top of page

In Processing of Scholarship Awardees

In Processing of Scholarship awardees

 

Scholarship awardee receives notification of their acceptance to the program

 

Scholarship awardee receives their personal scholarship package.  Said personal scholarship package to include:

 

Personalized business cards

Personalized executive binder

Personalized executive briefcase

Personalized laptop

Personalized / secure cell - phone[i]

Personalized radio frequency identification protected cell phone / credit card / identity card container

 

Scholarship awardee attends the scholarship awardee / acceptance dinner event

 

Scholarship awardee attends orientation process (scheduled on the day following awardee acceptance dinner) that outlines

 

The history / origins of the institution

The mission statement / mission goals of the institution

The principles the institution observes

The schedules of regular institutional events

 

Strategic partnerships the institute has with other organizations

 

Internships offered during summer months

 

Scholarship awardee scheduled meeting with an image consultant [ii]

 

Scholarship awardee meets with tailor to get custom tailored suits made, pursuant to image consultant’s guidelines

 

Scholarship awardee undergoes a initial assessment with a medical doctor / general practitioner (Doctor Kumar) to outline / document any specific health needs of the scholarship awardee

 

Scholarship awardee meets with a nutritionist to set up personalized dietary regimen conducive to supporting cognitive development

[iii]

 

Scholarship awardee attendance of scheduled seminar by an individual identity protection specialist [iv]

 

Scholarship awardee undergoes pre scholarship training – optimally completed in the summer before the applicants first semester

Competitive Cognition 

Case Studies in Counterintelligence Operations[v]

Counterintelligence in a Democratic Society [vi]

Spies, Subversion, Terrorism and Influence Operations [vii]

Political Warfare: Past, Present and Future [viii]

Foreign Propaganda, Perceptions and Policy [ix]

 

_______________________________________

 

[i] http://www.androidauthority.com/u-s-army-to-use-secure-android-devices-soon-33588/http://www.geek.com/articles/mobile/boeing-to-launch-its-own-secure-android-smartphone-20120413/

 

[ii] http://www.aici.org/directory/default.aspx  / http://newleafimageconsulting.com/corporate.html / http://www.professionalimagedress.com/

 

[iii] http://www.nap.edu/openbook.php?record_id=5827&page=519 / http://www.ncbi.nlm.nih.gov/pubmed/12798782 / http://www.nutrition-neuroscience.co.uk/publications/david_kennedy/all/all/publications/asc / http://www.cspo.org/documents/FinalEnhancedCognitionReport.pdf / http://www.military.com/features/0,15240,160921,00.html / http://archive.darpa.mil/DARPATech2002/presentations/ipto_pdf/speeches/SCHMORRO.pdf

 

[iv] http://5identitytheftprotection.com

 

[v] http://www.iwp.edu/programs/course/case-studies-in-counterintelligence-operations

 

[vi] http://www.iwp.edu/programs/course/counterintelligence-in-a-democratic-society-2

 

[vii] http://www.iwp.edu/programs/course/spies-subversion-terrorism-and-influence-operations

 

[viii] http://www.iwp.edu/programs/course/political-warfare-past-present-and-future

 

[ix] http://www.iwp.edu/programs/course/foreign-propaganda-perceptions-and-policy

bottom of page