Thursday, December 26, 2019

Latino Dual Identity Essay - 920 Words

Latinos who were raised in the United States of America have a dual identity. They were influenced by both their parents ancestry and culture in addition to the American culture in which they live. Growing up in between two very different cultures creates a great problem, because they cannot identify completely with either culture and are also caught between the Spanish and English languages. Further more they struggle to connect with their roots. The duality in Latino identity and their search for their own personal identity is strongly represented in their writing. The following is a quote that expresses this idea in the words of Lucha Corpi, a Latina writer: We Chicanos are like the abandoned children of divorced cultures. We are†¦show more content†¦A Latina writer, Espada Martin, said in an interview, I think Spanish is a very important bridge for Latinos to cross, because on the other side is the homeland ancestry and tradition, the elders of the community, yourself. Later she said, Its really difficult for Latinos who dont speak Spanish to feel whole ( Rysavy ). If a Latino cannot speak Spanish it can make them question their identity even more so, and people may question their validity as a Latino. Recently a Latino-American comedian appeared on television who made a very good point about Latino culture. The comedian joked about an Irishman who was raised in Ireland meeting a man of Irish decent who had been raised in the United States. The man raised in Ireland had a strong accent from his motherland. The man raised in the U.S. had an American accent. The first man shook the latters hand and asked him his name. The second replied, ORielly. Hearing this the first man said, Oh Irish, eh? Then wheres your accent? Then he proceeded to start a fight with the American-Irishman. This whole scenario is ridiculous. But the point the comedian was trying to make was valid. He was saying that someone who is Irish and raised in the old country would have no problem with someone of Irish decent raised in America not having an accent. Latinos do have this problem. Latinos raised in Mexico often dislike LatinosShow MoreRelatedThe Primary Responsibilities Of An Educator1412 Words   |  6 Pa geswhich students have access to instruction in their primary language and a second language, with the goal of becoming bilingual and biliterate. This paper will review literature and research supporting dual language programs and provide the rational for the implementation of Lenguas Nativas. Identity Formation and Cultural Awareness Garcia (2009) suggests that bilingualism leads to social advantages and allows students to become aware of cultural differences. Students in the Lenguas Nativas programRead MoreAmerica s Perception Of Me And My Self Identification968 Words   |  4 PagesChristina Saenz-Alcà ¡ntara, an author for Latino Rebels, does not believe a person can be White and Mexican. In one article she posed the question, â€Å"who and what the hell is a White Mexican?† I am. I was born into a dual world, one constructed by society. I am a diverse individual. Yeah, you heard me right. I am racially and culturally diverse. And I believe it is time for America to ditch its monolithic treatment of race that discredits self-identification; it is time that we acknowledge multiracialRead MoreEssay On Common Core1547 Words   |  7 Pagesfrom the National Center for Education Stats states that Hispanics have held the highest high school dropout rate since 1992. Although in the last decade it looks as though they are closing the gap between other ethnic groups. Currently, most of dual language schools are centered around urban and metropolitan areas such as Los Angeles, Houston, Chicago, New York City, and District of Columbia. Other areas of research currently being explored are how to best implement common core in ELL classroomsRead MoreHow Can We Minister More Effectively By Young Latino Catholics And Help Them Increase Their Participation774 Words   |  4 PagesHow can we minister more effectively to young Latino Catholics and help them increase their participation in the Church? These are key questions that are frequently raised and that must be acknowledged and studied carefully as we consider the future of the Catholic Church as well as her numerical growth. If we bear in mind that 44% of all Catholics under the age of thirty in the U.S. are Hispanics (according to the 2013 Pew Research Center survey of Hispanic adults) it would certainly seem that increasingRead MoreMaintenance Bilingual Education for Heritage Language Learners2083 Words   |  9 PagesIntroduction According to the 2010 U.S. census the Latino community makes up 16% of the country’s population and grew 43% from 2000 (Humes, Jones Ramirez, 2011). Within this large community there is great diversity both culturally and linguistically (Schreffler, 2007), from newly arrived immigrants to individuals whose families have been established in the region for generations. Most bilingual education programs are targeted towards English language learners (ELL) with the purpose of acquiringRead MoreImmigrants From Latin America s Annexation Of Mexico Essay1544 Words   |  7 Pages Historically, Latinos have struggled against ethnic labeling, immigration as well challenges surrounding education. This can traced back to mid-19th century when according to Harvest of Empire America’s annexation of Mexico which gave the United States Texas, California, and the southwest. â€Å"Mexico’s territory was cut by half and its mineral resources by three-quarters. These appalling numbers help explain so much. In fact, you can arguably lay Mexico’s poverty and loss through emigration rightRead MoreWhy Is The Gifted Program Is From An Education Standpoint?897 Words   |  4 PagesSome of the common themes across the groups of students discussed in the chapter include the family involvement. From a unique standpoint, in the Asian and Latino culture the students are expected to respect authority as well as honor their family. As a result, their feelings are repressed for the greater good of the family in both instances. All of the cultures, have a challenge of overcoming low socio-economic status. This can imply a couple of things within the gifted education world; withRead MoreWe Are Killing our History Essay1107 Words   |  5 PagesWhat do you think of when you think of identity? Is it culture, race or language? When I identified someone’s identity, I will focus on his or her appearance and language. According to the identity’s definition, identity means the qualities and attitudes a person or a group of people have, that make them different from other people. During recent few decades, there are a lot of immigrants arrive to the United States. Some people try to change their life habit and accent to integrate into AmericanRead MoreGender, Linguistic And Cultural Profiles Of U.s. Public Schools Essay1927 Words   |  8 PagesAccording to (Rosalie Rolon-Dow, 2014, P.50), â€Å"Latinos play the most dominant role in diversifying the demographic, linguistic and cultural profiles of U.S. public schools.† This article discusses how preservice teachers should be prepared to work with diverse students in the classroom. Preservice teachers should have the opportunity to engage with students about sociocultural and sociopolitical aspects of language, identities, and culture to English Language learners in the classroom. The articleRead MoreHow Language Is The Defining Aspect Of Person s Culture And Identity1122 Words   |  5 PagesLanguage is the defining aspect of person’s culture and identity. In the essay, â€Å"How to tame a wild tongue† by Gloria Anzaldua and from the â€Å"Mother Tongue† by Amy tan, both reading conveys the importance of culture in society and it is possible to suffer If we can’t use it properly, however anzaldua was far more confidence about her language but Amy tan was depressed about her language impacted on her life experiences. At my home I speak Urdu with my family but in school I speak English. This situation

Tuesday, December 17, 2019

Essay about Socrates - 2048 Words

SOCRATES THE PHILOSOPHER Socrates is a noteworthy and important historical figure as a philosopher, because of his and his pupils’ influence on the development of the philosophical world. His teachings, famous arguments, and ideas began the outgrowth of all later western philosophies. Born in 469 BC just outside of Athens, Socrates was brought up properly, and thoroughly educated. He was raised as most Athenians; developing both physical and mental strengths. Socrates then went on to learn from Archelaus the philosopher. Here he studied astronomy, mathematics, and was introduced to philosophy, which was a new concept at the time. Archelaus taught of explanations for the world with a scientific approach. Socrates, however, turned away†¦show more content†¦This means, for example, that when we think of characteristics such as roundness, we only picture ideas of it like a ball or a wheel. Therefore, he assumed that we only understand specific things that participate in o ur lives. In his search for the inner truth of oneself, Socrates theorized the explanation to the question of what the goals of life are. He concluded that everyone tries to find the meaning of happiness and goodness in their existence. This is the purpose of life. However, true happiness comes in many forms and is disguised in a way that people spend their lives looking for goodness, but finding only the evil in which it is concealed. The only way to discover true happiness, goodness, and the right way, is to fully understand oneself. Socrates did not believe in the Greek gods or religion. He had his personal view of god. Socrates felt that there must be some form of divine power because everyone seemed to believe in some kind of god and religion. He also believed in a sort of immortality. He hypothesized that there was an afterlife. His explanation for it was that people who had achieved goodness in their lives knew where they were going afterwards, and that evil people tried to i gnore the fact that immortality existed. He preached that the soul was a person’s true being, and that our goodness in life reflected on the goodness of our souls. According to Socrates, each individualShow MoreRelatedSocrates : The Suicide Of Socrates1405 Words   |  6 PagesSocrates was born in 470 BCE in Athens, Greece. His father was Sophroniscus, a sculptor and stone mason from Athens and his mother was a midwife by the name of Phaenarete (30 Interesting Socrates Facts 2014). Socrates original profession was masonry and sculpting, before becoming a philosopher. On a day in 399 BC, Socrates ( roughly 71 years at the time) went to trial.Now why would anyone want to send an old man to court? Three answer is that Socrates was accused of refusing to recognize theRead MoreSocrates And The Apology Of Socrates1322 Words   |  6 Pages Socrates is quite the unique individual compared to most, if not all, other Greeks at that time. In the Apology, Socrates gives an analogy of himself being a gadfly and that his gadfly like actions are favorable for Athens and that the actions are goods he is providing. From his service he claims to live a more private life than a public life when discussing virtue. This paper is going to discuss Socrates and his analogy of a gadfly, approach to others about virtue, his conduct effect on democracyRead MoreSocrates As A Martyr And Socrates927 Words   |  4 PagesIn philosophy class this semester we spoke a lot about Socrates and his trial. We were required to read the dialogue ‘Apology’ by Plato. The à ¢â‚¬ËœApology’ Dialogue is what Plato recorded during the speech Socrates gave to the court defending himself against the charges of corrupting the young, and by not believing in the gods in whom the city believes† these two were the main charges, but underneath that there were also other significant charges such as being considered an antidemocratic or pro-SpartanRead MoreSocrates : The Problem With Socrates908 Words   |  4 PagesThe Problem With Socrates: The problem with Socrates concerns the problem with the role of value and reason. Nietzsche believes that the bulk of philosophers claim that life is a corrupt grievance for mankind. Nietzsche reasoned that these life deniers were decadents of Hellenism, as a symptom of some underlying melancholy. For someone to paint life in such a negative light they must have suffered a great deal through the course of their own life. Furthermore, these no-sayers agreed in various physiologicalRead MoreSocrates Worldview Of Socrates1855 Words   |  8 PagesPart 1: Socrates’ Worldview Socrates is a widely renowned teacher, who has taught and demonstrated a variety of lessons that regard how he views the world. Socrates has described his view on morality, purpose, death, and the ultimate. He has spoken about these views through multiple texts including The Last Days of Socrates and they have been interpreted through the text Socrates by George Rudebusch. Through these worldviews, Socrates has given people the opportunity to expand their wisdom andRead MoreSocrates1461 Words   |  6 PagesSocrates was one of the greatest Greek philosophers. His work was not to propose any specific knowledge or policy: it was to show how argument, debate, and discussion could help men to understand difficult issues. Most of the issues he dealt with were only political on the surface. Underneath, they were moral questions about how life should be lived. Such is the influence of Socrates that philosophers before him are called the Presocratic philosophers. Socrates made enemies, three of whom broughtRead MoreSocrates1099 Words   |  5 PagesSocrates the Greek Philosopher December 14, 2014 PHI/105 In the beautiful city of Athens, Greece, there was a philosopher Socrates, and his Socratic method, was laid on the groundwork for the Western systems of logic and philosophy. Socrates did believe that he didnt know anything, and It was because of this that the Oracle told Socrates that he was wise and that he should seek out the wise men to hear what they had to say. So Socrates began to travel to different parts of Greece to questionRead MoreSocrates659 Words   |  3 PagesSocrates Socrates was accused of many things in the Athens market. Socrates was accused of being a man who makes the worse argument into the stronger argument. A man who knows about the heavens and earth and therefore any one who believe this must not believe in the gods. Socrates was accused of being an atheist. Most of the people that followed him around his quest were inquisitive. Where as most adults would walk by Socrates with his â€Å"annoying question† the youth stopped to see what heRead MoreSocrates : A Man By The Name Of Socrates963 Words   |  4 PagesIn 469 B.C. a man by the name of Socrates was born. Socrates was a very wise man that cared about doing the right thing. He believed that the best ways to develop ideas was in the give and take of conversation, and that the best way to educate people was to ask them a series of questions leading in a particular direction (now named â€Å"Socrates method). Socrates had been quick to identify the drawbacks of democracy, and he had also been the teacher of two men who in different ways harmed Athens: AlcibiadesRead MoreSocrates s Views On Socrates1314 Words   |  6 PagesSocrates could undeniably be described as one of the most influential philosophers and greatest thinker of his time. His views can be interpreted many different ways, but most would agree that he sought out wisdom and truth for the betterment of himself and his community. Though Socrates was one of the most intelligent men of his time, he was very foolish to never write his own book. For this reason, after his passing, one of his students, Plato, began to write a book about his teachings and ideas

Monday, December 9, 2019

Issues of Security and Privacy of Cloud Computing

Question: Discuss about theIssues of Security and Privacy of Cloud Computing. Answer: Introduction Cloud Computing is commonly known as the cloud and it is delivery of on-demand computing resources. This is an advanced technology and with this data and programs storage and access is done over internet not on local hard drive. Cloud is actually known as symbol of internet. In earlier days, hard drive was used to store data close to our computer and it can be accessed and used quickly by users. This is known as local storage and local computing. Everything that is required by user is close to him/her. But with local storage it is not possible for user to access data through internet or cloud. In this situation, cloud computing provides help to store data over network which can be accessed by anyone easily. Cloud applications have different applications such as SaaS, PaaS and IaaS. SaaS is Software as a Service which is run on unfriendly computers in cloud and these computers are owned and operated by others. PaaS cloud computing application support process of building and distributi ng cloud applications. There is no complexity in development and to manage cost of hardware, software and hosting components. Next application of cloud is Infrastructure as a service (IaaS) and it provides companies with computing resources including servers, networking, and storage and data center. In this way, this technology of cloud computing is considered beneficial for internet users. The purpose of making this report is to emphasize on security and privacy issues in cloud computing. Research on this topic is to build an understanding about information security. (Ibm.com, 2016) Challenges and Problems of Cloud Computing In field of security and privacy for confidential information, cloud computing also plays an important role. It is considered a secured technology for storing data over network database. But today various security and privacy attacks are implemented by hackers to violate security of cloud environment. Next segment of report is a about issues of security and privacy of cloud computing. (PCMag India, 2016) Security and Privacy Issues of Cloud Computing As we know that cloud computing has transformed the way of information technology but its issues of security and privacy are big barriers in this technology. There are number of security issues for cloud computing have seen those are related to network, databases, operating systems, resource scheduling transaction management and memory management. There are some essential areas of cloud computing where high level security is required to implement.( Technet.microsoft.com, 2016) These main areas are transit data security, authentication and authorization for users, applications and processes and cloud legal and regulatory issues and incident response. In cloud computing, for achieving security, traditional security parameters are used which are not so much beneficial for providing best security from vulnerable network attacks. There is no common cloud security standard and various additional challenges are associated with this. Some of cloud vendors implement their own proprietary stan dards and technologies that are required for security purposes. Both internal and external security standards are found in cloud computing. Following is the list of security and privacy issues of cloud computing. (Cepis.org, 2016) The main issue of cloud computing is treatment of information assets that resides in computing environments. Capability of different attackers to attack on cloud. All security risks those are associated with cloud and relevant thoughts of attacks and countermeasures. Risk factors of security of cloud. (Pearson, S. Yee, G, 2013) Besides these above listed issues of cloud computing, following are some classifications of security and privacy issues of cloud computing. Conventional Security Concerns Control Issues that are related to third party data. Availability Issues (Knorr, 2016) Traditional Security Issues These security issues are related to computer and network intrusions or attacks that are possible by moving data over cloud. In this case, it is possible to lock down information. The major concerning factors those come under this category are VM-Level Attacks, Cloud Service Providers Vulnerabilities and Phishing Cloud Provider. Third Party Control Related Issues The legal implications of applications and data are held by third party and these are complex and sometimes not easy to understand. When data is hold by third party then there is lack of control and transparency. There are various security and privacy issues exist those prompt companies to void these issues by building cloud framework. Third party control related issues consist of due diligence, auditability and contractual obligations. Availability Issues This concern is related to critical applications and data. Under this category some essential security and privacy issues are included such as maintenance of uptime, prevention from denial of service attacks and surety of robustness of computational integrity. These are some essential issues that are found in cloud computing environment by users. The threats of cloud computing are also come under cloud computing and in next segment of this report, we will emphasize on cloud security threats. Confidentiality Threat of confidentiality of information in cloud computing is a big threat. Both internal and external threats of confidentiality have become problems for business organizations. Internal threats of insiders, access customer data that is held within cloud. In different applications of cloud such as in SaaS, customers of cloud and administrators can be considered as insiders, in PaaS developers of applications and test environment managers are insiders and in IaaS, third party platform consultants are insiders. These insiders can perform malicious activities to violate confidentiality of cloud environment. Cloud providers consists of large amount of confidential data such as credit card information, personal information and sensitive government information and intellectual property etc. and to collect this information, attackers conduct vulnerable attacks. Threats of hardware attack, social engineering and supply chain attacks are common external confidential attack in cloud environm ent. Next cloud threat is data leakage and this data threat is concerned with failure of access of security rights in case of multiple domains and physical transport systems that are required for backups and cloud data. Integrity Integrity is related to verification that information is accessed by authorized users only. The violation of integrity is a big security threat for cloud users. This violation of integrity occurs due to incorrect security parameters and incorrect configuration of virtual machines and hypervisors. This is happened in case of data segregation. On other side, in case of user access, threat of loss of integrity is also high. This is happened due to poor identity and access management procedures. (Technet.microsoft.com, 2016) Availability Availability means information should be available to all authorized users, any unauthorized user must not be able to access this information. But in cloud environment, this is a bug threat or issue that is faced by users. The threats in availability of information in case of cloud environment occurs due to change in management. Change management actually introduces negative effects and this is happened due to software and hardware changes to existing cloud services. Besides this, change management, denial of service is also a big threat for availability of data. Due to this threat, attacker attacks on server with malware and all computers those are connected with server may not access information that is stored into it. Relevant Technologies and its Applications To handle above discussed issues of cloud computing there is requirement to use some essential technologies for its mitigation and these technologies include use of firewall, anti-virus and advanced network monitoring systems. The major application areas of these are web applications, software solutions and cloud based databases etc. Issue that is not Discussed in Forum The main issue that is not discussed in this report is why cloud platforms are hacked and encountered these above discussed issues. This is an important topic to discuss here in this report. (Pearson, S. Yee, 2013) Impact of Issues on Real World These are some essential threats that are faced by users of cloud computing and these all threats are serious and may cause vulnerable results for cloud users worldwide. Every cloud user or developer must have awareness about these threats. These threats are big barriers in usage of cloud computing. Actually these all are weak points of security and privacy of cloud environment. These above discussed all threats and issues of cloud must be mitigated, otherwise it may cause harmful impact on storage data into cloud database. It is responsibility of cloud providers and developers to reduce impacts of these threats and issues of cloud computing. (SearchCloudComputing, 2016) Lesson Learnt from above Discussion After this whole discussion, we can say that cloud computing is a powerful platform, but due to its security and privacy issues, above discussed threats are faced. In this case, to mitigate this problem, developers of cloud framework and cloud service providers should make strategies or solutions. Otherwise, in future, this problem can be increased and will become difficult to control. Today most of the business organizations are based on cloud platform and they want improvement in security and privacy of their data that is available on network database. Advanced security tools and techniques must be used by developers to control security and privacy attacks on cloud environment. (Hamlen, K., Kantarcioglu, M., Khan, L., Thuraisingham, 2010) References Ibm.com. (2016). IBM - What is cloud computing?. Retrieved 21 September 2016, from https://www.ibm.com/cloud-computing/what-is-cloud-computing PCMag India. (2016). What Is Cloud Computing?. Retrieved 21 September 2016, from https://in.pcmag.com/networking-communications-software/38970/feature/what-is-cloud-computing Cepis.org. (2016). Council of European Professional Informatics Societies - Cloud Computing Security and Privacy Issues. Retrieved 21 September 2016, from https://www.cepis.org/index.jsp?p=641n=825a=4758 Pearson, S. Yee, G. (2013). Privacy and security for cloud computing. London: Springer. Business in the cloud: what every business needs to know about cloud computing. (2011). Choice Reviews Online, 48(08), 48-4574-48-4574. https://dx.doi.org/10.5860/choice.48-4574 Knorr, E. (2016). What cloud computing really means. InfoWorld. Retrieved 22 September 2016, from https://www.infoworld.com/article/2683784/cloud-computing/what-cloud-computing-really-means.html Cloud computing - A simple introduction. (2016). Explain that Stuff. Retrieved 22 September 2016, from https://www.explainthatstuff.com/cloud-computing-introduction.html SearchCloudComputing.(2016). Security issues in cloud computing. (2016). Retrieved 22 September 2016, from https://searchcloudcomputing.techtarget.com/tutorial/Security-issues-in-cloud-computing Technet.microsoft.com. (2016). Cloud Computing: Privacy, confidentiality and the cloud | TechNet Magazine. Retrieved 22 September 2016, from https://technet.microsoft.com/en-us/magazine/dn235775.aspx Sciencedirect.com. (2016). Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Retrieved 22 September 2016, from https://www.sciencedirect.com/science/article/pii/S0308596112000717 Pearson, S. Yee, G. (2013). Privacy and security for cloud computing. London: Springer. Hamlen, K., Kantarcioglu, M., Khan, L., Thuraisingham, B. (2010). Security Issues for Cloud Computing. International Journal Of Information Security And Privacy, 4(2), 36-48. https://dx.doi.org/10.4018/jisp.2010040103

Monday, December 2, 2019

International Sport Events In The Netherlands Tourism Essay Example

International Sport Events In The Netherlands Tourism Essay 1.Introduction Without a successful execution of a superb scheme, it will hold no value. For a superb executing a successful scheme has to be created for every athletics organisation who wants to form such an events as the World Cup Football, Ryder Cup, Olympic Games, World Cup Hockey and Tour de France. The Olympic Games, World Cup Football and the Ryder Cup are the three biggest featuring events in the universe in footings of witness screening ( Tucker, 2007 ) . When a state wants to form such a large athletics event, the forming state has to hold a possible to form such an event and do an offer which can non be refused by the athletics commissions. This paper can added value and assist to supply such an offer which can non be refused. In the Netherlands there are athletics organisations which have the dream to form an event as the RyderCup 2014, World Cup Football 2018 or 2022 and the Olympic Games 2028 in the Netherlands. This paper has to place the most of import factors that have influence on a winning command for those events and do the dream become true. The construct of command on an international athletics event has grown the last decennaries. It has started merely before the Olympics of 1984 ( Los Angeles, USA ) . Such an international athletics event like the Olympics and the World Cup Football can supply the host metropolis and state a batch of benefits, but these are non ever guaranteed ( Meannig and Du Plessis, 2007 ) . For illustration, the Olympics of 1976 ( Montreal, Canada ) resulted in a immense sum of debts. Therefore, the International Olympic Committee ( IOC ) was since the Olympics of 1984 more focused on cost efficiency, low-risk and the use of bing substructure. The consequence of this attack was a immense fiscal success for Los Angeles 1984. Besides this, grosss from telecasting rights and sponsorships were increasing so more states were interested in forming such a athletics event ( Shoval, 2002 ) . We will write a custom essay sample on International Sport Events In The Netherlands Tourism specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on International Sport Events In The Netherlands Tourism specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on International Sport Events In The Netherlands Tourism specifically for you FOR ONLY $16.38 $13.9/page Hire Writer The organisation of the international athletics events has to present an excellent offer, which exceeds outlook, to the commission by the organisation of the athletics event in the Netherlands. This research has the end to derive an understanding what it takes to win the command of some great sport event by placing the cardinal success factors of the command procedure. The research on this subject had an international focal point so there is no article of all time written on Dutch athletics event command. Therefore, this subject is really interesting for carry oning research. 1.1 Research inquiries To form such an event, an initial missive has to be written to the commission of the athletics event. With the dorsum of the Dutch Government they have to compose a missive of purpose to do the command functionary. Within this missive, the organisation will depict their program of action and why the event has to be in the Netherlands. With the deficiency of research on event command in the Netherlands, this research will concentrate on the apprehension of what it takes to win the command for an international athletics event by placing the cardinal success factors of the biding procedure. In this research, the most of import cardinal success factors will be identified and what the influence on the winning command will be. The inquiry of this research will be stated as followed: What are the indispensable factors and how can these be incorporated to make a winning command for an international athletics event in the Netherlands? 1.2 Sub inquiries I have divided the research inquiry in the undermentioned sub-questions: i‚Â · What are the advantages and this advantages of forming an international athletics event in the Netherlands? i‚Â · What are the stairss involved in the command procedure of an international athletics event? i‚Â · What are success factors for winning event commands by and large and within the Nederlands? i‚Â · What are the past experiences of implementing a command for an international athletics event in The Netherlands? 1.3 Command on major athletics events The growing of commercialisation in athletics has been significantly increased the last decennaries. International athletics events are really interesting for host economic systems, companies and athletics organisations ( Slack, 1998 ) . This is non merely because of economic benefit but every bit good for societal and political benefits ( Swart and Bob, 2004 ) . The complexness and benefits for hosting such a athletics event are grounds why athletics events are presently capable to a command procedure. The commands of the host states are presented to the boards and commissions for blessing ( e.g. IOC, FIFA, UEFA and RyderCup ) . The commissions of those major athletics events organize a competitory auction in the signifier of commands by possible host states to maximise the gross from the rights to form an major athletics event. This command procedure can be seen as a monopolizer confronting a competitory groups of bidders were three parties are able to pull out much of the fiscal benefit of hosting the athletics event from the command states. The athletics commissions sign a contract with the host state that regulates the flow of benefits associated with the athletics event. Hosting an international athletics event can be seen in an economical point of position as a right, which the host state buys from the athletics commissions ( Maenning and Du Plessis, 2007 ) 1.4 Model of the command procedure Offering on an international athletics event can be visualized in a conceptual theoretical account ( figure 1 ) . This theoretical account shows the relationships with different elements taken into contemplation that have impact on the mark of the thesis. The theoretical account shows the factors that are of import and of influence on a command procedure for an international athletics event. 1.5 Relevance In this Master thesis the research worker have tried to acquire more cognition on the indispensable factors to make a winning command on an international athletics event in the Netherlands. To make a winning command a big fiscal investing is needed but hosting an international athletics event can convey tremendous benefits. This is the ground why the figure of bidders is increasing tremendously. Due this fact, this specific research on the indispensable factors for hosting an international event can be of added value for the event bidder. Besides, on the subject on event command is really small known. The relevancy of this research could be of influence on the determination shapers for coming bid book shapers for hosting an international athletics event in the Netherlands. 2. Research Methodology 2.1 Introduction This chapter outlines the research methodological analysis used for this Master thesis. It will do clear which types of informations have been used and more significantly why. Furthermore, it should do clear how the analyses have been conducted and where the decisions are based on. 2.2 Research design To reply the research inquiry, this chapter should do clear how the research have been conducted the analysis and were the decision are based on. The information for this study consist out of primary and secondary informations. The primary information is collected by qualitative interviews with experts in the field of international athletics events or command procedures. Qualitative attack is taken, because more practical penetrations into a command procedure can be taken. This is non possible when the research is conducted merely via qualitative informations. The secondary informations comes from theoretical cognition, which is available. The secondary informations can been found through literature from diaries, books and research studies. Most of this information is related to international athletics events and non to feature events in the Netherlands. Besides this, a good reply on the research inquiry can be reached through the information from international athletics events. The combination of primary and secondary informations can be used to reply the research inquiry and the sub inquiries. First, the sub inquiries will be answered which will take automatically to the reply of the chief inquiry. At the terminal, the consequences of the primary and secondary day of the month will be combined the come up with decisions and recommendations. 2.3 Interviews Qualitative interviews will be used for the primary informations. First of wholly, the inquiry list was set up. This list contains more than 20 inquiries, divided into different subjects with extra inquiries. These inquiries were based on the sub inquiries of the thesis. Before the interview, the chief subjects of the interview will be explained by a short debut. This, to give the interviewee a short indicant were the research worker is looking for and do them comfy with the interview. The interviewee was asked about his map and the engagement of the company/government into athletics events and about the added value for athletics events in the Netherlands. The command procedure is taken to research how the command procedure is set up, who is involved and what the chief phases are. The 2nd subject of the interview is stakeholder, which identifies the most of import people into the command procedure and what their influences can be. Success factors identifies and ranks the critical suc cess factors on a winning command. The 4th subject, international athletics events in the Netherlands acknowledge if concerns, authorities, ( local ) community are all supportive and enthusiastic about hosting such an event in the Netherlands. The last subject of the interview will be the Improvements on the command procedure of international athletics events in the Netherlands. 2.3.1 Choice of participants Besides the inquiry list was made, a list of participants was created for carry oning interviews. This list is divided into two different groups: ( a ) athletics and ( B ) industry environment. Group A: athletics: This group exists of people active within the athletics universe and involved in command procedures for international athletics events. Group B: industry environment. This group exists of stakeholders, the corporate universe and other experts in the field of 2.3.2 Data aggregation Initial contact was needed before the interviews could take topographic point. All contacts were made by the research workers straight. The interviews were conducted via face to face and telephone, due the troubles for doing an assignment. The interviews were recorded with permission of the interviewee. The interviews were recorded due the fact that the research worker do non desire to lose of import quotation marks and miss of import reading. Besides, the informations analyse could be done more exactly because the research worker could listen more times to the interview. This to guarantee no of import or valuable information was lost. 2.3.3 Data analysis After each interview was conducted, the interview was converted into transcripts. It was non literally typed out, because non all information was relevant for the research. After carry oning the interviews, all the interviews were analyzed on replies on the sub inquiry. These replies were compared with the theoretical portion of the thesis. The informations coming from the interviews were used to back up or strength the theoretical informations. 2.4 Decision In this chapter the research methodological analysis was set out for carry oning research. It started with the account of the usage of primary and secondary informations. After, an account of the set up for the interviews and the participants. Continued with the manner the information was collected and analyzed. With this, theoretical and practical informations were compared and could give informations to reply the sub inquiries for this thesis. 3. Theoretical model 3.1 Introduction In this chapter I will show a reappraisal of the literature to research what has been researched and written sing my subject. The information will be used to acquire a better apprehension of the subject with research that has been conducted by researches. The result of the deepness interview can be compared with the theoretical informations to acquire a better understanding about the command procedure for an international athletics event. The information that already has been written on my subject, I will utilize it to acquire a better apprehension on my subject. The interviews with specific spouses will be used to compare theoretical informations with practical informations. Both can take to the best attack, which can be used for the command procedure. Due the deficiency of information and literature to the command procedure of international athletics events in the Netherlands, I will concentrate chiefly on the information found about command and forming athletics events. The chapter is divided into different subdivisions. First the term international athletics events will be described. Second the advantages that can be achieved by forming major events. Followed by the most of import factors that are of import to make a winning command. After this the factors of influence will be discussed. Last, the past experience of event command in the Netherlands will be described. 3.2 An international athletics event Literature describes these sorts of events as particular, mega, alone or major events ( Getz, 1997 ; Hall, 1995 ) . All events have an pulling international attending, short continuance and organized one-off or on a regular rhythm. To form such an international event, support from the ( local ) authorities of the host state is needed. With this support, the organisation can reconstitute the substructure, altering policies, etc. The international athletics events pull a batch of international attending, because it is broadcasted all over the universe with many witnesss. All of those factors are related to an international athletics event and that is the ground why researches define this as an international athletics event. Events like the Olympics, World Soccer, Tour de France and the Ryder Cup are illustrations of an international athletics event. 3.3 Value of hosting events The literature describes the value of organisation such a alone event as the Olympics, World Soccer, Tour de France and the Ryder Cup. The hosting state can see socio-economic and political benefits before, during and after the event ( Swart and Bob, 2004 ; Jones, 2001 ) . A twosome of benefits are effects on the societal community, coevals of grosss, development bowls and substructure, excess touristry, return touristry via experiences and media exposure, and other economical benefits ( Swart and Bob, 2004Getz, 1997 ; Hall, 1995 ) . Besides the exhilaration of being a host state, a batch of media exposure can convey positive returns to the hosting state, which offset initial investing made ( Du Plessis, 2007 ) . Hall ( 1992 ) has found in his research that states or metropoliss besides host international athletics events for hiking their image of the state or metropolis in order to develop the touristry. With this a metropolis or state wants to be a concern or touristry finish. Fore sts ( 2005 ) mentioned that the above steps touchable impacts could besides be intangible impacts. Social intangible impacts such as quality of life, civic pride and societal properties of communities could alter into a positive or negative manner for the host state or metropolis. Forests ( 2005 ) explained the touchable and intangible impacts in a diagram for host states. This can be found in appendix A. 3.4 Factors of Influence With the fact the more and more states are offering on athletics events, it is of import to cognize the complexness and alone environment of the athletics industry. Due the fact that there is a limited supply of athletics events, it of import to cognize which factors influences the command procedure. Emery ( 2002 ) concluded the increasing demand from metropoliss to host athletics events and suggest that there is a demand to find the advantages of a state into the command procedure. A bidder should work their ain strengths instead than the failing into rivals. Therefore, several researches came up with cardinal factors into a winning command. The six factors of Crockett ( 1994 ) are: part publicity, fiscal returns, location determination, professional presentation, demands of determination shapers and economic impact. Emery ( 2002 ) came up with the undermentioned factors: full apprehension of the brief and the formal/informal decision-making procedure ; professional credibleness ; m ake non presume that decision-makers are experts, or that they use rational standards for choice ; custom-making professional touchable and intangible products/services and transcending outlook and cognizing the strengths and failings of your command in comparison to your competition. The cardinal success factors for command on an international athletics event were divided into two different groups: primary standards and new primary standards by the researches Ingerson and Westerbeek ( 2000 ) . Primary standards can be seen as pressing necessities to host an international athletics event in a state or metropolis. These standards must run into the demands of the event proprietors. The standards were: economic, political, substructure, media and proficient. After their research they came up with new primary standards which were: command trade name equity, edifice dealingss, bequest, offering experience, warrant added value, offering experience, originative statistics and command squad composing. After new research in 2002 of Ingerson and Westerbeek and in add-on Turner more of import factors were found. They came up with the eight success factors needed to make a winning command to form an international athletics event. The eight success factors defined by these research workers are: substructure, relationship selling, answerability, political support, ability, command squad composing, bing installations, and communicating and exposure. In the event proprietor view the ability factor of the forming squad can be seen as a important factor in the determination doing procedure to give the right to the squad to host the athletics event. The ability factor can be divided in proficient expertness, event direction and sport-specific expertness to run the event ( Ingerson, Westerbeek and Turner, 2002 ) 3.4.1 Bid Team Emery ( 2002 ) concluded in his research that a command squad must understand the formal and informal procedures and these should non be underestimated. A command squad with a batch of experiences in forming little or big ( international ) athletics event is really ideal, but this can be overcome by choosing cardinal individuals to fall in the command squad. 3.4.2 Stakeholders The engagement of stakeholders is important in portion of the command procedure and is aimed at increasing effectivity of describing to do certain that determinations really reflected the diverse involvements of all different histrions involved ( Frey, Iraldo and Melis, 2007 ) . It is necessary that the command squad cooperate with the cardinal stakeholders in the execution of an international athletics event. This to guarantee that different policies are complementary alternatively of viing with one other. A strong base of people who are in favor is important to make a winning command but it takes many stakeholders to form an international athletics event. An illustration with different stakeholders in the command procedure of an international athletics event is ; Local community Political and concern leaders Sport event commission Sport federations ( local ) Government Support from concern community 3.4.2.1 Local community A important portion in the command procedure is the support of the local community. Without the support of the local community it is about impossible to form a successful international athletics event. A duologue between the command squad and the local community ( stakeholders ) is necessary to understand and analyse the impacts and jobs on the community. 3.4.2.2 Support Business support and/or public support is frequently indispensable for an international athletics event because of the big sum of the fiscal committedness ( Westerbeek, Turner A ; Ingerson, 2002 ) . Another indispensable factor is the big measures of voluntaries that is necessary in the organisation ( Emery, 2002 ) . The securing of an international athletics event from portion of a more comprehensive touristry, concern investing scheme or athletics development to show that the major event is widely accepted and accepted by the community as a whole. 3.4.2.3 Sport associations In the organisation procedure athletics federations, both at national every bit good as international degree are playing an of import function to make a winning command. At national degree the support of athletics federations are really of import in the command procedure. For illustration, to make a winning command for the Olympics in 2028 in Amsterdam support from the NOC*NSF ( Dutch Olympic Committee ) is necessary. On an international degree, support from the European athletics federation is critical in the command procedure like the UEFA ( European Football Association ) for the World Soccer Bid in 2018 in the Netherlands. 3.4.2.4 Government, provincial and local political relations The organisation commission has to understand the bureaucratism of the authorities, provincial and local political relations. Besides, they have to put in this relationship. The organisation of the athletics event will be guarantee that there is a desire and support of the ( local ) authorities to procure the international athletics event for their state and part. A authorities relation s expert can be of added value for a command squad and its political support. First of all support from politicals is of import for procuring important resources such as physical, fiscal and human resources. Second, the support is needed for political and fiscal stableness of the hosting state in relation to the longer-term ends and policies of the authorities that will lend to the quality of the athletics event ( Westerbeek, Turner A ; Ingerson, 2002 ) . 3.5 Bidding procedure The command procedure is for every international athletics event different. This can differ significantly, depending on the sort of event. There is a difference between command for the Olympic Games or World Cup Baseball. Emery ( 1997 ) concluded that there seems to be a generic command procedure which can be used for all sort of athletics events that require a command. The environment of an international athletics event is really complex and involves different elements: resource, organisational and proficient complexness ( Maylor, 1996 ) . Harmonizing to the research of Emery ( 2002 ) the command procedure will last minimally one twelvemonth with three different organisational phases ( figure 2 ) . First of wholly, the group willing to take part in the command procedure should acquire blessing of the local council. Second, the group should convert the national athletics federation by offering a competitory command, which will go the national command after the blessing. Finally, this national command will be offered to the international athletics commission and this should take to a winning command and therefore the right to host the international athletics event. Figure 2: Basic sum-up of major event organisation relationships and construction ( Emery, 2002 ) Within the three phases, the degree of resource committedness, bureaucratism and engagement of stakeholders rises. When the right to host the international athletics event is officially, the low degree contractors are responsible for the major hazards associated with the event ( Emery, 2002 ) . Getz ( 2001 ) came up with another theory were the focal point is on relationship selling of the command procedure ( figure 3 ) . This theoretical account described the factors that influence a command procedure and a winning scheme. It described the standards for the event proprietor and on the other side the factors that influence the event organisers. Those standards come together and ensue to the command procedure. This theoretical account with the two standards is influenced by different critical success factors. Figure 3: Event command procedure ( Getz, 2001 ) Appendixs Appendix A