Free Essay

Test

In: Business and Management

Submitted By sjf7777
Words 1555
Pages 7
Case Report
“Security Planning for the 2004 DNC (A)”

12/22/2013
Stephen Ferrick
MSFM-Organizational Behavior
-------------------------------------------------

Case Summary:

In November of 2002 the City of Boston was awarded the upcoming 2004 Democratic National Convention. Because the DNC was to be the first “major” political event in the US since the terrorist attacks of 9/11 outside help was sought to insure the overall security of the event and its attendees. The Department of Homeland Security was asked to designate the 2004 DNC a “National Special Security Event” NSSE. The request was honored. With this designation in place the US Secret Service was called upon to devise and implement a comprehensive security plan. Secret Service Special Agent Scott Sheafe was chosen to take the lead in the role of “Coordinator of Security Arrangements for the Democratic National Convention”. In order to be successful at protecting the attendees of the upcoming DNC, agent Sheafe would ultimately need to rely on the cooperation of over 30 local, state and federal agencies. This was no small task but as a member of the Secret Service Agent Sheafe was singularly qualified for the task at hand. Due to his time spent on the “Presidential Protection Detail” Agent Scott Sheafe was familiar with the necessity of relying on multiple agencies from different governmental levels to ensure the safety of the president and the environments involved in his activities. Agent Sheafe’s experience led him to use inclusion, cooperation and “appeals to common goals” to gain the confidence of participating agencies and to foster a positive organizational environment. When disagreements between different agencies and individuals did arise the “functional conflict” was used as a mechanism by which all parties were able to come to terms with what was truly best for the collective goal of ensuring the safety of both the Fleet Center and attendees for the 2004’ DNC. Agent Sheaf relied heavily on the different agencies in navigating the unique political and organizational landscape of the City of Boston. By using the collective knowledge base of all the resources at his disposal he was able to make informed recommendations and finalize decisions through consensus while instilling a genuine feeling of inclusion for all persons involved. Organizational Dynamics: (Positive or Negative affects)

From the start of his appointment as “Coordinator” of Security Arrangements for the upcoming 2004 DNC Agent Sheafe understood that ultimate success would be dependent upon many agencies having a “common goal.” To accomplish this He would need to rely on the Secret Services’ “core strategy” of “forming partnerships” with other law enforcement, security and public safety agencies. In order to use this strategy it was important that he create an atmosphere of “inclusion” and “cooperation”. By accomplishing this he would encourage the over 30 different agencies to work together towards a common goal. The first thing Agent Sheafe did was to create partnerships by introducing himself to key officials of the various agencies whose cooperation was needed for the success of his mission. Next a “Steering Committee” was created comprised of the heads (decision makers) of the agencies that would have a roll in the security plan. Also created were 17 “Sub-Committees” that would be co-chaired by one member of each the Secret Service and of the BPD. The “Sub-Committees” functioned as “cross-functional teams” where the members from different agencies would discuss issues of the safety plan and devise possible solutions. The steering committee was used to validate the ideas and solutions brought forth by the sub-committees. This structure was experienced as empowering and inclusive by the sub-committee members.
By following proven methods used by the US Secret Service agent Sheafe was able to create an organizational dynamic that thrived on lateral communication and cooperation between agencies. Because of this, different opinions and concerns could be voiced and discussed and the merits of each weighed out. People truly felt listened to even if their position was in turn decided against. Ultimately Agent Sheafe was able to take different entities with potentially competing interests and different priorities and marshal their collective resources to accomplish one common goal. Role Perception and Attribution:

From the outset Agent Sheafe recognized that the overall success of organizing and implementing a security plan of this scope would be impacted significantly by the “first impression” he made on those he would be leading. He understood the potential effects (negative and positive) of “Perception and Attribution”.
Because people’s perceptions and attributions influence how they behave in an organization it was vital that he communicate his intention to lead through cooperation and consensus. He also needed to demonstrate his desire to lean heavily on their collective knowledge and abilities in their respective roles. Agent Sheafes' goal was to soften his entrance into the “tight knit” Community of Boston and not step on toes. An example of this was Agent Sheafes’ commitment to Steven Ricciardi then “Special Agent in Charge” of the Secret Service field office in Boston that “I was not going to embarrass him in his district. I’m going to make sure when I leave here that the wonderful relationship that the Boston field office has with the law enforcement community, both local and state and the relationship (it has) with (its) federal partners isn’t going to be the same-it’s going to be better.” Because of this verbalization of intent Agent Ricciardi was able to filter, organize and interpret this information, understand his role and respond in an organizationally positive way. Because Agent Sheafe went to great lengths to give the “initial impression” of his intent to work together through good communication and cooperation the effects of perception and attribution were positive. Individuals were able to react to the situation in a way that allowed the successful planning and implementation of a comprehensive safety plan. Management Systems and Culture:

Like most cities Boston’s organizational management system and culture will function in line with the “Governmental Politics Model”. This is described as: * Loosely aligned organizations * Organizational culture and procedure * Incrementalism.
This model can and does work on a day to day basis. Daily duties and functions are carried out routinely by the separate departments of the city. Although there may be conflicts between departments and or individuals the “common goal” of the cities’ operation is accomplished. This Model however does not always work as was demonstrated by the Chicago Heat Wave of 1995. Unfortunately for the citizens of Chicago that were affected this model of management failed to correctly plan for, react to and resolve the problems and issues that would arise due to an excessive heat event. Obviously this model does not always operate efficiently in times of crisis or in an atmosphere of heightened urgency. One reason for this is that efficient and precise communication between groups isn’t always possible due to the loose or disjointed structure between agencies. Another is that different departments may have decidedly different cultures or shared beliefs and values that are not consistent with each other. This makes finding common ground nearly impossible. Because of these obstacles as well as many others Agent Sheafe needed to change or tweak Boston’s organizational management system and culture for his mandate to be successful. Agent Sheafe needed to take the existing city and state organization and make it work for the goal of protecting the DNC. He accomplished this through open communication, being respectful of and to the different departments and their chiefs and most importantly using their knowledge of their respective duties and plans to date as a starting point for the overall safety plan. What Agent Sheafe did was create a “rule of agreement”. In short he created an environment or culture where agreement was the rule. This doesn’t mean that people just agreed blindly. It means that agreement was the goal. This sets the table so to speak for positive and productive discussions. When agreement is the cultural expectation common ground between different parties will be easier to find resulting in solutions instead if disagreements. Another change to the management system and culture was in the use of the steering and sub-committees. This type of management structure allowed for relationships between departments to form, lines of communication between departments to be opened. This all created an opportunity for the different groups to see the city organization as “we” instead of “us and them”.

Conclusion:

Unlike the organizational missteps in Florida’s handling of Hurricane Floyd and Chicago’s lack of preparedness for the 1995 heat wave the planning of the 2004 DNC in Boston was a relative success. There were many factors responsible for this however, none were more important than the emphasis that was put on communication, cooperation and appeals to common goals. Agent Sheafe was able to lead different groups of people he had never met in a city he was not familiar with effectively as a result of his successful implementation of the US Secret Service core strategy of “forming partnerships”. That is an important lesson to be learned by any person in a position of management in any organization. Although this was played out on a large governmental level it is important to realize that the strategies and techniques Agent Sheafe employed can be used to the same effect on a smaller scale in organizations of all types and sizes.

Similar Documents

Premium Essay

Test

...Test Data   Elvis Presley ± ISSUnit 1 ± Match Risks/ThreatsDr. Grubb12-13-2011 Risks or Threats: 1. Violation of a security policy by a user.C. Place employee on probation, review acceptable use policy (AUP) and employeeManual, and discuss status during performance reviews.2. Disgruntled employee sabotage.I. Track and monitor abnormal employee behavior, erratic job performance, and use of ITinfrastructure during off-hours. Begin IT access control lockout procedures based onAUP monitoring and compliance.3. Download of non-business videos using the internet to an employee-owned computer.A. Enable content filtering and antivirus scanning at the entry and exit points of theinternet. Enable workstation auto-scans and auto-quarantine for unknown file types.4. Malware infection of a user¶s laptop.L. Use workstation antivirus and malicious code policies, standards, procedures, andguidelines. Enable an automated antivirus protection solution that scans and updatesindividual workstations with proper protection.5. Unauthorized physical access to the LAN. N. Make sure wiring closets, data centers, and computer rooms are secure.Provide no access without proper credentials.6. LAN server operating system vulnerabilities.F. Define vulnerability window policies, standards, procedures, and guidelines.Conduct LAN domain vulnerability assessments.7. Download of unknown file types from unknown sources by local users.B. Apply file transfer monitoring, scanning, and alarming for unknown......

Words: 372 - Pages: 2

Premium Essay

Test

... External Modem | Circuit Board | CD Drive | Hard Drive | Memory Board | Test device 1 | 7 | 3 | 12 | 6 | 18 | 17 | Test device 2 | 2 | 5 | 3 | 2 | 15 | 17 | Test device 3 | 5 | 1 | 3 | 2 | 9 | 2 | The first two test devices are available 120 hours per week. The third (device 3) requires more preventive maintenance and may be used only 100 hours each week. The market for all six computer components is vast, and Quitmeyer Electronics believes that it can sell as many units of each product as it can manufacture. The table that follows summarizes the revenues and material costs for each product: Device | Revenue Per Unit Sold ($) | Material Cost Per Unit ($) | Internal modem | 200 | 35 | External modem | 120 | 25 | Graphics circuit board | 180 | 40 | CD drive | 130 | 45 | Hard disk drive | 430 | 170 | Memory expansion board | 260 | 60 | In addition, variable labor costs are $15 per hour for test device 1, $12 per hour for test device 2. and $18 per hour for test device 3. Quitmeyer Electronics wants to maximize its profits. (a) Formulate this problem as an LP model. (b) Solve the problem by computer. What is the best product mix? (c) What is the value of an additional minute of time per week on test device 1? Test device 2? Test device 3? Should Quitmeyer Electronics add more test device time? If so, on which equipment? Let X1 = the number of internal modems......

Words: 4454 - Pages: 18

Free Essay

Test

...Test Automation Criteria Benefit * How often do you believe the test should be run? * How many minutes are required for one tester to execute the test manually? * Will human intervention still be required to execute the test after automation? * Does the execution of the test require the tester to input a large amount of data (e.g. populating many fields or populating the same fields many times) via the gui interface? * Does the test require an inordinate amount of user interface actions (e.g. mouse clicks, validations)? * Will automating the test increase the productivity of the team? * Will automating the test allow us to increase test coverage? * Will automating the test allow us to increase the accuracy (exactness) and precision ( reproducibility or repeatability) of the test? * Is the execution of this test prerequisite to the execution of multiple other tests? Cost * How many hours of data preparation (e.g. querying data, setup within the application, etc.) is required for this test? * Is the test documented in such a way that someone other than the author can execute it, and is it stored in Quality Center? * What is the average number of times the test needs to be updated (e.g to reflect development changes) within a six month span? * Are the manual test steps currently up to date? * Are the systems and environments in which the test is run stable and consistently available? * Are third party systems......

Words: 276 - Pages: 2

Premium Essay

Test

...This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is just a test This is......

Words: 5040 - Pages: 21

Premium Essay

Test

...is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test file This is a test......

Words: 385 - Pages: 2

Free Essay

Test

...Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User Category test User......

Words: 588 - Pages: 3

Premium Essay

Test

...James Bach on Risk-Based Testing by James Bach This is risk-based testing: 1. Make a prioritized list of risks. 2. Perform testing that explores each risk. 3. As risks evaporate and new ones emerge, adjust your test effort to stay focused on the current crop. Any questions? Well, now that you know what risk-based testing is, I can devote the rest of the article to explaining why you might want to do it, and how to do it well. Why Do Risk-Based Testing? As a tester, there are certain things you must do. Those things vary depending on the kind of project you’re on, your industry niche, and so on. But no matter what else you do, your job includes finding important problems in the product. Risk is a problem that might happen. The magnitude of a risk is a joint function of the likelihood and impact of the problem—the more likely the problem is to happen, and the more impact it will have if it happens, the higher the risk associated with that problem. Thus, testing is motivated by risk. If you accept this premise, you might well wonder how the term "risk-based testing" is not merely redundant. Isn’t all testing risk-based? To answer that, look at food. We all have to eat to live. But it would seem odd to say that we do "food-based living." Under normal circumstances, we don’t think of ourselves as living from meal to meal. Many of us don’t keep records of the food we eat, or carefully associate our food with our daily activities. However, when we......

Words: 3876 - Pages: 16

Free Essay

Test

...  Test     Reportable  subjects  tested:   • • • • • • • • • • Fractions   Decimals   Percentage   Exponents   Equations   Algebraic  Equations   Word  Problems   Analytic  Geometry   Mensuration   Trigonometry     1. Multiply 0.06 by 0.021 A) 0.0126 B) 0.0000126 C) 0.00126 D) 0.126 E) None of these 2. Divide 4.2 by 0.07 A) 1.33 B) 60 C) 6 D) 600 E) None of these 3. 9 – 3 (2+6)÷6 -2 × 5 A)-2 B) 35 C) 5 D) -5 E) None of these SETAS-­‐SOT  2012     3   4. The decimal equivalent of A) 4.44 B) 2.25 C) 0.225 D) 0.0225 is: E) None of these 5. Express0.275 as a common fraction in lowest terms: A) B) C) D) E) None of these 6. Express A).4% B) 20% as a percent: C) 4% D) 2% E) None of these 7. 60% of $10.60 A) $1.63 B) $6.36 C) $63.60 D) $16.31 E) None of these 8. 24 is what percent of 40? A) 60% B) 3.75% C) 6% D) 37.5% E) None of these 9. 0.85 is 25% of what sum? A) 3.4 B) 34 C) 21.25 D) 2.125 E) None of these 10. 36 is what percent of 30? C) 120% D) 72% E) None of these A) 83.3% B) 90% SETAS-­‐SOT  2012     4   11. A) 90 6 is 15% of what number? B) 0.9 C) 2.5 D) 40 E) None of these 12. The population of Snowtown was 4500 in 1990. In 1994, it had decreased to 3600. Find the percent decrease in population during those four years. A) 80% B) 90% C) 16.2% D) 20% E) None of these 13. You receive a grade of 75% on a test......

Words: 2346 - Pages: 10

Free Essay

Test

...reverse chronological order. You can add tags to your pips, and you can post them with any name you like. In addition, you can delete your pips. AngularJS 101: A Beginner’s Tutorial Karmen Blake This tutorial on AngularJS will guide you through the fundamentals of the framework. You will explore the exciting benefits of using a client-side JavaScript framework to create dynamic and modern web applications. JEDI SENATUS: an italian open source project aims towards the systematic software reuse in organizations Ciro D’Urso, Alberto Persello, David Visicchio JEDI is a J2EE application that provides a centralized service aiming at significantly simplifying the generation of data driven documents in an enterprise environment. JUnit Test Should Include Assert Damian Czernous A static code analysis is an important part of the software development life cycle, but like every tool, it must be adjusted adequately to the reality of the project. 4 AngularJS Starter Kit Wrap collections Damian Czernous 53 58 60 The essence of Object Oriented Programming (OOP) can be captured by three words: polymorphism, inheritance and encapsulation (PIE). In the end, these terms represent specific object design concepts It takes time to gain proficiency in using PIE during software development process e.g. wrapping data collections can be seen as an example of encapsulation. It’s really awesome how wrapped collections look and how they release engineers from thinking......

Words: 22760 - Pages: 92

Free Essay

Test

...Test   Paper  Test.  How  does  this  work?Test   Paper  Test.  How  does  this  work?    Test   Paper  Test.  How  does  this  work?   Test   Paper  Test.  How  does  this  work?    vvvTest   Paper  Test.  How  does  this  work?   Test   Paper  Test.  How  does  this  work?   Test   Paper  Test.  How  does  this  work?Test   Paper  Test.  How  does  this  work?   Test   Paper  Test.  How  does  this  work?   Test   Paper  Test.  How  does  this  work?     Test   Paper  Test.  How  does  this  work?Test   Paper  Test.  How  does  this  work?    Test   Paper  Test.  How  does  this  work?   Test   Paper  Test.  How  does  this  work?    vvvTest   Paper  Test.  How  does  this  work?   Test   Paper  Test.  How  does  this  work?   Test   Paper  Test.  How  does  this  work?Test   Paper  Test.  How  does  this  work?   Test   Paper  Test.  How  does  this  work?   Test   Paper  Test.  How  does  this  work?         Test   Paper  Test.  How  does  this  work?Test   Paper  Test.  How  does  this  work?   ...

Words: 351 - Pages: 2

Premium Essay

Test

...This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file. This is a test file....

Words: 336 - Pages: 2

Free Essay

Test

... Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden. Ik test dit met 250 woorden....

Words: 290 - Pages: 2

Premium Essay

Test

... 890,000 infants are born each year. Since the 1960s, each individual born in a hospital is screened soon after birth for medical conditions such as phenylketonuria and sickle cell anemia via obtaining a few drops of blood from the baby’s heel as part of standard hospital procedure, irrespective of parental consent. These tests commonly analyze hormone and protein content from the samples. Each state oversees their own screening program and currently there is little uniformity among the conditions studied. The costs of these tests vary from $15 to $60 and are often covered through state fees and by health insurance plans. The addition of mandatory postnatal genome sequencing would add a tremendous burden to the healthcare system. Whole genome sequencing tests can currently cost around $1000, creating a deficit of around 4 billion dollars a year. Parents would be required to meet with a genetic counselor to interpret the data and the functionality of many genes has yet to be discovered. There is room for tremendous ambiguity without prior research and a shortage of qualified individuals to interpret all the data. False positive test results for genetic tests occur, on average, more than 50 times per every true positive finding according to a study conducted by Kwon et al from JAMA Pediatrics. This could potentially lead to an increase of vulnerable child syndrome, a condition that affects the family of an infant or child who has suffered what the parents believe is a “close......

Words: 551 - Pages: 3

Premium Essay

Test

...Testing Life Cycle (STLC). The different stages in Software Test Life Cycle - Each of these stages have a definite Entry and Exit criteria  , Activities & Deliverables associat In an Ideal world you will not enter the next stage until the exit criteria for the previous stage practically this is not always possible. So for this tutorial , we will focus of activities and delive different stages in STLC. Lets look into them in detail. http://www.guru99.com/software­testing­life­cycle.html 1/12 6/28/2015 Software Testing Life Cycle STLC Requirement Analysis During this phase, test team studies the requirements from a testing point of view to identify requirements. The QA team may interact with various stakeholders (Client, Business Analyst, System Architects etc) to understand the requirements in detail. Requirements could be eith (defining what the software must do) or Non Functional (defining system performance /secur .Automation feasibility for the given testing project is also done in this stage. Activities Identify types of tests to be performed.  Gather details about testing priorities and focus. Prepare Requirement Traceability Matrix (RTM). Identify test environment details where testing is supposed to be carried out.  Automation feasibility analysis (if required). Deliverables RTM Automation feasibility report. (if applicable) Test Planning This phase is also called Test Strategy phase. Typically , in this stage, a......

Words: 1712 - Pages: 7

Free Essay

Test

...Quantitative research methods in educational planning Series editor: Kenneth N.Ross Module John Izard 6 Overview of test construction UNESCO International Institute for Educational Planning Quantitative research methods in educational planning These modules were prepared by IIEP staff and consultants to be used in training workshops presented for the National Research Coordinators who are responsible for the educational policy research programme conducted by the Southern and Eastern Africa Consortium for Monitoring Educational Quality (SACMEQ). The publication is available from the following two Internet Websites: http://www.sacmeq.org and http://www.unesco.org/iiep. International Institute for Educational Planning/UNESCO 7-9 rue Eugène-Delacroix, 75116 Paris, France Tel: (33 1) 45 03 77 00 Fax: (33 1 ) 40 72 83 66 e-mail: information@iiep.unesco.org IIEP web site: http://www.unesco.org/iiep September 2005 © UNESCO The designations employed and the presentation of material throughout the publication do not imply the expression of any opinion whatsoever on the part of UNESCO concerning the legal status of any country, territory, city or area or of its authorities, or concerning its frontiers or boundaries. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means: electronic, magnetic tape, mechanical, photocopying, recording or otherwise, without......

Words: 13966 - Pages: 56