SlideShare a Scribd company logo
1 of 50
40 / Rotman Magazine Spring 2007
The vast majority of today’s business decisions
are made with incomplete information and in the face of an
uncer-
tain future. Indeed, with the exception of a reasonable
expectation
that the sun will come up tomorrow, few things in human affairs
can
be predicted with certainty. The term ‘risk management’ has
come
to serve as a set phrase in the financial services industry,
referring
to a formal process for evaluating and controlling a company’s
total
exposure to loss together with estimates of the probability of
loss.
However, this term deserves to be reclaimed to a broader usage,
as
all companies have to deal with risk.
While risk can never be completely avoided, well-trained man-
agers have many ways to take uncertainty into account in their
strategy planning. Successful long-term planning includes a
combi-
nation of the following six techniques.
1. Risk Identification
In most business situations it is remarkably easy to identify the
risks that a firm is facing by simply asking, “What could go
wrong?”
For example, if a product depends on components, the inability
of
a supplier to ship parts when needed is a risk that can be readily
anticipated. Where a firm is attempting to develop a new
technol-
ogy, its research and development efforts will be successful in
achieving desired performance – or not.
This is not to say that all risks can be foreseen. Former U.S.
Defense Secretary Donald Rumsfeld famously observed that
there are both ‘known unknowns’ and ‘unknown unknowns.’ In
a
military situation, he meant that an army might know that its
adversary had troops over the horizon, but not exactly how
many (a
‘known unknown’); and there might be some uncertainty as to
whether the enemy had certain types of weapons (again, a
known
unknown). However, his dictum was meant to alert planners
that,
for all the variables that they could list and worry about, there
would always be some others that could not have been
anticipated
(the ‘unknown unknowns’).
It is hard to describe an ‘unknown unknown’ in business, simply
because it is just that – unknown. However, an example would
be
A Primer on the
Management of
Risk and Uncertainty
By David Robinson
Effective risk management depends on a clear understanding of
what a firm can control and what factors are beyond its control.
Using a combination of the techniques described here can go a
long
way to effective strategic planning in the face of risk.
Strategy
Near Misses
Plan
ROT045
This document is authorized for use only by Familia Herring in
Strategy at Strayer University, 2018.
Rotman Magazine Spring 2007 / 41
something like the emergence of a completely new technology,
such
as the advent of transistors in electronics. The efficiency and
minia-
turization offered by these solid-state devices could not have
been
predicted from the existing development work on thermionic
valves.
How can business leaders plan for the unknown unknown? At
the extreme, they could calculate the cost of project
abandonment
due to unforeseen circumstances. It is usually possible to
imagine
the effects of an unknown unknown, even when a specific cause
cannot be anticipated. For example, prior to 2001, the managers
of
the New York Stock Exchange would have had little reason to
include terrorist attacks in their strategic planning. However,
they
could reasonably plan for ‘something’ (an unknown unknown)
that
would make it impossible for them to use their own trading
floor:
burst water-pipes, bomb threats and catastrophic fires in
neighbor-
ing buildings were reasonably foreseeable as rare-but-possible
events that could interrupt access to their building.
One useful source of ideas for things that can go wrong is ‘near
misses.’ For example, in the loss of the Columbia space shuttle
in
2003, the vehicle broke apart upon re-entry, a problem that had
never been seen before. However, the cause of this disaster was
damage to a heat-shielding tile that in turn was the result of a
strike
by fuel tank insulation that had broken away during the launch.
The
Control
loss of insulation had been observed before, and was a matter of
ongoing concern for NASA engineers.
In the business realm, the hint of a near miss comes when a suc-
cessful tactical maneuver is accompanied by exclamations of,
“phew
– we were lucky!” For example, suppose a firm runs an overly-
gener-
ous mail-in coupon rebate program, but is saved from crippling
expense by the lucky coincidence of a major storm that kept
most
shoppers out of the malls during the time of the promotion. This
is
a clue that in future, the firm could face a predictable loss if
rebate
programs are not more carefully planned and controlled.
2. Risk Assessment
There are several ways to take risks into account and develop
ways
to manage them. The first step is to consider when trend shifts
and
adverse events might occur, and then to make an assessment of
the
severity of the impact of these future states. Once risks have
been
identified, the impact of each can be assessed and assigned to
one
of three categories: noticeable, moderate and severe.
‘Noticeable’ events are things such as the market entry of a
small competitor with an offering that appeals to a market
niche;
the competitor’s eventual entry has been predicted, and as long
as
the competitor stays in its narrow market, there is a measurable-
but-small loss in sales that requires no particular response.
Events
that have moderate impact might include the failure of a
supplier in
a market with many generic alternatives, or the entry of a
competi-
tor with equivalent technology. A catastrophic impact would be
something that makes the current strategy infeasible, such as the
Unknown Unknowns
This document is authorized for use only by Familia Herring in
Strategy at Strayer University, 2018.
42 / Rotman Magazine Spring 2007
overturning of a patent or the emergence of a severe side effect
to
a drug – as happened to Merck with the Vioxx painkiller.
When these dimensions have been added to the list of risks,
they can be organized into a matrix that gives general guidance
for
how to manage them, as shown in Figure 1. Consider first the
col-
umn of ‘immediate-impact events.’ Few firms have to face a
catastrophic event with little warning. Terrorist attacks and the
outbreak of civil war certainly count in this category – but
thank-
fully, these are rare.
Where there is a change in the environment that has an imme-
diate impact that is moderate, the prudent managerial course of
action is to quickly shift additional resources to the current
strate-
gy. For example, when a major competitor enters a firm’s
principal
market, a substantial investment in promotional spending (and a
new advertising approach emphasizing either a defensible core
position or direct comparison) is likely warranted.
In the case of an immediate event that is assessed to have a
merely ‘noticeable’ impact, firms should continue with the
strategy
already in place and make only moderate adjustments. For
example,
suppose a niche-player enters a firm’s established market. The
firm
would continue the same level of promotional spending, but
might
retrain salespeople with new talking points to specifically
address
the competition. The key to success here is in correctly
assessing an
impact as ‘noticeable,’ but not over-reacting. Temporary promo-
tional pricing by close competitors is an example of such a
situation
that should not require a complete rethinking of strategy.
In the intermediate time horizon, where the risk to the firm is
not imminent, the key success factor is to anticipate the risks to
cur-
rent strategy and then identify and monitor the relevant metrics.
For example, it is often anticipated that a firm’s customers will
migrate from one technology to another at some unknown point
in
the future. Prudent managers will handle this by surveying
customer
interest and monitoring the pricing of competing technology.
For
example, for many years manufacturers of cathode ray tube
comput-
er monitors were well aware that flat panel displays would
eventual-
ly take over their business. However, early flat panels were very
expensive. There was no way to predict whether the change-
over
would be sudden (as happened with adoption of home use of the
Internet) or would occur only as consumers replaced their
comput-
ers (about once every four years). As long as careful
observation is in
place and managers are not complacent, a firm can take some
time
to develop alternate strategies.
Where the intermediate future includes some possibly-cata-
strophic events, managers should test strategies against the cost
of
project abandonment. For example, in the tourism and
hospitality
industry, avian influenza or other contagious diseases might
close
down all intercontinental travel for a period of time. The
prudent
course in the face of such a risk is to avoid over-investment that
would ‘bet the company’ on one project.
When threats are far distant, the best approach is to have a
comprehensive view of strategy planning and to fully explore
all the
options available. This is especially true in the middle case,
where
perceived adverse events are likely to have a moderate impact
on
the company’s operations. Where the impact will be
catastrophic,
the firm should have an exit strategy in mind. Often this will
simply
be the abandonment of a specific market, with investment-to-
date
treated as a sunk cost. For far-distant threats that are likely to
have
only a minimal impact on the firm, identification of the relevant
metrics – such as market share or consumer sentiment – and
regu-
lar monitoring are all that is required.
3. Risk Tolerance and Diversification
All firms and their management teams have a certain tolerance
for
risk, usually tied to the company’s age, with young companies
often willing to bet their entire net worth on a single strategy,
while
more mature firms may become positively risk averse. Between
these two extremes, many firms actively manage their exposure
to
risk through a ‘portfolio approach.’
Investors are familiar with the portfolio approach to investing,
whereby they tolerate owning risky instruments by only putting
a
portion of their net worth into each one. A well-balanced
portfolio is
one with investments in many different industries, so that an
adverse
event that affects one investment will not impact the others.
Firms
use the same portfolio approach for projects, especially those
associ-
ated with new product development. A simple product
modification
to adapt a product to an existing market is low risk, whereas
entering
a new industry with no developed market is very high risk.
Under a portfolio approach, a firm would not completely avoid
high-risk projects, but would limit the number of such projects
that
it undertakes simultaneously, balancing them with low-
risk/moder-
ate-reward projects. For example, a firm with too many high-
risk
projects might license out some patents to other firms to avoid
the
expenses and risks of new product introduction for some lines
of
business, while concentrating on the in-house launch of other
ideas.
4. Risk Transfer
When risk can be clearly identified, one way to eliminate it is to
transfer it to another entity. For example, almost all
homeowners
transfer the risk of loss of their house by fire to an insurance
com-
CATASTROPHIC Abandon Manage with Plan an
current strategy this in mind – exit strategy
and develop a don’t
new one over-invest
MODERATE Shift Pre-plan an Research
significant appropriate strategy
resources to reaction options
counter
NOTICEABLE Modest change Plan a Develop
in resource possible metrics
allocation resource shift and monitor
NOW SOON FAR DISTANT
Approaches to risk management
based on immediacy and impact
Strategy
Effect
Figure 1
This document is authorized for use only by Familia Herring in
Strategy at Strayer University, 2018.
Rotman Magazine Spring 2007 / 43
pany. Similarly, commodity producers can transfer the risk of
price declines by trading in the futures markets to lock in a
price
and commodity users can avoid price shocks by purchasing
future
contracts. Southwest Airlines used this technique to avoid a rise
in jet fuel prices in 2005. Firms whose strategies are impacted
by
foreign currency exchange variations can reduce their risk by
hedging transactions.
Changes in ownership structure can also reduce risk. For exam-
ple, a company that sells its headquarters building to a real-
estate
investor and then leases back the building transfers the risk of
future value of the building to the investor. Taking on a joint
ven-
ture partner can reduce a firm’s capital exposure to a risky new
market. For example LG.Philips LCD is a a joint venture
between
South Korea’s LG Electronics Inc. and Royal Philips
Electronics
NV of the Netherlands. It spreads the risk of loss from the
massive
investment needed to set up a flat-panel TV manufacturing
facility,
when consumer adoption of the new technology was unknown.
So why don’t firms simply transfer away all their risk? First,
there is no insurance or hedging that will protect against what is
called ‘ordinary business risk,’ such as the risk that consumers
won’t
like a new product. Second, all insurance comes at a price.
When
Southwest hedged its fuel costs, JetBlue, an airline with a
similar
business model, guessed that fuel prices would decline and
decided
not to purchase future contracts. The firm that engages in sale-
and-
lease back gives up the possibility of a capital return on the
asset,
and a firm that engages in a joint venture gives up part of future
profits. In sum, risk transfer is never without cost.
5. Scenario Analysis
In his seminal text Competitive Strategy, Michael Porter wrote:
“The device of scenarios is a particularly useful tool in
emerging
industries. Scenarios are discrete, internally-consistent views of
how the world will look in the future.”
Scenario planning can be contrasted with forecasting, where
careful analysis of historic data is used to offer a precise
estimate of
a parameter in the future, such as the specific level of demand
for a
firm’s product. Unfortunately, precise numeric estimates often
give
a false sense of certainty of what the future will be like. For
exam-
ple, the worldwide demand for domestic-use DVD recorders in
2005 was estimated at 47 million units, but in fact only about
three
million were sold.
The difficulty of extending trends into the future can also be
illustrated with the example of the market opportunity that has
opened up due to the increasing number of Americans who are
obese. Furniture manufacturers and hospital equipment
suppliers
have adapted designs that accommodate people of high body
weight. But will the trend continue? From 1980 to 2006, the
num-
ber of obese Americans rose from 23 to 60 million people: but
does
that mean that we can expect an additional 37 million obese
cus-
tomers in the next 26 years, or will the trend reverse itself due
to
cultural shifts and new treatments for obesity?
The process of constructing scenarios is fairly simple. First,
identify the relevant variables, then identify whether they are
dis-
crete or continuous. Next, gather the variables together to make
specific ‘scenarios.’ Remember that Porter said that scenarios
must
be discrete and internally-consistent. That means that one
scenario
cannot overlap another, and ideally all possible futures can be
described within the list of scenarios. The requirement for
internal
consistency may eliminate some scenarios entirely. For
example, if
the economy is in deep recession, it’s unlikely that consumer
spending will be high.
Coming up with a manageable, discreet set of scenarios is not
as difficult as it sounds, because of likely links between
variables.
Consider the situation faced by film maker Kodak in the early
1990s. Effective digital camera technology had just been
announced, and the uncertain future contained these
possibilities:
(a) Digital cameras remain expensive and are only adopted in
professional markets;
(b) over a long period of time, digital cameras are adopted by
professionals and a small number of ‘serious amateurs,’ and the
price of components remains high;
(c) digital cameras move to the mainstream over several decades
(similar to the adoption of automatic transmission in U.S. cars
from 1940 to 1960) and prices of components gradually fall;
(d) ‘Grandma goes digital’: fast and broad adoption of the digi-
tal format accompanied by a sharp decrease in use of film
cameras and a lowering in component costs for digital cameras.
Note that while the cost of components for cameras was uncer-
tain 15 years ago, it was reasonably predictable that with
mass-market adoption would come manufacturing inefficiencies
resulting in lower prices. As a result the possibility: “Everyone
wants
one and the prices go sky high,” is not in the set of likely
scenarios.
Once the scenarios have been identified and labeled, it is pru-
dent to make an estimate of the likelihood of each one. For
discrete
variables, when there is no credible external information, each
out-
come is equally likely. For example, the chance that a
competitor
will or will not decide to offer a product in a particular category
should be estimated at 50 per cent. However, if the competitor
has
signaled intentions (“We find Asian markets particularly
attractive
for future growth”), then the probability of market entry could
be
estimated higher, say 80 per cent. For continuous variables,
such as
growth of the economy, planners can use intuition or the
average
1. List the critical variables
2. Constrain continuous variables into low, medium and high
values
3. Combine variables and eliminate implausible groupings
4. Give easy-to-remember names to each scenario
5. Estimate the likelihood of each scenario
6. Develop a concise but exhaustive list of possible strategies
7. Assess the likely payoff for each strategy against each
scenario
8. Develop an algorithm to choose such as minimum acceptable
pay-
off, maximum tolerable loss
9. Select a strategy and re-test it using regret analysis
Steps in scenario planning Figure 2
This document is authorized for use only by Familia Herring in
Strategy at Strayer University, 2018.
44 / Rotman Magazine Spring 2007
value of published experts’ opinions (individual expert’s
opinions
are often wrong, and ‘consensus’ of experts who listen to each
other’s forecasts are not particularly reliable.)
Fortunately, if scenario planning is done correctly, estimating
which scenario is most likely is the least important part of the
process. Rather, managers must try to choose a strategy that
will be
beneficial no matter which scenario plays out.
6. Regret Analysis
This essentially entails a ‘re-check’ of the attractiveness of the
cho-
sen strategy. When a viable strategy has emerged, it should be
con-
sidered a ‘candidate’ for the firm’s planning, and managers
should
conduct one last survey of all the options that have been
eliminat-
ed and reassess them to evaluate ‘regret.’ Regret analysis is a
form
of protection against biases that tend to creep in when planners
begin to believe with certainty the likelihood of one scenario.
As an example, imagine a company that is considering selling
software in the China. A major unknown about the future is
whether
the Chinese government will strictly enforce intellectual-
property
protection. A reasonable extrapolation from historic experience
is
that despite top government commitment to enforcement, there
is
still rampant piracy of computer software (more than 96 per
cent of
programs in use have been pirated). A thorough scenario
analysis
suggests that no strategy for market entry (high price, high
price and
economy versions, economy version only) can lead to any
reasonable
payoff for the foreseeable future.
However, what does regret analysis tell us? One scenario,
though extremely unlikely, is that the future includes a fail-safe
method to prevent the copying of software. Competitors who
entered early have achieved brand recognition and our firm’s
belat-
ed entry would be shut out of an emerging profitable market.
The
level of regret would be high. After the regret analysis, the firm
takes another look at the market entry strategies, and chooses
the
one with the best chance of establishing a recognized brand,
albeit
at little immediate incremental profit.
In Closing
Effective decision making depends on managers clearly under-
standing what their firm can control and what factors are
beyond
its control. The systematic identification and assessment of risk,
a
frank discussion of risk tolerance, and the use of a variety of
the
techniques described here can go a long way to achieving
effective
strategic planning in the face of risk.
David Robinson teaches Marketing at the Haas School of
Business, University of California, Berkeley, and has also
taught
at the Stanford Graduate School of Business. He writes a
weekly business column for The San Francisco Chronicle.
A longer version of this article is available on his Web site at
http://faculty.haas.berkeley.edu/robinson
R E U N I O N 2 O O 7
This document is authorized for use only by Familia Herring in
Strategy at Strayer University, 2018.
<<
/ASCII85EncodePages false
/AllowTransparency false
/AutoPositionEPSFiles true
/AutoRotatePages /None
/Binding /Left
/CalGrayProfile (Gray Gamma 2.2)
/CalRGBProfile (sRGB IEC61966-2.1)
/CalCMYKProfile (U.S. Web Coated 050SWOP051 v2)
/sRGBProfile (sRGB IEC61966-2.1)
/CannotEmbedFontPolicy /Error
/CompatibilityLevel 1.3
/CompressObjects /Off
/CompressPages true
/ConvertImagesToIndexed true
/PassThroughJPEGImages true
/CreateJDFFile false
/CreateJobTicket false
/DefaultRenderingIntent /Default
/DetectBlends true
/DetectCurves 0.0000
/ColorConversionStrategy /LeaveColorUnchanged
/DoThumbnails true
/EmbedAllFonts true
/EmbedOpenType false
/ParseICCProfilesInComments true
/EmbedJobOptions true
/DSCReportingLevel 0
/EmitDSCWarnings false
/EndPage -1
/ImageMemory 1048576
/LockDistillerParams true
/MaxSubsetPct 99
/Optimize true
/OPM 1
/ParseDSCComments true
/ParseDSCCommentsForDocInfo true
/PreserveCopyPage true
/PreserveDICMYKValues true
/PreserveEPSInfo true
/PreserveFlatness true
/PreserveHalftoneInfo false
/PreserveOPIComments false
/PreserveOverprintSettings true
/StartPage 1
/SubsetFonts false
/TransferFunctionInfo /Preserve
/UCRandBGInfo /Remove
/UsePrologue false
/ColorSettingsFile ()
/AlwaysEmbed [ true
/AgencyFB-Bold
/AgencyFB-Reg
/AgfaRotisSemiSerif
/AgfaRotisSemiSerif-Bold
/AgfaRotisSerif
/AgfaRotisSerif-Bold
/AgfaRotisSerif-Italic
/AllegroBT-Regular
/AmerTypewriterITCbyBT-Medium
/Arial-Black
/Arial-BlackItalic
/Arial-BoldItalicMT
/Arial-BoldMT
/Arial-ItalicMT
/ArialMT
/ArialNarrow
/ArialNarrow-Bold
/ArialNarrow-BoldItalic
/ArialNarrow-Italic
/ArialRoundedMTBold
/ArialUnicodeMS
/AvantGardeITCbyBT-Book
/AvantGardeITCbyBT-BookOblique
/AvantGardeITCbyBT-Medium
/AvantGardeITCbyBT-MediumOblique
/BankGothicBT-Medium
/Batang
/BatangChe
/BenguiatITCbyBT-Bold
/BernhardFashionBT-Regular
/BernhardModernBT-Bold
/BernhardModernBT-BoldItalic
/BlackadderITC-Regular
/BodoniMT
/BodoniMTBlack
/BodoniMTBlack-Italic
/BodoniMT-Bold
/BodoniMT-BoldItalic
/BodoniMTCondensed
/BodoniMTCondensed-Bold
/BodoniMTCondensed-BoldItalic
/BodoniMTCondensed-Italic
/BodoniMT-Italic
/BookAntiqua
/BookAntiqua-Bold
/BookAntiqua-BoldItalic
/BookAntiqua-Italic
/BookmanOldStyle
/BookmanOldStyle-Bold
/BookmanOldStyle-BoldItalic
/BookmanOldStyle-Italic
/BookshelfSymbolSeven
/BradleyHandITC
/BremenBT-Bold
/CalisMTBol
/CalistoMT
/CalistoMT-BoldItalic
/CalistoMT-Italic
/Castellar
/Century
/CenturyGothic
/CenturyGothic-Bold
/CenturyGothic-BoldItalic
/CenturyGothic-Italic
/CenturySchoolbook
/CenturySchoolbook-Bold
/CenturySchoolbook-BoldItalic
/CenturySchoolbook-Italic
/CharlesworthBold
/ComicSansMS
/ComicSansMS-Bold
/CopperplateGothic-Bold
/CopperplateGothicBT-Bold
/CopperplateGothic-Light
/CourierNewPS-BoldItalicMT
/CourierNewPS-BoldMT
/CourierNewPS-ItalicMT
/CourierNewPSMT
/CurlzMT
/DauphinPlain
/Dotum
/DotumChe
/EdwardianScriptITC
/Elephant-Italic
/Elephant-Regular
/English111VivaceBT-Regular
/EngraversMT
/ErasITC-Bold
/ErasITC-Demi
/ErasITC-Light
/ErasITC-Medium
/EstrangeloEdessa
/FelixTitlingMT
/ForteMT
/FranklinGothic-Book
/FranklinGothic-BookItalic
/FranklinGothic-Demi
/FranklinGothic-DemiCond
/FranklinGothic-DemiItalic
/FranklinGothic-Heavy
/FranklinGothic-HeavyItalic
/FranklinGothic-Medium
/FranklinGothic-MediumCond
/FranklinGothic-MediumItalic
/FrenchScriptMT
/FuturaBlackBT-Regular
/FuturaBT-Bold
/FuturaBT-BoldItalic
/FuturaBT-ExtraBlack
/FuturaBT-Light
/FuturaBT-LightItalic
/Garamond
/Garamond-Bold
/Garamond-Italic
/Gautami
/Georgia
/Georgia-Bold
/Georgia-BoldItalic
/Georgia-Italic
/Gigi-Regular
/GillSansMT
/GillSansMT-Bold
/GillSansMT-BoldItalic
/GillSansMT-Condensed
/GillSansMT-ExtraCondensedBold
/GillSansMT-Italic
/GillSans-UltraBold
/GillSans-UltraBoldCondensed
/GloucesterMT-ExtraCondensed
/GoudyHandtooledBT-Regular
/GoudyOldStyleBT-Bold
/GoudyOldStyleBT-BoldItalic
/GoudyOldStyleBT-Italic
/GoudyOldStyleBT-Roman
/GoudyOldStyleT-Bold
/GoudyOldStyleT-Italic
/GoudyOldStyleT-Regular
/GoudyStout
/Gulim
/GulimChe
/Gungsuh
/GungsuhChe
/Haettenschweiler
/Helvetica
/Helvetica-Bold
/Helvetica-BoldOblique
/Helvetica-Narrow
/Helvetica-Narrow-Bold
/Helvetica-Narrow-BoldOblique
/Helvetica-Narrow-Oblique
/Helvetica-Oblique
/Humanist521BT-Bold
/Humanist521BT-BoldItalic
/Humanist521BT-Italic
/Humanist521BT-Roman
/Impact
/ImprintMT-Shadow
/KabelITCbyBT-Book
/KabelITCbyBT-Ultra
/Kartika
/Latha
/Lithograph-Bold
/LithographLight
/LucidaConsole
/LucidaSans
/LucidaSans-Demi
/LucidaSans-DemiItalic
/LucidaSans-Italic
/LucidaSans-Typewriter
/LucidaSans-TypewriterBold
/LucidaSans-TypewriterBoldOblique
/LucidaSans-TypewriterOblique
/LucidaSansUnicode
/MaiandraGD-Regular
/Mangal-Regular
/MicrosoftSansSerif
/MingLiU
/MonotypeCorsiva
/MS-Gothic
/MS-Mincho
/MSOutlook
/MS-PGothic
/MS-PMincho
/MSReferenceSansSerif
/MSReferenceSpecialty
/MS-UIGothic
/MT-Extra
/MVBoli
/NSimSun
/OCRAExtended
/OzHandicraftBT-Roman
/PalaceScriptMT
/Palatino-Bold
/Palatino-BoldItalic
/Palatino-Italic
/PalatinoLinotype-Bold
/PalatinoLinotype-BoldItalic
/PalatinoLinotype-Italic
/PalatinoLinotype-Roman
/Palatino-Roman
/Papyrus-Regular
/Perpetua
/Perpetua-Bold
/Perpetua-BoldItalic
/Perpetua-Italic
/PerpetuaTitlingMT-Bold
/PerpetuaTitlingMT-Light
/PMingLiU
/PosterBodoniBT-Roman
/Pristina-Regular
/Raavi
/RageItalic
/Rockwell
/Rockwell-Bold
/Rockwell-BoldItalic
/Rockwell-Condensed
/Rockwell-CondensedBold
/Rockwell-ExtraBold
/Rockwell-Italic
/ScriptMTBold
/SerifaBT-Bold
/SerifaBT-Italic
/SerifaBT-Roman
/SerifaBT-Thin
/Shruti
/SimHei
/SimSun
/SouvenirITCbyBT-Demi
/SouvenirITCbyBT-DemiItalic
/SouvenirITCbyBT-Light
/SouvenirITCbyBT-LightItalic
/Staccato222BT-Regular
/Swiss911BT-ExtraCompressed
/Sylfaen
/SymbolMT
/Tahoma
/Tahoma-Bold
/TimesNewRomanPS-BoldItalicMT
/TimesNewRomanPS-BoldMT
/TimesNewRomanPS-ItalicMT
/TimesNewRomanPSMT
/Trebuchet-BoldItalic
/TrebuchetMS
/TrebuchetMS-Bold
/TrebuchetMS-Italic
/Tunga-Regular
/TwCenMT-Bold
/TwCenMT-BoldItalic
/TwCenMT-Condensed
/TwCenMT-CondensedBold
/TwCenMT-CondensedExtraBold
/TwCenMT-Italic
/TwCenMT-Regular
/TypoUprightBT-Regular
/Verdana
/Verdana-Bold
/Verdana-BoldItalic
/Verdana-Italic
/Vrinda
/Webdings
/Wingdings2
/Wingdings3
/Wingdings-Regular
/WP-ArabicScriptSihafa
/WP-ArabicSihafa
/WP-BoxDrawing
/WP-CyrillicA
/WP-CyrillicB
/WP-GreekCentury
/WP-GreekCourier
/WP-GreekHelve
/WP-HebrewDavid
/WP-IconicSymbolsA
/WP-IconicSymbolsB
/WP-Japanese
/WP-MathA
/WP-MathB
/WP-MathExtendedA
/WP-MathExtendedB
/WP-MultinationalAHelve
/WP-MultinationalARoman
/WP-MultinationalBCourier
/WP-MultinationalBHelve
/WP-MultinationalBRoman
/WP-MultinationalCourier
/WP-Phonetic
/WPTypographicSymbols
]
/NeverEmbed [ true
]
/AntiAliasColorImages false
/CropColorImages true
/ColorImageMinResolution 150
/ColorImageMinResolutionPolicy /OK
/DownsampleColorImages false
/ColorImageDownsampleType /Bicubic
/ColorImageResolution 600
/ColorImageDepth -1
/ColorImageMinDownsampleDepth 1
/ColorImageDownsampleThreshold 1.50000
/EncodeColorImages false
/ColorImageFilter /DCTEncode
/AutoFilterColorImages true
/ColorImageAutoFilterStrategy /JPEG
/ColorACSImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/ColorImageDict <<
/QFactor 0.76
/HSamples [2 1 1 2] /VSamples [2 1 1 2]
>>
/JPEG2000ColorACSImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 15
>>
/JPEG2000ColorImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 15
>>
/AntiAliasGrayImages false
/CropGrayImages true
/GrayImageMinResolution 150
/GrayImageMinResolutionPolicy /OK
/DownsampleGrayImages false
/GrayImageDownsampleType /Bicubic
/GrayImageResolution 600
/GrayImageDepth -1
/GrayImageMinDownsampleDepth 2
/GrayImageDownsampleThreshold 1.00000
/EncodeGrayImages false
/GrayImageFilter /DCTEncode
/AutoFilterGrayImages true
/GrayImageAutoFilterStrategy /JPEG
/GrayACSImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/GrayImageDict <<
/QFactor 0.76
/HSamples [2 1 1 2] /VSamples [2 1 1 2]
>>
/JPEG2000GrayACSImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 15
>>
/JPEG2000GrayImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 15
>>
/AntiAliasMonoImages false
/CropMonoImages true
/MonoImageMinResolution 1200
/MonoImageMinResolutionPolicy /OK
/DownsampleMonoImages false
/MonoImageDownsampleType /Bicubic
/MonoImageResolution 600
/MonoImageDepth -1
/MonoImageDownsampleThreshold 1.50000
/EncodeMonoImages false
/MonoImageFilter /CCITTFaxEncode
/MonoImageDict <<
/K -1
>>
/AllowPSXObjects false
/CheckCompliance [
/None
]
/PDFX1aCheck false
/PDFX3Check false
/PDFXCompliantPDFOnly false
/PDFXNoTrimBoxError true
/PDFXTrimBoxToMediaBoxOffset [
0.00000
0.00000
0.00000
0.00000
]
/PDFXSetBleedBoxToMediaBox true
/PDFXBleedBoxToTrimBoxOffset [
0.00000
0.00000
0.00000
0.00000
]
/PDFXOutputIntentProfile (None)
/PDFXOutputConditionIdentifier ()
/PDFXOutputCondition ()
/PDFXRegistryName ()
/PDFXTrapped /False
/Description <<
/CHS
<FEFF4f7f75288fd94e9b8bbe5b9a521b5efa76840020004100640
06f006200650020005000440046002065876863900275284e8e55
464e1a65876863768467e5770b548c62535370300260a853ef4ee5
4f7f75280020004100630072006f0062006100740020548c002000
410064006f0062006500200052006500610064006500720020003
5002e003000204ee553ca66f49ad87248672c676562535f00521b5
efa768400200050004400460020658768633002>
/CHT
<FEFF4f7f752890194e9b8a2d7f6e5efa7acb76840020004100640
06f006200650020005000440046002065874ef69069752865bc66
6e901a554652d965874ef6768467e5770b548c52175370300260a
853ef4ee54f7f75280020004100630072006f00620061007400205
48c002000410064006f0062006500200052006500610064006500
7200200035002e003000204ee553ca66f49ad87248672c4f86958b
555f5df25efa7acb76840020005000440046002065874ef63002>
/DAN
<FEFF004200720075006700200069006e0064007300740069006
c006c0069006e006700650072006e0065002000740069006c0020
006100740020006f0070007200650074007400650020004100640
06f006200650020005000440046002d0064006f006b0075006d00
65006e007400650072002c0020006400650072002000650067006
e006500720020007300690067002000740069006c002000640065
00740061006c006a006500720065007400200073006b00e600720
06d007600690073006e0069006e00670020006f00670020007500
640073006b007200690076006e0069006e0067002000610066002
00066006f0072007200650074006e0069006e006700730064006f
006b0075006d0065006e007400650072002e00200044006500200
06f00700072006500740074006500640065002000500044004600
2d0064006f006b0075006d0065006e0074006500720020006b006
1006e002000e50062006e00650073002000690020004100630072
006f00620061007400200065006c006c006500720020004100630
072006f0062006100740020005200650061006400650072002000
35002e00300020006f00670020006e0079006500720065002e>
/DEU
<FEFF00560065007200770065006e00640065006e00200053006
90065002000640069006500730065002000450069006e00730074
0065006c006c0075006e00670065006e0020007a0075006d00200
0450072007300740065006c006c0065006e00200076006f006e00
2000410064006f006200650020005000440046002d0044006f006
b0075006d0065006e00740065006e002c00200075006d00200065
0069006e00650020007a0075007600650072006c00e4007300730
0690067006500200041006e007a00650069006700650020007500
6e00640020004100750073006700610062006500200076006f006
e00200047006500730063006800e40066007400730064006f006b
0075006d0065006e00740065006e0020007a00750020006500720
07a00690065006c0065006e002e00200044006900650020005000
440046002d0044006f006b0075006d0065006e007400650020006
b00f6006e006e0065006e0020006d006900740020004100630072
006f00620061007400200075006e0064002000520065006100640
065007200200035002e003000200075006e00640020006800f600
680065007200200067006500f600660066006e006500740020007
70065007200640065006e002e>
/ESP
<FEFF005500740069006c0069006300650020006500730074006
100200063006f006e0066006900670075007200610063006900f3
006e0020007000610072006100200063007200650061007200200
064006f00630075006d0065006e0074006f007300200064006500
2000410064006f006200650020005000440046002000610064006
50063007500610064006f00730020007000610072006100200076
0069007300750061006c0069007a00610063006900f3006e00200
06500200069006d0070007200650073006900f3006e0020006400
6500200063006f006e006600690061006e007a006100200064006
500200064006f00630075006d0065006e0074006f007300200063
006f006d00650072006300690061006c00650073002e002000530
065002000700075006500640065006e0020006100620072006900
7200200064006f00630075006d0065006e0074006f00730020005
000440046002000630072006500610064006f007300200063006f
006e0020004100630072006f006200610074002c0020004100640
06f00620065002000520065006100640065007200200035002e00
3000200079002000760065007200730069006f006e00650073002
00070006f00730074006500720069006f007200650073002e>
/FRA
<FEFF005500740069006c006900730065007a002000630065007
30020006f007000740069006f006e00730020006100660069006e
00200064006500200063007200e90065007200200064006500730
0200064006f00630075006d0065006e0074007300200041006400
6f006200650020005000440046002000700072006f00660065007
300730069006f006e006e0065006c007300200066006900610062
006c0065007300200070006f007500720020006c0061002000760
069007300750061006c00690073006100740069006f006e002000
6500740020006c00270069006d007000720065007300730069006
f006e002e0020004c0065007300200064006f00630075006d0065
006e00740073002000500044004600200063007200e900e900730
02000700065007500760065006e0074002000ea00740072006500
20006f007500760065007200740073002000640061006e0073002
0004100630072006f006200610074002c002000610069006e0073
0069002000710075002700410064006f006200650020005200650
06100640065007200200035002e00300020006500740020007600
65007200730069006f006e007300200075006c007400e90072006
900650075007200650073002e>
/ITA (Utilizzare queste impostazioni per creare documenti
Adobe PDF adatti per visualizzare e stampare documenti
aziendali in modo affidabile. I documenti PDF creati possono
essere aperti con Acrobat e Adobe Reader 5.0 e versioni
successive.)
/JPN
<FEFF30d330b830cd30b9658766f8306e8868793a304a30883073
53705237306b90693057305f002000410064006f0062006500200
050004400460020658766f8306e4f5c6210306b4f7f75283057307
e305930023053306e8a2d5b9a30674f5c62103055308c305f00200
05000440046002030d530a130a430eb306f300100410063007200
6f0062006100740020304a30883073002000410064006f0062006
5002000520065006100640065007200200035002e003000204ee5
964d3067958b304f30533068304c3067304d307e3059300230533
06e8a2d5b9a3067306f30d530a930f330c8306e57cb30818fbc307f
3092884c3044307e30593002>
/KOR
<FEFFc7740020c124c815c7440020c0acc6a9d558c5ec0020be44
c988b2c8c2a40020bb38c11cb97c0020c548c815c801c73cb85c00
20bcf4ace00020c778c1c4d558b2940020b3700020ac00c7a50020
c801d569d55c002000410064006f0062006500200050004400460
020bb38c11cb97c0020c791c131d569b2c8b2e4002e0020c774b8
07ac8c0020c791c131b41c00200050004400460020bb38c11cb29
40020004100630072006f0062006100740020bc0f002000410064
006f00620065002000520065006100640065007200200035002e0
0300020c774c0c1c5d0c11c0020c5f40020c2180020c788c2b5b2c
8b2e4002e>
/NLD (Gebruik deze instellingen om Adobe PDF-documenten
te maken waarmee zakelijke documenten betrouwbaar kunnen
worden weergegeven en afgedrukt. De gemaakte PDF-
documenten kunnen worden geopend met Acrobat en Adobe
Reader 5.0 en hoger.)
/NOR
<FEFF004200720075006b0020006400690073007300650020006
9006e006e007300740069006c006c0069006e00670065006e0065
002000740069006c002000e50020006f007000700072006500740
0740065002000410064006f006200650020005000440046002d00
64006f006b0075006d0065006e00740065007200200073006f006
d002000650072002000650067006e0065007400200066006f0072
0020007000e5006c006900740065006c006900670020007600690
073006e0069006e00670020006f00670020007500740073006b00
7200690066007400200061007600200066006f007200720065007
4006e0069006e006700730064006f006b0075006d0065006e0074
00650072002e0020005000440046002d0064006f006b0075006d0
065006e00740065006e00650020006b0061006e002000e5007000
6e00650073002000690020004100630072006f006200610074002
00065006c006c00650072002000410064006f0062006500200052
0065006100640065007200200035002e003000200065006c006c0
0650072002e>
/PTB
<FEFF005500740069006c0069007a00650020006500730073006
1007300200063006f006e00660069006700750072006100e700f5
0065007300200064006500200066006f0072006d0061002000610
0200063007200690061007200200064006f00630075006d006500
6e0074006f0073002000410064006f00620065002000500044004
600200061006400650071007500610064006f0073002000700061
0072006100200061002000760069007300750061006c0069007a0
06100e700e3006f002000650020006100200069006d0070007200
650073007300e3006f00200063006f006e0066006900e10076006
50069007300200064006500200064006f00630075006d0065006e
0074006f007300200063006f006d0065007200630069006100690
073002e0020004f007300200064006f00630075006d0065006e00
74006f00730020005000440046002000630072006900610064006
f007300200070006f00640065006d002000730065007200200061
0062006500720074006f007300200063006f006d0020006f00200
04100630072006f006200610074002000650020006f0020004100
64006f00620065002000520065006100640065007200200035002
e0030002000650020007600650072007300f50065007300200070
006f00730074006500720069006f007200650073002e>
/SUO
<FEFF004b00e40079007400e40020006e00e40069007400e4002
000610073006500740075006b007300690061002c0020006b0075
006e0020006c0075006f0074002000410064006f0062006500200
050004400460020002d0064006f006b0075006d0065006e007400
740065006a0061002c0020006a006f0074006b006100200073006
f0070006900760061007400200079007200690074007900730061
007300690061006b00690072006a006f006a0065006e0020006c0
075006f00740065007400740061007600610061006e0020006e00
e400790074007400e4006d0069007300650065006e0020006a006
1002000740075006c006f007300740061006d0069007300650065
006e002e0020004c0075006f00640075007400200050004400460
02d0064006f006b0075006d0065006e0074006900740020007600
6f0069006400610061006e0020006100760061007400610020004
100630072006f0062006100740069006c006c00610020006a0061
002000410064006f0062006500200052006500610064006500720
0200035002e0030003a006c006c00610020006a00610020007500
7500640065006d006d0069006c006c0061002e>
/SVE
<FEFF0041006e007600e4006e00640020006400650020006800e
4007200200069006e0073007400e4006c006c006e0069006e0067
00610072006e00610020006f006d0020006400750020007600690
06c006c00200073006b006100700061002000410064006f006200
650020005000440046002d0064006f006b0075006d0065006e007
400200073006f006d002000700061007300730061007200200066
00f60072002000740069006c006c006600f60072006c006900740
06c006900670020007600690073006e0069006e00670020006f00
6300680020007500740073006b007200690066007400650072002
000610076002000610066006600e4007200730064006f006b0075
006d0065006e0074002e002000200053006b00610070006100640
0650020005000440046002d0064006f006b0075006d0065006e00
740020006b0061006e002000f600700070006e006100730020006
90020004100630072006f0062006100740020006f006300680020
00410064006f00620065002000520065006100640065007200200
035002e00300020006f00630068002000730065006e0061007200
65002e>
/ENU ()
>>
>> setdistillerparams
<<
/HWResolution [600 600]
/PageSize [612.000 792.000]
>> setpagedevice
The Three U.S.-Mexico Border Wars: Drugs, Immigration, and
Homeland Security Book
Report
This book, “The three U.S.-Mexico border wars: drugs,
immigration, and homeland
security” by Tony Payan (2016) is a very insightful book. It
focuses more on the three central
issues that continue to dominate the U.S. - Mexico relationship
today: drugs, immigration, and
security. Interesting is that this book is backed up by various
sources including a[n academic]
journal [article] by Kellner & Pipitone (2010), book by Kan
(2012), and an article by Turbiville
(2010). These mostly serve to reinforce the idea of the author
on the anecdotes throughout his
book. In addition, I loved his book and gained many new
insights that enable me to comprehend
the information about the background of the conflict and the
likely effects. In general, the
[Payan?] book covers the U.S.-Mexico economic relationship,
the deployment of technology, the
bureaucratic interests that control the border landscape, the
democratic deficit, and a detrimental
lack of policy coordination.
One of the many valuable insights I gained from this book is
about the historical
perspective that is necessary to understand today's border
conflicts. It is with the provision of a
detailed, history-based examination of the evolution of current
conditions on the border, that
these revelations aremade. These include: the reason [the
preceding sentences are “throat
clearing” — better to get to the point, eg., “Payan provides
insights into…] why corruption at the
U. S-Mexican border has increased, the reason why Mexico is
now suffering due to the cartels
that have been established at the border. Payan (2016) argues
that they exist due to a steady
growth in the security concerns of the U.S. over almost two
centuries. He also carefully
considers how much September 11th strongly affected U. S-
Mexican as many of the towns and
Comment [1]:
avoid praise that doesn’t convey anything of
substance
Comment [2]:
Make this your lede and then say that Payan (& identify
who he is) devoted his 2016 book to these issues.
Comment [3]:
this doesn’t tell the reader anything of value
Comment [4]:
which conflict?
Comment [5]:
very vague, best not mentioned until you can explain,
or at least refer to this as “what Payan calls a
‘democratic deficit’ between _[year]_ & __[year]___ “
Comment [6]:
better to refer to the specific author
2
cities across the Southwestern side of the U.S. experienced the
consequences of the new security
in the U.S. that is oriented towards the practices and ethos first
hand.
He also indicates that the first priority was to make the border
areas safe through the
prevention of illegal entry which was enhanced by the strict
scrutiny of those getting in
especially through the U.S. - Mexican border. These are among
the aspects that are embodied
within the Homeland Security Act of 2002. Mainly, it is brought
about by the need for its
implementation along the 2100 miles that are found along the
border between U.S. and Mexico.
In the past, there was the optimistic talk that was related to
investment, trade, and the economic
integration in the 1990s in the North America. It is through his
book that I was exposed to the
idea of the "balloon effect". This has been very helpful to me in
understanding both drug
trafficking and undocumented crossing. He has convincingly
shown the need for security and
especially, the need to secure all the points of entry as well as
exit points in the U.S. It is this
strategy that he did convincingly illustrate the comprehensive
security that permeates the three
major wars at the border. These are mainly the war on drugs,
the need for the enforcement of the
immigration laws and the war on terror (Turbiville, 2010).
He also indicates that there have been major effects associated
with the three wars that
take place on the border land. It is in this case that I think they
are very significant as they
include the loss of the local autonomy. He has also highlights
the various conflicts between the
priorities that exist in Washington and those among the local
population. He suggests that this is
powerful information on development of a rigid international
line, which represents some of the
barriers to social, cultural and economic integration among the
communities through the high
Comment [7]:
vague
Comment [8]:
Should not start a paragraph with a pronoun — make
clear who you are referring to
Comment [9]:
eliminate all personal references
Comment [10]:
Comment [11]:
avoid such opinion-sounding descriptions — even if
“unconvincing” can be acceptable when properly
supported
Comment [12]:
Comment [13]:
does he refer to three “wars” — & specifically to
immigration enforcement as “war?
Comment [14]:
Comment [15]:
Comment [16]:
I know of this firsthand but you need to explain
3
level of corruption and cartels among the law enforcement
officers has also become a major
problem.
Moreover, through his penetrating analysis, I am able to
understand why these wars have
become a great source of fear and have also caused suspicion
between the two neighbors. I think
this is what has driven the author to trace the history for the
policies that are enacted at the
border that help in the discernment and the understanding of the
evolutionary patterns that are
common and help in joining the three policies that exist today
together as shown by Kellner &
Pipitone (2010). His argument has been on the gradual
tightening and the increase of militarized
activities at the border throughout its history. It is this powerful
statement that makes it easier to
understand the existence of the restrictive laws that are present
at the border today. The author
makes it clear that the changes that have taken place in relation
to the law enforcement officers
are drastic and have the potential of causing problems not only
to the Mexicans but to the U.S. as
well. This is a worry, and he says relevant and fast measures
need to be taken as soon as possible
to curb the issue and to place the border activities to their
initial state where the Mexicans will no
longer live in fear of the presented effects.
Surprisingly, he creates a picture of the border as a place of
hope in need of better
management rather than reinforcement of the security regime in
the last decade. Therefore, the
book makes an attempt to show me the different ways that the
residents at the border are
suffering and trying to cope with the strict security that is
maintained at the border and the
environment that is filed with the newly formed cartels. His
book also provides the effort to
navigate through their daily lives with the massive increase in
the number of federal bureaucrats
and the many programs that have been designed to close the
border. Specifically, it offers an
Comment [17]: Payan’s (?) analysis allows us to
understand…
Comment [18]:
Comment [19]:
Comment [20]:
whose, now?
Comment [21]:
ok if you say why this is surprising, eg, “After having
explained ______________, Payan (?) surprisingly…
Comment [22]:
4
examination of the evaluation efforts done towards the
understanding of the significant conflict
that exists between the efforts of the government to close the
borders and those of the
communities that live at the border to open it.
In a detailed explanation and elaboration, the book offers an
explanation for the reason
that makes the issue about the U.S.-Mexico border a hot topic
both for the two countries as well
as in other places around the world. In particular, through the
exploration of the focus on the
policy that exists in the U.S. after the September 11 terrorist
attacks he reveals that this idea is
also a contentious one. It is in this regard that through his book,
I am updated on the happenings
that are being experienced at the U.S. – Mexico border and their
causes. According to his
argument the factors are a result of the steady growth [of what?]
that has been present due to the
security concerns that have been held by the U.S. for over two
centuries. In this way, it becomes
possible for him to show that the activities at the border have
gone through several historical
stages that eventually have led to the crippling of the region in
the form of the numerous cartels
in which the law enforcement officers are involved to make the
residents of the region suffer in
fear. Substantially, I feel he has backed up his idea with
relevant example.
The author manages to combine breadth and depth to cover the
economic relationship
that exists between the U.S. and Mexico through the ability to
deploy technology and to cater for
the bureaucratic interests they control the landscape at the
border, the deficit that exists in the
democratic space and the detrimental lack of coordination of the
policies. He explores a number
of the issues that affect the area such as drug trafficking and the
homeland security which is also
considered. Moreover, the book also demonstrates the
contradictory logic that is found within the
internal aspects of the American policy that is established to
cater for the border activities. In this
relation, he provides the argument that the current conditions
are likely to cause the return of the
Comment [23]:
Comment [24]:
Comment [25]:
address?
5
authoritarian rule in Mexico and the concurrent rise of the
sentiments against the Americans
(Kan, 2012).
Payan (2016) indicates that there were presidents in the U.S.
and Mexico who knew each
other and had formed partnerships together before the
September 11 attacks. In particular, he
mentions the time when Bush was the Governor of Texas. He
goes on to show how George W.
Bush and Vicente Fox were involved in the economic activities
and the human costs that would
be realized following the delays at the border. It is through his
couple examples that make the
situation is more human. Further, for this reason, an effort was
made to implement the idea of
having an open border that would be related to the aspect that
was raised by the European
community in order to enhance the integration efforts of their
economies. However, after the
attacks, there was a wayside demolition and fall of the walls.
This was because of the opinion by
the U.S. that there was need for more control regarding the
border and its activities in order to
stop any likely terrorist, the trafficking of illegal drugs as well
as immigrants. In a
methodological way, he points out sound policy separately and
highlights the related folly and
the wasted resources that are directed towards this effort.
All in all, he asserts that the policies in the U.S. are leading to
hostility towards its
neighbors and thus ending up in the detrimental economies of
both countries. This may mean
that the efforts being put up are futile since the U.S. has not
been able to stop the war on drugs
by stopping their flow. Finally, he says that the war on drugs
only acts to enhance the situation as
also expressed by Kellner & Pipitone (2010).
Comment [26]:
be sure to be precise — does he refer to the EC
(European Community) or EU (European Union) or
what? Different names at different times.
Comment [27]:
clarify — “fall of the wall” is taken to mean the Berlin
Wall that fell in 1989 — a dozen years before 9/11
Comment [28]:
I don’t think you’ve given supporting evidence to
justify this language
Comment [29]:
incomprehensibly vague
6
There’s lots to fix, frankly, to make it more readable and allow
a focus on substance. All the self
references, the unhelpful opinionating (mainly excessive
praise), the overuse of pronouns
instead of referring to authors by name — those are all serious
distractions that stand between
the reader and what you may substantively have to say. The
assigned report is not supposed to
be a “book report” but rather a report on the best sources you’ve
found on a particular question
or topic. Taking care of all the needed cleaning up, answering
the questions I raised in the
comments, and balancing the report among several sources
instead of organizing around the
Payan book is plenty to do.
References
Kan, R. P. (2012). Cartels at War: Mexico’s Drug-Fueled
Violence and the Threat to US
National Security. New York: Potomac books.
Kellner, T., & Pipitone, F. (2010). Inside México's drug war.
World Policy Journal, 27(1), 29
37.
Payan, T. (2016). The Three US-Mexico Border Wars: Drugs,
Immigration, and Homeland
Security: Drugs, Immigration, and Homeland Security. ABC-
CLIO.
Turbiville Jr, G. H. (2010). Firefights, raids, and assassinations:
tactical forms of cartel violence
and their underpinnings. Small Wars & Insurgencies, 21(1),
123-144.
40  Rotman Magazine Spring 2007The vast majority of today.docx

More Related Content

Similar to 40 Rotman Magazine Spring 2007The vast majority of today.docx

SUPPLY CHAIN FINANCE IN THE CONTEXT OF WORKING CAPITAL MANAGEMENT
SUPPLY CHAIN FINANCE  IN THE CONTEXT OF  WORKING CAPITAL  MANAGEMENTSUPPLY CHAIN FINANCE  IN THE CONTEXT OF  WORKING CAPITAL  MANAGEMENT
SUPPLY CHAIN FINANCE IN THE CONTEXT OF WORKING CAPITAL MANAGEMENTIgor Zax (Zaks)
 
Strategic risk management
Strategic risk managementStrategic risk management
Strategic risk managementKarim Farag
 
What is Modern Risk Management?
What is Modern Risk Management?What is Modern Risk Management?
What is Modern Risk Management?CTRM Center
 
Risk Monitoring and Management Trends In Commodities
Risk Monitoring and Management Trends In CommoditiesRisk Monitoring and Management Trends In Commodities
Risk Monitoring and Management Trends In CommoditiesCTRM Center
 
ERM -01- Introduction 06-10-2022.pptx
ERM -01- Introduction 06-10-2022.pptxERM -01- Introduction 06-10-2022.pptx
ERM -01- Introduction 06-10-2022.pptxManiPSamRCBS
 
Uncertainty
UncertaintyUncertainty
UncertaintyJan Zika
 
Value Engineering. Measuring and managing risks in the wind energy industry
Value Engineering. Measuring and managing risks in the wind energy industryValue Engineering. Measuring and managing risks in the wind energy industry
Value Engineering. Measuring and managing risks in the wind energy industryStavros Thomas
 
BUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIES
BUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIESBUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIES
BUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIESMark Evans
 
Strategy under uncertainty by
Strategy under uncertainty byStrategy under uncertainty by
Strategy under uncertainty bysunil prasad
 
How well are you managing risk
How well are you managing riskHow well are you managing risk
How well are you managing riskGregg Barrett
 
Global risk management issues
Global risk management issuesGlobal risk management issues
Global risk management issuesDr. Jojo Javier
 
Strategically+Speaking+October+2015
Strategically+Speaking+October+2015Strategically+Speaking+October+2015
Strategically+Speaking+October+2015Andrew Smart
 
Crisis Management in Reverse - Capitalizing on Shocks to the System
Crisis Management in Reverse - Capitalizing on Shocks to the SystemCrisis Management in Reverse - Capitalizing on Shocks to the System
Crisis Management in Reverse - Capitalizing on Shocks to the SystemForte Consultancy Group
 
Crisis And Risk
Crisis And RiskCrisis And Risk
Crisis And Riskkktv
 
Risk Management for New Era - Risk Magazine Spring 2023
Risk Management for New Era - Risk Magazine Spring 2023Risk Management for New Era - Risk Magazine Spring 2023
Risk Management for New Era - Risk Magazine Spring 2023The IRM India
 
Sheet1RISK RESPONSE MATRIXRisk EventReduce ProbabilityReduce Impac.docx
Sheet1RISK RESPONSE MATRIXRisk EventReduce ProbabilityReduce Impac.docxSheet1RISK RESPONSE MATRIXRisk EventReduce ProbabilityReduce Impac.docx
Sheet1RISK RESPONSE MATRIXRisk EventReduce ProbabilityReduce Impac.docxlesleyryder69361
 
New Age HSE Services - Pics Auditing whitepaper
New Age HSE Services - Pics Auditing whitepaperNew Age HSE Services - Pics Auditing whitepaper
New Age HSE Services - Pics Auditing whitepapercraigwillis_newagehse
 

Similar to 40 Rotman Magazine Spring 2007The vast majority of today.docx (20)

SUPPLY CHAIN FINANCE IN THE CONTEXT OF WORKING CAPITAL MANAGEMENT
SUPPLY CHAIN FINANCE  IN THE CONTEXT OF  WORKING CAPITAL  MANAGEMENTSUPPLY CHAIN FINANCE  IN THE CONTEXT OF  WORKING CAPITAL  MANAGEMENT
SUPPLY CHAIN FINANCE IN THE CONTEXT OF WORKING CAPITAL MANAGEMENT
 
Strategic risk management
Strategic risk managementStrategic risk management
Strategic risk management
 
What is Modern Risk Management?
What is Modern Risk Management?What is Modern Risk Management?
What is Modern Risk Management?
 
Q2_09_An Ounce of Prevention_LowRes
Q2_09_An Ounce of Prevention_LowResQ2_09_An Ounce of Prevention_LowRes
Q2_09_An Ounce of Prevention_LowRes
 
Risk Monitoring and Management Trends In Commodities
Risk Monitoring and Management Trends In CommoditiesRisk Monitoring and Management Trends In Commodities
Risk Monitoring and Management Trends In Commodities
 
ERM -01- Introduction 06-10-2022.pptx
ERM -01- Introduction 06-10-2022.pptxERM -01- Introduction 06-10-2022.pptx
ERM -01- Introduction 06-10-2022.pptx
 
Uncertainty
UncertaintyUncertainty
Uncertainty
 
Mtt sap assignment
Mtt   sap assignmentMtt   sap assignment
Mtt sap assignment
 
Value Engineering. Measuring and managing risks in the wind energy industry
Value Engineering. Measuring and managing risks in the wind energy industryValue Engineering. Measuring and managing risks in the wind energy industry
Value Engineering. Measuring and managing risks in the wind energy industry
 
BUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIES
BUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIESBUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIES
BUSINESS RISK IN MEDIUM & LARGE SCALE CORPORATE ENTITIES
 
Strategy under uncertainty by
Strategy under uncertainty byStrategy under uncertainty by
Strategy under uncertainty by
 
How well are you managing risk
How well are you managing riskHow well are you managing risk
How well are you managing risk
 
Global risk management issues
Global risk management issuesGlobal risk management issues
Global risk management issues
 
Risk management
Risk managementRisk management
Risk management
 
Strategically+Speaking+October+2015
Strategically+Speaking+October+2015Strategically+Speaking+October+2015
Strategically+Speaking+October+2015
 
Crisis Management in Reverse - Capitalizing on Shocks to the System
Crisis Management in Reverse - Capitalizing on Shocks to the SystemCrisis Management in Reverse - Capitalizing on Shocks to the System
Crisis Management in Reverse - Capitalizing on Shocks to the System
 
Crisis And Risk
Crisis And RiskCrisis And Risk
Crisis And Risk
 
Risk Management for New Era - Risk Magazine Spring 2023
Risk Management for New Era - Risk Magazine Spring 2023Risk Management for New Era - Risk Magazine Spring 2023
Risk Management for New Era - Risk Magazine Spring 2023
 
Sheet1RISK RESPONSE MATRIXRisk EventReduce ProbabilityReduce Impac.docx
Sheet1RISK RESPONSE MATRIXRisk EventReduce ProbabilityReduce Impac.docxSheet1RISK RESPONSE MATRIXRisk EventReduce ProbabilityReduce Impac.docx
Sheet1RISK RESPONSE MATRIXRisk EventReduce ProbabilityReduce Impac.docx
 
New Age HSE Services - Pics Auditing whitepaper
New Age HSE Services - Pics Auditing whitepaperNew Age HSE Services - Pics Auditing whitepaper
New Age HSE Services - Pics Auditing whitepaper
 

More from tamicawaysmith

(No Plagiarism) Explain the statement Although many leading organi.docx
(No Plagiarism) Explain the statement Although many leading organi.docx(No Plagiarism) Explain the statement Although many leading organi.docx
(No Plagiarism) Explain the statement Although many leading organi.docxtamicawaysmith
 
 What made you choose this career path What advice do you hav.docx
 What made you choose this career path What advice do you hav.docx What made you choose this career path What advice do you hav.docx
 What made you choose this career path What advice do you hav.docxtamicawaysmith
 
 Patient Population The student will describe the patient populati.docx
 Patient Population The student will describe the patient populati.docx Patient Population The student will describe the patient populati.docx
 Patient Population The student will describe the patient populati.docxtamicawaysmith
 
 Dr. Paul Murray  Bessie Coleman  Jean-Bapiste Bell.docx
 Dr. Paul Murray  Bessie Coleman  Jean-Bapiste Bell.docx Dr. Paul Murray  Bessie Coleman  Jean-Bapiste Bell.docx
 Dr. Paul Murray  Bessie Coleman  Jean-Bapiste Bell.docxtamicawaysmith
 
 In depth analysis of your physical fitness progress  Term p.docx
 In depth analysis of your physical fitness progress  Term p.docx In depth analysis of your physical fitness progress  Term p.docx
 In depth analysis of your physical fitness progress  Term p.docxtamicawaysmith
 
 Information systems infrastructure evolution and trends  Str.docx
 Information systems infrastructure evolution and trends  Str.docx Information systems infrastructure evolution and trends  Str.docx
 Information systems infrastructure evolution and trends  Str.docxtamicawaysmith
 
⦁One to two paragraph brief summary of the book. ⦁Who is the.docx
⦁One to two paragraph brief summary of the book. ⦁Who is the.docx⦁One to two paragraph brief summary of the book. ⦁Who is the.docx
⦁One to two paragraph brief summary of the book. ⦁Who is the.docxtamicawaysmith
 
101018, 6(27 PMPage 1 of 65httpsjigsaw.vitalsource.co.docx
101018, 6(27 PMPage 1 of 65httpsjigsaw.vitalsource.co.docx101018, 6(27 PMPage 1 of 65httpsjigsaw.vitalsource.co.docx
101018, 6(27 PMPage 1 of 65httpsjigsaw.vitalsource.co.docxtamicawaysmith
 
100.0 Criteria10.0 Part 1 PLAAFP The PLAAFP thoroughly an.docx
100.0 Criteria10.0 Part 1 PLAAFP The PLAAFP thoroughly an.docx100.0 Criteria10.0 Part 1 PLAAFP The PLAAFP thoroughly an.docx
100.0 Criteria10.0 Part 1 PLAAFP The PLAAFP thoroughly an.docxtamicawaysmith
 
100635307FLORIDABUILDINGCODE Sixth Edition(2017).docx
100635307FLORIDABUILDINGCODE Sixth Edition(2017).docx100635307FLORIDABUILDINGCODE Sixth Edition(2017).docx
100635307FLORIDABUILDINGCODE Sixth Edition(2017).docxtamicawaysmith
 
1003Violence Against WomenVolume 12 Number 11Novembe.docx
1003Violence Against WomenVolume 12 Number 11Novembe.docx1003Violence Against WomenVolume 12 Number 11Novembe.docx
1003Violence Against WomenVolume 12 Number 11Novembe.docxtamicawaysmith
 
102120151De-Myth-tifying Grading in Sp.docx
102120151De-Myth-tifying Grading             in Sp.docx102120151De-Myth-tifying Grading             in Sp.docx
102120151De-Myth-tifying Grading in Sp.docxtamicawaysmith
 
100.0 Criteria30.0 Flowchart ContentThe flowchart skillful.docx
100.0 Criteria30.0 Flowchart ContentThe flowchart skillful.docx100.0 Criteria30.0 Flowchart ContentThe flowchart skillful.docx
100.0 Criteria30.0 Flowchart ContentThe flowchart skillful.docxtamicawaysmith
 
100 words agree or disagree to eac questions Q 1.As her .docx
100 words agree or disagree to eac questions Q 1.As her .docx100 words agree or disagree to eac questions Q 1.As her .docx
100 words agree or disagree to eac questions Q 1.As her .docxtamicawaysmith
 
101118, 4(36 PMCollection – MSA 603 Strategic Planning for t.docx
101118, 4(36 PMCollection – MSA 603 Strategic Planning for t.docx101118, 4(36 PMCollection – MSA 603 Strategic Planning for t.docx
101118, 4(36 PMCollection – MSA 603 Strategic Planning for t.docxtamicawaysmith
 
100 words per question, no references needed or quotations. Only a g.docx
100 words per question, no references needed or quotations. Only a g.docx100 words per question, no references needed or quotations. Only a g.docx
100 words per question, no references needed or quotations. Only a g.docxtamicawaysmith
 
100A 22 4 451A 1034 51B 1000 101C 1100 11D 112.docx
100A 22 4 451A 1034  51B 1000 101C 1100  11D 112.docx100A 22 4 451A 1034  51B 1000 101C 1100  11D 112.docx
100A 22 4 451A 1034 51B 1000 101C 1100 11D 112.docxtamicawaysmith
 
10122018Week 5 Required Reading and Supplementary Materials - .docx
10122018Week 5 Required Reading and Supplementary Materials - .docx10122018Week 5 Required Reading and Supplementary Materials - .docx
10122018Week 5 Required Reading and Supplementary Materials - .docxtamicawaysmith
 
101416 526 PMAfter September 11 Our State of Exception by .docx
101416 526 PMAfter September 11 Our State of Exception by .docx101416 526 PMAfter September 11 Our State of Exception by .docx
101416 526 PMAfter September 11 Our State of Exception by .docxtamicawaysmith
 
100 words per question, no references needed or quotations. Only.docx
100 words per question, no references needed or quotations. Only.docx100 words per question, no references needed or quotations. Only.docx
100 words per question, no references needed or quotations. Only.docxtamicawaysmith
 

More from tamicawaysmith (20)

(No Plagiarism) Explain the statement Although many leading organi.docx
(No Plagiarism) Explain the statement Although many leading organi.docx(No Plagiarism) Explain the statement Although many leading organi.docx
(No Plagiarism) Explain the statement Although many leading organi.docx
 
 What made you choose this career path What advice do you hav.docx
 What made you choose this career path What advice do you hav.docx What made you choose this career path What advice do you hav.docx
 What made you choose this career path What advice do you hav.docx
 
 Patient Population The student will describe the patient populati.docx
 Patient Population The student will describe the patient populati.docx Patient Population The student will describe the patient populati.docx
 Patient Population The student will describe the patient populati.docx
 
 Dr. Paul Murray  Bessie Coleman  Jean-Bapiste Bell.docx
 Dr. Paul Murray  Bessie Coleman  Jean-Bapiste Bell.docx Dr. Paul Murray  Bessie Coleman  Jean-Bapiste Bell.docx
 Dr. Paul Murray  Bessie Coleman  Jean-Bapiste Bell.docx
 
 In depth analysis of your physical fitness progress  Term p.docx
 In depth analysis of your physical fitness progress  Term p.docx In depth analysis of your physical fitness progress  Term p.docx
 In depth analysis of your physical fitness progress  Term p.docx
 
 Information systems infrastructure evolution and trends  Str.docx
 Information systems infrastructure evolution and trends  Str.docx Information systems infrastructure evolution and trends  Str.docx
 Information systems infrastructure evolution and trends  Str.docx
 
⦁One to two paragraph brief summary of the book. ⦁Who is the.docx
⦁One to two paragraph brief summary of the book. ⦁Who is the.docx⦁One to two paragraph brief summary of the book. ⦁Who is the.docx
⦁One to two paragraph brief summary of the book. ⦁Who is the.docx
 
101018, 6(27 PMPage 1 of 65httpsjigsaw.vitalsource.co.docx
101018, 6(27 PMPage 1 of 65httpsjigsaw.vitalsource.co.docx101018, 6(27 PMPage 1 of 65httpsjigsaw.vitalsource.co.docx
101018, 6(27 PMPage 1 of 65httpsjigsaw.vitalsource.co.docx
 
100.0 Criteria10.0 Part 1 PLAAFP The PLAAFP thoroughly an.docx
100.0 Criteria10.0 Part 1 PLAAFP The PLAAFP thoroughly an.docx100.0 Criteria10.0 Part 1 PLAAFP The PLAAFP thoroughly an.docx
100.0 Criteria10.0 Part 1 PLAAFP The PLAAFP thoroughly an.docx
 
100635307FLORIDABUILDINGCODE Sixth Edition(2017).docx
100635307FLORIDABUILDINGCODE Sixth Edition(2017).docx100635307FLORIDABUILDINGCODE Sixth Edition(2017).docx
100635307FLORIDABUILDINGCODE Sixth Edition(2017).docx
 
1003Violence Against WomenVolume 12 Number 11Novembe.docx
1003Violence Against WomenVolume 12 Number 11Novembe.docx1003Violence Against WomenVolume 12 Number 11Novembe.docx
1003Violence Against WomenVolume 12 Number 11Novembe.docx
 
102120151De-Myth-tifying Grading in Sp.docx
102120151De-Myth-tifying Grading             in Sp.docx102120151De-Myth-tifying Grading             in Sp.docx
102120151De-Myth-tifying Grading in Sp.docx
 
100.0 Criteria30.0 Flowchart ContentThe flowchart skillful.docx
100.0 Criteria30.0 Flowchart ContentThe flowchart skillful.docx100.0 Criteria30.0 Flowchart ContentThe flowchart skillful.docx
100.0 Criteria30.0 Flowchart ContentThe flowchart skillful.docx
 
100 words agree or disagree to eac questions Q 1.As her .docx
100 words agree or disagree to eac questions Q 1.As her .docx100 words agree or disagree to eac questions Q 1.As her .docx
100 words agree or disagree to eac questions Q 1.As her .docx
 
101118, 4(36 PMCollection – MSA 603 Strategic Planning for t.docx
101118, 4(36 PMCollection – MSA 603 Strategic Planning for t.docx101118, 4(36 PMCollection – MSA 603 Strategic Planning for t.docx
101118, 4(36 PMCollection – MSA 603 Strategic Planning for t.docx
 
100 words per question, no references needed or quotations. Only a g.docx
100 words per question, no references needed or quotations. Only a g.docx100 words per question, no references needed or quotations. Only a g.docx
100 words per question, no references needed or quotations. Only a g.docx
 
100A 22 4 451A 1034 51B 1000 101C 1100 11D 112.docx
100A 22 4 451A 1034  51B 1000 101C 1100  11D 112.docx100A 22 4 451A 1034  51B 1000 101C 1100  11D 112.docx
100A 22 4 451A 1034 51B 1000 101C 1100 11D 112.docx
 
10122018Week 5 Required Reading and Supplementary Materials - .docx
10122018Week 5 Required Reading and Supplementary Materials - .docx10122018Week 5 Required Reading and Supplementary Materials - .docx
10122018Week 5 Required Reading and Supplementary Materials - .docx
 
101416 526 PMAfter September 11 Our State of Exception by .docx
101416 526 PMAfter September 11 Our State of Exception by .docx101416 526 PMAfter September 11 Our State of Exception by .docx
101416 526 PMAfter September 11 Our State of Exception by .docx
 
100 words per question, no references needed or quotations. Only.docx
100 words per question, no references needed or quotations. Only.docx100 words per question, no references needed or quotations. Only.docx
100 words per question, no references needed or quotations. Only.docx
 

Recently uploaded

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

40 Rotman Magazine Spring 2007The vast majority of today.docx