Action Plan Essays (Examples)

Studyspark

Study Document Study Document

Declaration Of Independence

Pages: 4 (1310 words) Sources: 1 Document Type:Lesson Plan Document #:73104267

Social Science Lesson plan Part II
Lesson Title:
American Revolution: Understanding the Declaration of Independence—Vocabulary and Reading Comprehension Lesson plan
Unit Central Historical Question(s):
How did the Declaration of Independence justify the American Revolution?
Subject / Course:
American History
Grade:
8th
Lesson Duration:
… analyze the impact of specific word choices on meaning and tone, including analogies or allusions to other texts.
Narrative Summary of Tasks / action:
1. Anticipatory Set (5 min)
2. Central Historical Question for Lesson (0 min)
3. Teacher Input-delivery of historical content (20 min)
a. Historical … min)
Materials / Equipment:
· Document A: Declaration of Independence
· Document B: Excerpts from Paine’s The Rights of Man
Direct Instruction Lesson plan for Social Science
1. Anticipatory Set
Time: 5 min
Students will engage in a Think-Pair-Share activity in response to the following Question of ……

Studyspark

Study Document Study Document

How To Help Stop Veteran Suicides

Pages: 1 (363 words) Sources: 3 Document Type:Essay Document #:95328557

… of the staggering number of veterans who die from suicide each year and knew how to help stop this problem. Some of the action steps that can be taken in this regard include the following:
1. Raise community awareness of the problem of veteran suicides by disseminating ……

References

References

Albright, D. L. & Borah, E. V. (2017, Spring). Mental health practice with military- and veteran-connected populations. Best Practices in Mental Health, 13(1), 11-13.

Spiva, D. (2019, January). Veterans 50 percent more likely to commit suicide. VFW Magazine, 106(4), 8.

Suicide among veterans. (2016). Department of Veterans Affairs. Retrieved from https://www. mentalhealth.va.gov/docs/2016suicidedatareport.pdf.

Studyspark

Study Document Study Document

Policy On Shift Swapping

Pages: 6 (1887 words) Sources: 2 Document Type:Essay Document #:36684700

… his own name. Shift swapping is a common practice in the agency and occurs when an employee who is scheduled to work makes plan to have another person work on their shift. Shift swapping is carried out in exchange of an agreement to trade shifts or for … who are found guilty of practices that have contributed to financial losses on the part of the agency should be subjected to disciplinary action in line with the agency’s policies and relevant labor laws.
In conclusion, the agency is facing a lawsuit from a part-time employee whose ……

References

References

Bowen, G.A. (2009). Document Analysis as a Qualitative Research Method. Qualitative Research Journal, 9(2), 27-40. DOI: 10.3316/QRJ0902027

Disselkamp, L. (Ed.). (2013). Workforce Asset Management Book of Knowledge. Hoboken, NJ: John Wiley & Sons.

Golden, L. (2015, April 9). Irregular Work Scheduling and Its Consequences. Retrieved May 20, 2020, from  https://www.epi.org/publication/irregular-work-scheduling-and-its-consequences/ 

Paychex. (2019, November 13). How to Manage and Minimize Trading Shifts at Work. Retrieved May 12, 2020, from  https://www.paychex.com/articles/payroll-taxes/how-to-manage-and-minimize-trading-shifts-at-work 

Studyspark

Study Document Study Document

Allied Health And Technology Institute Reopening Guidelines COVID 19

Pages: 11 (3201 words) Sources: 3 Document Type:Essay Document #:35262297

… hours. Between the testing and receipt of results, the individuals will be categorized as ‘suspicious positive’ cases and will enter the institution’s quarantine plan. As the institution lacks residential facilities, suspected individuals will return home and await their results to be provided in not more than 48 … cleared by the SHS to return to campus, while the confirmed positive cases will be required to adhere to the isolation and quarantine plan until they are confirmed negative by their healthcare provider and cleared to return by the SHS upon the provision of relevant documentation. Regular … rumors that could cause unnecessary panic. The school will conduct regular communication to update students, faculty, and staff about academic outcomes and the plan for continuing lectures to reduce uncertainty and anxiety.
h) Communication Strategy
In the case of a suspected test, the institution will notify DC … immediately reach out to contacts……

References

References

CDC (2019). Operating Schools during Covid-19: CDC’s Considerations. Center for Diseases Prevention and Control (CDC). Retrieved from  https://www.cdc.gov/coronavirus/2019-ncov/community/schools-childcare/schools.html 

DC Health (2020). Health Notice for district of Columbia Healthcare Providers . DC Health. Retrieved from  https://dchealth.dc.gov/sites/default/files/dc/sites/doh/publication/attachments/COVID-19_HAN_20200305_Final_update.pdf 

WHO (2020). Key Messages and Actions for Covid-19 Prevention and Control in Schools. World Health Organization. Retrieved from  https://www.who.int/docs/default-source/coronaviruse/key-messages-and-actions-for-covid-19-prevention-and-control-in-schools-march-2020.pdf?sfvrsn=baf81d52_4 

Studyspark

Study Document Study Document

Enterprise Risk Management In Wells Fargo During The Pandemic

Pages: 15 (4587 words) Sources: 15 Document Type:Essay Document #:32848070

… (one domestic and two international) implement Enterprise Risk Management.
Critical Analysis and Comparison of ERM with Traditional Risk Management
ERM is simply a plan-based business strategy, the purpose of which is to identify, evaluate, and reduce the impact of potential dangers, threats, and challenges that could be … to reduce exposure to these risks by preparing for them through safety mechanisms, altering strategy so as to avoid them, or developing a plan to meet these challenges head-on. The aim of ERM is to address the issue of risk holistically, comprehensively and from the macro perspective … relevant risks while simultaneously understanding and preparing for accepted risks that cannot be avoided if the organization is going to implement its business plan. From this perspective, strategy risk is accepted risk that comes with the opportunity to do business (plan & Mikes, 2012).
ERM is essentially an extension of traditional risk management……

References

References

Beasley, M. (2020). How to Leverage ERM Principles to Better Respond to COVID-19-Related Risks. ERM Professional Insights.

Derysh, I. (2020). Watchdog questions why Wells Fargo reported giving only one large PPP loan to a Black-owned business. Retrieved from  https://www.salon.com/2020/07/22/watchdog-questions-why-wells-fargo-reported-giving-only-one-large-ppp-loan-to-a-black-owned-business/ 

English, C. (2020). Wells Fargo Forced to Cut Its Dividend After Fed Stress Test. Here’s What Other Banks Did. Retrieved from  https://www.barrons.com/articles/wells-fargo-forced-to-cut-its-dividend-after-fed-stress-test-51593467664 

Hall, J. (2007). Internal Auditing and ERM: Fitting in and Adding Value. Retrieved from  https://global.theiia.org/about/about-the-iia/Public  Documents/Sawyer_Award_2007.pdf

Kaplan, R. & Mikes, A. (2012). Managing risks: A new framework. Harvard Business Review, 3.

Lewis, M. (2010). The Big Short. NY: W. W. Norton.

Lundqvist, S. (2014). Abandoning Silos for Integration: Implementing Enterprise Risk Management and Risk Governance. Lund University.

Morgenson, G. (2020). More Wells Fargo customers say the bank decided to pause their mortgage payments without asking. Retrieved from https://www.nbcnews.com/business/personal-finance/more-wells-fargo-customers-say-bank-decided-pause-their-mortgage-n1234610

Studyspark

Study Document Study Document

FBI Drugs And WMDs

Pages: 11 (3378 words) Sources: 13 Document Type:Research Paper Document #:66505511

… incident to spark that focus—but it was an important factor in the development of a new counterproliferation strategy that would inevitably become the plan to stop the spread and usage of WMDs by terrorists against America. As the primary research question of this study is “In what … and ideological challenges." Australian Journal of International Affairs 58, no. 2 (2004), 242.]
Literature Review
The Development of a Strategy
As Mauroni points out, the plan to stop the spread and usage of WMDs by terrorists against America and American interests was “based on a counterproliferation strategy developed in … of rogue nations to possess WMDs is a threat to the international community, which means that there must be a high level of action, cooperation, collaboration, and communication among the allied nations of the international community. A counterproliferation strategy that does not have this level of collaboration … been identified by the Commission……

References

Bibliography

Arnold, Aaron and Daniel Salisbury, “The Long Arm,” Belfer Center, 2019. https://www.belfercenter.org/publication/long-arm

Carter, Ashton B. "Overhauling counterproliferation." Technology in Society 26, no. 2-3 (2004): 257-269.

The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. “Combating Proliferation of Weapons of Mass Destruction,” Washington, D.C., 1999.

FBI. “COINTELPRO.”  https://vault.fbi.gov/cointel-pro 

FBI Counterproliferation Center. “About.”  https://www.fbi.gov/about/leadership-and-structure/national-security-branch/fbi-counterproliferation-center 

Fischer, Rowena Rege. “Guide to the Study of Intelligence: Counterproliferation,” Journal of U.S. Intelligence Studies 21, no. 1 (Winter 2014-15), 78-82.

Liow, Joseph Chinyong. "The Mahathir administration's war against Islamic militancy: operational and ideological challenges." Australian Journal of International Affairs 58, no. 2 (2004): 241-256.

Manchikanti, Laxmaiah, Jaya Sanapati, Ramsin M. Benyamin, Sairam Atluri, Alan D. Kaye, and Joshua A. Hirsch. "Reframing the prevention strategies of the opioid crisis: focusing on prescription opioids, fentanyl, and heroin epidemic." Pain physician 21, no. 4 (2018): 309-326.

Studyspark

Study Document Study Document

Counterintelligence

Pages: 12 (3490 words) Sources: 6 Document Type:question answer Document #:11133529

… National Counterintelligence Strategy of the United States of America 2016 (Strategy), 5. https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf]
Automation is another key aspect of the strategy and ONCIX plan to use automated records checkers to help identify applicable counterintelligence information that would assist in identifying an insider threat.[footnoteRef:4] Risk management is also … protocol are more likely to be followed, as everyone will know that everything they do is being watched and monitored and that any action out of the ordinary will be flagged and compared to other anomalies to determine whether the actor is an FIE.
The organization supports … whether the actor is an FIE.
The organization supports this culture with technological programs that assist in the monitoring of individuals and their action. This two-pronged approach uniting a workplace culture with a technical methodology of monitoring and evaluating employee action to determine anomalies and potential insider threats is comprehensive and cohesive and……

References

Bibliography

Counter intelligence for National Security, CIA, 1993. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol2no4/html/v02i4a10p_0001.htm

Johnston, David and James Risen, “U.S.had evidence of espionage,” New York Times, 2001. https://www.nytimes.com/2001/02/23/us/us-had-evidence-of-espionage-but-fbi-failed-to-inspect-itself.html

National Counterintelligence Strategy of the United States of America 2016 (Strategy).  https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf 

Prunckun, Hank. 2012. Counterintelligence Theory and Practice, Lanham: Rowman&Littlefield Publishers Inc. Read the following: Chapters 8 to 14, pages 131 to 217. Appendices A to D, pages 219 to 231.

Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September 17). National Security Archive. Accessed January 19, 2017.  http://nsarchive.gwu.edu/NSAEBB/NSAEBB230/ .

Van Cleave, Michelle. “Strategic Counterintelligence: What Is It and What Should We Do About It ?” 2007. CIA Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html

Studyspark

Study Document Study Document

Application Of Quality And Safety Concepts

Pages: 11 (3179 words) Sources: 8 Document Type:Case Study Document #:72132391

… mortality attributed to feared risks like motor accidents, AIDS and breast cancer. The term ‘clinical error’ may be described as non-completion of an action according to plan or employing the wrong plan for accomplishing an objective. The issues which mostly crop up whilst delivering healthcare services to patients include wrong transfusions, adverse medication related events, … HITs on patient safety result improvements. It was concluded that HIT gives rise to patient safety improvements through decreasing clinical errors and adverse action to medication, in addition to improving adherence to clinical practice guidelines. Furthermore, it was concluded that HIT constitutes a key instrument when it … The authors classified 41 research works through the use of inductive thematic studies with open coding. They utilized 3 pre-established groups, namely, prevention, action, and identification. Coding helped create 3 more groups, namely, challenges, location, and outcomes. This research aimed at providing a basis to……

References

Bibliography

Alotaibi, Y. K., & Federico, F. (2017). The impact of health information technology on patient safety. Saudi Med J, 38(12), 1173–1180.

Amit, M. (2019, January 28). 5 Problems Which Healthcare Technology Can Solve for a Healthier World. Retrieved from Net Solutions:  https://www.netsolutions.com/insights/5-healthcare-problems-which-digital-technologies-can-solve-for-a-fit-and-healthy-world/ 

DeSanctis, G., & Poole, M. S. (1994). Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory. Organization Science, 5(2), 121-147.

Feldman, S. S., Buchalter, S., & Hayes, L. W. (2018). Health Information Technology in Healthcare Quality and Patient Safety: Literature Review. JMIR Med Inform, 6(2).

Halamka, J., Mandl, K., & Tang, P. (2008). Early Experiences with Personal Health Records. Journal of the American Medical Informatics Association, 15(1), 1-7.

IOM. (1999). To Err is Human: Building a Safer Health System. National Academy of Sciences.

Singh, H., & Sittig, D. (2016). Measuring and improving patient safety through health information technology: The Health IT Safety Framework. BMJ Quality & Safety, 25, 226-232.

Weigel, F., Hall, D. J., & Landrum, W. H. (2009). Human/Technology Adaptation Fit Theory for Healthcare. SAIS 2009 Proceedings.

Studyspark

Study Document Study Document

Harpers Ferry Raid

Pages: 7 (1983 words) Sources: 6 Document Type:Research Paper Document #:35837474


John Brown was a fervent abolitionist who believed pacifism would never be sufficient to end slavery. He was a man who insisted on action—violent action if necessary (McGlone). During the Bleeding Kansas crisis, Brown had been in the thick of the violence, leading men in several battles and … up going into the tanning business. In the 1840s he was inspired by other abolitionists like Frederick Douglass and Sojourner Truth to take action. He assisted in the Underground Railroad project and got to know Douglass and others by creating an abolitionist center in Massachusetts. Brown helped … warred upon those who facilitated slavery (Furnas). As Brown gained experience in his raids, he plotted a bigger attack on the South, a plan armed slave revolt. He had his sights set on the arsenal at Harpers Ferry. Douglass opposed the scheme believing it would fail—but Brown … sights set on the……

References

Works Cited

Barney, William L. "Brown, John". The Civil War and Reconstruction: A Student Companion. New York: Oxford University Press, Inc., 2001.

Furnas, J. C. The Road to Harpers Ferry. New York, William Sloane Associates, 1959.

Hoffer, Williamjames Hull. The Caning of Charles Sumner: Honor, Idealism, and the Origins of the Civil War. Johns Hopkins University Press, 2010.

Horwitz, Tony. Midnight Rising: John Brown and the Raid That Sparked the Civil War. Henry Holt and Company, 2011. 

McGlone, Robert E. John Brown's War against Slavery. Cambridge, CUP, 2009.

Smith, Ted A., Weird John Brown: Divine Violence and the Limits of Ethics. Stanford, CA: Stanford University Press, 2015.

Studyspark

Study Document Study Document

Emergency Managers And Climate Risk

Pages: 7 (2056 words) Sources: 6 Document Type:Essay Document #:49338362

… to the question, “When you enter the field, what can you highly educated individuals do to ensure that you are informed about and plan for ALL high risk hazards, climate risks included?” To this end, an examination of the current issues facing emergency managers plan for climate risks is followed by a discussion concerning some success stories in plan for climate risks as well as a description concerning how these successes were achieved. Finally, an assessment concerning how this information can be … climate risks and emergency management in the paper’s conclusion.
Review and Discussion
What issues current emergency managers are running into when trying to plan for climate risks?
Despite a growing body of scientific evidence that confirms climate change is a reality, many policymakers and public officials still … Alley. It is important to note, however, that climate change is introducing a number of novel risks for……

References

References

Edwards, F. L. (2011, Spring). Symposium: Preparing for climate change. The Public Manager, 40(1), 20-25.

IPCC Working Group II. (2014). Assessing and managing the risks of climate change. Retrieved from https://www.ipcc.ch/site/assets/uploads/2018/03/WGIIAR5_SPM_Top_Level_ Findings-1.pdf.

Labadie, J. R. (2011). Emergency managers confront climate change. Sustainability, 3, 1250-1264.

Leven, R. & Goldstein, Z. (2019). Kentucky is among the states blocking climate action. As weather gets more extreme, its residents — and U.S. taxpayers — are paying a price. Public Integrity. Retrieved from  https://publicintegrity.org/environment/one-disaster-away/a-dangerous-disconnect-disaster-prone-states/ .

Mickus, J. (2017, June 1). A Sugar Creek chronicle: Observing climate change from a Midwestern woodland. Perspectives on Science and Christian Faith, 69(2), 110-114.

The Nature Conservancy. (2020). Pennsylvania climate solutions. Retrieved from https://www. nature.org/en-us/about-us/where-we-work/united-states/pennsylvania/stories-in-pennsylvania/pennsylvania-climate-solutions/.

Join thousands of other students and

"spark your studies".