Wednesday, November 27, 2019

The rise of the online university

Starting a new venture such as an online university is a risky affair under any circumstance. In fact, the risks are further aggravated when the new venture has few precedents.Advertising We will write a custom assessment sample on The rise of the online university specifically for you for only $16.05 $11/page Learn More In addition to the risks associated with a new venture, an online university must raise capital from cynical sources, hire inexperienced staff, and establish a new market for its services (Greenwood Suddaby, 2006, p.29). This paper will address two problems associated with a novel venture and the different types of legitimacies that need to be garnered in relation to online universities. There are two main challenges that an online university must face in new populations. First, it must devise efficient practices and capabilities under conditions of ambiguity and ignorance. Second, an online university must create relations with an envi ronment that is ignorant to their existence. In nutshell, an online university faces legitimacy issues as it strives to curve a niche in the market. The question that arises is: what is legitimacy? A number of social scientists have given different definitions of legitimacy. According Suchman, legitimacy is â€Å"a generalized perception that the actions of an entity are desirable, proper, or appropriate within some socially constructed system of norms, values†¦and definitions† (1995, p.574). Legitimacy is socially constructed in the sense that it mirrors an analogy between the activities of the legalized entity (online university) and the common values of a particular social group (Suchman, 1995, p.574). There are three main types of organizational legitimacy that are relevant to the existence of an online university. Pragmatic legitimacy entails the direct exchanges between the entity (online university) and its immediate audiences (Suchman, 1995, p.578). It also refer s to the process where the public, main stakeholders, government officials and other influential leaders accept a venture as suitable and right (Aldrich Fiol, 1994, p.648). Moral legitimacy, on the other hand, mirrors a normative assessment of the online university and its activities. It is mainly concerned with whether the activities of the online university support the welfare of the society. Thus, moral legitimacy gives credence to the social welfare of the society over the organization’s self-interests (Thornton Ocasio, 2008, p.103).Advertising Looking for assessment on education? Let's see if we can help you! Get your first paper with 15% OFF Learn More Cognitive legitimacy involves the spread of knowledge concerning a novel technology. It can be ascertained by assessing the level of public knowledge regarding a new technology. An example is the introductions of online universities that have enable millions of students around the world to access education from their homes (Suchman, 1995, p.581). Lack of adequate sociopolitical legitimacy is a major barrier to the introduction of novel technology. For example, online universities may fail to secure approval from vigilant government agencies because the society lacks knowledge about its activities and the related long-term effects (Aldrich Fiol, 1994, p.661). Government agencies can make a major contribution by restructuring the inter-organizational atmosphere of new entities (such as online universities) in order to foster understanding between firms. The methods for developing and sustaining trust, reputation, trust and institutional legitimacy are interrelated. Obtaining the trust of stakeholders within and around the new entity creates a foundation from which to develop a knowledge base through mutual exchange rules with other comparable organizations. These interactions eventually enable member organizations to organize as a group and to create an expansive reputation of their i ndustry as a permanent reality. Trust is an important element that facilitates a smooth flow throughout the legitimacy-building process (Aldrich Fiol, 1994, p.663). References Aldrich, H.E., Fiol, C.M. (1994). Fools rush in? The Institutional Context of Industry Creation. Academy of Management Review, 19, 645-670. Greenwood, R., Suddaby, R. (2006). Institutional Entrepreneurship in Mature Fields: The Big Five Accounting Firms. Academy of Management Journal, 49: 27-48 Suchman, M.C. (1995). Managing Legitimacy: Strategic and Institutional Approaches. Academy of Management Review, 20, 571-610.Advertising We will write a custom assessment sample on The rise of the online university specifically for you for only $16.05 $11/page Learn More Thornton, PH Ocasio, W. (2008). Institutional Logics. New York: Ashgate Publishing. This assessment on The rise of the online university was written and submitted by user Yusuf Robinson to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Saturday, November 23, 2019

Whats it like to work with a ghostwriter on your memoir

Whats it like to work with a ghostwriter on your memoir What's It Like to Work with a Ghostwriter? Well, Let’s Ask One Katy Weitz is an acclaimed UK ghostwriter who has worked for some of the biggest names in publishing including Harper Collins, Simon Schuster, Macmillan and Penguin Random House. In this guest post, she pulls back the curtain to reveal what the collaboration between a ghostwriter and an author  is really like.Just a few days before Christmas last year, I sent an email with the subject line - Your Book: The Full Manuscript - to my latest author Fiona. As I clicked on the send button, I actually grinned. I felt like Saint Nicholas himself, delivering to Fiona the very thing she had dreamed of for so long - her very own memoir. A few months before we had never even heard of one another and yet now, four months down the line, I knew Fiona’s life so intimately that I had been able to ‘become’ her on the page, to structure her story and create a narrative entirely from the interviews she had given me. Together, we had written a book! As always, the whole process s eemed miraculous, even to me, and I knew that Fiona (not her real name) was delighted with the result. I have been on this same journey a dozen times now, and yet it is never less than extraordinary every single time. And though the end result may be a physical thing - a book - it is the process of writing the story that is transformative. That is where the real magic happens; that is why I love what I do. Parts of a Book Explained: Front Matter, Body, and Back Matter Read post And so, with all the chapters written and amended, I put the whole lot together, including the ‘furniture’ of the book - i.e. the contents page, acknowledgments, and dedication - to create the full manuscript. Now it was time for a thorough read to check for pacing, consistency and structural issues. At this point, I can still make quite drastic changes. After all, it is the first time you are reading the book as a whole entity. It must come together in a coherent way. Have we tied up the loose ends? Are the chapters the correct length? Did we explain the background to each character? It takes a bit of time but only after I am completely satisfied will it go to my author and I get to send that wonderful email titled: Your Book: The Full Manuscript.For the author, there may be a few more steps on the road to publication but this is the moment I treasure - and those are the words I never tire of writing.If you have any experiences of working with a ghostwriter - or any questions you'd like to ask Katy - just leave a message in the comments below.

Thursday, November 21, 2019

How do United States special military teams play a role in combatting Research Paper

How do United States special military teams play a role in combatting terrorism, irregular warfare strategy, domestic intelligence gathering, and foreign law assistance - Research Paper Example This commitment of the American government becomes evident from the revamping of the US Special Forces activities in the aftermath of 9/11 terrorist attack by Al-Qaeda. In the wake of this disastrous event, controversies have mounted on the effectiveness of domestic intelligence and the coordination of the activities of existing joint forces. Most of the criticism in this regard has been directed at the intelligence community for its purported failure to warn other agencies of an imminent threat. On the other hand, problems also prevail in other areas and terrorist organizations have been exploiting this vulnerability to wreak havoc on the nation. Thus, an urgent and imperative need has emerged for a dedicated Homeland Security Intelligence (HSI) in the nation to augment the existing intelligence collection system and solidify the functions of security forces. In addition, a necessity has also been felt for further sharpening the cutting edge of operational efficiency of the US Speci al Forces so as to enable them to combat terrorism more effectively. Though there no single definition universally for the term ‘terrorism’ the most commonly accepted definition perceives this phenomenon as the â€Å"use of violence to create fear† to attain political, religious or ideological objectives (Matusitz, 2012, p.4). Thus, terrorist activities, most of the times, are directed at noncombatant civilian population with a view to inflict maximum damage to human life and property so as to create terror and thus propagate their cause amongst the citizens. Terrorist organizations usually function as clandestine entities with a hierarchical system including a leader and other chieftains, â€Å"planners, trainers and actual bombers/killers† (p.4). Most of them are highly educated, motivated, physically competent, and trained in various types of combat tactics as well as electronic and information and communication