Preview

RDP Module1 Week3 Part I

Better Essays
Open Document
Open Document
1857 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
RDP Module1 Week3 Part I
ETHIOPIAN CIVIL SERVICE UNIVERSITY

MASTERS IN URBAN PLANNING AND DEVELOPMENT
COURSE: URBAN AND REGIONAL DEVELOPMENT PLANNING
MODULE 1: Basic Concepts and Theories in Regional Planning

SEMESTER 1, WEEK 3

SESSION OBJECTIVES/ LEARNING OUTCOMES

At the end of the session, students will be able:
• To describe the concept of growth poles
• To explain the policy implications of a growth pole strategy • To identify the factors to be considered in gauging the effectiveness/ impact of growth pole strategies

SESSION OUTLINE










Origins of the growth pole concept
Growth pole as a dominant firm/industry
Growth pole as a geographic concept
Gauging the impact of growth pole strategies
The appeal to adopt growth pole strategies
Effectiveness of growth pole strategies
Renewed interest in growth pole strategies
Recent efforts to adopt growth pole strategies
Growth center strategies

1.Origins of the growth pole concept
• British economist, sir William Petty (1623-1687) is probably the first to coin the concept of a growth pole
(Cf., the fast growth of London during the 17th century)
• French economist Francois Perroux (1903-1987) formalized the concept of growth poles in
1949?/1955?
• A lot is written about the growth pole concept by different authors, some of which are based on empirical studies
• Names associated with the growth pole theories:
Perroux, Boudeville, Hirshman, Myrdal, Friedman and many more

Origins… Cont’d
• Perroux originally defined growth poles as abstract economic space: “a centre in abstract economic space from which centrifugal forces emanate and to which centripetal forces are attracted. Each center being center of attraction and revulsion has its own field, which is in the field of other centers”

Origins… Cont’d
• Originally the growth pole concept was referring to a single innovative firm (propulsive industry) that grows fast to dominate other industries linked to it : “Growth pole is a set of industries capable of generating

You May Also Find These Documents Helpful

  • Satisfactory Essays

    First of all, glad to hear from you again after giving you some pointers regarding those interns and your merchandising team.…

    • 190 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Would you recommend a RAID setup? If so, what RAID level? If not, what would you suggest for fault tolerance?…

    • 868 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    I can understand your concern with your network security and better securing your information without losing productivity. You can set up your users to have their passwords be changed at a certain time and I would recommend a short amount of time in-between. And also you can have the passwords be in a certain context or to be made a certain way and make sheer that the security levels are high on them so that a hacker has a harder time to get in to the network. I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “JVentura10415867@Domain*%$.Local” if someone tried to hack the account and all that they knew was the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. Can also buy better security items to better your network things like smart card, finger print scanners, retinal scanners, and others. But I only recommend these for really sensitive information and only for certain users in your company. I hope that this has helped you in any way and I wish the best of luck to you.…

    • 327 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Rlt2 Task 3

    • 273 Words
    • 2 Pages

    Angela really needs support as she is finding very difficult coping with the children’s, and she get so stressed some times and takes it out on Ricky .Getting support will help her to be less stressed. Angela and Ricky can have a mother and child healthy relationships. Des should take the kids out of the house more affiant and have him staying with him for the weekend just to give Angela time out to relax and not having to worrying about them. Everybody needs time to them self; Since Ricky doesn’t go to play school could stay with Angela’s mother some times. Angela is…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2846338 involve privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority.…

    • 552 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Answer the following questions, using information from this week’s readings. Respond to each question in 100 to 200 words.…

    • 691 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    “Using an anonymous current client or one you have worked with in the past, apply the methods discussed in this module to their case and discuss what you think could have been achieved.”…

    • 3028 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    The beginning of chapter 5 discusses the importance of cryptography and the legislative issues that surround government access. The debate of whether the government should have access to all encryptions we use, ultimately giving them total ability to read all communication to help fight crime and terrorism or if that is a breach of personal space. As the text attests to, "the tension between enabling secure conduct of electronic commerce and preventing secret communication among outlaws had been in the air for a decade" (Abelson, Ledeen, and Lewis 163). Later however, the government turned to helping citizens and businesses encrypt their messages to ultimately keep more information secure through packets from the construction of a system of routers (Abelson, Ledeen, and Lewis 164). However as technology has improved, the ability to create new encryption systems is…

    • 773 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 537 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    Our text defines self-esteem as “a belief about how a person evaluates his or her self-worth as part of an overall self-evaluation” (Baack, 2012), whereas self-efficacy is the “extent to which people believe they can perform a behavior to produce a particular desired outcome” (Lu, Chang & Lai, 2011). Self-esteem and self-efficacy are interrelated; using this graduate degree from Ashford as an example – having successfully completed an undergraduate degree with honors at Ashford provides me with the high self-efficacy that I can also complete a graduate degree. Similarly, completing courses with good grades boosts self-esteem by reinforcing a positive self-image. On the contrary, if a person failed to achieve a goal, like graduating from college, their self-esteem would be low(er) and their self-efficacy about higher education would also be low. An external forces that can impact self-efficacy are persuasion and encouragement. These forces can come from peers, colleagues, family, or romantic partners (Baack, 2012), and help to strengthen a person’s innate belief in themselves, which can translate into successes in other areas of their life.…

    • 249 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Emotional intelligence (EI) can be described as “a person's ability to detect and manage emotional cues and information” (Baack, 2012), and it is comprised of five features: self-awareness, self-management, self-motivation, empathy, and social skills. Cognitive abilities are skills that allow people the capability to process information, reason, remember, and relate whereas non-cognitive abilities can include things like “persistence, self-control, curiosity, conscientiousness, grit and self-confidence” (Tough, 2013). EI by any definition is really a combination of cognitive and emotional abilities; “the essence of EI is the integration of the emotional centers of the brain and the cognitive centers…EI [is] a set of skills that involve processing information about emotion” (Singh, 2008). I employ emotional intelligence on a daily basis when interacting with strangers while out running errands. Having the wherewithal to discern another person’s mood or intention based on their non-verbal cues and their willingness to engage in conversation or interaction draws from the empathy, self-awareness, and social skills or EI.…

    • 244 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The Internet Protocol (IP) sits in the middle of the five-layer TCP/IP model. IT provides service to the layers above it and receives services from the layers below it. Almost every computing device on the planet communicates in some way, and most of those use IP. IP exists as an Internet standard protocol, also called ipv4, although it is mostly just referred to as IP. IP was created in the 1970s, but did not reach standard status as the IPv4 RFC until the 1980s.…

    • 360 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    5. Which of the following server operating systems can be used when the domains in Windows Server 2008 Active Directory are set at the Windows Server 2003 domain functional level? (Choose all that apply.)…

    • 772 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    BSBADM502B Manage meetings 2

    • 3256 Words
    • 12 Pages

    What are the different types of formal meetings that might be held in a workplace and what purpose do they serve?…

    • 3256 Words
    • 12 Pages
    Good Essays
  • Good Essays

    Module 3 Discussion

    • 552 Words
    • 3 Pages

    Some businesses choose offshoring to solve the issue of expertise, especially for IT personnel. These companies claim they simply cannot find enough qualified employess in the United States to do certain technology jobs. Do you agree with this assessment? Why or why not?…

    • 552 Words
    • 3 Pages
    Good Essays

Related Topics