Action Research Essays (Examples)

Studyspark

Study Document Study Document

Weapons Of Mass Destruction

Pages: 9 (2563 words) Sources: 10 Document Type:Research Paper Document #:76982977

… the use of international treaties, the rise of terrorism, and counter-proliferation strategies, this paper will assess the measures available for achieving the aim.
research Question
What can nations do to prevent or reduce the risk of CBRN WMD attacks?
Literature Review
International Strategies
While international treaties may … by the FBI may work to some degree, but these efforts require a great deal of collaboration among nations and agencies, and other action are being taken at state department levels that undermine what these agencies are doing. In the end, there is a lot of uncertainty ……

References

References

Asada, M. (2008). Security Council Resolution 1540 to combat WMD terrorism: effectiveness and legitimacy in international legislation. Journal of Conflict & Security Law, 13(3), 303-332.

Carter, A. B. (2004). Overhauling counterproliferation. Technology in Society 26(2-3), 257-269.

CBS. (2011). Clinton on Qaddafi: We came, we saw, he died. Retrieved from  https://www.youtube.com/watch?v=mlz3-OzcExI 

The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. (1999). Combating Proliferation of Weapons of Mass Destruction. Washington, D.C.

Forest, J.J.F. (2012, Winter). Framework for Analyzing the Future Threat of WMD Terrorism. Journal of Strategic Security 5, 4. Retrieved from  http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1193&context=jss 

Hochman, D. (2006). Rehabilitating a rogue: Libya's WMD reversal and lessons for US policy. Parameters, 36(1), 63.

Lang, C. G. (1937). Archbishop's Appeal: Individual Will and Action; Guarding Personality. London Times, 28.

Stone, O., & Kuznick, P. (2013). The untold history of the United States. Simon and Schuster.

Studyspark

Study Document Study Document

FBI Drugs And WMDs

Pages: 11 (3378 words) Sources: 13 Document Type:Research Paper Document #:66505511

… counterproliferation strategy that would inevitably become the plan to stop the spread and usage of WMDs by terrorists against America. As the primary research question of this study is “In what ways can the nonproliferation regime connect and collaborate with homeland security as a way to improve … of rogue nations to possess WMDs is a threat to the international community, which means that there must be a high level of action, cooperation, collaboration, and communication among the allied nations of the international community. A counterproliferation strategy that does not have this level of collaboration … The Commission was established in 1998 and its report was presented the following year to Congress. The Commission observed that to stop proliferation, action must be taken both domestically and abroad, but that overall the strategy “requires specific mechanisms to plan and execute operational responses to the … plan and execute operational responses……

References

Bibliography

Arnold, Aaron and Daniel Salisbury, “The Long Arm,” Belfer Center, 2019. https://www.belfercenter.org/publication/long-arm

Carter, Ashton B. "Overhauling counterproliferation." Technology in Society 26, no. 2-3 (2004): 257-269.

The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. “Combating Proliferation of Weapons of Mass Destruction,” Washington, D.C., 1999.

FBI. “COINTELPRO.”  https://vault.fbi.gov/cointel-pro 

FBI Counterproliferation Center. “About.”  https://www.fbi.gov/about/leadership-and-structure/national-security-branch/fbi-counterproliferation-center 

Fischer, Rowena Rege. “Guide to the Study of Intelligence: Counterproliferation,” Journal of U.S. Intelligence Studies 21, no. 1 (Winter 2014-15), 78-82.

Liow, Joseph Chinyong. "The Mahathir administration's war against Islamic militancy: operational and ideological challenges." Australian Journal of International Affairs 58, no. 2 (2004): 241-256.

Manchikanti, Laxmaiah, Jaya Sanapati, Ramsin M. Benyamin, Sairam Atluri, Alan D. Kaye, and Joshua A. Hirsch. "Reframing the prevention strategies of the opioid crisis: focusing on prescription opioids, fentanyl, and heroin epidemic." Pain physician 21, no. 4 (2018): 309-326.

Studyspark

Study Document Study Document

The Rise Of The Opium Trade In Afghanistan Following The US Invasion

Pages: 14 (4271 words) Sources: 15 Document Type:Research Paper Document #:85024812

… remain justifiable from the standpoint of religious and social critique. Strategy focuses on the whole picture, from moving the cause along with implementable action items to mobilizing members to advance that action and promote the ideology that supports it. Tactics refers to the development of a spirit of mission where a command-and-control structure is in … them or aligned themselves against the US forces and their allies in Afghanistan.
Initial victory was not far off: the strategy combined military action with the application of law enforcement, the seizure and freezing of financial assets, and calls for international support (Pavlova, 2004). The US built ……

References

References

Almukhtar, S. & Nordland, R. (2019). What Did the U.S. Get for $2 Trillion in Afghanistan? Retrieved from  https://www.nytimes.com/interactive/2019/12/09/world/middleeast/afghanistan-war-cost.html 

Barno, D. (2007). The Other War: Counterinsurgency Strategy in Afghanistan 2003– 20. Military Review, 87(5), 32–44.

Barton, G. (2016). Out of the ashes of Afghanistan and Iraq: the rise and rise of Islamic State. Retrieved from  https://theconversation.com/out-of-the-ashes-of-afghanistan-and-iraq-the-rise-and-rise-of-islamic-state-55437 

Felbab-Brown, V. (2017). Afghanistan’s opium production is through the roof—why Washington shouldn’t overreact. Retrieved from  https://www.brookings.edu/blog/order-from-chaos/2017/11/21/afghanistans-opium-production-is-through-the-roof-why-washington-shouldnt-overreact/ 

FM 3-24. (2014). Retrieved from  https://fas.org/irp/doddir/army/fm3-24.pdf 

Hitz, F. P. (1999). Obscuring Propriety: The CIA and Drugs. International Journal of Intelligence and CounterIntelligence, 12(4), 448-462.

IrishTimes. (2001). Britain freezes £61m of suspected Taliban assets. Retrieved from  https://www.irishtimes.com/news/britain-freezes-61m-of-suspected-taliban-assets-1.398565 

Kiras, J. D. (2002). Terrorism and Irregular Warfare, in John Baylis, James Wirtz, Eliot Cohen and Colin Gray eds., Strategy in the Contemporary World (Oxford: Oxford University Press, 2002), 208–232.

Studyspark

Study Document Study Document

Army Organization Analysis Equal Opportunity Program

Pages: 5 (1483 words) Sources: 5 Document Type:Research Paper Document #:96709465

… also helps to clarify the contextual variables impacting the environment. Applying organizational metaphors and exploring alternative theories will also help develop an informed action plan for resolving current challenges. Colonel S serves in a position of leadership, and therefore has direct connection to the Equal Opportunity Program. … are most at risk for victimization.
What the Equal Opportunity Program provides is a set of overarching values and ethics that permeates all action and behaviors within every single unit, team, or department. Yet the act of constructing those shared values requires the participation of all personnel. … unit, team, or department. Yet the act of constructing those shared values requires the participation of all personnel. Any time someone perceives an action or affront, however seemingly small, that issue or complaint needs to be brought to the surface and dealt with immediately and in accordance … opportunity for growth and resolution.……

References

References

“The Army Values,” (n.d.). Retrieved from:  https://www.army.mil/values/ 

Daft, R. L. (2016). Organization Theory & Design (12th ed.). Boston, MA: Cengage Learning.

Morgan, G. (2006). Images of organization. Sage Publications, Inc

Schein, E. H. (1992). Organizational Culture and Leadership. 2nd ed. San Francisco: Jossey-Bass Publishers.

United States Army (2014). Army equal opportunity program. Retrieved from:  https://www.army.mil/standto/archive_2014-03-21/ 

Studyspark

Study Document Study Document

Natural Law In Catholic Social Teaching

Pages: 11 (3338 words) Sources: 5 Document Type:Research Paper Document #:14149927

… for charity for the underserved; 5) Solidarity, which refers to the need for peace, justice, faith and charity to be interwoven into human action around the world; 6) Care for God’s Creation, which emphasizes the value of taking care of the environment rather than mistreating and abusing ……

References

Bibliography

Barton, George Aaron. A critical and exegetical commentary on the book of Ecclesiastes. Vol. 17. Scribner, 1908.

Hunt, Lynn. \\\\\\"Introduction: The Revolutionary Origins of Human Rights.\\\\\\" In The French Revolution and Human Rights: A Brief History with Documents, 2nd Edition, edited by Lynn Hunt, 1-31. Boston: Bedford, 2016 National Assembly. “Declaration of the Rights of Man and Citizen, 26 August 1789.”

Liberte, Egalite, Fraternite. Accessed November 4, 2019. http://chnm.gmu.edu/revolution/exhibits/show/liberty--equality--fraternity/item/3216

Pope, Stephen J. “Natural Law in Catholic Social Teachings.”  https://www.bc.edu/content/dam/files/centers/boisi/pdf/f09/Pope_Natural_Law_In.pdf 

United States Conference of Catholic Bishops, “Seven Themes of Catholic Social Teaching,”  http://www.usccb.org/beliefs-and-teachings/what-we-believe/catholic-social-teaching/seven-themes-of-catholic-social-teaching.cfm 

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… this paper, the processes information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT security auditing constitutes a significant step in the safeguarding of corporate data against cybercrime, data breaches, and fraud. It … of thorough logs of access time, credentials of the accessing individual, and whether a security breach was attempted constitutes a second essential security action. The above details prove highly informative to system auditors.
Audit frameworks
i. ISO 27001 Framework
ISO 27001, a kind of taxonomy of potential … the safety of audit instruments and information for use in the future or the subsequent audit; (6) follow-up and improvements – undertaking corrective action where needed.
As information systems grow ever more sophisticated, security auditing is becoming increasingly challenging; however, security auditors have automated audit tools at ……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Quality And Sustainability In Health Care

Pages: 7 (2140 words) Sources: 7 Document Type:Research Paper Document #:49381937

… visits, they could ask questions and share their experiences. In this way, Kenneth's staff will get the opportunity to see the program in action, interact with colleagues who are using telehealth on a daily basis, and gain firsthand knowledge on how telehealth services can benefit their facility. ……

References

References

Alenius-Smeds, L., Tishelman, C., Lindqvist, R. Runesdotter, S. & McHugh, M.D. (2016). RN assessments of excellent quality of care and patient safety are associated with significantly lower odds of 30-day inpatient mortality: A national cross-sectional study of acute-care hospitals. International Journal of Nursing Studies. Retrieved from http://dx.doi.org/10.1016/j.ijnurstu.2016 (06)005

Brasait?, I., Kaunonen, M., Martink?nas, A., Mockien?, V., & Suominen, T. (2016). Health care professionals’ skills regarding patient safety. Medicina, 52(4), 250-256. doi:10.1016/j.medici.2016.05.004

Campbell, R. J. (2008). Change Management in Health Care. The Health Care Manager, 27(1), 23-39. Retrieved from  https://www.ncbi.nlm.nih.gov/pubmed/18510142 

Hughes, R.G. (2007). "3 Barriers to quality improvement and quality improvement research." Institute of Medicine (IOM). Advancing quality improvement research: Challenges and opportunities: Workshop summary. doi:10.17226/11884.x

Lennox, L., Maher, L., & Reed, J. (2018). Navigating the sustainability landscape: a systematic review of sustainability approaches in healthcare. Implementation science: IS, 13(1), 27. doi:10.1186/s13012-017-0707-4

Stetler C.B., Ritchie J.A., Rycroft-Malone J. & Charns M.P. (2014) Leadership for evidence-based practice: strategic and functional behaviors for institutionalizing EBP. Worldviews on Evidence Based Nursing 11(4), 219–226.

Twigg, D. E., Pugh, J. D., Gelder, L., & Myers, H. (2016). Foundations of a nursing-sensitive outcome indicator suite for monitoring public patient safety in Western Australia. Collegian, 23(2), 167-181. doi:10.1016/j.colegn.2015.03.007

Studyspark

Study Document Study Document

Global Boycott Divestment And Sanctions Movement

Pages: 5 (1417 words) Sources: 6 Document Type:Research Paper Document #:75753246

… very least. The BDS movement is a way for Americans and others all over the world to protest what they see as intolerable action on the part of Israel towards the people of Palestine, people who are everyday 100x more oppressed and victimized than the people of ……

References

References

Aridan, N. (2019). Israel Lobby. Israel Studies, 24(2), 128-143.

Cohen, M. S., & Freilich, C. D. (2018). War by other means: the delegitimisation campaign against Israel. Israel Affairs, 24(1), 1-25.

Gazit, N. (2015). State-sponsored vigilantism: Jewish settlers’ violence in the occupied Palestinian territories. Sociology, 49(3), 438-454.

Kaposi, D. (2016). On the possibility of critiquing Israel: The Times’ engagement with Israel’s deployment of white phosphorous during the first Gaza war. Media, War & Conflict, 9(3), 272-289.

Sheskin, I. M., & Felson, E. (2016). Is the Boycott, Divestment, and Sanctions Movement Tainted by Anti-Semitism?. Geographical Review, 106(2), 270.

UN. (2019). Israel’s Exploitation of Palestinian Resources is Human Rights Violation, Says UN Special Rapporteur for the Situation of Human Rights in the OPT. Retrieved from  https://www.un.org/unispal/document/israels-exploitation-of-palestinian-resources-is-human-rights-violation-says-un-special-rapporteur-for-the-situation-of-human-rights-in-the-opt-press-release/ 

Studyspark

Study Document Study Document

Code Of Ethics For Managers In Acquisition

Pages: 11 (3162 words) Sources: 5 Document Type:Research Paper Document #:25977313

… acquisitions would then need to adhere to this code of ethics, and their performance could be weighed against it. Yet, there is little research that has been conducted to define the elements of an effective code of ethics for managers in acquisition. This research paper will examine this topic, and seek to identify some of the key elements of an effective code of ethics that governments can … roles. The code sets the bounds of acceptable behavior, establishes a clear ethical framework, and should also provide examples that are clear and action to the intended audience. It should be written in line with the code of ethics for the organization as a whole, so that … a whole, so that there is internal consistency of ethical standards within the organization. Furthermore, it should be useful in terms of providing action guidance for specific common situations and a set of……

References

References

Adelstein, J. & Clegg, S. (2016) Code of ethics: A stratified vehicle for compliance. Journal of Business Ethics. Vol. 138 (1) 53-66.

Lazeros, M. (2008) Leaders can learn from Druyun’s ethical lapses and their consequences. USAWC Research Project. Retrieved October 25, 2019 from  https://apps.dtic.mil/dtic/tr/fulltext/u2/a479019.pdf 

McConnnell, A. & Rood, T. (1997) Ethics in government: A survey of misuse of position for personal gain and its implications for developing acquisition strategy. Journal of Business Ethics. Vol. 16 (1997) 1107-1116.

McConnell, T. (2018). Moral dilemmas. Stanford Encyclopedia of Philosophy Retrieved October 25, 2019 from  https://plato.stanford.edu/entries/moral-dilemmas/ 

Neu, D., Everett, J. & Rahaman, A. (2015) Preventing corruption within government procurement: Constructing the disciplined and ethical subject. Critical Perspectives on Accounting. Vol. 28 (2015) 49-61.

Studyspark

Study Document Study Document

The Character Of Polonius In Hamlet

Pages: 7 (2093 words) Sources: 7 Document Type:Research Paper Document #:68316093

… what his children’s “self” should be: “There is no meaningful sense in which Laertes and Ophelia have internal essences to which their external action make reference. Instead, ‘the self’ is Polonius’s image for the version of his children that he wants to see. Polonius is his children’s ……

References

Works Cited

Cox, Roger L. Between earth and heaven: Shakespeare, Dostoevsky, and the meaning of Christian tragedy. Holt McDougal, 1969.

Di, Poona Mtrive. \\\\\\"Unraveling Hamlet’s Spiritual and Sexual Journeys: An Inter- critical Detour via the Gita and Gandhi.\\\\\\" Shakespeare’s Asian Journeys. Routledge, 2016. 75-86.

Farahmandfar, Masoud, and Gholamreza Samigorganroodi. \\\\\\"\\\\\\" To Thine Own Self Be True\\\\\\": Existentialism in Hamlet and The Blind Owl.\\\\\\" International Journal of Comparative Literature and Translation Studies 3.2 (2015): 25-31.

Felce, Ian. \\\\\\"In Search of Amlóða saga: The Saga of Hamlet the Icelander.\\\\\\" Studies in the Transmission and Reception of Old Norse Literature: The Hyperborean Muse in European Culture. Edited by Judy Quinn and Adele Cipolla (2016): 101-22.

Hadfield, Andrew. \\\\\\"Jonson and Shakespeare in an Age of Lying.\\\\\\" Ben Jonson Journal 23.1 (2016): 52-74.

Landy, Joshua. \\\\\\"To Thine Own Selves Be True-ish.\\\\\\" Shakespeare\\\\\\'s Hamlet: Philosophical Perspectives (2017): 154.

Wilson, Jeffrey R. What Shakespeare Says About Sending Our Children Off to College. No. 402071. 2016.  https://www.aaup.org/article/what-shakespeare-says-about-sending-our-children-college 

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".