Colorado ITS425 Persuasive Encounter Paper

Question # 00651592
Subject: Computer Science
Due on: 12/29/2023
Posted On: 12/29/2023 01:16 AM
Tutorials: 1
Rating:
4.9/5
Question Dot Image

COM 425 CSU Global Campus Persuasive Encounter Paper

Option #1:—Persuasion Focus

For the Portfolio Project you will have the opportunity to apply what you have learned about conflict and persuasion by analyzing a persuasive encounter you have experienced. You will apply and assess the skills and theories presented in this course as they relate to your case study.

To support your application of concepts, terms, techniques, and theories, draw on and discuss at 4-6 credible/academic sources other than our assigned books (the journal articles are okay). The CSU-Global Library is a good place to find credible sources. 

Section One: Introduction—Situation Overview (approximately 2 pages)
Analyze a recent persuasive encounter you have directly experienced (not one described to you by a family member, friend, or coworker). Keep in mind that negotiations involve persuasion, so you can share a recent negotiation or a time when you presented an argument of some sort. In this section, focus on WHAT led to the persuasive encounter. Write a narrative of the persuasive encounter as if you were telling it to another person.

Here are some questions to keep in mind (no need to answer each one; they are offered as possible items for consideration):

  • What was the main issue that was at the core of the persuasive encounter?
  • Who was involved? What were the relationships among those involved? What power, if any, was evident in the relationship(s)?
  • How do you think the other person(s) in the persuasive encounter viewed it?
  • Who else may have been affected by this persuasion?  How did the impact on them affect your approach?
  • Why is the persuasive encounter worthy of analysis? What can you and your reader expect to gain by examining and analyzing the interaction?

Please be specific in use of pronouns and names of people within the interaction. If you want to maintain anonymity of those involved, you may create pseudonyms rather than referring to individuals by position or through some other naming device.

Section Two: Theoretical Connections (approximately 3-4 pages)
The application step of this Portfolio Project incorporates the theoretical perspectives covered in class. To explain your understanding of these theories, indicate which of the following theories of persuasion are most useful for examining the persuasive encounter:

  • Ethos
  • Pathos
  • Logos
  • Identification
  • Culture and its influence on evidence and persuasion

Link this analysis to theory explanations from your assigned readings and outside sources.

Section Three: Skills Assessment (approximately 3-4 pages)
Evaluate the interaction by applying techniques and skills covered in the course. Which of the following methods are applicable to the interaction that is your case study and why?

  • The Negotiation Method
  • BATNA—Best Alternative to a Negotiated Agreement
  • Negotiation jujitsu

Support your position with reference to the assigned readings and your outside sources.

Section Four: Conflict Assessment (approximately 1 page):
How did conflict affect the persuasion encounter? Be sure to use conflict terminology to examine the role of conflict in the persuasive encounter. You could use any of the following:

  • Communication phases and processes in conflict
  • Patterns and cycles in constructive and destructive conflict processes
  • Communication options in conflict
  • The S-T-L-C System
  • Conflict climates
  • Forgiveness and reconciliation

Section Five: Conclusion and Reflection—Your Overall Learning and Future Application (approximately 1 page)
In conclusion, briefly summarize and restate the main point of your essay. Then address your plans for future learning and application of conflict management and/or persuasion skills.

Here are some questions to keep in mind:

  • How have your perspectives changed with regard to conflict management and/or persuasion?
  • What has changed?
  • What hasn’t changed?
  • How do you assess your learning in the class?
  • How do you see yourself engaging in a lifetime of learning about this issue?
Dot Image
Getsolution Posted By :
Questions: 15503 Tutorials: 15502
Tutorials for this Question

Colorado ITS425 Persuasive Encounter Paper

Tutorial # 00650483
Posted On: 12/29/2023 01:16 AM
Feedback Score: Not rated yet!
Purchased By: 2
Getsolution
Posted By:
Questions:
15503
Tutorials:
15502
Report this Tutorial as Inappropriate
Tutorial Preview
The solution of Colorado ITS425 Persuasive Encounter Paper...
Attachments
Colorado_ITS425_Persuasive_Encounter_Paper.ZIP (18.96 KB)

Great! We have found the solution of this question!

Related Questions
Examine the several different types of data insights that occur
Question Examine the several different types of data insights that occur in big data analytics:  ? Offer novel knowledge  ? Provide causation relationships  ? Add a competit …
Computer science - Is virtualisation cost effective
Computer science question Is virtualisation cost effective and does it support green IT? Contents Introduction Is Virtualisation cost effective? Running out of space? Needing Virtualisa …
Studying Computing involves developing both subject
Studying Computing involves developing both subject-specific and transferable skills. Describe the skills you have used prior to university, and discuss how you would expect those skills to develop wh …
Computer Science - Discuss the critical characteristics
Computer Science Question Assignment 1 - Question 1: Discuss the critical characteristics of communication channels in data communications. Explain how bandwidth and communication medium affe …
List and explain two browser add-ons(plug-ins)that improve the security
1- List and explain two browser add-ons(plug-ins)that improve the security of a user’s browser. Why are these features not built-into the browser? 2- What are two security risks associated wi …
How are browsers being used to mine crypto currency
Part A: How are browsers being used to mine crypto currency? (1 pt) Find an example of malvertising. Provide a screen shot of the malvertising. (2 pts) Provide the details on how and where you …
What are the seven categories of cybersecurity functions in the NICE
security awareness What are the seven categories of cybersecurity functions in the NICE Cybersecurity Workforce Framework (https://www.nist.gov/itl/applied-cybersecurity/nice/resources/nice-cybe …
The Computer Mouse - Once a nondescript box perched on a large
The Computer Mouse Once a nondescript box perched on a large ball bearing, today the computer mouse comes in a wide range of shapes with a variety of capabilities. There are cordless mice, ergonomi …
CMSC350 Program that accepts an arithmetic expression
CMSC350 Program that accepts an arithmetic expression The second programming project involves writing a program that accepts an arithmetic expression of unsigned integers in postfix notation and bu …
Week 6 Discussions - Local Security Good Practices
Week 6 Discussions Please respond to at least two main topics  1. Local Security Good Practices Discuss in detail several effective local security practices to harden your Linux distribu …
Recent Questions
Walden HLTH6475 Complete Course Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 1 Discussion INDIVIDUAL RESPONSIBILITY VERSUS VICTIM BLAMING IN HEALTH PROMOTION Part of what makes a discussion a discussion and not a lectur …
Walden HLTH6475 All Quizzes Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 1 Quiz Question 1 Which factors have been found to influence behavior? Socioeconomic Status Skills Culture Attitude Gender A …
Walden HLTH6475 Module 6 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 6 Quiz Question 1 Which method allows study participants to tell their stories?  Observations In-depth individual interview &nbs …
Walden HLTH6475 Module 5 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 5 Quiz Question 1 What alternative term has been suggested recently for hard-to-reach? Marginalized Inaccessible Hard to access Ha …
Walden HLTH6475 Module 4 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 4 Quiz Question 1 Outreach workers from the CeaseFire program spent a total of 500 combined hours with program participants during the first y …
Walden HLTH6475 Module 3 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 3 Quiz Question 1 Which of the following is the construct of the Theory of Reasoned Action that explains behavior based on what we think other …
Walden HLTH6475 Module 2 Quiz Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 2 Quiz Question 1 If the program is aimed at a true population, the term is called ______________. Intended population Intended audience …
Walden HLTH6475 All Assignments Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 2 Assignment LANNING MODELS ARTICLE REVIEW The published literature is rich with examples of health promotion programs that have utilized the …
Walden HLTH6475 Module 6 Assignment Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 6 Assignment EVALUATION PLAN Once the program has been designed, it is time to consider how the program will be evaluated. To design an evalu …
Walden HLTH6475 Module 5 Assignment Latest 2024
HLTH6475 Prgm Plan, Implement & Eval Module 5 Assignment  DEVELOPING EVALUATION QUESTIONS Evaluation takes place at various points within a program's life cycle. It requires di …