Sales of goods law Essay Assignment Paper

Sales of goods law
                  Sales of goods law

Sales of goods law

Order Instructions:

Indicate the nature of hotls claim, an express an opinion as to the outcome of the case.

SAMPLE ANSWER

The issue in question is related to the sale of goods law since the ownership has been passed from the owner to the buyer. The confusion at the library display made Holt to believe that the book he is buying is in good shape. According to Tepper (2011), the sale of goods law requires that the seller should pass goods of good quality to the buyer so that the buyer can get quality for his money. In this case, Holt believed that he was purchasing a book in good quality in accordance to the price quotation. Since he has been given the book he never intended to buy, Holt has an actionable claim against MacPherson. In his claim, Holt can argue that the property passed to him by the seller was not corresponding with the description he gave for the property in accordance with the sale of good law. In addition, the sale of goods law demands that the property passed from the seller to the buyer should be fit for purpose and this was not in this case of Holt and MacPherson (Tepper, 2011). MacPherson is liable under the sale of goods law which requires that the quality of goods passed to the buyer should correspond to the sample that was put in the library display. In this regard, Holt ought to have been given a reasonable opportunity to compare what he wanted to buy and what he has been given as the actual product to assess whether the goods have any defects. This accord the buyer an opportunity not to be duped into buying goods that does not reflect the amount of money paid on them. Therefore, MacPherson is liable for passing goods which are not of the right quantity to the buyer.

Reference

Tepper, P. (2011). The Law of Contracts and the Uniform Commercial Code. Cengage Learning; 2 edition

We can write this or a similar paper for you! Simply fill the order form!

Important aspects of leadership Essay Paper

Important aspects of leadership
Important aspects of leadership

Important aspects of leadership

Order Instructions:

Dear Admin,

For this essay (entry) it is required to maintain a weekly journal, documenting important aspects of leadership they encounter over the duration of the module. Entries into the journal may include examples of leadership personally witnessed or insights gained through readings or class discussions.

1)I want 2 entries each one is around 100 words, and each entry is in separate word document.

2)Entries should be placed in a journal.

3)Entries should be based on your learning experience after reading the attached files.

4)You are free to follow your own format as long as it is logically structured.

5)Note: To prepare for this essay please read the required articles that is attached.

SAMPLE ANSWER

  1. Entry 1

New leadership theories have emerged that change the primacy of individual leaders. One of such theories is the co production approach that posits leadership as a collective process.  Leaders need to share with others in their leadership duties by involving everyone in their leadership role. Some adapt to authentic leadership, as they remain dear to their personal values and characteristics, others exhibit servant leadership as they prioritize the needs of the followers before their own. Therefore, distributed leadership model and shared models ensures that leaders work together. Culture is also important when providing leadership as this promotes shared meaning making (Allio, 2005).  A leader must be receptive of the various cultures when providing leadership. For instance, my leader adopts a humane orientation as he encourages and provides reward to his followers.

Reference list

Allio, R 2005, Leadership development: teaching versus learning. Management Decision, vol. 43 no. 7/8, pp. 1071-1077.  https://www.researchgate.net/publication/240258666_Leadership_development_Teaching_versus_learning

We can write this or a similar paper for you! Simply fill the order form!

IPSec tunneling Research Assignment

IPSec tunneling
                  IPSec tunneling

IPSec tunneling

Order Instructions:

The example used in class was a company merger between a large corporate building in Chicago and a large corporate building in San Diego. By describing the path from one user in Chicago, how does a packet make it to San Diego using IPSec?

SAMPLE ANSWER

Table of Contents

IPSec Tunneling. 3

1.0      Introduction. 3

2.0      IPSec Standards. 3

3.0      IPSec Architecture. 4

3.1      IPSec Authentication Header (AH) 4

3.2      Encapsulating Security Payload (ESP) and Internet Key Exchange (IKE) 5

4.0      IPSec authentication using IPv4 versus IPv6. 5

4.1      IPv6. 5

4.2      IPv4. 5

5.0      IPSec tunneling. 6

5.1      IPSec Tunnel Mode. 6

5.2      IPSec Network topology: Packet from Chicago to San Diego. 8

5.3      Layer Two Tunneling Protocol (L2TP) over IPSec. 9

6.0      References. 1

IPSec Tunneling

1.0  IPSec Overview

The Internet Protocol Security (IPSec) provides Layer three security (RFC 2401). It is a collection of algorithms, services, and protocols that are utilized in securing IP data at the network layer. It provides a complete security solution for an IP network. The services and protocols of the IPSec combine to offer different kinds of protection. Given that the IPSec works at the IP layer, it is able to offer these protections for higher-layer TCP/IP applications or protocols with no need for extra security methods (Somesh, 2011). The protection services that the IPSec offers are as follows: it authenticates the integrity of a message so that the message is not altered en route; it encrypts user data to ensure privacy; and it protects against some kinds of security attacks for instance replay attacks. Other kinds of protection services are: the capability of devices to negotiate the security keys and algorithms that are needed to satisfy their security needs; and 2 security modes – transport and tunnel – to satisfy the various network needs (Somesh, 2011). IPSec combines various constituents: internet key exchange (IKE), authentication headers (AH), security associations (SA), and encapsulating security payload (ESP).

2.0     IPSec Standards

Given that IPSec is in fact a set of protocols and techniques, it is not described in just one internet standard. The services, architecture, as well specific protocols that are utilized in IPSec are defined by a set of Request for Comments (RFCs). There are a number of Internet Protocol Security Standards as illustrated in the table below:

  RFC Number Name Description
1 RFC 2402 IP Authentication Header (AH) This defines the IPSec AH protocol utilized for ensuring origin verification and integrity of data
2 RFC 2401 Security Architecture for IP This is the key Internet Protocol Security document. It describes the architecture as well as the operation of the technology. It also illustrates how various parts fit together (Kozierok, 2012).
3 RFC 2403 The use of HMAC-MD5-96 in AH and ESP Defines a certain encryption algorithm for use by the ESP and AH protocols known as Message Digest 5 or MD5, HMAC variant.
4 RFC 2406 IP ESP Defines the IPSec Encapsulating Security Payload protocol that provides encryption of data for confidentiality (Somesh, 2011)
5 RFC 2404 The use of HMAC-SHA-1-96 in AH and ESP Defines a certain encryption algorithm for use by ESP and AH known as Secure Hash Algorithm 1 (SHA-1), HMAC variant
6 RFC 2409 The IKE Defines the Internet Key Exchange protocol which is utilized in negotiating security associations and exchanging keys between different devices for secure communications.
7 RFC 2408 Internet Security Association and Key Management Protocol (ISAKMP) Describes the techniques used to exchange keys and negotiate security associations
8 RFC 2412 The OAKLEY Key Determination Protocol Defines a generic protocol for key exchange (Kozierok, 2012)

 

The IPSec technology is mostly used to implement virtual private networks (VPNs)

3.0     IPSec Architecture

3.1       IPSec Authentication Header (AH)

This offers authentication services for Internet Protocol Security. AH enables the recipient of a message to confirm that the hypothetical originator of the message was in fact the one who sent that message. Moreover, the AH enables the recipient of a message to confirm that intermediate devices have not altered any of the data within the datagram. In addition, it offers protection against reply attacks, a situation in which an authorized user captures a message and then resends it (Somesh, 2011).

3.2       Encapsulating Security Payload (ESP) and Internet Key Exchange (IKE)

ESP encrypts the payload of the Internet Protocol datagram. It encrypts the data and secures it against eavesdropping during transit (Knight, 2010). IKE is a protocol negotiation as well as key exchange protocol, which enables the communicating parties to negotiate the techniques of secure communication. The IPSec offers security in 3 situations: gateway-to-gateway; host-to-gateway; and host-to-host. The IPSec operates in 2 modes: tunnel mode for virtual private network (VPN), and transport mode for end-to-end (Knight, 2010).

4.0     IPSec authentication using IPv4 versus IPv6

4.1       IPv6

In IPv6, the Authentication Header protects nearly all of the IPv6 base header, the authentication header itself, the IP payload, as well as the non-mutable extension headers after the authentication header (Dominik & Yvette, 2011). Protection for the IPv6 header does not include the mutable fields.

4.2       IPv4

In an IPv4 datagram, Knight (2010) stated that the Protocol field shows the identity of the UDP or TCP that is carried in the datagram. This field therefore points to the next header at the front of the IP payload. In IPv4 the Authentication Header protects the IP payload as well as every header field of an IP datagram with the exception of mutable field – those which may be in transit –, and the IP options like the IP Security Option RFC 1108 (Knight, 2010).

5.0     IPSec tunneling

5.1       IPSec Tunnel Mode

IPSec could be configured to operate in either the Transport mode or the Tunnel mode; Tunnel mode is the default mode. When the IPSec is configured to operate in the Tunnel mode, the whole IP packet will be protected by IPSec; the IPSec will wrap the original packet, encrypt that packet, add a new IP header, and then send it to the other side of the Virtual Private Network tunnel (Dominik & Yvette, 2011). It is notable that Tunnel Mode is mainly utilized between gateways – ASA firewalls or Cisco routers. It is also commonly utilized at an end-station to a gateway; the gateway will act as a proxy for the hosts behind it. Tunnel mode is used in encrypting traffic between secure IPSec Gateways, for instance 2 Cisco routers that are connected over the internet through IPSec Virtual Private Network (Dominik & Yvette, 2011).

An IPSec tunnel between an IPSec Gateway and a Cisco VPN Client is an example of tunnel mode. The client will connect to the IPSec Gateway. Traffic from client is encrypted, encapsulated within a new IP packet and is then transmitted to the other end. Once a firewall appliance decrypts it, the original IP packet of the client is sent to the local network. An IPSec header – ESP header or AH header – in the tunnel mode is inserted between the upper layer protocol and the IP header. Between ESP and AH, ESP is most widely utilized in IPSec virtual private network configuration (Somesh, 2011).The figure below shows IPSec Tunnel mode with an ESP header:

The figure below shows IPSec Tunnel mode with an AH header:

 When IPSec is in the tunnel mode, the AH could be applied together with the ESP or it could be applied alone. The function of the AH is to protect the whole packet (Hoffman, 2011). It is notable that the AH does not protect each field in the New IP Header since some change while in transit, and the sender is not able to envisage the way they may change. In essence, the AH will protect everything that does not change while in transit (Hoffman, 2011).

5.2 IPSec Network topology: Packet from Chicago to San Diego

Path of the packet from Chicago to San Diego

The IPSec network topology above illustrates how a packet moves from Site A in Chicago to Site B in San Diego. VPN is a secure and inexpensive technique for site-to-site connectivity such as the one illustrated above (Hoffman, 2011). Each site runs VPN servers. With IPSec Virtual Private Networks, offices in the two different locations can be connected together over the internet with the strong encryption as well as security that the IPSec protocol offers. In this topology, IPSec offers secure communication in the path through which the packet moves through from the sender in Chicago to the destination in San Diego.

5.3 Layer Two Tunneling Protocol (L2TP) over IPSec

L2TP is basically an industry-standard internet tunneling protocol which offers encapsulation for the sending of Point-to-Point (PPP) frames through packet-oriented media. Layer 2 Tunneling Protocol enables IP traffic to be encrypted before being sent via any medium which supports PPP datagram delivery, for instance IP (Hoffman, 2011). The Microsoft implementation of the Layer 2 Tunneling Protocol makes use of IPSec encryption in protecting data stream from the Virtual Private Network client to the VPN server.

Tunneling, as Knight (2010) pointed out, is the whole process of encapsulation, routing, as well as decapsulation. The tunneling process encapsulates or wraps the original packet within a new packet, which may have new routing and addressing information that allows it to move through a network. When data confidentiality is combined with tunneling, then the original packet data in addition to the original source and destination, is not made known to those who listen to traffic on the network (Hoffman, 2011). The encapsulation is removed the moment the encapsulated packet gets to its destination, and the original packet header is utilized in routing the packet to its last destination, which in this case is San Diego. It is notable that the tunnel is the logical data path wherein the packets that have been encapsulated travel through. To the original source as well as destination peer, this particular tunnel is transparent and it appears similar to another PPP connection within the network path. The peers are not aware of any routers, proxy servers, switches, or other security gateways between the starting point and the endpoint of the tunnel (Hoffman, 2011). Tunneling can be utilized in providing a Virtual Private Network when it is combined with confidentiality.

In the figure shown above, the packets that have been encapsulated travel through the network within the IPSec encrypted tunnel. The internet is the network. The gateway is an edge gateway which stands between the private network and the outside network. Carmouche (2009) pointed out that the edge gateways could normally be a proxy server, a firewall, a router, or any other security gateway. Moreover, two gateways could be utilized within the private network for the purpose of protecting traffic across untrusted sections of the network. Whenever the IPSec is utilized in tunnel mode, Carmouche (2009) stated that the IPSec itself offers encapsulation only for the IP traffic. IPSec tunnel mode is utilized mainly for interoperability with other gateways, routers, or end systems which do not support Layer 2 Tunneling Protocol over IPSec (Carmouche, 2009).

6.0     References

Carmouche, J. H. (2009). Basic IPSec VPN Topologies and Configurations. Columbus, OH: CRC Press.

Dominik, S., & Yvette E., G. (2011). Securing IP Multimedia Subsystem with the appropriate Security Gateway and IPSec Tunneling. 보안공학연구논문지, (3), 385.

Hoffman, P. (2011). Cryptographic Suites for IPSec. Crescent City, CA: Penguin Publishers.

Knight, P. (2010). Dynamic Routing Inside IPSec VPNs. Nortel Networks.

Kozierok, C. (2012). TCP/IP Guide: IPSec Authentication Header. Boston, MA: Penguin Publishers.

Somesh, J. (2011). IP, IPSec, and Related RFCs. Albany, NY: CRC Press.

We can write this or a similar paper for you! Simply fill the order form!

Differentiating Components of Health Assessment

Differentiating Components of Health Assessment
   Differentiating Components of Health                                   Assessment

Differentiating Components of Health Assessment

Order Instructions:

For this assignment, the writer will complete the chart using the information provided from the list 1- 20. it is critical that the writer pay attention to details. I will upload the details of the assignment in the upload section.

SAMPLE ANSWER

Differentiating Components of Health Assessment

Subjective Data Objective Data Assessment (medical diagnosis) Plan (orders)
“My throat is sore and  hoarse” Pneumonia Bilateral Breath sounds clear to auscultation Refer to Pulmonology
Chest pain associated with activity Chronic Bronchitis Productive cough x 10 days of green yellow sputum Relieve of chest pain with Tylenol
My head hurts” Hemoglobin 25 Lateral curvature of thoracic spine Fine Needle Aspiration of thyroid gland
Sister with breast cancer Potassium 3.8 Left mastitis

 

Refer to Oncology
Back pain score 8/10 with radiation to legs COPD Skin warm and dry
Consumes 75% of meals

 

Short summary

Objective, subjective, health assessment and plan of action are all components of a SOAP note. SOAP note is a medical form which facilitates easy documentation process of the patient. Subjective data includes all information provided by the client regarding the health complication. It includes chief complaints and family, social and current medical histories (Reznich, Wagner, & Noel, 2010). The subjective data explains the patient’s condition using narrative form. It includes the onset of the condition, its chronology, quality of the pain, factors which modify the pain and associated symptoms. Objective data includes all traceable facts. It includes data from clinical laboratory reports and from other vital findings. This data will include physical assessment data such as age, weight etc. This data is straight forward and includes disease vital signs such as Blood Pressure, respiration, temperature etc. (Mitsuishi, Et al., 2014).

Health Assessment refers to a quick summary of objective and subjective information. It includes lists of potential diagnoses. In some cases, assessment will include diagnostic tests information such as X-rays, blood analysis among others. The problem list is numerically listed as supported by objective and subjective findings.   This is the part which aids in developing of differential diagnosis. Plan (Orders) include all actions that will be conducted as guided by the assessment. They include specific laboratory duties; intention for hospitalization; study of specific diagnoses; differential diagnoses; medication therapy and follow up actions (Erickson, McKnight, & Utzman, 2008).

References

Erickson, M., McKnight, R., & Utzman, R. (2008). Physical therapy documentation. Thorofare, NJ: SLACK.

Mitsuishi, F., Young, J., Leary, M., Dilley, J., & Mangurian, C. (2014). The Systems SOAP Note: A Systems Learning Tool. Academic Psychiatry. doi:10.1007/s40596-014-0128-5. Retrieved from http://eds.a.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=12d28572-cabe-4aaf-b355-4d40fb3e2538%40sessionmgr4003&vid=0&hid=4205

Reznich, C., Wagner, D., & Noel, M. (2010). A repurposed tool: the Programme Evaluation SOAP Note. Medical Education, 44(3), 298-305. doi:10.1111/j.1365-2923.2009.03600.x. Retrieved http://eds.a.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=dfcf3206-e0fd-4e06-a590-6898a729ba23%40sessionmgr4002&vid=0&hid=4205

We can write this or a similar paper for you! Simply fill the order form!

A letter asking for financial details and practice information about the ads

A letter asking for financial details and practice information about the ads
A letter asking for financial details and practice information about the ads

A letter asking for financial details and practice information about the ads

Order Instructions:

Mary Utanpitak asks you to write a letter for her signature to CEO Richard Rebh at floor graphics, inc (1725 E 3rd avenue, Vancouver, bc, vv5m 5r6) asking for financial details and practice information about the ads, for examples, how will you clean your clean your floors? who installs and removes the ads? can you terminate the lease if you don’t like the ads?

SAMPLE ANSWER

A letter asking for financial details and practice information about the ads

54, Greyhound Road

Lockwood

St. Louis

C76 8FK.

 

Richard Rebh

The Chief Executive Officer

Floor Graphics INC.

1725 E 3rd avenue

Vancouver

BC VV5M 5R6.

 

28th Feb 2015

Dear Mr. Richard,

I am writing to ask for the financial details and practice information about the advertisements made in your establishment.

How  are  your  floors  cleaned  up  and  who  does  the  cleaning?  Also  who  installs  and  removes  the  advertisements  since  the contract  isn’t  clear  on  those  specifics. If  the  advertisements  do  not  please  you, can  you  terminate  the  lease  agreement  or  is  it  fixed  based  on  the  months  or  years signed  for?

I’m  hoping  to  hear  from  you  soon, with  any  pertinent  information  pertaining  the  lease  agreement  and  the  contract  to  be  signed. Thank you for your time.

Yours Sincerely,

Mary Utanpitak.

We can write this or a similar paper for you! Simply fill the order form!

Aspects of Leadership Journal Entry

Aspects of Leadership Journal Entry
Aspects of Leadership Journal Entry

Aspects of Leadership Journal Entry

Order Instructions:

For this essay (entry) it is required to maintain a weekly journal, documenting important aspects of leadership they encounter over the duration of the module. Entries into the journal may include examples of leadership personally witnessed or insights gained through readings or class discussions.

1)I want 2 entries each one is around 100 words, and each entry is in separate word document.

2)Entries should be placed in a journal.

3)Entries should be based on your learning experience after reading the attached files.

4)You are free to follow your own format as long as it is logically structured.

5)Note: To prepare for this essay please read the required articles that is attached.

SAMPLE ANSWER

Aspects of Leadership Journal Entry

  1. Entry W8

Leaders must be in a position to take leadership of an entity and help spearhead reforms that will lead to achievement of the set goals. To achieve this, the leaders are expected to possess skills and knowledge that will enable them to lead the rest of the people. When offering training in leadership, it is important that the right candidates enroll, learning challenges should be created and mentoring services must be available. The training should as well provide experiments to ensure that they develop leadership competency (Allio 2005).  The training should as well focus on developing self-knowledge and skills in critical thinking and rhetoric thinking.  A leader is also expected to reflect on their leadership styles and actions to understand the way forward. Acton-observation –reflection models allows one to learn from the experiences as they think about the same, this enables a leader o make adjustments of the actions hence can provide superb leadership.  Assessment of leadership allows a leader to identify areas that need improvement hence promotes quality leadership.

Reference list

Allio, R 2005, Leadership development: teaching versus learning. Management Decision, vol. 43 no. 7/8, pp. 1071-1077.

We can write this or a similar paper for you! Simply fill the order form!

Outlawed in Pakistan Essay Term Paper

Outlawed in Pakistan
Outlawed in Pakistan

Outlawed in Pakistan

Order instructions

Watch the film and write a 3-4 page paper about of the film answering the three questions below:
1. What was it about (what country, what population, what was the issue)?
2. What did you learn? This is not a summary of the film. I want to know what you learned about the world, about social change.
3. How you can connect what you learned from the film to what you have learned in a class on social change? (I have attached a few PowerPoint) Use specific examples of things we have read in the text or that we have discussed in class.

Outlawed in Pakistan: http://www.pbs.org/wgbh/pages/frontline/outlawed-in-pakistan/

SAMPLE ANSWER

Outlawed in Pakistan

  1. This documentary film was recorded in Pakistan and it features the quest for justice by a teenager who sought to pursue justice for her rape by four men. The documentary sheds light on the plight of women in Pakistan and more specifically those who have fallen victim to rape or gang-rape. The issue that this story highlights is the fact that the victims of rape are condemned to suffer in silence since the odds are against them both from a socio-cultural perspective as well as from a legal point of view. The challenge being highlighted here is the obstacles that exist between the women and young girls who fall victim to rapists and legal redress.

2. I learnt several things about social change. The first thing I learnt is that social change often results from the existence of inequalities that exist in any given society. In this context there is a clear imbalance between men’s rights and women’s rights. While they have an equal stake in he culture and legal system, women have a smaller chance of benefitting from the existent regulations since men have all the power to manipulate the regulatory framework to suit their needs. This is indicative of other situations where the more influential members of a given society such as the elites conspire to leverage existent legislation to suit their selfish needs and this often places another party on the receiving end. The offended or injured party are the ones who often clamor for social change.

Something else that I learnt about social change is the fact that the need for it is usually more evident from the outside, usually by an individual or group of people who have experienced or witnessed first-hand the benefits of a given change. In this context the girl’s struggle to ensure rapists are punished appears to be more important to foreign journalists who want to share the story, an indication that the local media still has to toe the line, or does not really see the benefit that this social change will bring.

Social change is seldom a government priority as the government tends to reflect the will of the people. For change to be effected effectively, the threshold of people who are in favor of the change needs to exceed the resistance of those who are keen on holding on to the existent way of doing things. This is unfortunately where many social change initiatives get stuck, those who desire the change will often lack the means to win enough people over. At times the sociological term used is political will whereby individual in leadership positions have the final say on what will actually become of a proposed social change. These leaders may be elected officials, state officials or also religious leaders.

Last but not least, I learnt that social change is a continuous process that is bound to fail at different stages of its life cycle. The failures are partly attributed to the resistance to change by key decision makers. In other instances obstacles to change arise in the form of personal threats to the main drivers of change and this happens when one or more of the members of the ‘establishment’ feel that the status quo will be upset if the change is successful. Such individuals will go to extreme lengths to ensure that the ‘balance’ they enjoy is not done away with. In such instances the continuity of the initiative will involve the drivers of the social change doing so at their own risk.

I also learnt that social change needs to be considered in subjectively according to the context within which it is being proposed to function. While change is important and there exist examples of strategies which have worked elsewhere, it is necessary for any given social change to be understood with particular attention being allocated to the stakeholders who are going to be affected both directly and indirectly.

Last but not least, I learnt that social change needs to be presented through the emphasis of what its benefits will be in comparison to an existent situation which is retrogressive. This helps to drum up support for it and at the same time a bottom up approach is more ideal since this places more pressure and responsibility on the leadership to facilitate the necessary change. This requires a vast deal of resources which are at times inaccessible or unavailable in some parts of the world. As such many social change projects in impoverished regions are carried out by foreign aid organizations.

3. The first similarity between the content of this documentary and what we have learnt in class is the definition that I got of social change. Under ‘definitions of social change’  the second definition is given as “A process by which society becomes something different while remaining in some respects the same.”  From the context of this film, it is clear that the aspect that the girl and her family intend to change is the manner in which this community treats victims of rape. The society will still remain the same in that traditional gender roles are unlikely to change in the wake of the success of their effort.

Something else that the film’s content had in common with the material that was given in class is with respect to the source of the social change. The specific topic being referred to here is ‘Clashes over resources and values’ as one of the sources of social change. In the documentary film the clash is between the value systems held by the men who raped the girl and the girl’s family. The men feel that girls have significantly less rights compared to men like themselves who can have their way and manipulate the system to get away with their actions. Not just through the rape but also in ways like forced marriages and also honor killings which in effect exonerate the men from any wrong doing. The girl and the family on the other hand believe that girls and women need to enjoy the right to self-determination and also protection from the state through the issuing of punishments for acts such as rape and other forms of sexual violence. The two value systems contradict one another this the manifestation of a need for social change.

There is also a clear manifestation of fascism in this society since there has been little if any evidence of a collected effort being made by independent community based groups to come to the defense of the girl. The only evidence of people coming together was when the community wanted to have her killed for losing her virginity before marriage or when the religious leader testified about conducting the marriage (PBS, 2013).

Reference

PBS (2013) Outlawed in Pakistan (film) Retrieved from http://www.pbs.org/wgbh/pages/frontline/outlawed-in-pakistan/

We can write this or a similar paper for you! Simply fill the order form!

Analysis of Ground Rules Assignment

Analysis of Ground Rules
Analysis of Ground Rules

Analysis of Ground Rules

Order Instructions:

ASSIGNMENT: Analysis of Ground Rules
1. Think of a time that you were on a team that was not only effective but was a pleasure in which to participate. Write a description of this team and its task, paying particular attention to the behavioral expectations for which the team members held each other accountable-these might be spoken or unspoken. List these ground rules and describe how the rules helped the team perform and work well together.

2. Also, think of a time you were on a team that was not effective and was frustrating. Write a description of this team and its tasks, including the spoken or unspoken ground rules that describe the expectations for behavior on this team. Examine the possibility that some members held ground rules that others did not. How was this was a source of tension? Analyze how this difference in what is expected of team members caused conflict and damaged performance. What effect could discussion of ground rules as a method of team learning have had for this group?

Reference
Senge, P. M., Kleiner, A., Roberts, C., Smith, B., & Ross, R. (1994). The fifth discipline fieldbook: Strategies and tools for building a learning organization. New York: Doubleday. ISBN: 0385472560

SAMPLE ANSWER

Good team work scenario

I consider a team that was developed to lead a corporate social responsibility (CSR) event for my organization the most efficient team I have ever participated in. I had a pleasure working in this team, where each member played by the set ground rules and was always accountable to other members. The team consisted of six individuals among them the chairman, secretary, accountant and team members including myself. The role of the team was to identify a suitable CSR activity that the organization could undertake in a bid to increase publicity. The team was also responsible for organizing the event including the budget and coordinating CSR activity. CSR is considered to be of great significance in modern times and this team therefore aimed at coordinating the most impactful event possible. Accordingly, there were various behavioral expectations and ground rules that each member adhered to during the process.

To begin with, time keeping was highly valued and each member was expected to arrive on time. This not only ensured that the meetings could begin on time and end as scheduled but also gave the team adequate time to discuss the agenda at hand without the possibility of postponing issues. This ensured that the planning process took minimal time and the event was done on the scheduled date without any major mishaps.

Secondly, each meeting ended with particular tasks that every individual was expected to perform and report on during the next meeting. The meeting would therefore begin with a report of the progress made by each team member, who was also responsible for identifying any challenges, possible solutions and alternative courses of action if any. This helped the team greatly because through sharing of responsibilities and tasks, objectives were achieved faster and fewer meetings were necessary. In addition, responsibilities aimed at meeting a common objective fed into the shared vision and ensured that the job was done.

Though not written, every member of the team was expected to bring forth any kind of information which they considered helpful to the planning process and also point out areas where they thought the team was making the wrong moves. This can be linked to team learning, which as indicated by Senge, et al (1994), helps team members to share knowledge, skills and experiences with each other and conduct meaningful discussions aimed at doing things better. This ground rule ensured that the team avoided possible mistakes and that decisions taken were made with adequate information; hence reducing the chances of failure.

Poor team work scenario

The company had been undergoing a decline in profitability for about a year and the management believed that a more reliable service delivery strategy would address the issue. Accordingly, a team consisting of 10 members was formed to design a service delivery strategy that would ensure that the company can attract more customers and hence improve profitability. The role of the team was to identify gaps within the service delivery system at the company and come up with solutions that would ensure that customers received high quality services. Unfortunately, this team was not only ineffective but equally frustrating, considering that the strategy took three months to complete and not one and a half months as earlier intended.

To ensure smooth running of the team, each member was assigned tasks, which were expected to be done within a given time and reports submitted to the chairperson of the team before the next meeting. Each member was expected to show commitment to the team through attending all meetings or providing adequate reasons for not attending; in which case they would have to forward their contributions to the chairman on the day’s agenda as well as findings from previous assignments. Possible disagreements were to be addressed systematically until a common solution was established. Time keeping was also expected to be strictly adhered to.

It is however regrettable that a majority of team members did not meet the ground rules as set. Consistent failure of some members coming late often led to delays and meetings objectives either went unmet, meetings would end late and members who planned their time effectively would end up being inconvenienced. In addition, there were many cases of absence, which would at times lead to postponement of meetings. Lateness and absence caused major conflict and tension during the first few meetings, such that members who were previously inconvenienced ended up missing consecutive meetings because of fear of additional time wastage. This greatly damaged performance and consequently caused the team to take double the time in preparing the new strategy.

There were major disagreements, which unfortunately ended up unresolved most of the time because no protocol was followed to address them or the team members could not agree. This can be blamed on the differences in opinions, where each member had their own suggestions on how the issue at hand should be addressed. Other team members feared that the new strategy would change how they work, including extended working hours, and thus opposed the proposed changes.  Senge, et al (1994) links such behavior to mental modes, noting that mind-sets, beliefs, values and assumptions play a significant role in how people think and act. Where there is no shared understanding, conflicts may occur and thwart the process of change.

A discussion on ground rules as a method of team learning would have been highly appropriate for this team and thus improved its performance. Discussions at the initial stages of team formation will ensure that each team member is aware of the ground rules and agrees to them, such that they can be effectively held responsible for failure to adhere. This way, conflicts can be avoided and compliance improved significantly. The team members must however ensure that the ground rules are maintained by pegging consequences for non-compliance. Examples include fines, additional responsibilities and other forms of penalty. This will ensure that discussions on ground rules are respected and thus ensure team objectives are met effectively.

Reference

Senge, P. M., Kleiner, A., Roberts, C., Smith, B., & Ross, R. (1994). The fifth discipline fieldbook: Strategies and tools for building a learning organization. New York:      Doubleday. ISBN: 0385472560

We can write this or a similar paper for you! Simply fill the order form!

Building an Organization that Recognizes Everyone’s Uniqueness

Building an Organization that Recognizes Everyone’s Uniqueness
Building an Organization that Recognizes Everyone’s Uniqueness

Case study: Building an Organization that Recognizes Everyone’s Uniqueness

Order Instructions:

Please see attachments

 

SAMPLE ANSWER

Building an Organization that Recognizes Everyone’s Uniqueness

Case study

The chosen case study is about the Herman Miller Company, a Michigan-based company that produces high-class and innovatively designed office furniture. At Herman Miller, team-learning practices were used to support change in the organization through valuing and appreciating the uniqueness that each member of staff brought to the organization. Herman Miller Company made an effort to understand diversity and to assist individuals work together more effectively. A number of workshops were held to talk about pertinent issues on diversity.

Several managers from Herman Miller attended a seminar to learn skills and concepts of diversity, quality, and change. The organization also designed workshops that are focused on offering a process for common understanding as well as creating a common language. The discussions were kept personal and gross generalizations and gross stereotypes were avoided. According to Hunt (n.d), the pattern of thinking and expression of every person is unique and if everybody wants to work effectively, then they have to learn to communicate with those who have dissimilar patterns. During one exercise, a group of African Americans, or a group of men was pulled out and placed inside a circle to discuss their experiences as others listened. Such an exercise helped to create awareness and to convey issues of the group. In workshops, the subject of gender balance was also covered. It is imperative to avoid to stereotype since women and men are not different when talking. In the workshops, Herman Miller’s staffs talked about the differences in communication styles between men and women and this was effective in supporting change in the organization (Hunt, n.d).

The useful methods to experiment with my organization include holding workshops that focus on offering a process for mutual understanding as well as creation of a common language, and to encourage Latino women and Native Americans who work in the company to come forward and talk about their experiences as others listen. This will help to create awareness of their experiences and to bring to light issues that they face. The other method to experiment is to hold a meeting to discuss differences in communication styles between male and female employees in my organization. This will help to improve communication between men and women and avoid stereotyping basing on gender.

Two questions that I have about this assignment are:

  1. How does this assignment help in understanding issues of gender in the workplace?
  2. How does this assignment bring to light ways of resolving issues regarding stereotyping different groups of people

References

Hunt, M. (n.d). Building an Organization that Recognizes Everyone’s Uniqueness. Team Learning.

We can write this or a similar paper for you! Simply fill the order form!

The difference among mediation conciliation and arbitration

The difference among mediation conciliation and arbitration
The difference among mediation conciliation and arbitration

The difference among mediation conciliation and arbitration and how these are used in labor disputes

Order Instructions:

explain the difference among mediation conciliation and arbitration and how these are used in labour disputes

SAMPLE ANSWER

The difference among mediation conciliation and arbitration and how these are used in labor disputes

Mediation, conciliation, and arbitration are alternative dispute resolution (ADR) methods that have proven, in some cases, to be more expeditious, private, and economical than litigation. Nevertheless, these three methods differ in their effectiveness when applied in labour disputes.

Mediation involves the use of a neutral and impartial third party to facilitate the process of dispute resolution between the parties involved (Sourdin, 2002). The neutral and independent third party does not make the final decision for the parties, but only facilitates the negotiation process by laying down the issues, needs and wishes of the parties. Arbitration, on the other hand, is a dispute resolution method which involves an independent and impartial third party who makes a decision that is final and binding on the parties involved. Unlike mediation which is voluntary and non-binding, arbitration limits the control of the parties over the final decision. Lastly, conciliation involves the use of an impartial third party who attempts to build a positive relationship between the parties involved in a dispute, drives their negotiations, and directs them to a satisfactory decision. Conciliation is less adversarial than arbitration. However, conciliation differs with mediation in the sense that the conciliator greatly influences the actual resolution of the dispute. The conciliator exhibits more power on the parties and he is perceived as an authority figure responsible for proposing the best solution for resolving the dispute.

Mediation, arbitration, and conciliation pursue the same objectives which include reduced congestion in courts, fair outcomes, prompt hearing, and access to justice (Sourdin, 2002). Conciliation and mediation aim at maintaining the existing labor relationship and rekindling the lost power balance between the parties to a labor dispute. Mediation has proven to be the best ADR method in the United States due to the fact that it gives the parties a chance to make settlements which are economical, practical, and durable

Reference

Sourdin, T. (2002). Alternative Dispute Resolution. Pyrmont NSW: Lawbook Co.

We can write this or a similar paper for you! Simply fill the order form!