Understanding and Coping with Change
Order ID |
53563633773 |
Type |
Essay |
Writer Level |
Masters |
Style |
APA |
Sources/References |
4 |
Perfect Number of Pages to Order |
5-10 Pages |
Description/Paper Instructions
Understanding and Coping with Change
Change is everywhere, yet very few people seem to embrace the concept. We are, for the most part, creatures of habit and follow daily routines. When change occurs, our activities and thought patterns are disrupted.
Write a four- to five-page APA formatted paper (excluding the title and reference pages), using a minimum of three scholarly sources in addition to the textbook, analyzing the internal and external factors contributing to an individual’s resistance to change.
Describe a situation where you or someone you know was resistant to change as identified in one of following areas:
Self-interest
Lack of understanding
Lack of trust in management
Differing assessments of the need for change
Low tolerance for change
Explain whether the resistance to change was caused by an internal or external factor. Using Kotter’s theory for change, provide a plan for overcoming that resistance. What will be done and how will you know that the plan has worked?
Notes
- The best known of these may be a list released by the White House in 2005 of ten plots that had been disrupted since the 9/11 attacks, which is discussed later in this article.
- Brian Jenkins provides a list of some 46 failed plots, but provides few details and no citations; see Brian Michael Jenkins, Unconquerable Nation: Knowing Our Enemy, Strengthening Ourselves (Santa Monica: RAND, 2006), pp. 185–191. A slightly shorter list is included as an appendix to Dallas Boyd et al., Why Have We Not Been Attacked Again? Competing and Complementary Hypotheses for Homeland Attack Frequency, Defense Threat Reduction Agency ASCO Report Number 2008 007, June 2008, pp. 165–166. Useful recent listings are: Jena Baker McNeill, James Jay Carafano,
636 E. J. Dahl
and Jessica Zuckerman, “30 Terrorist Plots Foiled: How the System Worked,” Heritage Foundation Backgrounder, 29 April 2010, and Alejandro J. Beutel, “Data on Post-9/11 Terrorism in the United States,” Muslim Public Affairs Council Policy Memo Backgrounder, 13 May 2010. Marc Sageman has recently studied all Al Qaeda and Al Qaeda–inspired plots, successful and unsuccessful, in the West since the formation of Al Qaeda in 1988: Marc Sageman, “Confronting al-Qaeda: Understanding the Threat in Afghanistan,” Perspectives on Terrorism 3(4) (December 2009), pp. 4–25.
- Underlying Reasons for Success and Failure of Terrorist Attacks: Selected Case Studies, Homeland Security Institute Final Report, 4 June 2007; Brian A. Jackson and David R. Frelinger, Understanding Why Terrorist Operations Succeed or Fail (Santa Monica: RAND, 2009); Michael Jacobson, “Terrorist Dropouts: Learning from Those Who Have Left,” The Washington Institute for Near East Policy Policy Focus 101, January 2010.
- Exceptions include a recent study that examines 32 attacks thwarted since 9/11: Germain Difo, “Ordinary Measures, Extraordinary Results: An Assessment of Foiled Plots Since 9/11,” Amer- ican Security Project Report, May 2010; and Kevin Strom et al., Building on Clues: Examining Successes and Failures in Detecting U.S. Terrorist Plots, 1999–2009 (Institute for Homeland Secu- rity Solutions, October 2010), which examines 86 foiled and executed terrorist plots against U.S. targets. Another useful study that includes failed plots, but that is limited to post-9/11 radical Islamist attacks, is Jerome P. Bjelopera and Mark A. Randol, American Jihadist Terrorism: Combating a Complex Threat, Congressional Research Service, 20 September 2010.
- “Summary of the White House Review of the December 25, 2009 Attempted Terrorist Attack,” released by the White House on 7 January 2010.
- Brian Jenkins, “Lessons for Intelligence,” Vanguard (Canada), 1 March 2006. Available at http://www.rand.org/commentary/030106VC.html
- Paul R. Pillar, “Intelligence,” in Audrey Kurth Cronin and James M. Ludes, eds., Attacking Terrorism: Elements of a Grand Strategy (Washington, DC: Georgetown University Press, 2004), p. 123. Richard L. Russell, on the other hand, argues that intelligence successes are becoming known more often today, because the CIA public affairs staff often leaks its successes to the press anonymously: Sharpening Strategic Intelligence: Why the CIA Gets it Wrong, and What Needs to be Done to Get it Right (New York: Cambridge University Press, 2007), p. 22.
- Statement for the Record by Lieutenant General Michael V. Hayden, USAF, Before the Joint Inquiry of the Senate Select Committee on Intelligence and the House Permanent Select Committee on Intelligence, 17 October 2002. Emphasis in the original. Available at http://www.fas.org/irp/congress/2002 hr/101702hayden.html. CIA Director Leon Panetta has more recently written that “The CIA cannot speak publicly about its major victories—the plots foiled, the terrorists neutralized.” “The CIA is Proud to Be on the Front Lines against al-Qaeda,” The Washington Post, 10 January 2010.
- Rohan Gunaratna, “Combating Al-Qaida and Associated Groups,” in Doron Zimmerman and Andreas Wenger, eds., How States Fight Terrorism: Policy Dynamics in the West (Boulder: Lynne Rienner, 2007), p. 190.
- Brian M. Jenkins, “Intelligence and Homeland Security,” in Anja Dalgaard-Nielsen and Daniel S. Hamilton, eds., Transatlantic Homeland Security: Protecting Society in the Age of Catas- trophic Terrorism (London: Routledge, 2006), p. 127.
- Adam Liptak, “Suspected Leader of 9/11 Attacks Is Said to Confess,” The New York Times, 15 March 2007. A CIA study of the results of detainee interrogation found that detainees “often try [to] pass incomplete or intentionally misleading information, perhaps hoping that the volume of the reporting will make it difficult to sort out the truth.” Central Intelligence Agency, Detainee Reporting Pivotal for the War Against Al-Qa’ida, 3 June 2005, p. 6. In a separate report—completed before KSM’s Guantanamo testimony—the CIA argued that information obtained from his debriefing led to disruption of several plots against the United States: “Khalid Shaykh Muhammad: Preeminent Source On Al-Qa’ida,” Central Intelligence Agency, 13 July 2004.
- “Waiting for al-Qaeda’s next bomb,” Economist, 5 May 2007, p. 30. 13. State of the Union Address, 23 January 2007, transcript as provided by The New
York Times, 24 January 2007. Available at http://www.nytimes.com/2007/01/23/washington/23bush- transcript.html
The Plots that Failed 637
- Statement by David C. Gompert, Acting Director of National Intelligence, 19 July 2010. Available at http://www.dni.gov/. Of note, the principal reporter for the Washington Post series, Dana Priest, said in an interview that she had asked intelligence officials for examples of intelligence successes, but she was not provided any: “We asked them to share with us anything they could, plots that were foiled that we could put in the paper because we didn’t have many examples. We said give us things, just in generalities . . . and we didn’t receive anything back.” NPR “Talk of the Nation,” 19 July 2010, with transcript available at http://www.npr.org/templates/story/story.php?storyId=128624199
- The White House, “Fact Sheet: Plots, Casings, and Infiltrations Referenced in Presi- dent Bush’s Remarks on the War on Terror,” 6 October 2005. Available at http://georgewbush- whitehouse.archives.gov/news/releases/2005/10/20051006-7.html. Other examples of the U.S. gov- ernment touting its success in foiling terrorist plots and prosecuting terrorism related offenses include: The White House, 9/11 Five Years Later: Successes and Challenges, September 2006; and the U.S. Department of Justice Counterterrorism White Paper, 22 June 2006.
- For an examination of what is known about the incidents on the White House list, see “Thwarted Terrorist Attacks,” New York University Review of Law and Security 7, April 2006, pp. 16–21; also Sara Kehaulani Goo, “List of Foiled Plots Puzzling to Some,” The Washington Post, 23 October 2005.
- Transactional Records Access Clearinghouse, Syracuse University, “Criminal Terrorism Enforcement in the United States During the Five Years Since the 9/11/01 Attacks.” Available at http://trac.syr.edu/tracreports/terrorism/169/. An updated report that examined data through 2009 found that an increasing number of cases have resulted in convictions, suggesting what it calls “a more effective use of the criminal justice system.” Terrorist Trial Report Card: September 11, 2001–September 11, 2009, January 2010, p. i.
- Dan Eggen and Julie Tate, “U.S. Campaign Produces Few Convictions on Terrorism Charges,” The Washington Post, 12 June 2005.
- New York University School of Law, Center on Law and Security, Terrorist Trial Report Card: U.S. Edition, 11 September 2006, p. 3. The Center on Law and Security has continued to track the results of terrorist trials, and its most recent reports are available at http://www.lawandsecurity.org/pub newsletter.cfm?id=3. Daveed Gartenstein-Ross and Kyle Dabruzzi disagree with the Center on Law and Security’s conclusion that this data suggests poli- cymakers have overestimated the terrorist threat. They argue that because authorities are successfully disrupting plots at an early stage by using criminal and other non-terrorism charges, it is not sur- prising that few trials result in terrorism convictions. The Convergence of Crime and Terror: Law Enforcement Opportunities and Perils, Manhattan Institute Center for Policing Terrorism, Policing Terrorism Report No. 1, June 2007, p. 16.
- A prominent database that does include failed attacks is the International Terrorism: At- tributes of Terrorist Events (ITERATE) database maintained by Edward F. Mickolus. The ITERATE database, however, only tracks international terrorism, so does not capture purely domestic plots and attacks. On ITERATE, see Peter A. Flemming, Edward Mickolus, and Todd Sandler, “Research Note: Using the ITERATE and DOTS Databases,” Journal of Strategic Security 1(1) (November 2008). Published listings of terrorist activities that do cover failed attacks include Christopher Hewitt, Polit- ical Violence and Terrorism in Modern America: A Chronology (Westport, CT: Praeger, 2005), and Daveed Gartenstein-Ross, Joshua D. Goodman, and Laura Grossman, Terrorism in the West 2008: A Guide to Terrorism Events and Landmark Cases (Washington, DC: FDD Press, 2009).
- National Counterterrorism Center Worldwide Incidents Tracking System, “Methodology.” Available at http://www.nctc.gov/witsbanner/wits subpage criteria.html
- Global Terrorism Database: http://www.start.umd.edu/gtd/faq/. A recent study sponsored by the Department of Defense found that it was difficult to find good quality, openly available data on terrorism events in general, whether successful or unsuccessful. Rare Events, JASON study JSR-09-108, The MITRE Corporation, October 2009, pp. 44–45.
- See http://www.isvg.org/faq.html 24. Joshua Sinai, “New Trends in Terrorism Studies: Strengths and Weaknesses,” in Magnus
Ranstorp, ed., Mapping Terrorism Research: State of the Art, Gaps and Future Direction (London: Routledge, 2007), p. 43.
638 E. J. Dahl
- Berto Jongman, “Research Desiderata in the Field of Terrorism,” in Ranstorp, Mapping Terrorism Research, p. 283. Stephen Marrin, “Preventing Intelligence Failures by Learning from the Past,” International Journal of Intelligence and Counterintelligence 17(4) (December 2004), p. 661.
- The full data set, including criteria for the coding of intelligence and other factors, is available by e-mail from the author.
- Eight plots are attributed to “other,” neither radical Islamism nor domestic extremism. The causes in these cases vary and are not always clear, for example in the case of a man who wanted to bomb the Alaskan oil pipeline during the Millennium celebrations in order to manipulate the oil futures market and cause financial panic. “Canadian Man Pleads Guilty to Plot to Blow Up Tans- Alaska Oil Pipeline,” Associated Press, 13 March 2008. Also coded as “other” are three attacks or plots against U.S. government facilities overseas in January 1991 that were apparently conducted by Iraqi Intelligence Service agents on orders from Saddam Hussein in retaliation for the U.S.-led Desert Storm. See U.S. State Department, Patterns of Global Terrorism: 1991.
- National Counterterrorism Center, 2009 Report on Terrorism, 30 April 2010, p. 5, available at www.nctc.gov.
- The author has not attempted to define “significant” damage or destruction, but further research would be useful in helping to determine a threshold; at what point does a certain level of destruction in an attack suggest that it was “successful”?
- A fuller discussion of the various factors involved in determining whether to define attacks as successful or unsuccessful is in Brian A. Jackson and David R. Frelinger, Understanding Why Terrorist Operations Succeed or Fail (Santa Monica: RAND, 2009), pp. 2–3.
- A prominent example of this sort of case not counted as a failed plot is that of the Holy Land Foundation for Relief and Development, a Texas-based Muslim charity accused by the U.S. government of providing support to Hamas. Five of its leaders were convicted on a variety of counts, including support of terrorism, in 2008, but the group was not accused of directly financing terrorist bombings or attacks. Gretel C. Kovach, “Five Convicted in Terrorism Financing Trial,” The New York Times, 25 November 2008.
- For example, in 2005 authorities in California received a tip that six individuals had been smuggled into the United States from Mexico in order to obtain nuclear material, and they were on their way to Boston to launch some sort of attack. It turned out to be a hoax. Shelley Murphy, “FBI Finds Terror Threat Was Fabricated,” Boston Globe, 26 January 2005. Another case not counted here is that of the “Detroit sleeper cell”: on 17 September 2001, authorities in Detroit charged four men with conspiracy after evidence found in their apartment suggested they might have been terrorists. The charges were later dropped after allegations were made of prosecutorial misconduct. Philip Shenon, “Ex-Prosecutor Acquitted of Misconduct in 9/11 Case,” The New York Times, 1 November 2007.
- In several cases plotters have thought they were carrying out attacks, only to find that law enforcement officials had supplied them with non-functioning weapons or explosives. These are not counted as actual attempted attacks, but as cases stopped at an earlier stage for some other reason (such as that an informant was involved and provided the fake weapons).
- Michael Jacobsen, “They Trained. They Plotted. Then They Bailed,” The Washington Post, 23 March 2008.
- KSM’s Brooklyn Bridge Plot, The NEFA Foundation, August 2007. Available at www. nefafoundation.org.
- National Commission on Terrorist Attacks upon the United States, The 9/11 Commission Report (New York: Norton, 2004), pp. 176–179.
- Robert Hanley, “Suspected Terrorist Convicted in Bomb Case,” The New York Times, 30 November 1988. For an extensive discussion of this case, see University of Arkansas, Indicators of Terrorist Incidents, pp. 277–284.
- See, for example, the Homeland Security Institute, Underlying Reasons for Success and Failure of Terrorist Attacks, pp. 61–65.
- Greg Krikorian, “Plot Posed a Real, Immediate Threat, Experts Say,” Los Angeles Times, 15 December 2007.
The Plots that Failed 639
- Southern Poverty Law Center, The Second Wave: Return of the Militias, August 2009, p. 18.
- Craig S. Smith, “North Africa Feared as Staging Ground for Terror,” The New York Times, 20 February 2007.
- U.S.A. v. Hosam Maher Husein Smadi, Criminal Complaint, 24 September 2009. 43. Al Baker and William K. Rashbaum, “3 Held Overseas in Plan to Bomb New York Target,”
The New York Times, 8 July 2006. 44. Craig Whitlock, “Trial Opens In Alleged Plot Against U.S. Targets,” The Washington Post,
23 April 2009. 45. Central Intelligence Agency, Detainee Reporting Pivotal. Large sections of this report
remain blacked out in the redacted version that has been publicly released, suggesting that additional plots and attacks may have been prevented, but are too sensitive to make public. Iyman Faris was reportedly arrested in part on the basis of information revealed by Khalid Sheikh Mohammed; he had apparently already decided not to carry out the attempt to destroy the Brooklyn Bridge.
- Brian M. Jenkins, Statement to the National Commission on Terrorist Attacks upon the United States, Washington, 31 March 2003. Available at http://govinfo.library.unt.edu/911/ hearings/hearing1/witness jenkins.htm
- Karen DeYoung and Walter Pincus, “Success Against Al-Qaeda Cited,” The Washington Post, 30 September 2009.
- This is not a new finding. A RAND study on terrorism in the 1970s found that informants and undercover sources were more often useful than wiretaps or other sources. Sorrel Wildhorn, Brian Michael Jenkins, and Marvin M. Lavin, Intelligence Constraints of the 1970s and Domestic Terrorism: Vol. I, Effects on the Incidence, Investigation, and Prosecution of Terrorist Activity (Santa Monica: RAND, December 1982), p. xi. The importance of human intelligence in preventing terrorist attacks has also been seen in France: A French antiterrorism official recently claimed that 15 plots thwarted in recent years were all stopped as a result of information received from human sources. See Edward Cody, “Europe’s Antiterrorism Agencies Favor Human Intelligence Over Technology,” The Washington Post, 12 May 2010.
- William K. Rashbaum and Kareem Fahim, “Informer’s Role in Bombing Plot,” The New York Times, 23 May 2009.
- Cara Buckley and William K. Rashbaum, “4 Accused of Plot to Blow Up Facilities at Kennedy Airport,” The New York Times, 3 June 2007.
- On the British case, see for example Don Van Natta Jr., Elaine Sciolino, and Stephen Grey, “Details Emerge in British Terror Case,” The New York Times, 28 August 2006. On the Miami case, see “The Miami Plot to Bomb Federal Buildings and the Sears Tower,” The NEFA Foundation, updated January 2008. Available at www.nefafoundation.org
- Stella Rimington, “‘Humint’ Begins at Home,” Wall Street Journal, 3 January 2005. The study cited above by Kevin Strom and others, Building on Clues: Examining Successes and Fail- ures in Detecting U.S. Terrorist Plots, 1999–2009, reached similar findings, noting that routine law enforcement activities and public vigilance are key factors in preventing terrorist attacks.
- For background on the Lackawanna Six case, see Dina Temple-Raston, “Enemy Within? Not Quite,” The Washington Post, 9 September 2007, and Bjelopera and Randol, American Jihadist Terrorism: Combating a Complex Threat, pp. 109–112.
- Mitchell D. Silber and Arvin Bhatt, Radicalization in the West: The Homegrown Threat (New York Police Department, 2007), p. 62.
- Matthew Purdy and Lowell Bergman, “Where the Trail Led,” The New York Times, 12 October 2003.
- Purdy and Bergman, “Where the Trail Led.” 57. “Text of President Bush’s 2003 State of the Union Address,” Washington Post,
28 January 2003. Available at http://www.washingtonpost.com/wp-srv/onpolitics/transcripts/ bushtext 012803.html
- For example, see Arthur S. Hulnick, Keeping Us Safe: Secret Intelligence and Homeland Security (Westport, CT: Praeger, 2004), pp. 126–127; Ravi Satkalmi, “Material Support: The United
640 E. J. Dahl
States v. the Lackawanna Six,” Studies in Conflict and Terrorism 28(3) (May 2005), pp. 193–199; and Temple-Raston, “Enemy Within?”
- Silber and Bhatt, Radicalization in the West, p. 59. 60. Temple-Raston, “Enemy Within?” 61. Ahmed Al-Haj, “Yemeni-American on FBI ‘Most Wanted” List Jailed in San’a,” Associated
Press, 19 May 2008. 62. Mark Mazzetti and David Johnston, “Bush Weighed Using Military in Arrests,” New York
Times, 25 July 2009. 63. NEFA Foundation, “The Fort Dix Plot,” January 2008, p. 4. Available at http://www1.
nefafoundation.org/reports.html. See also Amanda Ripley, “The Fort Dix Conspiracy,” Time, 6 De- cember 2007, and George Anastasia and Troy Graham, “Dix Case a Test of New Laws,” Philadelphia Inquirer, 24 December 2008. U.S. v. Shnewer, et al, superseding indictment, U.S. District Court, District of New Jersey Case 07-459 (RBK), 15 January 2008.
- Geoff Mulvihill, “Fort Dix Tipster Steps into Limelight,” Associated Press, 30 May 2007. The store clerk, named Brian Morgenstern, was not initially identified by police, but he later came forward to give a series of media interviews.
- Ripley, “The Fort Dix Conspiracy.” 66. Ibid. 67. Josh Meyer, “‘Ft. Dix Six’ Informants in Hot Seat Too,” Los Angeles Times, 19 October
2008, and David Kocieniewski, “The Role of an F.B.I. Informer Draws Praise as Well as Questions About Legitimacy,” New York Times, 10 May 2007.
- On this dilemma, see John Farmer Jr., “Playing Chicken With Suicide Bombers,” The New York Times, 27 September 2009.
- Robert Block, “FBI Alters Tactics in Fight Against Terrorists,” Wall Street Journal, 23 May 2007.
- “Attorney General Eric Holder Speaks at the Press Conference Announcing Guilty Plea by Najibullah Zazi,” U.S. Department of Justice press release, 22 February 2010. Available at http://www.justice.gov/ag/speeches/2010/ag-speech-100222.html
- Robert S. Mueller III, prepared statement before the U.S. Senate Homeland Security and Government Affairs Committee, 22 September 2010.
- A. G. Sulzberger and William K. Rashbaum, “N.Y. Terror Suspect Admits Guilt and Co- operates,” The New York Times, 23 February 2010 and John Marzulli, “Zazi, Al Qaeda Pals Planned Rush-Hour Attack on Grand Central, Times Square Subway Stations,” New York Daily News, 12 April 2010.
- Judith Miller, “A Bullet Dodged,” New York Post, 26 September 2009. 74. On the CIA in Pakistan, see Brian Ross, Richard Esposito, and Clayton Sandell, “FBI Arrests
Three Men in Terror Plot that Targeted New York,” ABC News, 20 September 2009. Available at http://abcnews.go.com/Blotter/men-arrested-fbi-nyc-terror-plot/story?id = 8618732; and Lolita Baldor, “NY Suspect Had Senior Al-Qaida Contact,” Associated Press, 6 October 2009.
- “British Spies Help Prevent al Qaeda-Inspired Attack on New York Subway,” The Tele- graph (London), 9 November 2009, and Dina Temple-Raston, “Feds: N.Y. Subway Bomb Plot In- cluded U.K. Targets,” NPR, 8 July 2010. Available at http://www.npr.org/templates/story/story.php? storyId=128368594
- U.S. Department of Justice press release, “Charges Unsealed Against Five Alleged Members of Al-Qaeda Plot to Attack the United States and United Kingdom,” 7 July 2010. Available at http://www.justice.gov/opa/pr/2010/July/10-nsd-781.html; Julia Love, “Alleged Al Qaeda Operatives Indicted in New York Plot,” Los Angeles Times, 8 July 2010; Raffaello Pantucci, “Manchester, New York and Oslo: Three Centrally Directed Al-Qa’ida Plots,” West Point Combating Terrorism Center CTC Sentinel August 2010, pp. 10–13. Available at http://www.ctc.usma.edu/sentinel/
- Dina Temple-Raston, “Terrorism Case Shows Range of Investigators’ Tools,” NPR, 3 Oc- tober 2009. Available at http://www.npr.org/templates/story/story.php?storyId = 113453193
- Temple-Raston, “Terrorism Case Shows Range of Investigators’ Tools.” 79. U.S. v. Najibullah Zazi criminal complaint, 19 September 2009, p. 6.
The Plots that Failed 641
- Temple-Raston, “Terrorism Case Shows Range of Investigators’ Tools.” 81. Baldor, “NY Suspect Had Senior Al-Qaida Contact.” 82. William K. Rashbaum and Al Baker, “How Using Imam in Terror Inquiry Backfired on
Police,” The New York Times, 13 September 2009. 83. Spencer S. Hsu, “Al-Qaeda Operative Led N.Y. Subway Plot, U.S. Says,” The Washington
Post, 8 July 2010. 84. William K. Rashbaum, “Qaeda Leader Indicted in New York Subway Plot,” New York Times,
7 July 2010. 85. On this new domestic–overseas hybrid threat, see Michael Leiter, Director of the Na-
tional Counterterrorism Center, Statement for the Record before the Senate Homeland Security and Government Affairs Committee, 22 September 2010. Available at http://www.nctc.gov/press room/speeches.html
RUBRIC
QUALITY OF RESPONSE |
NO RESPONSE |
POOR / UNSATISFACTORY |
SATISFACTORY |
GOOD |
EXCELLENT |
Content (worth a maximum of 50% of the total points) |
Zero points: Student failed to submit the final paper. |
20 points out of 50: The essay illustrates poor understanding of the relevant material by failing to address or incorrectly addressing the relevant content; failing to identify or inaccurately explaining/defining key concepts/ideas; ignoring or incorrectly explaining key points/claims and the reasoning behind them; and/or incorrectly or inappropriately using terminology; and elements of the response are lacking. |
30 points out of 50: The essay illustrates a rudimentary understanding of the relevant material by mentioning but not full explaining the relevant content; identifying some of the key concepts/ideas though failing to fully or accurately explain many of them; using terminology, though sometimes inaccurately or inappropriately; and/or incorporating some key claims/points but failing to explain the reasoning behind them or doing so inaccurately. Elements of the required response may also be lacking. |
40 points out of 50: The essay illustrates solid understanding of the relevant material by correctly addressing most of the relevant content; identifying and explaining most of the key concepts/ideas; using correct terminology; explaining the reasoning behind most of the key points/claims; and/or where necessary or useful, substantiating some points with accurate examples. The answer is complete. |
50 points: The essay illustrates exemplary understanding of the relevant material by thoroughly and correctly addressing the relevant content; identifying and explaining all of the key concepts/ideas; using correct terminology explaining the reasoning behind key points/claims and substantiating, as necessary/useful, points with several accurate and illuminating examples. No aspects of the required answer are missing. |
Use of Sources (worth a maximum of 20% of the total points). |
Zero points: Student failed to include citations and/or references. Or the student failed to submit a final paper. |
5 out 20 points: Sources are seldom cited to support statements and/or format of citations are not recognizable as APA 6th Edition format. There are major errors in the formation of the references and citations. And/or there is a major reliance on highly questionable. The Student fails to provide an adequate synthesis of research collected for the paper. |
10 out 20 points: References to scholarly sources are occasionally given; many statements seem unsubstantiated. Frequent errors in APA 6th Edition format, leaving the reader confused about the source of the information. There are significant errors of the formation in the references and citations. And/or there is a significant use of highly questionable sources. |
15 out 20 points: Credible Scholarly sources are used effectively support claims and are, for the most part, clear and fairly represented. APA 6th Edition is used with only a few minor errors. There are minor errors in reference and/or citations. And/or there is some use of questionable sources. |
20 points: Credible scholarly sources are used to give compelling evidence to support claims and are clearly and fairly represented. APA 6th Edition format is used accurately and consistently. The student uses above the maximum required references in the development of the assignment. |
Grammar (worth maximum of 20% of total points) |
Zero points: Student failed to submit the final paper. |
5 points out of 20: The paper does not communicate ideas/points clearly due to inappropriate use of terminology and vague language; thoughts and sentences are disjointed or incomprehensible; organization lacking; and/or numerous grammatical, spelling/punctuation errors |
10 points out 20: The paper is often unclear and difficult to follow due to some inappropriate terminology and/or vague language; ideas may be fragmented, wandering and/or repetitive; poor organization; and/or some grammatical, spelling, punctuation errors |
15 points out of 20: The paper is mostly clear as a result of appropriate use of terminology and minimal vagueness; no tangents and no repetition; fairly good organization; almost perfect grammar, spelling, punctuation, and word usage. |
20 points: The paper is clear, concise, and a pleasure to read as a result of appropriate and precise use of terminology; total coherence of thoughts and presentation and logical organization; and the essay is error free. |
Structure of the Paper (worth 10% of total points) |
Zero points: Student failed to submit the final paper. |
3 points out of 10: Student needs to develop better formatting skills. The paper omits significant structural elements required for and APA 6th edition paper. Formatting of the paper has major flaws. The paper does not conform to APA 6th edition requirements whatsoever. |
5 points out of 10: Appearance of final paper demonstrates the student’s limited ability to format the paper. There are significant errors in formatting and/or the total omission of major components of an APA 6th edition paper. They can include the omission of the cover page, abstract, and page numbers. Additionally the page has major formatting issues with spacing or paragraph formation. Font size might not conform to size requirements. The student also significantly writes too large or too short of and paper |
7 points out of 10: Research paper presents an above-average use of formatting skills. The paper has slight errors within the paper. This can include small errors or omissions with the cover page, abstract, page number, and headers. There could be also slight formatting issues with the document spacing or the font Additionally the paper might slightly exceed or undershoot the specific number of required written pages for the assignment. |
10 points: Student provides a high-caliber, formatted paper. This includes an APA 6th edition cover page, abstract, page number, headers and is double spaced in 12’ Times Roman Font. Additionally, the paper conforms to the specific number of required written pages and neither goes over or under the specified length of the paper. |
|
|
GET THIS PROJECT NOW BY CLICKING ON THIS LINK TO PLACE THE ORDER
Also, you can place the order at www.collegepaper.us/orders/ordernow / www.phdwriters.us/orders/ordernow
|
Do You Have Any Other Essay/Assignment/Class Project/Homework Related to this? Click Here Now [CLICK ME]and Have It Done by Our PhD Qualified Writers!! |
|
|
PLACE THE ORDER WITH US TODAY AND GET A PERFECT SCORE!!!