as a small gro up owns most of the states power as well as economical and military resources. Bashar al-Assad's nationalism, clientelism and severe repression held up over the years until March 2011 (Donker & Janssen, 2011). On March 6, 2011, children that were not older than 15 wrote the text ‘the people want the fall of the regime' (in Syrian) in the southern city Daraa. The children were arrested and tortured by Syrian security forces.Protests arose in response to this incident, first locally, but it did not take long for the remaining Syrians to participate in nationwide demonstrations. At first uprisings were generally peaceful, as people remembered what happened under his father's ruler ship. Yet, over time certain protest groups became more violent and separated themselves from the mainstream, but still recalling its support (Donker & Janssen, 2011). Videos posted on YouTube of the arrests spread a wide feeling of anger, among citizens, but also internationally (Times, 2011).Anti gove rnmental movements have been suppressed to underground spheres under the ruler ship of the al-Assads and its police state. Yet, there was an opening for coming out now. Support for protests and coordinated uprisings were now present and several movements tried to gather as much people as possible. Thus, it happened several times that the government controlled media was manipulated to prevent protest progress as when mobile phone networks were shutdown as well as many websites (Zoepf, 2011).The so-called ‘Arab Spring' started at the end of December 2010 as a series of protests and demonstrations across several North African and Middle Eastern states, such as in Libya, Egypt, Lebanon, Tunisia and also in March 2011 in Syria (Schippers, 2011). The Arab Spring was mostly led by the voices of youngsters concerned with their future. The feeling of repression, unemployment, corruption and little democratic value triggered many to protest against their current leaders and governments. Many other states were showing symptoms of breaking regimes, motivating Syrians to continue to fight for their cause (Schippers, 2011).The peaceful protests gave way for more violent ones once the government started to repress them with violence. Heavy military resources were used to break up demonstrations as well as targeted assaults on protest group leaders (Schippers, 2011). More and more, images, videos and reports came from Syria and were spread all over the world. The cruel acts of armed government forces towards civilians were portrayed as terroristic, suppressive, inhumane and in violation with international laws (Khalay, 2011). As in other ‘Spring' states, governments were not going to settle easy.Violence was commonly used in Egypt and the prime example is Libya where the protests led to a civil war between government and several protest groups. The killing of civilians by a central, repression based government was described as a crime and the international communi ty was to be involved soon (Khalay, 2011). Amnesty International is an international organization concerned with human rights. It is mayor player in international integration, as its reports trigger discussion, provoke change and picture current developments.During the Arab Spring, Amnesty International has been highly concerned with the treatment of civilians. Reports about Syria indicate serious human rights violations and the organization is alarming the international community to act to stop these practices. Violent attacks harm civilians and there is a lack of primary resources and security. It is a situation that needs to be changed and it needs to be changed fast as these gross violations lead to more causalities every day (Khamis, 2012). International intervention returns to the picture.Up till recent day the inner state conflict Syria is dealing with, is still not resolved. Thousands of deaths are marking an ongoing civil war which seems not to end on a short notice as the Syrian regime of Bashar al-Assad still enjoys military support(although some soldiers turned over) as well as scarce, yet important public support. The international community, with the UN as main player, has alarmed the Syrian government to stop its activities and has applied multiple sanctions to pressure its movement and resources such as oil export restrictions (Iadtu, 2011).The security council has been involved since the beginning of the cruel acting of the armed government forces. The Arab Spring has been interpreted as a period of humanitarian crimes, where old repressive regimes are tried to be destroyed (Iadtu, 2011). The Security Council approved a military intervention in Libya, bombing governmental buildings, weapons depots and providing resources and manpower to the ‘democratic' opposition. The bombings were successful till the extent that they destroyed most of Libya's military force used for repression.Thus, the amount of civilian, unintended, casualties were h igh. The creation of an integrated democratic governmental structure has shown some progress, but the latest report indicates new instability as power protest groups now claims power and use force to gain this (Nazemroaya, 2012). The Security Council has send negotiators, as Kofi Annan, to Syria to discuss possible diplomatic solutions to end the conflict. Yet, Bashar al-Assad does not want to comply. Its government is also stating that it is fighting terrorist groups and not the entire population of Syria.He refers to groups of protestors that are well armed and are targeting the Syrian government. It accuses the USA and other Western countries of supplying the opposition with resources to take out the government. In response to this acquisition the Western society claims the protestors need to defend themselves from ongoing governmental attacks (Cunningham, 2012). The Security Council has suggested a similar intervention as in Libya, thus Russia and China stood in the way as they vetoed this proposal.Russia has been internationally criticized for the ongoing weapon supply to the Syrian government. Battle helicopters have been shipped several times and the USA is the main opponent of this practice as it implies Russia is supporting the al-Assad regime and therefore approving it means on how to settle the conflict. Russia says it is not violating any international laws and that it is providing the helicopters for protection and not for attack (Lathd, 2012) Russia is Syria's biggest arm supplier, it houses the only Russian naval base in the Mediterranean Sea.Syria has quite some Russian inhabitants and the Russian Orthodox church is influential regarding certain accommodations and populations in Syria (Carr, 2012). Besides these interests, other factors play a big role. Russia played its veto card with the statement that it does not want to see a Libya scenario again. That includes many civilian victims, the rise of radical Islamism and a lot of costs (Carr, 20 12). It is stopping the Security Council from taking action in the form of an military intervention.It can also be taken in consideration that Putin faced some severe resistance when he reassigned himself as president and its resulting protests. Supporting another military intervention might give Putin away as a person willing to participate in overthrowing repression led governments, as Russia might be labeled as such with suspicious democratic regulations (Lathd, 2012). The Security Council has not been able to stop the conflict, yet its sanctions are felt more every day. But also these means of conflict suppression are not only inflicting al-Assads government, large parts of the population are facing below average standards of living.Russia also shares the opinion that Western states are providing resources to destroy the regime (Cunningham, 2012). Cunningham(2012) and Nazemroaya(2012) argue that international interventions are a tool of Western imperialism, modern colonialism. T he power of the Security Council and its main members has grown towards a way to change states in such a way that the West will benefit from it, such as open economies ready for more foreign investments. The Western media plays a significant role in portraying situation as cruel and is good at moving the populations emotions and opinions.It tries to justify their actions by showing images of killed children, while negative reporting about NATO bombing and the resulted civilian deaths are hard to find. Once violence has started it is important to supply the opponent, in this case the protestors, with arms, so it can be said that the government, when shooting with sharp, is harming civilians. It is important that the media will justify the intervention with help from international organizations such as Amnesty International. The ‘Responsibility 2 Protect' has been used under the headline ‘humanitarianism' to execute violent operations as seen in Iraq, Afghanistan and Libya .The Security Council, and the UN, have enormous international powers and are able to decide over death and life. The hegemon plays an important in addressing and executing issues and missions. Much military interventions have led to the destruction of regimes and set boundaries for future development. Syrians are pessimistic about a foreign intervention as some of them still support al-Assad. It is unlikely that Russia will set for a new direction soon, leaving the situation of ongoing civil war to continue (Cunningham, 2012) (Nazemroaya, 2012).Up till present day no military intervention has been undertaken. Constant debate about the use of such a mean slows the power to act and protect down. Syria is under international interest, but the international community has not yet found a way to act and stop the violence. The conflict in Syria provides a better look at the problems international integration is facing when debate and veto votes lead to a stop in developing solutions for c onflict. The democratic aspect leads to a proper justification of the Security Council's decisions, but it turns against him when there is no cohesion.The consequences are severe, as Syria remains in a civil conflict. Conclusion The answer to the main question revolves around the process of globalization, the United Nations and the current conflict in Syria. International integration has generated an interconnected world, in where more is known then ever before and where states are generating cooperation. The change in communication resources has led to a network of intelligence where one can find and publish almost everything. Accessibility, fluidity and transparency mark modern times.The United Nations is a prime example of international integration and it will continue to be. Its goals, declarations, treaties and resolutions illustrate the worldwide need for international integration and its further development. The UN's power has increased over time and the Security Council is o ne of the most profound organs to achieve its goals. The validity of the resolutions is determined by the permanent members, powerful actors in the world with more influence than other states. History illustrates interventions as successful means to stop violent conflicts and generate peace.Thus, this should be claimed with care as the current conflict in Syria is not benefitting from international integration. The empire steers the interests of the UN, yet others are able to influence its goals. As the USA is a superior military-, economical- and political power in the world, its influence has great consequence for international integration. World peace is one of the main goals of the United Nations and the integration of states worldwide has set out several positives achievements. Is international integration an advantage or disadvantage for world peace?The United Nations motivate international integration and its goals are clear. It wants to distribute wealth, create common inter ests of concern and stop violent conflicts. If international integration was less intense than it is nowadays, the legality of actions by states would be less, possibly provoking new conflicts. The democratic procedures justify the UN's actions and consensus is properly reached. Yet, as the Syria case has shown, it also slows down the process of acting. Overall I would like to answer the question with; an advantage.Cooperation leads to efficient usage of resources as knowledge, money and weapons. It also integrates multiple interests and reflects opinions. The recognition of the UN's goals creates a justifications for its actions and therefore prevents further conflict. If ( almost ) universal goals and means are approved, acting for the sake of world peace will be accepted faster. Bibliography Bertucci, G. , & Alberti, A. (2001). Globalization and the Role of the State: Challenges and Perspectives. New York: United Nations. Carr, B. (2012, June 25). Syrian Solution Lies in Putin's Hands.The Australian , p. 7. Cunningham, F. (2012). how the Arab League Has Become a Tool of Western Imperialism. Global Research. Donker, T. H. , & Janssen, F. (2011). Supporting the Syrian Summer; Dynamics of the Uprising and Considerations for International Engagement. The Hague: Clingendael Institute. Fincle, P. , & Govale, E. (2012, February 10). Globalisation. Retrieved July 1, 2012, from BBC Bitesize: http://www. bbc. co. uk/schools/gcsebitesize/geography/globalisation Giddens, A. (2000). Runaway World: How Globalization is Reshaping Our Lives. London: Routeledge Taylor and Francis.Goldstein, J. , & Pevehouse, J. (2011). International Relations. London: Pearson. Iadicola, P. (2008). Globalization and Empire. International Journal of Social Inquiry , 3-36. Iadtu, S. (2011, August 18). Can western sanctions touch Bashar al-Assad? Guardian Comment Network . Jeffery, S. (2002, October 21). What is globalisation? Retrieved July 1, 2012, from The Guardian: http://www. guardian. co. uk/world/2002/oct/31/globalisation. simonjeffery Khalay, D. (2011, October 24). Damascus may have to revise its political mindset. BBC Monitoring Middle East , p. 10.Khamis, N. (2012, July 2). Historic arms trade negotiations a chance to prevent future Syrian-style slaughter. Amnesty International Annual Report . Lathd, S. (2012). Russia's veto on Syria resolution sign or changing world order. BBC Worldwide Monitoring. Lombaerde, P. d. , & Iapadre, P. L. (2007). International Integration and Societal Progress: A Critical Review of Globalisation Indicators. Paris: OECD. Maier, C. (2005). An American Empire? : The Problems of Frontiers and Peace in Twenty-First Century Politics. In L. C. Young, The New American Empire (pp. 9-11).New-York: The New Press. Nazemroaya, M. D. (2012). From the Cold War to NATO's â€Å"Humanitarian Wars† – The Complicity of the United Nations. Global Research. Schippers, H. (2011, July). Op eigen kracht: taai verzet van Syrische oppositie. Int ernationale Spectator , pp. 401-404. Schooyans, M. (2001). The United Nations and Globalization. Louvain: Louvain University. Scott, S. V. (2010). International Law in World Politics. London: Lynne Rienner Publishers. Shaw, M. N. (2008). International Law. Cambridge: Cambridge University Press. Sneyd, A. (2005). UN Millennium Summit.Hamilton: McMaster University. Times, T. N. (2011, March 19). In Syria, Crackdown After Protests. The New York Times , p. 10. UN. (1945). UN Charter. San Fransisco : UN. Zandee, D. (2012, April). International Interventies; ‘Lessons learned'. Retrieved June 28, 2012, from www. clingendeal. nl: http://www. clingendael. nl/search/results. html? term=Dick+Zandee&start=1&division_id=&target=author Zoepf, K. (2011, April 28). Long Repressed in Syria, an Internal Opposition Takes Shape. The New York Times , p. 12. ——————————————– [ 1 ].Transnational c orporations, also called multinational corporations, are corporations operating in multiple states all over the world. An example is McDonalds, with restaurants in more than 100 countries [ 2 ]. Sovereignty is seen as a concept of a state being independent from other states influences. It entails that a certain territory that belongs to a state should not be interfered by another state so that it is free to make its own choices, create laws and determine a governmental form. [ 3 ]. In this context the word regime refers to states that are lead by dictators, corruption and unjustified government violence.

Saturday, September 28, 2019

Analysis of Lady in Black by Francis Cadell Essay Example for Free

Analysis of ‘Lady in Black’ by Francis Cadell Essay Francis Campbell Boileau Cadell, associated with the Scottish colourists was born in Edinburgh in 1883 and by the age of 16 was studying at the Academie Julian in Paris. During his career he was very much influenced by the Fauvists such as Matisse and on his return to Scotland exhibited much of his own work in Edinburgh Glasgow and London. He died in poverty at the age of 54 after the economic climate made it difficult for him to sell any of his work. He painted landscapes (mainly those of Lona which were a favourite of his), interiors, still life and figures in oil and watercolour but is known most for his portraits of glamorous women. One such portrait, completed in 1921, is ‘Lady in Black’ painted in oil. The painting has a rather macabre mood as the woman within the picture has a reflective expression on her face as if longing for the past. There is a mirror behind her, which may also add to the idea of reflection. She is dressed in black, which adds to the morbid mood as it could indicate she is mourning the death of a loved one. Her body language also expresses sadness as her posture is quite slumped, and the small flowers seen behind her could have been meant for a grave. The shadow over her eyes caused by her large hat makes them look undefined and blurry, giving them a sad, depressed look. The painting itself is also very dark as there is very little light and the colours used are very dull and grey, adding to the dreary mood. The media is used very loosely, in an almost impressionistic manner, which may have sprung from Cadell being exposed to the work of the Impressionists who were active in Paris at the time he was being educated there. He uses strokes of bold colour such as the woman’s lips, the flowers in the background and the pink furniture reflected in the mirror. These strong reds and pinks could symbolise love or passion, which adds emphasis to the woman’s lost love. This piece was more or less typical of the Scottish Colourist movement, but also contains undertones of impressionism as not much line is used; instead different colours are layered on top of each other, as the impressionists were known to do. It is a very realistic piece with a well-expressed dreary, nostalgic mood. Analysis of ‘Lady in Black’ by Francis Cadell. (2017, Nov 11).

Friday, September 27, 2019

Valuation of Shopping Centers Research Paper Example | Topics and Well Written Essays - 3750 words

Valuation of Shopping Centers - Research Paper Example rom the fact that investment behaviours in shopping centres have been changed due to dramatic progress in the retail industry of Germany and it can be explicitly understood from the fact that until 2011 Germans were dominating investors in the market. However, now German retail industry has largely attracted foreign investors accounting for 62% overall investment in the retail market. Due to the desired aim of maximizing profits, owners of retail properties hire professional companies to evaluate the properties accurately by taking different criteria into consideration. However this is a complex and difficult task, especially with high investments like shopping centres. The real estate crises has shown what impact wrong valuations can have. This is why it is important that the valuation process is done correctly and with caution. The aim of this paper is, next to an introduction of the shopping centre market, the general definition of shopping centres, the different classification types and the historic development, to answer the question what factors influence the market value of a property. In this context, the meaning of valuation will be discussed, followed by an analysis of different factors incluencing the value. In order to link the theoretcial approach with practical experience these factors will be anaylsed by means of project made during an internship at Jones Lang LaSalle in Frankfurt in summer 2012. Additionally, the project will be briefly described and the outcome of the valuation will be mentioned. Trends of shopping centres are continuously changing since the development of shopping centres’ phenomenon among masses. Researchers have suggested that with the passage of time and emerging technologies it has been noticed that trends of shopping and shopping centres are gaining much attention (Coleman, 2012, pp. 6-105). Business of shopping centres is successfully going with growing populations’ needs and increasing social awareness. Intellectuals

Thursday, September 26, 2019

Theoretical Analysis - The 21st Centy Organization Assignment

Theoretical Analysis - The 21st Centy Organization - Assignment Example The three articles: Why Few Organizations Adopt Systems Thinking by Ackoff; How to be a truly global company by Prahalad and Bhattacharya; and Putting Organizational Complexity in Its Place by Birkinshaw and Heywood, are highly relevant as they provide a huge insight into the factors that are having an impact on organizations in the 21st century. Three reading that are interesting Ackoff (2005) in his article is distinct in its philosophy that system thinking is vital ingredient of organizational success or its failure when it is not part of organizational strategy. According to him, there is a distinct lack of dynamic decision making that takes into account the changing environment and organizational management’s willingness to learn from its failure or wrong decisions. These are important factors because organizational culture does not allow failures thereby not only restricting creativity within organization but also failing to take risk that could provide the organizations with competitive advantage. It is important that one takes the risks and commits mistakes and learns from it. System thinking broadly encourages responsible decision-making and allows its workforce to err in order to make a successful decision next time. In the contemporary environment of competitive business, new challenges need to be faced with equanimity and as new opportunities of growth. Prahalad and Bhattacharya (2011) have given important clues to become a global company with success. They emphasize that organizational restructuring greatly helps to inculcate trust in the stakeholders across the globe. Meeting local demands through customization of products and using local resources is very important for business to gain the trust of the local people where they are doing business. McDonalds’ has customized its products to suit local requirement across its global outlets. Exploiting local talents and cultural competencies become the highlight of truly global companies which thrive on global competitive businesses. Globalization has given a big thrust to industrialization and development through expansion of business across geographical boundaries. In globalization, inter-dependency of resources has become a reality. Thus, flexible approach and acting local with global vision provides the individuals and organizations with greater leverage to compete and gain leverage. Birkinshaw and Heywood (2010) have raised very pertinent issues of organizational complexities within and outside its offices across different geographical areas which emerge due to changing dynamics of business environment in the 21st century. The outdated business processes, ambiguity in roles, conflicting ideologies of pluralistic workforce etc. are vital obstacles that hinder growth. The institutional complexities and individual complexities need to be addressed and managed effectively for higher productive outcome. Institutional complexities are major issues which considerably impact employees’ performance. The complexities like role ambiguity, identifying obstacles like poor processes, product alignment with current demand etc. must be addressed and redefined to accommodate changing preferences of the

Baroque to Classical Kinds of Music and Composers Essay

Baroque to Classical Kinds of Music and Composers - Essay Example An imperative kind of instrumental music in the Baroque period was the concerto. Two of the best writers of concertos were Corelli and Vivaldi. Vivaldi's The Four Seasons is not just an excellent and suggestive bit of music, but at the same time it is an impeccable representation of the expanding beautiful force Baroque music was going for. Vivaldi's most well known pieces are the concertos for one or several solo violins and string symphony, in spite of the fact that he made an extraordinary arrangement out of music in different classifications, including musical dramas, cantatas, and others. Vivaldi took after the typical example of the period in his concertos by encircling a musical or sensational moderate second development with quick and energetic first and third developments. In reality, Vivaldi's instrumental works establish the framework for the concerto's advancement into the Classical Period. Toward the established Classical period in the history of classical music the orch estra had little contrast to its Baroque forerunner. As the years advanced, we see the expansion of more woodwind and metal instruments as composers discovered approaches to give the wind instruments more character and profundity. Significantly, the Classical period saw the presentation of a structure which has commanded instrumental organization to the present day: sonata structure. With it came the present day's advancement orchestra, concerto, trio, sonata, and quartet to another top of basic and expressive refinement.

Wednesday, September 25, 2019

National incident based reporting system Essay Example | Topics and Well Written Essays - 1250 words

National incident based reporting system - Essay Example This paper identifies the current challenges of crime reporting as the lack of harmonization on the usage of crime reporting programs used in various states in U.S. It is important to note that some cities have failed to incorporate NIBRS into their crime prevention and detection system. It also addresses the technological opportunity presented by NIBRS in crime reporting technology and its advantages over the UCR. The paper makes some basic recommendation for effective crime reporting system. First, it recommend the need to involve the community and ordinary citizens in the system since they are the one affected by crime and it might be more effective if they know exactly the significance of correctly reporting a crime incident. Secondly, it calls for the crime reporting system to be more alert so as to adapt to the changing society so as to capture immerging new forms of crimes in our society. A crime is an act that violates a political or moral rule. Presently, an act that was considered a crime some years back might no longer be a crime in today's society. It is also true that what a certain community considers to be an antisocial act might mean nothing to another community. Statistical crime rate will directly be affected as culture and political environment changes. This in turn determines the allocation of resources for the enforcement of such laws and also influences public opinion. Public perception of a crime is affected if there are changes in the way the crime data are collected. (Hart, 1961) Law enforcing agencies before used to employ awkward way of crime reporting to know whether crime is increasing or not such as counting the number of people in the people and this made crime data analysis very difficult. Until early 18th century, the data collection on crime incidences was insignificant. (Blythe, 1992) The governments of all nations all over the world have been looking forward to minimizing the occurrence of crime in the society. The incidences of crimes are usually identified by location, gender, nature and race by these crime reporting programs. This has really helped the government in allocating resources by allocating more resources in the areas more prone to crimes to reduce them. The crime incidences reporting have helped the Federal state to plan and redirect resources in fighting crimes since the UCR began its operations according to the data collected by USA government. According to the FBI (2006), there is an overall reduction in crime incidences ranging from violent to simple assaults for the past ten years. Statement of the problem Many crimes that happen every day goes unreported in the UCR crime reporting program. NIBRS in the other hand, as an improvement of UCR, has its own limitations. One, there is no enough resources needed to capture all the crime incidences. This in turn has lead to its failure in giving a proper picture of crime to the law enforcement agencies for it to strategies effective ways of fighting crimes. This has been contributed by failure of some cities to introduce the NIBRS in their systems and lack of harmonization in crime prevention system strategies and partnership between cities. This paper is an effort to address

Tuesday, September 24, 2019

Regulatory and Compliance Issues Assignment Example | Topics and Well Written Essays - 750 words

Regulatory and Compliance Issues - Assignment Example This might include insurance policies (Corporations Act 2001, Section 763C). Non-cash payments refers generally to alternatives to cash payments such as cheques, credit cards, debit cards, travellers cheques and so on (Corporations Act 2001, Section 763D). B. Plain English Definition A plain English definition of financial advice is guidance and recommendations from an individual who is qualified and knowledgeable about financial products, estate planning and asset protection. Financial advice is not only based on knowledge, but also based on due diligence. In this regard financial advice is given after taken into account investment, savings, debt creation, debt management and so on that is compatible with the client’s needs and resources. C. Examples of Financial Products in Australia Examples of financial products available in Australia include, managed investment portfolios, derivatives, securities, and foreign exchange agreements. Managed investment portfolios refer to a c ollection of investments made by and on behalf of the owner of financial assets. The idea is to invest those assets in particular undertakings with the expectation that the owner of the assets will acquire some returns. ... Securities are documents that substitute for actual assets or interests in assets. Examples of securities are bonds, stocks, debentures and certificates such as share certificates. Foreign exchange agreements are contracts in which a party agrees to purchase foreign currency at a specified rate on a specific date. Question 2: The Role of the Financial Planner The role of the financial planner in Australia is to evaluate the client’s financial needs and his or her financial circumstances with a view to preparing and implementing a financial plan that realistically helps the client meet his or her financial needs. In this regard, financial planners in Australia provide a variety of services including retirement plans, income planning, superannuation, fund investments, the acquisition of shares, managing risks, managing or reducing debts, implementing savings plans, investing in futures and/or securities, filing taxes, insurance plans, business planning, estate planning and so on (Toten, 2006). Each of these services are tailored toward financial planning and/or asset protection depending on the client’s needs and resources. For example, estate planning would involve the distribution of assets during the life time of the client with the expectation that the estate will not be subject to probate. In such a case, the client might be advised to create a trust deed in which trustees manage the client’s estate for the benefit of the client and his or her children. An insurance plan will also involve financial planning as it would involve making interim payments toward an insurance policy that would insure the client’s life or medical care and thus ensure that the client leaves money to loved ones upon death or has access to

Monday, September 23, 2019

Compare and contrast the different respects in which Freemen were Essay

Compare and contrast the different respects in which Freemen were treated during Reconstruction by the Cherokee Nation and how t - Essay Example Following an establishment of a working treaty with the United States of America, these individuals gained Cherokee citizenship in 1866. Numerous rights of the freedmen remained limited with some being available only to Cherokees and not freedmen Cherokees. During the reconstruction of the Cherokee nation, freedmen were only granted citizenship into the Cherokee nation. Numerous human rights, however, were not granted to the freedmen Cherokees following citizenship. Controversies continued through the 20th century concerning the rights granted to freedmen Cherokees. These individuals felt they were being accorded second grade citizenship with limited rights. Though the Cherokee citizenship offered freedmen with citizenship based on possession of Cherokee blood, amendments into the constitution later involved acceptance based on historical presence. The Cherokee nation presented controversial regulation regarding citizenship of freedmen Cherokees. This controversy continues to yield c ontinuous court battle as freedmen seek acceptance into the citizenship of Cherokee nation. Various Cherokee constitutional laws declare that qualification to Cherokee citizenship should be based on having Cherokee blood relationships and not merely historical presence within the Cherokee nation. ... Within the context of Cherokee nation, however, separation of these parameters remains difficult. The integration of the Cherokee nation as part of the United States of America brought significant impact and clarification of the pending citizenship issues. Freedmen Cherokees continued to be accorded limited right by the Cherokee nation. These included limitation into intermarriages with native Cherokees; hence freedmen Cherokees could not intermarry with native Cherokees according to the Cherokees’ regulations. This mainly remained so because these freedmen continued to be viewed as slaves of the Cherokees. There exists an unwritten slavery law where masters cannot intermarry with slaves. This theoretical believe continued to be commonly practiced within the Cherokee nation. The freedmen were also accorded second-class citizenship, with limited rights, like those of intermarriages. Adaptation into the constitution of the United States of America included access to various righ ts, previously unavailable. These included the right for freedmen Cherokees to vote and elect leaders. Though the united states governments seeks to empower the freedmen Cherokees through giving them human right accorded to other marginalized communities, controversy continues to cloud the issues of freedmen Cherokees. These individuals were offered citizenship into Cherokee nation before integration into the United States of America. The standing order, therefore, remains that they are still bound by the regulations which gave them Cherokee citizenship. These people, therefore, completely remain bound by the constitution of the Cherokee nation whose authority

Saturday, September 21, 2019

Theme and Narrative Elements in the Short Story Essay Example for Free

Theme and Narrative Elements in the Short Story Essay The short story of Little Red Riding Hood is a simple to understand child’s tale and clearly portrays the deceitfulness of appearance. The story is clearly organized with characters and symbols of innocence by a child and the sly dangers represented by a wolf. Throughout the story we see the characters build more of a persona of innocence and evil. It is stated by Cassady, M. (1991), â€Å"Symbolism plays a large part in Identity and Difference.† This is seen a lot and very clearly with the oblivious thoughts of Red Riding Hood and the singular objective of the wolf constantly reminded throughout the story. The characters add to the theme and the theme is portrayed though these characters. The theme of Little Red Riding Hood is made clearer and understanding in many ways. In the original short story there are clear references to what the clear idea is behind the theme. These are pointed out and recognized by asking simple questions even supported through the text. Clungston, R. (2010), â€Å"How does the writer use setting to narrow the underlying idea? How do characters make particular aspects of the underlying idea clear? How does conflict reveal the strength or worth of the underlying idea?† These are questions more clearly defined in this story than could be found in many others. The most clear and obvious would be the characters. The antagonist being represented as a mischievous and blood thirsty wolf gave a clear view on the danger posed against the young and innocent Little Red Riding Hood. The little fun loving child was also a character who added to the theme, making it clear there was an innocent victim. Along with the presence of the characters there is a clear instance of conflict making the theme clearer. In the short story there was a most noted and memorable moment when the wolf and Little Red Riding Hood reunited without Red Riding Hood knowing she was in the presence of the wolf. The famous lines in the story written by l’Oye (1697), â€Å"Grandmother, what big arms you have! All the better to hug you with, my dear. Grandmother, what big legs you have! All the better to run with, my child. Grandmother, what big ears you have! All the better to hear with, my child. Grandmother, what big eyes you have! All the better to see with, my child. Grandmother, what big teeth you have got! All the better to eat you up with.† Said and repeated, this became one of the most notorious childhood short stories to ever exist. This conflict showed the adolescence of the child and the trust she put into the wolf’s words. As these go on it becomes more obvious the appearance of Little Red Riding Hood’s grandmother become less resembling to how Little Red Riding Hood know her to appear. This is where â€Å"looks can be deceiving† seems to be most appropriately referenced. In the story of Little Red Riding Hood the child character had no knowledge of not talking to the stranger wolf, which led to her and her grandmother’s peril. . The story has the intertwining relations between the characters and their symbolism in the story. As the little child frolics and plays with butterflies and picks up nuts to enjoy the wolf tears through the woods to be sure not to lose out on his opportunity to feast. This is the image brought to the reader of the characters and heightened by the influences of the child being a child and the wolf being a wolf. Cassady, M. (1991) also states, â€Å"the characters are symbols as well as individuals† this explain our predicted image of the characters and the importance of why these two characters have to be who they are to make a clear statement in the story. Without the presence of these characters or the manifestation of the theme, neither would exist without the other to create the effect this story created. This is symbolism and character created strongest in the story of Little Red Riding Hood.

Friday, September 20, 2019

Designing An Online Dating Service Information Technology Essay

Designing An Online Dating Service Information Technology Essay Valentinos has been a very successful dating service since 1976 as it provides a round the clock assistance to their clients. The company allows the client to request as many introductions as they can and also facilitate the modification of the information as many times as the member wants to free of charge. The agency is very popular because it not only provides better customer care but also effective matching with largest number of members. Weakness Time consuming in terms of matching from database Lack of investment in technology No provision of online matching as the website is information only The technology used for maintaining the database and language used for writing the code are very old The system is poorly documented Valentinos is losing its profitability as the services it provides are old fashioned and consume a lot of time. The process of match making is done offline which delays the service. The technology used in the system is also a decade older which the new staff finds difficult to use and maintain. Opportunities Make use of new and improved technology Provide online matching of compatible clients Bring innovation to their marketing strategy by advertising online Including winks, flirts and various emotions along with messages Valentinos can make best use of the recent advancements in the technology so that they can attract more clients and serve the existing clients in a better way. They can advertise on the internet on different websites along with newspapers and public transports due to the increase usage of internet over the past few years. Threats Different agencies providing better and advanced interactive interfaces Some agencies providing registration free of cost Changing government laws on accessing personal information Due to the competition from various new dating agencies which provide more and more interactive services using of the new technologies at hand, Valentinos is losing its market share. Changes made in the government policies in the past decade also contribute to the loss in the profitability of the organization. BALANCED BUSINESS SCORECARD Financial Objectives Measures Targets Increase the revenue from membership Application processed per day Increase the application processed per day by 15% in next 1 year Reduce advertisement cost More online advertisements Reduce the advertisement cost by 20% within next 6 months Reduce manpower cost Number of queries handled per employee Reduce the cost of manpower by 5% in next one year Customer Objectives Measures Targets Increase response time Time taken to process an application Response time should be within 24 hours Decrease registration fee cost for membership Registration fee should be reduced to 125 pounds More matches per list List of compatible members Compatibility list should have 10 person/ list Internal Objectives Measures Targets Increase manpower utilization No. of applications processed/ employee Increase the No. of applications processed/ employee by 10% Speed up the process of displaying members details Time taken to display members information Members information should be displayed within 24 Provision of online matching No. of matches per application Increase no. of matches per application by 15% Innovation Objectives Measures Targets Market survey To make use of the new technology at a faster pace Quarterly progress Interactive environment of the website Use of more winks and emotions with better look and feel of website Include new features in the website within 2 months VISION STATEMENT For all the people in U.K. who are single and in search for their special someone, Valentinos- the personal introductions agency is an online matchmaking agency that will help them to find the companion they are looking for. The agency allows the users to create a profile on its website to search for their suitable partners without the need to display much of their personal information. The information held is fully confidential, secure and assisted by trained personnel of the company 24*7. The system will increase the revenue of the agency by 20% in the first year of its use. Unlike the current offline matching system our new system will provide the customers with the option of online dating allowing them to find their partners in no time. The customers will be able to interact with their partners effectively and a lot of time will be saved in finding the right match. Scope Diagram Help Desk Administrator Client Website Maintains Member profiles Output Result Query Database Registers Compatible Profiles Customer Assistance Valentinos Membership MatchmakingOut of scope: Marketing Techniques Advancement in technology used Market survey Costs: Cost of development of online matchmaking system The cost that will be involved in creating the software for matching profiles online. Cost of software updation As the software is very old it needs to be updated so it covers the cost involved in any updation of the website. Hardware installation cost This include the cost of setting up of new servers to handle the increased traffic of member and also of the new systems to be set up having advanced technologies. Staff training cost It covers the cost involved in arranging seminars and sessions for the employees to train them so that they can provide efficient service. Software maintenance The cost involved in maintain the software i.e. various updates needed and instalment of new versions of it. Cost of customer Assistance It covers the cost of providing assistance to the clients i.e. setting up of various telephone lines and hiring new people to provide assistance. Benefits: Increased revenue from membership fee There will be an increase in revenue as with new services there will be increase in demand for the membership of the agency. Better throughput The profiles of the clients will be made available in less time thus the process of adding members will increase. Increased customer satisfaction As the services provided will be faster and more proficient the customers will be satisfied to a greater extent. Fast profile matching With online profile matching the compatible list can be generated in very less amount of time thus speeding up the process of dating. Fewer Complaints With the matches been made available in less time there would be fewer problems in related to the delivery of matches and hence the complaints from the clients will also decrease. Increased reliability The dating system will be more reliable as the matches are made online which will result in the decrease in human errors and the success of delivery of results will increase. Functional requirements Membership Creating user profiles Managing user profiles Registration Priority: Medium Profile matching 2.1 Search the members database 2.2 Match the compatible profiles 2.3 Display the matching profiles Priority: High Managing Staff 3.1 Employees responsible for the development 3.2 Employees maintaining database 3.3 Customer assistance staff Priority: Medium Customer support 4.1 Helping with the membership form 4.2 Providing counselling 4.3 Listening to and providing solutions to customer complaints Priority: High Online dating 5.1 Provide online compatibility matching 5.2 Speed dating Priority: High Payments 6.1 Make payments for the membership and new introductions 6.2 Record payments 6.3 Printing statements of the payments made 6.4 Accept membership fee Priority: High Editing user profiles 7.1 Modification to user records by the user any number of times 7.2 Deletion of personal profile Priority: Low Maintaining database 8.1 Creating a database containing user information 8.2 Updating the database 8.3 Deleting the profiles from the database who do not want to be a member anymore Priority: Medium Advertisement 9.1 Increase in online advertisements 9.2 Better graphical advertisements Priority: Low Non-functional requirements Software Quality Attributes Availability-1: The system should be available to the users any time of the day so that they can use it according to their ease. Reliability-1: The capacity of the system should also be planned so that it can handle any amount of user traffic anytime and should not slow down when lot of users are accessing the service at the same time. Performance Requirements PE-1: Response time for answering the general query of the user should not be more than 10 seconds. PE-2: At least 10 matches should be displayed while providing the matching list to the user. PE-3: The members profiles should be made available on the website in no more than one day. PE-4: The compatibility list should be handed over to the member within a day. Security Requirement SE-1: The transactions made online through credit cards should be totally secure so that no theft takes place. SE-2: Members should be asked for verification username and password so that only authorized users can access the service. SE-3: Ensure that only authorized users can modify the account details and personal information of their own profiles. Legislative Requirements LE-1: The system should comply with rules and regulations of the Data Protection Act. LE-2: Personal information provided by the users should be kept confidential i.e. should not be shared with any other entity without the prior permission of the person. Product Requirements PR-1: The software used for providing the service should be easy to upgrade. PR-2: The system should be able to work with all the standard applications. PR-3: The maintaining of the database should not be outsourced to a third party. Employees should be hired to maintain it within the organization. Detailed description of functional requirements Source: Planning Priority: High Owner: Planning Manager Requirement Id: 4.0 Functional requirement: Customer Support To be able to provide counselling to all the users who need one and answer to the complaints of members. Non-functional requirement(s) Description Target Value Acceptable Range Comments Response time 1 day 5 days Analysing the complaint and looking for solution Service hours 24 hours a day Benefits Will enable the agency to improvise the services they offer by finding solutions to the customer complaints. Comments/suggested solutions The user can also provide feedback. Related Documents Related requirements Resolution Source: Planning Priority: High Owner: Planning Manager Requirement Id: 5.0 Functional requirement: Online Dating To be able to match the compatible profiles online and displaying the results to the user. Non-functional requirement(s) Description Target Value Acceptable Range Comments Response time 1 hour 2-3 hours Searching the large database Benefits Will enable the user to find his/her compatible profiles list in a very quick time. Comments/suggested solutions Instant display of compatible profiles. Related Documents Related requirements 2.0 Profile Matching Resolution (Goodland, 2010) Use Case Model For Valentinos (created using StarUML)Detailed description of a single Use Case Use Case 6.1 Make Payment Goal in Context New user deposits the registration fee to use the services of the agency and existing user deposits the charge for getting new introductions Scope Level Online Dating System, User goal Precondition System available, Finance manager available Success End Condition Payment made successfully, Registration fee paid, receipt of the payment handed to user Failed End Condition Payment not successful, receipt not accepted Primary, Secondary Actors Client, Finance Manager, Credit Card Company, Bank Trigger Request for Introductions Description Step Action 1 Client is asked to make the payment to get the introductions. 2 Client enters his/her account details 3 Makes the required payment 4 Finance Manager records the payment made 5 Finance Manager generates a receipt 6 Client prints the receipt Extensions Step Branching Action 1a If the client is the first time customer: 1a1. Asked to register first 1a2. Deposits the membership fee also 2a If the client enters the wrong password: 2a1. Give him few more chances to enter the right one 2a2. Allow the client to change the password if he does not get it right. 4a If the client is using the system for the first time: 4a1. Create a new account for him. Variations Step Branching Action 3 Client may pay through Credit card, Demand draft, Pay pal Related information Make Payments Priority High Performance 5 minutes for the payment, 1 minute to handover the receipt Frequency 500/day Channels to actors Online Open issues Due Date à ¢Ã¢â€š ¬Ã‚ ¦any other management informationà ¢Ã¢â€š ¬Ã‚ ¦ Included in Inclusions (Goodland, 2010) Assumptions made while modelling use case diagram Client can also provide a feedback in the form of complaints if he is dissatisfied with the services or the agency or if he wants to recommend any changes to the service. Administrator will maintain the information supplied by the client. He will also maintain the history of every client i.e. the introductions offered to the client. Administrator will hold the details of all the employees of the company. Customer service providers will not only provide solutions to the queries of the clients but also will be responsible for handling the complaints if any made by the client. Finance manager will be responsible for recording all the payments made by the clients so that the information can be used by the credit card company. He will also be required to produce statements of all the payments made by the client. Developer will have to run the match list to find compatible profiles and also manage the user traffic on the companys website. Areas Requiring Further Definition The use case Make Payments can further be expanded by including the different ways by which user can pay i.e. the user can either pay by credit card, a demand draft or even through services such as pay pal. The use case view online matches can be viewed in further detail by adding various features of online dating like chatting, winking, emotions etc. Rich Picture for Valentinos Reduced cost of offline matching Why cannot i have more than 6 matches Provide faster matches earn more money Will it be secure from hackers? This system will help us compete with new agencies Now I can see matches instantly Administrator Online matchmaking service Manager More work and new technology Maintain client records and their history Manage the traffic and run the match list for users Design the new system with latest technology Make the site more interactive Less queries about delivery success Decrease in number of complaints Developer Customer AssistanceC:UsersDeepankerAppDataLocalMicrosoftWindowsTemporary Internet FilesContent.IE5P2TU6YUZMC900055561[1].wmfC:UsersDeepankerAppDataLocalMicrosoftWindowsTemporary Internet FilesContent.IE5XUXPG77LMC900332528[1].wmf wow a faster and a convenient dating service Client C:UsersDeepankerAppDataLocalMicrosoftWindowsTemporary Internet FilesContent.IE5XUXPG77LMC900410797[1].wmf Police Is the company following the Data Protection Law C:UsersDeepankerAppDataLocalMicrosoftWindowsTemporary Internet FilesContent.IE56NVVFFGMC900150005[1].wmf C:UsersDeepankerAppDataLocalMicrosoftWindowsTemporary Internet FilesContent.IE5P2TU6YUZMM900365263[1].gif Hacker More chances of getting caught Solve the problems of customers Various Stakeholders Primary stakeholders Client, Shareholders, Developer Secondary Stakeholders Administrator, Finance manager, Customer assistance staff, Hackers Key Stakeholders Client, Shareholders Stakeholders Attitudes Clients that are already using the dating service might not be comfortable with the new system at first. But as they get used to it they will find the new features of the system easy and better to use. The Shareholders at first might fear that the investment for the new system will not be worth the money and the effort. They have to be convinced that it is for the better as the services provided will be enhanced with greater customer satisfaction resulting to increased revenue. The employees may also find it hard to operate the new system as they are used to working with the older one for many years. There should be proper training provided to all the employees on the new system so that they can handle the new system efficiently. The development team may also find it a cumbersome job to create a new system and integrating it with the existing one. There will be an increased amount of work for the customer assistance department in the beginning when the new system is implemented. The lines might be flooded with assistance so they may demand an increase in pay or else new employees have to be recruited. Change Management The development team might not be very proficient or they may be wasting a lot of time in developing the new system. The project may be delayed and wasting a lot of money of the company. The senior managers might have to provide a warning of execution to the present team. If the development process still does not takes the required pace new development team has to be hired. During the developmental stage there might be a change in technology in demand which is cheaper and provides better functionality. Developers will be interested in that but the investors who have already invested in the existing technology will be reluctant. Both the teams have to agree on one common solution for the project to continue. If the new investment in the technology yields a profit on the combined total investment then the management gives a go ahead for investment in the new technology. Possible Developmental Approaches Scenario 1: Development by an external contractor who will specify the system and have it programmed by their sister company Select user story for release Suitable development approach would be Extreme Programming (XP). XP is chosen as it is an agile development technique which helps in developing a more effective product. A the programming is outsourced to the sister company it will be convenient for the contractor to follow this approach as the development can be done with only one customer n only 3 weeks of time. The process of development involves informal story narration of requirements between a customer and developer which can be easily understood. The programming is done by the programmers in pair. There is daily interaction with the customer so if he feels that the system has reached the desired level further work may be prevented. (Source: Cockburn A., 2008) Stories broken down into tasks Release planning Develop/ test software Software release System evaluation Extreme Programming Release Cycle (Sommerville, 2007) Advantages Cost saving in development as the development team consists of 3-10 members only. Development can be done with one customer also in a single room. The process of development is done in interactions over a period of 3 weeks. Each iteration provides the code that is tested and running. The customers as well as the programmers can reprioritize the tasks over time. Pair programming is followed. The delay of finding the solution is less. Rapid feedback. The design is simple. (Cockburn, 2008) Disadvantages The requirements are not documented. To proceed with development discussion is needed between developer and customer after every iteration. Optimization of code is left for the end. No overtime. (Goodland, 2010) Risks Involved There might arise a conflict between the two programmers and they may not be able to reach to a common conclusion. Hence the development can be delayed or even not be able to proceed. In such a case a new team has to set up and the work has to be done all over again. If there is a sudden change in the development team, new employees will find it hard to understand the progress of the work as the requirements are not documented anywhere. (Cockburn, 2008) Scenario 2: Purchase of rival agency and customisation of their software The development lifecycle suitable for such a scenario will be Incremental Model because the software is already present with the rival agency. The development team of Valentinos only need to structure some components and provide extra functionality to it according to their ease. It is an iterative model for the waterfall lifecycle approach i.e. each iteration follows the waterfall model and the iterations are done till the desired functionality of the end product is reached. (Ruparelia, 2010) Design system architecture Assign increments to requirements Define requirements Final system Validate system Integrate increment Validate increment Develop system increment System Incomplete Incremental Model Cycle (Goodland, 2010) Advantages The functionality of the software is made available quickly and in the early stages. Previous iterations provide feedback to the new ones. While the iterations are smaller testing and debussing is an easier job. Stakeholders view can also be incorporated throughout the development cycle. Risk of failure of the project is very low. Potential issues with the development can be found out easily and can be resolved. (Ruparelia, 2010) Disadvantages The individual iterations done are not flexible and they do not overlap with one another. All the requirements for the system life cycle are not clearly framed out during the initial iterations which may lead to problems. (Source: http://qastation.wordpress.com/2008/04/27/software-development-life-cycle-part-5/ )