Administration Essays (Examples)

Studyspark

Study Document Study Document

Sociology Law And Identity

Pages: 6 (1908 words) Sources: 1 Document Type:Essay Document #:83127915

… especially the defendant must be taken into account as a failure to do so amount to a miscarriage of justice. While in the administration of justice, the law must be culturally sensitive, the main reason why culture has to applied is to ensure that all citizens within … ungrounded and without meaning. It is, therefore, based on this understanding that it is argued that the aspect of culture in the justice administration cannot be ignored or overlooked. Culture is also an integral part of determining what is right and what is wrong, which is the ……

References

References

Renteln, A. D. (2004). The cultural defense. Oxford University Press.

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

...Administration What is Cybercrime?
Definition of Cybercrime
Cybercrime is any criminal activity that is conducted using computers or the Internet. As today’s digital natives have the most experience with computers, cybercriminals tend to be of the Millennial generation—i.e., born after 1980. They are young, digitally sophisticated, and able to operate with a degree of professionalism and discipline that allows them to hide their crimes beneath legitimate-looking facades. Spearphishing is one example of a type of cybercrime used by professional criminals to lure victims into traps or sites that have the appearance of legitimacy.
Cybercrime is committed by people who know computer code, understand computer systems and networks, know how to navigate databases, access data storage, get past firewalls, exploit cloud computing services, control the Internet of Things and more. They
How Cybercrime Has Evolved over Time
Computers and the rise of the Internet ushered in the era of cybercrime. IBM’s first……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

Advantages And Disadvantages Of Interrelationships Between Organizational

Pages: 16 (4728 words) Sources: 28 Document Type:Essay Document #:81594345

… the development as well as regulation of Civil Aviation individual within the nation. What is more, the institution is also culpable for the administration of different legislations including the Aircraft Act of 1934 and the Aircraft Rules of 1937 as well as other laws relating to India’s ……

References

References

Air India. (2019). Board of Directors. Retrieved from:  http://www.airindia.in/board-of-directors.htm 

Aquinas, P. G. (2008). Organization structure and design. India: Excel Books India.

Burns, T., & Stalker, G. M. (2005). Mechanistic and organic systems. Organizational Behavior, 2, 214-25.

Choo, S., & Bowley, C. (2007). Emerald Article: Using training and development to affect job satisfaction. Journal of Small Business and Enterprise Development, 14(2),339 - 352.

Cichocki, P., & Irwin, C. (2014). Organization design: A guide to building effective organizations. Kogan Page Publishers.

Civil Aviation. (2019). About Us: Organizational Setup. Retrieved from:  http://www.civilaviation.gov.in/en/aboutus/orgsetup 

Cunliffe, A. L. (2008). Organization theory. New York: Sage.

Cunliffe, A. L., & Luhman, J. T. (2012). Key concepts in organization theory. New York: Sage.

Studyspark

Study Document Study Document

Optimizing Health Information Systems

Pages: 12 (3717 words) Sources: 16 Document Type:Research Paper Document #:99273225

...Administration Optimizing Merged Health Information Systems
Although the merger of two comparably sized companies competing in the same industry is a relatively commonplace business strategy, the process is fraught with obstacles and challenges and a significant percentage of merged entities fail outright because of these problems (Murphy, 2019). These types of problems are further compounded when there are sophisticated information systems involved that must also be merged successfully. The purpose of this paper is to explicate the responsibilities involved in implementing a health information system (HIS) that meets current Health Information Technology for Economic and Clinical Health (HITECH) Act and the Health Insurance Portability and Accountability Act (HIPAA) Security and Privacy regulatory requirements. To this end, a discussion and analysis of health information systems, a description concerning how a system will affect patient care and documentation and an explanation concerning how using a system to access information will affect the quality……

References

References

Abouzhar, C. & Boerma, T. (2009, August). Health information systems: The foundations of public health. Bulletin of the World Health Organization, 83(8), 578-583.

Cresswell, K. & Aziz, S. (2013, May). Organizational issues in the implementation and adoption of health information technology innovations: An interpretative review. International Journal of Medical Informatics, 87(5), 73-86.

Drazen, E. L. (2006, February). Maximizing the benefits of health care information systems. Journal of Medical Systems, 10(1), 51-56.

Kruse, C. S. & Smith, D. (2017, July). Security techniques for the electronic health records. Journal of Medical Systems, 41(8), 127.

Kumar, V. (2011). Impact of health information systems on organizational health communication and behavior. The Internet Journal of Allied Health Sciences and Practice, 9(2), 37-44.

McGrail, K. M. & Black, C. (2009, August). Access to data in health information systems. Bulletin of the World Health Organization, 83(8), 563-569.

Murphy, M. L. (2019, March). Mastering accounting for business combinations: Mergers and acquisitions present challenges that finance can overcome by staying involved with the deal and preparing in advance of the closing. Journal of Accountancy, 227(3), 24-27.

NAHQ code of ethics for healthcare quality. (2019). National Association for Healthcare Quality. Retrieved from  https://nahq.org/about/code-of-ethics .

Studyspark

Study Document Study Document

Managing Behavior In Adolescents And Children Through Solution Focused

Pages: 10 (3015 words) Sources: 5 Document Type:Annotated Bibliography Document #:12594584

...Administration Abstract
Objective: The motivation behind this paper is to give annotated bibliography of sources on research in regards to overseeing conduct in young people and kids through arrangement centered treatment. Solution Focused Therapy or SFBT is a type of therapy that spotlights on solutions rather than on issues. Therapists do this by helping Adolescents and Children recognize what's annoying them. A significant piece of SFT is helping the Adolescents and Children distinguish what has and hasn't worked in the past when managing a specific test. It at that point urges them to utilize their qualities to achieve their objectives. Since SFBT is objective arranged and present moment, it tends to be less exorbitant and less tedious than long haul treatment. Methodology: For this undertaking, FSCJ's databases diary articles are used to find them. To identify with similar restricted center articles, the hunt terms "Overseeing Behavior in Adolescents and Children Through……

References

References

Boyer, B., MacKay, K. J., McLeod, B. D., & van der Oord, S. (2018). Comparing Alliance in Two Cognitive-Behavioral Therapies for Adolescents with ADHD Using a Randomized Controlled Trial. Behavior Therapy, 49(5), 781–795. 10.1016/j.beth.2018.01.003

Brockman, M., Hussain, K., Sanchez, B., & Turns, B. (2016). Managing Child Behavior Problems in Children with Autism Spectrum Disorders: Utilizing Structural and Solution Focused Therapy with Primary Caregivers. American Journal of Family Therapy, 44(1), 1–10. 10.1080/01926187.2015.1099414

Gonzalez, C. (2017). Recovering Process from Child Sexual Abuse During Adulthood from an Integrative Approach to Solution-Focused Therapy: A Case Study. Journal of Child Sexual Abuse, 26(7), 785–805. 10.1080/10538712.2017.1354954

Kiser, D. J., & Piercy, F. P. (2014). Creativity and family therapy theory development: Lessons from the founders of solution-focused therapy: The journal of solution focus in organizations. InterAction, 6(2), 51-851645018526?accountid=45782

Smith, T. E., Shelton, V. M., & Richards, K. V. (2016). Solution-focused financial therapy with couples. Journal of Human Behavior in the Social Environment, 26(5), 452–460. 10.1080/10911359.2015.1087921

Studyspark

Study Document Study Document

Workplace Trends And Changes

Pages: 7 (2170 words) Sources: 5 Document Type:Term Paper Document #:67790748

… issues such as worker privacy, and 3) the problem of politics and how there may be gaps between the type of culture the administration wants to cultivate and the socio-political beliefs of some of its workers. For instance, Google has recently come under fire for demonstrating bias … its workers. For instance, Google has recently come under fire for demonstrating bias against conservative workers whose socio-political views do not reflect that administration’s Left-leaning politics (Ghaffary). This paper will discuss these trending issues, how they might impact the role of the administrative professional and the support ……

References

Works Cited

Ghaffary, S. Political tension at Google is only getting worse. Vox, 2019.  https://www.vox.com/recode/2019/8/2/20751822/google-employee-dissent-james-damore-cernekee-conservatives-bias 

Kreager, Derek A., and Jeremy Staff. "The sexual double standard and adolescent peer acceptance." Social psychology quarterly 72.2 (2009): 143-164.

Nilsson, Warren. "Positive institutional work: Exploring institutional work through the lens of positive organizational scholarship." Academy of Management Review 40.3 (2015): 370-398.

O'Neil, Adrienne, et al. "The# MeToo movement: an opportunity in public health?." The Lancet 391.10140 (2018): 2587-2589.

PLBSH. Yes, Men Can Be Sexually Harassed In The Workplace. PLBSH, 2019.  https://www.plbsh.com/yes-men-can-be-sexually-harassed-in-the-workplace/ 

Wong, N. & Chin, Y. “Issues and Challenges Faced by Generation X While Managing Generation Y.” International Journal of Business and Social Science 7.2 (2016): 167-170.

Studyspark

Study Document Study Document

Cholelithiasis Gallstones Gallbladder Disease

Pages: 13 (3816 words) Sources: 12 Document Type:Case Study Document #:34628165

...Administration Introduction
Gallbladder disease, especially cholelithiasis (gallstones) affects over 20 million Americans every year. The condition often goes undiagnosed because cholelithiasis rarely presents symptoms. Abdominal discomfort, nausea, jaundice and biliary colic are some symptoms of the condition. Imaging techniques are the most accurate diagnosis tools for gallbladder diseases. However, laboratory values such as CBC, serum amylase, liver-function testing and lipase can help differentiate the type of gallbladder disease/or identify related issues. Surgery is the most effective treatment for gallbladder disease patients. Exercise, diet, and nutrition affect gallbladder disease. It is important for patients to integrate the healthy habits into their lifestyle to lower the risk of developing gallbladder disorders (Jugenheimer, et al., 2008).
Cholelithiasis (gallstones) is the most common type of gallbladder disease. It affects over 20 million Americans every year, translating to over $6.3 billion in direct costs. Generally, gallstones are asymptomatic. The stones are usually identified during autopsy or……

References

References

Anderson, P. O., Knoben, J. E., & Troutman, W. G. (2010). Clinical drug data. New York: McGraw-Hill Medical.

Al-alem, F., Mattar, R. E., Madkhali, A., Alsharabi, A., Alsaif, F., & Hassanain, M. (April 26, 2017). Incidental Gallbladder Cancer.

Borzellino, G., & Cordiano, C. (2008). Biliary lithiasis: Basic science, current diagnosis, and management. Milan: Springer.

Bullock, ., Shane, ., & Hales, . (2012). Principles of Pathophysiology. Sydney: P. Ed Australia.

In Agresta, F., In Campanile, F. C., & In Vettoretto, N. (2014). Laparoscopic Cholecystectomy: An Evidence-based Guide.

In Cox, M. R., In Eslick, G. D., & In Padbury, R. (2018). The management of gallstone disease: A practical and evidence-based approach.

In Wang, D. Q.-H., & In Portincasa, P. A. M. (2017). Gallstones: Recent advances in epidemiology, pathogenesis, diagnosis and management.

Jugenheimer, M., Immenroth, M., Berg, T., & Brenner, J. (2008). Laparoscopic cholecystectomy. Heidelberg: Springer.

Studyspark

Study Document Study Document

Elder Abuse

Pages: 7 (2239 words) Sources: 4 Document Type:Term Paper Document #:22335640

...Administration Introduction: What Is Known About Elder Abuse
Elder abuse occurs at an alarming rate: around one million incidences a year and perhaps more due to under-reporting and inconsistencies in defining what constitutes elder abuse (Falk, Baigis, Kopac, et al., 2012). Roberto (2016) estimates as many as one in every ten American elders experience some kind of abuse. Unfortunately, “there is no uniform term or agreed-upon definition used among state governments, researchers, health care and service providers, and advocates,” (Roberto, 2016, p. 302). Cultural and religious diversity further impedes the evolution of a comprehensive and universally applicable definition of elder abuse, in spite of the fact that some forms of abuse and certain instances can be considered unequivocal (Saghafi, Bahramnezhad, Poormollamirza, et al., 2019).
Some types of abuse may go undetected, such as financial abuse or identity theft, which could go unnoticed for years. Healthcare workers often feel powerless to intervene……

References

References

Falk, N. L., Baigis, J., Kopac, C., (August 14, 2012) \\\\\\\\\\\\"Elder Mistreatment and the Elder Justice Act\\\\\\\\\\\\" OJIN: The Online Journal of Issues in Nursing 17(3).

Forum on Global Violence Prevention; Board on Global Health; Institute of Medicine; National Research Council (2014). Ethical considerations. Washington (DC): National Academies Press (US); 2014 Mar 18.

Lacher, S., Wettstein, A., Senn, O., et al. (2016). Types of abuse and risk factors associated with elder abuse. Swiss Medical Weekly 2016(146): 1-10.

Lachs, M.S., Teresi, J.A., Ramirez, M., et al. (2016). The prevalence of ersident-to-resident elder mistreatment in nursing homes. Annals of Internal Medicine 165(4):229-236.

Malmedal, W., Iversen, M.H. & Kilvik, A. (2014). Sexual abuse of older nursing home residents: A literature review. Nursing Research and Practice 2015(Article 902515):  http://dx.doi.org/10.1155/2015/902515 

Roberto, K.A. (2016). The complexities of elder abuse. American Psychologist 71(4): 302-311.

Saghafi, A., Bahramnezhad, F., Poormollamirza, A., et al. (2019). Examining the ethical challenges in managing elder abuse: a systematic review. Journal of Medical Ethics and History of Medicine 2019(12):  https://www.ncbi.nlm.nih.gov/pmc/articles/ PMC6642445/" target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Pablo Escobar

Pages: 5 (1470 words) Sources: 6 Document Type:Research Paper Document #:90013199

...Administration Pablo Escobar: A Classic Anti-Hero
Pablo Escobar established his reputation as a modern-day Robin Hood: a man who genuinely did come from a humble working class background and who at some point did actually give a lot of money away to social service organizations in Colombia. He was also an astute businessman who recognized trends and opportunities in the illicit drug trade. Yet Escobar was no hero; he was “violent” and “ruthless,” (“Pablo Escobar Crime Files,” 1) and was directly responsible for “terror campaigns that resulted in the murder of thousands,” (“Pablo Escobar Biography,” 1). This dichotomous figure has become one of the world’s most notorious anti-heroes. He became so iconic as to have his story been made into numerous television shows and films, such as the Netflix series Narcos. Escobar’s story reveals the inherent problem with the war on drugs, and signals the need for change in international drug……

References

Works Cited

Kenney, Michael. “From Pablo to Osama: Counter-terrorism Lessons from the War on Drugs.” (2003). Survival, 45(3), 187–206. doi:10.1080/00396338.2003.9688585

“Pablo Escobar Biography.” Biography.com. Accessed 4 Dec, 2019 from  https://www.biography.com/crime-figure/pablo-escobar 

“Pablo Escobar Crime Files.” Crime and Investigation. Accessed 4 Dec, 2019 from  https://www.crimeandinvestigation.co.uk/crime-files/pablo-escobar 

Pobutsky, Aldona Bialowas. “Peddling Pablo: Escobar\\\\\\\\\\\\'s Cultural Renaissance.” Hispania, Vol. 96, No. 4, Dec 2013, pp. 684-689.

Thompson, D. P. (1996). Pablo Escobar, Drug Baron: His surrender, imprisonment, and escape. Studies in Conflict & Terrorism, 19(1), 1996: 55–91. doi:10.1080/10576109608435996

Studyspark

Study Document Study Document

Integrated Waveguide Technologies Preparing For A Public Offering

Pages: 7 (1963 words) Sources: 6 Document Type:Essay Document #:71352857

...Administration Introduction

Distribution policy is a set of principle stipulating the guidelines for cash dividends payout to the shareholders and stock repurchases. Dividends mean the company's earnings distributed to the stockholders declared during the year, interim dividends, or at the end of a financial year referred to as the final dividend. Dividends account as a source of income for the investors but also have an information signaling effect. Therefore, a dividend distribution is informing the management of the earnings to allocate as dividends and contribute to sharing purchase investment decisions. Dividend distribution policy is informed by multiple factors such as financial flexibility, investment opportunities for the company, tax consideration, contractual and legal restrictions, the volatility of expected future earnings, and flotation costs (Baker & Weigand, 2015).
Dividends may be distributed in the form of stock repurchases or cash dividends. Cash dividends offer investors a stream of income. Stock repurchases entail the……

References

References

Al-Malkawi, H.-A. N., Rafferty, M., & Pillai, R. (2010). Dividend Policy?: A Review of Literatures and Empirical Evidence. International Bulletin of Business Administration, 5(9), 38–45.  https://doi.org/10.12816/0037572 

Baker, H. K., & Weigand, R. (2015). Corporate dividend policy revisited. In Managerial Finance (Vol. 41, Issue 2, pp. 126–144).  https://doi.org/10.1108/MF-03-2014-0077 

Black, F., & Scholes, M. (2010). The effects of dividend yield and dividend policy on common stock prices and returns. In Journal of Financial Economics (Vol. 1, Issue 1, pp. 1–22).  https://doi.org/10.1016/0304-405X(74)90006-3 

Farre-Mensa, J., Michaely, R., & Schmalz, M. (2014). Payout Policy. Annual Review of Financial Economics, 6, 75–134.

Mohanasundari, M., & Vidhya, P. (2016). Dividend Policy and Its Impact on Firm Value: A Review of Theories and Empirical Evidence. Journal of Management Sciences and Technology, 3(3), 59–69.

Travlos, Trigeorgis, & Vafeas. (2001). No Title. Multinational Finance Journal, 5(2), 87–112.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".