Study Document
Literature Review on Coping Through The Use Of Informal Institutions during COVID 19 in South Africa, Nigeria, and Swaziland
The institutional theory deals with the outlines, regulations, standards, and procedures that are formulated in the institutions as commanding instructions for social behavior. This theory gives an understanding of how institutions are shaped, and the societal norms and frameworks are informed to all people of an organization. Communication … but is still followed as acceptable social behavior.
Studies have been conducted to see what drives change in an organization and how institutional theory comes into play. There are certain actions carried out in an organization when change happens, and that is evident on all levels and … Goodstein & Scott, 2002). The character of the organization changes over time with a change in its potency, and this is where institutional theory highlights the richness and diversity inside the processes. The same……
References
Coelho, A. (2019). The role of informal institutions in the enforcement of rules and how to improve corporate and public governance in Brazil: Studies based on a set of corporate governance cases involving state-owned companies (Working Paper). Retrieved from SSRN website https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3434037
Dacin, M.T., Goodstein, J. & Scott, W.R. (2002). Institutional theory and institutional change: Introduction to the special research forum. Academy of Management Journal, 45(1), 45- 47. DOI: 10.2307/3069284
Escandon-Barbosa, D.M., Urbano, D., Hurtado-Ayala, A., Paramo, J.S. & Dominguez, A.Z. (2019). Formal institutions, informal institutions, and entrepreneurial activity: A comparative relationship between rural and urban areas in Colombia. Journal of Urban Management, 8(3), 458-471. https://doi.org/10.1016/j.jum.2019.06.002
Estrin, S. & Prevezer, M. (2010). The role of informal institutions in corporate governance: Brazil, Russia, India, and China compared. Asia Pacific Journal of Management, 28, 41- 67. https://doi.org/10.1007/s10490-010-9229-1
Kaufmann, W., Hooghiemstra, R. & Feeney, M.K. (2018). Formal institutions, informal institutions, and red tape: A comparative study. Public Administration, 96(2), 386-403. https://doi.org/10.1111/padm.12397
Meluch, A.L. (2016, August). Understanding the organizational and institutional origins of social support in a cancer support center. (Unpublished doctoral dissertation). Retrieved from https://etd.ohiolink.edu/!etd.send_file?accession=kent1466944822&disposition=inline
Torniainen, T.J. & Sasstamoinen, O.J. (2007). Formal and informal institutions and their hierarchy in the regulation of the forest lease in Russia. Forestry: An International Journal of Forest Research, 80(5), 489-501. https://doi.org/10.1093/forestry/cpm033
Study Document
… of concern, here, is not only the degree to which those “imaginative, flexible, and active measures” lead to the problems both for the agency and for the field it aims to serve (Nolan 1997, 53). There is also the matter of confusing counterintelligence with security, which is … came to maturity in the US in an era of conflict, it is helpful to approach the subject from the standpoint of conflict theory and the theories developed around it, all of which focus on the ways in which power is sought and used by groups in ……
Bibliography
2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center
Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.
Bernardi, Beatrice. 2013. \\\\\\"The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles.\\\\\\" Bachelor\\\\\\'s thesis, Università Ca\\\\\\'Foscari Venezia.
Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.
Erskine, Toni. 2004. \\\\\\"\\\\\\'As Rays of Light to the Human Soul\\\\\\'? Moral Agents and Intelligence Gathering.\\\\\\" Intelligence & National Security 19 (2): 359-381.
Godson, Roy, and James J. Wirtz. 2000. \\\\\\"Strategic denial and deception.\\\\\\" International Journal of Intelligence and Counterintelligence 13 (4): 424-437.
Horkheimer, Max. 1972. Critical Theory. New York: Seabury Press.
Intelligence and National Security Alliance. 2020. Counterintelligence for the 21st Century. Arlington, VA.
Study Document
… insight into what went wrong with counterintelligence and how those problems can be prevented in the future. It uses a combination of conflict theory, structural functionalism and critical theory to explore the dimensions of counterintelligence in the 1950s, 1960s, and 1970s. The research design is qualitative with the case study approach to … went on to destroy the creator.
Such an ominous analogy may be appropriate, at least according to Wettering (2000), the retired Central Intelligence agency operations officer, who oversaw clandestine operations in Europe and Africa for more than three decades. Director Colby certainly felt as much in the … always included work within private industry, but in many cases…[break]…problems that arose within the counterintelligence program from the 1950s to the 1970s. Conflict theory was posited as a response to structural functionalism, and critical theory arose out of the failure of conflict theory to fully account for the……
Reference List
Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.
Bartos, C. and P. Wehr. 2002. Using conflict theory. UK: University of Cambridge.
Bellaby, Ross. "What's the Harm? The Ethics of Intelligence Collection." Intelligence and National Security 27, no. 1 (2012): 93-117.
Church Committee. “Final report of the Select committee to study governmental operations With respect to Intelligence activities United states senate Together with Additional, supplemental, and separate Views.” Intelligence.senate.gov, 1976. https://www.intelligence.senate.gov/sites/default/files/94755_I.pdf
Coyne, John, Peter Bell, and Shannon Merrington. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2, no. 10 (2013): 27-37.
Erskine, Toni. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19, no. 2 (2004): 359-381.
Nakashima, Ellen. “Top counterintelligence official challenges the private sector to step up defenses against foreign spying.” Washington Post, 2020. https://www.washingtonpost.com/national-security/top-counterintelligence-official-challenges-the-private-sector-to-step-up-defenses-against-foreign-spying/2020/02/10/d842d83c-4c15-11ea-9b5c-eac5b16dafaa_story.html
Study Document
… 61% and 89%, respectively).
Optimal Capital Structure Theories
There are four capital structure theories that have been developed to date: 1) the trade-off theory, 2) the pecking order theory, 3) the signaling theory, and 4) the managerial opportunism theory (Graham & Leary, ) Each theory describes a firm’s optimal capital structure as discussed below.
Trade-off theory
This theory suggests that managers should choose a mix of debt and equity that achieves a balance between the tax advantages of the debt and … that achieves a balance between the tax advantages of the debt and the various costs of using financial leverage. Costs of debt include agency costs, bankruptcy costs, and loss of future financing flexibility. A firm is allowed to deduct interest expenses form gross income when determining taxable … being equal, the greater the indirect bankruptcy cost, the less debt the firm can afford to use for any……
References
Estimating a synthetic rating and cost of debt. (n.d.). Retrieved from http://pages.stern.nyu.edu/~adamodar/New_Home_Page/valquestions/syntrating.htm
Fenebris.com. (2019, August 18). AU. Retrieved from http://www.market-risk-premia.com/au.htmlm
Intelligent Investor. (n.d.). FlexiGroup Limited. Retrieved from https://www.intelligentinvestor.com.au/shares/asx-fxl/flexigroup-limited/financials IntelligentInvestor.com. (n.d.). Afterpay Touch Group Limited. Retrieved from https://www.intelligentinvestor.com.au/shares/asx-apt/afterpay-touch-group-limited/financials
Yahoo Finance. (n.d.). FLEXIGROUP FPO (FXL.AX) Balance Sheet. Retrieved from https://finance.yahoo.com/quote/FXL.AX/balance-sheet?p=FXL.AXhttps://finance.yahoo.com/quote/FXL.AX/balance-sheet?p=FXL.AX
Study Document
… discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing ……
Bibliography
Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">
Study Document
...Agency theory Epistemology and Duty Ethics in Criminal Justice
Ethical Issues
1 Ethics in Law Enforcement Agencies
As Roufa (2019) notes, ethics in law enforcement are essential to prevent behaviors from going unchecked and bad reputations from being developed. Ethics in law enforcement agencies can provide guidelines, identify values that should be promoted, and dictate what sort of actions, behaviors and attitudes law enforcement agents should demonstrate. The Law Enforcement Oath of Office focuses on protecting, upholding and defending the Constitution of the US. It also contains terms regarding how officers should conduct themselves: soberly, honorably and honestly.
Law enforcement agencies tend to codify the ethics they want their officers to follower. The reason for this is that they want their officers to engage in ethical decision making, which means making the right decision morally. Sometimes officers can have an unconscious or implicit bias and this can affect their decision making (Hehman,……
References
Cahn, S. & Markie, P. (2011). Ethics: History, Theory and Contemporary Issues, 5th Edition. UK: Oxford University Press.
Hehman, E., Flake, J. K., & Calanchini, J. (2018). Disproportionate use of lethal force in policing is associated with regional racial biases of residents. Social psychological and personality science, 9(4), 393-401.
Holmes, A. (2007). Ethics: Approaching moral decisions. Downers Grove, IL: InterVarsity Press.
Roufa, T. (2019). Ethics in law enforcement. Retrieved from https://www.thebalancecareers.com/ethics-in-law-enforcement-and-policing-974542
Study Document
...Agency theory Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber warfare, helps to establish appropriate countermeasures against cyberattacks and potential threats in cyberspace, and enhances intelligence gathering. While the study provides significant insights on this topic, future studies should examine the……
Bibliography
Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018. https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf
Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">
Study Document
… discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing ……
Bibliography
Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">
Study Document
… are also highly religious and spiritual. I love watching T.V., taking part in sports, creative activities, reading, and listening to music.
SECTION II –theory/THEORIST(S), CONCEPTS OF HUMAN GROWTH AND DEVELOPMENT
1. Choose any two theories/theorists on the effect of the social environment on human behavior and one … CONCEPTS OF HUMAN GROWTH AND DEVELOPMENT
1. Choose any two theories/theorists on the effect of the social environment on human behavior and one theory/theorist on, Person-In-Environment (PIE).
Social Learning theory
According to Bandura, a crititcal element of human learning occurs through imitation. Of course, imitation involves some cognitive processes. A lot of information … and less on external influence. In other words, adults build their internal standards to punish and reward what they do (Crain, 2014)
Psychosocial theory
Erik Erikson, on his part, opined that all humans pass through eight developmental stages –from when they are born until they die. The……
References
Alexander Jr, R. (2010). The Impact of Poverty on African American Children in the Child Welfare and Juvenile Justice Systems. In Forum on Public Policy Online (Vol. 2010, No. 4). Oxford Round Table. 406 West Florida Avenue, Urbana, IL 61801.
Belgrave, F. Z., & Allison, K. W. (2009). African American psychology: From Africa to America. Los Angeles: Sage.
Brittian A. S. (2012). Understanding African American Adolescents\\\\\\' Identity Development: A Relational Developmental Systems Perspective. The Journal of black psychology, 38(2), 172–200. https://doi.org/10.1177/0095798411414570
Chávez, R. (2016). Psychosocial development factors associated with occupational and vocational identity between infancy and adolescence. Adolescent Research Review, 1(4), 307-327.
Crain, W. C. (2014). Theories of development: Concepts and applications. Harlow, Essex: Pearson.
Fernandes-Alcantara, A. L. (2018). Vulnerable Youth: Background and policies.Congressional Research Service
Newman, B. M., & Newman, P. R. (2015). Theories of human development. Psychology Press.
Reubins, B. M., &Reubins, M. S. (2014). Pioneers of child psychoanalysis: Influential theories and practices in healthy child development. London: Karnac.
Study Document
… the number of states with nuclear weapons (Mauroni 2010, 58).
The race for nonproliferation started during the Cold War. During the era, conflict theory was relatively rational and enemies were well-defined. After 9/11, concerns about nuclear weapons began shifting from aggressive acts of nation states to the ……
References
Busch, Nathan, and Joyner, Daniel (ed). 2009. “Introduction: Nonproliferation at a Crossroads.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Athens, GA: The University of Georgia Press.
Reiss, Mitchell. 2009. “Foreword.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Edited by Nathan Busch, and Daniel Joyner. Athens, GA: The University of Georgia Press.
Cameron, Gavin, Pate, Jason & Vogel, Kathleen. (2001). “Planting Fear: How Real is the Threat of Agricultural Terrorism?” Bulletin of Atomic Scientists, 57(5), 38-44.
Jennings, Elain. 2013. U. S. proliferation policy and the campaign against transnational terror: Linking the U.S. non-proliferation regime to homeland security efforts. Master’s Thesis. Naval Postgraduate School.
Levi, Michael. 2009. “On Nuclear Terrorism.” Cambridge, MA: Cambridge University Press.
Mauroni, Albert. J. 2010. “A Counter-WMD Strategy for the Future.” Parameters, 58-73.
Ogilvie-White, Tanya. 2008. “Facilitating Implementation of Resolution 1540 in South- East Asia, and the South Pacific.” In Implementing Resolution 1540: The Role of Regional Organizations. Edited by Lawrence Scheinman. New York: United Nations Institute for Disarmament Research.
Pilat Joseph F. 2009. “Dealing with Proliferation and Terrorism.” In Combating Weapons of Mass Destruction: The Future of International Nonproliferation Policy, edited by Nathan E. Busch and Daniel H. Joyner. Athens, GA: University of Georgia Press.
We have over 150,000+ study documents to help you.
Sign Up for FREE