Army Essays (Examples)

Studyspark

Study Document Study Document

Coronavirus COVID 19

Pages: 9 (2907 words) Sources: 4 Document Type:Essay Document #:604304

...Army Keywords:  corona virus, coronavirus, covid, covid-19

Introduction

The novel coronavirus spreading the COVID 19 disease first appeared in Wuhan, China, in 2019 and quickly spread around the world.  The infectious disease is a new form of a previous severe acute respiratory syndrome coronavirus (SARS) and has led to nationwide lockdowns from the East to the West.  This paper will discuss the signs and symptoms of COVID 19, the cause of the virus, prevention and management strategies currently being employed to help contain and stop the spread of what is now a pandemic, the epidemiology of the disease, and how it has impacted society and culture.

Signs and Symptoms

One of the more mysterious characteristics of COVID 19 is that one can be a carrier of the coronavirus and yet be completely asymptomatic (Chen et al., 2020).  Those who do exhibit signs of infection tend to have flu-like symptoms, especially if……

References

References

Chen, N., Zhou, M., Dong, X., Qu, J., Gong, F., Han, Y., ... & Yu, T. (2020).  Epidemiological and clinical characteristics of 99 cases of 2019 novel coronavirus pneumonia in Wuhan, China: a descriptive study. The Lancet, 395(10223), 507-513.

Kekatos, M. (2020). Ventilating too soon. Retrieved from  https://www.dailymail.co.uk/health/article-8201783/Some-doctors-moving-away-ventilators-virus-patients.html 

Myers, S. L. (2020). China Spins Tale That the U.S. Army Started the Coronavirus Epidemic. Retrieved from https://www.nytimes.com/2020/03/13/world/asia/coronavirus-china-conspiracy-theory.html

National Academies of Sciences, Engineering, and Medicine. (2015). Improving diagnosis in health care. National Academies Press.

Oliver, D. (2020). Coronavirus genetic material stayed on surfaces for up to 17 days on Diamond Princess cruise, CDC says. Retrieved from  https://www.usatoday.com/story/travel/cruises/2020/03/24/coronavirus-diamond-princess-cabin-surfaces-contaminated-cdc-report/2905924001/ 

Studyspark

Study Document Study Document

Comparison Of Leadership Model And Styles

Pages: 5 (1542 words) Sources: 5 Document Type:Essay Document #:47234629

...Army Part One
My Personal Model: Transformational Leadership
My own personal model of leadership is transformational leadership. This model focuses on giving following a vision of what they should work to become. The transformational leader identifies and explains the goal that the organization is trying to reach and how workers can help the organization to achieve that goal. It typically requires a change in the behavior and approaches of the workers, so logic and reason are used to show why this change is needed, which is a way of helping to break down resistance to the change (Nawaz & Khan, 2016). Communication is a key skill used in this model, and transformational leaders have to be able to relate well with followers, provide support along the way, and keep them focused on the vision and the mission. When it comes to organizational development, transformational leaders can be a very valuable asset……

References

References

Maslow, A. H. (1943). A theory of human motivation. Psychological Review, 50(4), 370.

Nawaz, Z. A. K. D. A., & Khan_ PhD, I. (2016). Leadership theories and styles: A literature review. Leadership, 16, 1-7.

Northouse, P. G. (2016). Leadership: Theory and practice (7th ed.). Thousand Oaks: CA: Sage Publications.

Reivich, K. J., Seligman, M. E., & McBride, S. (2011). Master resilience training in the US Army. American Psychologist, 66(1), 25.

Warrick, D. D. (2011). The urgent need for skilled transformational leaders: Integrating transformational leadership and organization development. Journal of Leadership, Accountability and Ethics, 8(5), 11-26

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… hacked every big American company looking for useful information as well as the computer systems of private transportation firms working for the U.S. Army. [7: Scott Jasper, “Deterring Malicious Behavior in Cyberspace”, Strategic Studies Quarterly 9, no. 1 (2015):60]
Cyber Espionage as an Acceptable State Behavior
According ……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Studyspark

Study Document Study Document

Should Reparations Be Paid To Native Americans And African Americans

Pages: 6 (1855 words) Sources: 10 Document Type:Term Paper Document #:86662683

… States undertook a mission to rid the continent of its indigenous population by whatever means necessary. For instance, according to Flavin, “The British army distributed smallpox-contaminated blankets to the Indians of Pennsylvania. Many people believe that Jeffery Amherst, a ‘lobster-backed general’ who once commanded the British military ……

References

References

Bradford, W. (2004). Beyond reparations: An American Indian theory of justice. Ohio State Law Journal.

Flavin, F. E. (2002, Winter). A pox on Amherst: Smallpox, Sir Jeffery, and a town named Amherst. Historical Journal of Massachusetts, 30(1), 1-5.

Forrester, K. (2019). Reparations, history and the origins of global justice. Cambridge: Cambridge University Press, 2019.

Gilmore, B. & Adams, H. (2019). The case for a reparations clinic. Michigan State Law Review.

Howard-Hassmann, R. E. (2004). Reparations to Africa and the group of eminent persons. Cahiers d’étudesafricaines.

Lenzerini, F. (2007). Reparations for indigenous peoples. Oxford: Oxford University Press.

Lockhart, P. (2019, June 19). The 2020 Democratic primary debate over reparations, explained. Vox. Retrieved from  https://www.vox.com/policy-and-politics/2019/3/11/18246741/  reparations-democrats-2020-inequality-warren-harris-castro.

Loewen, J. W. (1995). Lies my teacher told me. New York: The New Press.

Studyspark

Study Document Study Document

The Assassination Of Qassem Soleimani The Iranian General

Pages: 11 (3286 words) Sources: 13 Document Type:Research Paper Document #:89148612

...Army The assassination of Major General Qassem Soleimani
Introduction
In early 2020, January 3, the U.S. launched airstrike attacks around Baghdad International Airport and killed two of the most influential leaders in Iran, Iraq, and the surrounding regions. The strike killed Qassem Soleimani, the Islamic Revolutionary Guard Corps- Quds Force's Major General, and Abu Mahdi Al-Muhandis, the Deputy head of the Popular Mobilization Commission, and also the founder of the militia known as Kata' ib Hezbollah (Jahanbani, 2020). The strikes happened when there was an escalating conflict between the US, Iran and Iraq. This was after December 27, 2019, when a famous proxy from Iran by the name Kata' ib Hezbollah killed several pro-Iranian Militia members and a U.S. citizen four days down the line. The hit triggered criticisms of the Trump administration of how he was using his diplomatic, executive powers and ethical judgment in leadership. He was accused of……

References

References

Jahanbani, N. (2020). Beyond Soleimani: Implications for Iran\\\\\\\\\\\\'s Proxy Network in Iraq and Syria. CTC Perspectives.

Vladeck, S. I. (2004). Emergency Power and the Militia Acts. Yale LJ, 114, 149.

Brands, H. (2019). Why America Can\\\\\\\\\\\\" t Quit the Middle East. Hoover Institution, 21.

Tillman, S. P. (1982). The United States in the Middle East: Interests and Obstacles (Vol. 82). Bloomington: Indiana University Press.

Terry, J. P. (1986). Countering State-Sponsored Terrorism: A Law-Policy Analysis. Naval L. Rev., 36, 159.

Maogoto, J. N. (2003). War on the enemy: self-defense and state-sponsored terrorism. Melb. J. Int\\\\\\\\\\\\'l L., 4, 406.

Lillich, R. B., & Paxman, J. M. (1976). State Responsibility for Injuries to Aliens Occasioned by Terrorist Activities. Am. U.L. Rev., 26, 217.

Parker, C. & Noack, R. (2020, January 2). Iran has invested in allies and proxies across the Middle East. Here\\\\\\\\\\\\'s where they stand after Soleimani\\\\\\\\\\\\'s death. Washington Post. Retrieved from https://www.washingtonpost.com/world/2020/01/03/iran-has-invested-allies-proxies-across-middle-east-heres-where-they-stand-after-soleimanis-death/

Studyspark

Study Document Study Document

Polands Solidarity Movement 1980 1989

Pages: 5 (1353 words) Sources: 4 Document Type:Essay Document #:29966337

...Army SEM 416
As XXXX points out from the onset, the attendance of nonviolence is a daily effort. This is to say that nonviolence is not an automatic response, but rather a deliberate and considered course of action. There are numerous nonviolent movements that have been active in the past. In seeking to demonstrate that nonviolence is indeed achievable, it would be prudent to highlight two of these movements. The two movements that will be discussed in this text are: Czechoslovakia’s Velvet Revolution (1989) and Poland’s Solidarity Movement (1980-1989).
Poland’s Solidarity Movement (1980-1989)
It is important to note, from the onset, that the groundwork for Poland’s Solidarity movement was set in 1946 following the parliamentary electoral fraud perpetrated by the communists. This is more so the case taking into consideration the resulting civil resistance that went on until Solidarity become prominent – and the larger society found a way of embracing……

References

References

Howlett, C.F. (1984). Nicholas Murray Butler\\\\\\'s Crusade for a Warless World. The Wisconsin Magazine of History, 67(2), 99-120.

International Center on Nonviolent Conflict – ICNC (2020). Czechoslovakia’s Velvet Revolution (1989). Retrieved from  https://www.nonviolent-conflict.org/czechoslovakias-velvet-revolution-1989/ 

International Center on Nonviolent Conflict – ICNC (2020, January 13). A Force More Powerful - English - Denmark / Poland / Chile (high definition) [Video]. YouTube.  https://www.youtube.com/watch?v=cM695veBSUU 

Studyspark

Study Document Study Document

Strategy For National Defense

Pages: 7 (2014 words) Sources: 7 Document Type:Essay Document #:59270793

...Army Part I – Regional Security Issue within the Indo-Asia-Pacific Region
The National Security Strategy (NSS) focuses on promoting the security of the United States on the premise that a safe environment is critical toward enhancing the prosperity of the nation. This strategy goes beyond promoting the interests of America and includes safeguarding the interests of partners/allies around the world. Through the strategy, the United States responds to the increasing military, political and economic competitions encountered worldwide. As part of ensuring suitable response to these competitions, NSS includes a regional context strategy through which the United States tailors it approaches to various regions worldwide to protect her national interests.[footnoteRef:1] The United States requires integrated regional strategies that acknowledge the nature and extent of threats, intensity of rivalry, and potential opportunities across all regions. Such strategies become the premise of International Relations and U.S. foreign policy. [1: The White House, “National Security……

References

Bibliography

Davidson, P.S. “Statement of Admiral Philip S. Davidson, U.S. Navy Commander, U.S. Indo-Pacific Command Before the House Armed Services Committee on U.S. Indo-Pacific Command Posture.” United States Senate, March 27, 2019,  https://www.armed-services.senate.gov/imo/media/doc/Davidson_02-12-19.pdf 

Department of Defense. “Summary of the 2018 National Defense Strategy of the United States of America.” National Defense Strategy, 2018,  https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf 

Muller, K. “The Essence of Coercive Air Power: A Primer for Military Strategies.” Air University,  https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/mueller.pdf 

Pape, R.A. Bombing to Win: Air Power and Coercion in War, 1st ed. Ithaca, NY: Cornell University Press, 1996.

Tammen, R.L., Kugler, J. & Lemke, D. “Power Transition Theory.” International Relations, June 27, 2017, DOI: 10.1093/OBO/9780199743292-0038

The White House. “National Security Strategy of the United States of America.” The White House, December 2017, https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf

Withers, P. “Integrating Cyber with Air Power in the Second Century of the Royal Air Force.” Medium, March 4, 2019,  https://medium.com/raf-caps/integrating-cyber-with-air-power-in-the-second-century-of-the-royal-air-force-bca74b8d42ed 

 

Studyspark

Study Document Study Document

How To Help Stop Veteran Suicides

Pages: 1 (363 words) Sources: 3 Document Type:Essay Document #:95328557

...Army Advocating for Social Change: Techniques and Tools
According to the U.S. Department of Veterans Affairs (VA), on average, about 20 veterans commit suicide every day (Suicide among veterans, 2016). The transition from active military service to civilian life frequently exacerbates any existing mental health disorders, and far too many veterans fail to seek the help they need to cope. In this regard, Albright and Borah (2017) emphasize that, “Mental health concerns such as posttraumatic stress disorder and major depression can be significant problems for these populations which lead to increased risk for suicidal ideation, attempts, and completed suicides” (p. 11). Although this population is 50% more likely to commit suicide than the American population at large, those who do seek help are far less likely to commit suicide (Spiva, 2019).
What is especially troubling about these alarming statistics, though, is the fact that many Americans are unaware of this social……

References

References

Albright, D. L. & Borah, E. V. (2017, Spring). Mental health practice with military- and veteran-connected populations. Best Practices in Mental Health, 13(1), 11-13.

Spiva, D. (2019, January). Veterans 50 percent more likely to commit suicide. VFW Magazine, 106(4), 8.

Suicide among veterans. (2016). Department of Veterans Affairs. Retrieved from https://www. mentalhealth.va.gov/docs/2016suicidedatareport.pdf.

Studyspark

Study Document Study Document

Advantages Of Using Military Airpower

Pages: 1 (337 words) Sources: 2 Document Type:Essay Document #:56771290

...Army AirPower capabilities have made it the “easy call”
I agree with what you say about the article by John Garofano. Senior military leaders need to have a combination of both military analysis and political relevancies. However, I believe that there is also a need to have a critical analysis of the importance of airpower before any deployment. Military leaders will receive gratification only if they properly understand the cost implications of deploying airpower (Garofano 2000). Airpower can be deployed easily and most senior leaders have been overly reliant on this deployment to justify their continued use of airpower.
The recent event that took place in Iran regarding the shooting down of the UAV demonstrates how easily they can be taken over. The assumption that there is a data loss or data breach when this happens is not true. This is because the UAVs do not store any data and all……

References

References

Garofano, John. 2000. \\\\"Deciding on military intervention: What is the role of senior military leaders?\\\\" Naval War College Review LIII (2):40-64.

Kalilizad, Z, and J Shapiro. 2002. United States Air and Space Power in the 21st Century. Santa Monica, CA: RAND Corporation.

Studyspark

Study Document Study Document

Maritime Safety And Security SOP For Homeland Security Perspectives

Pages: 4 (1341 words) Sources: 11 Document Type:literature review Document #:28623347

...Army Introduction
The maritime industry is increasingly moving towards the adoption of systems that rely heavily on digitization, automation, and integration (Hayes, 2016). The extensive use of advanced technological solutions in the maritime industry is driven by the urgent need to maintain the industry in sync with all other industries that seem to have a step forward in adopting technological solutions. As a result of this growth and development in technological solutions, the security of data and other sensitive information has increasingly become a huge concern for the industry (Bueger, 2015). Cybersecurity has become a priority for the maritime industry. With many of the operational and critical system having already been digitized, automated, and integrated, the concern has now shifted to how entities within the maritime industry should implement appropriate procedures and policies to respond to cybersecurity incidents effectively.
Background
Cybersecurity refers to the ability of entities to prepare for possible……

References

References

Bowen, B.M. (2011). Measuring the Human Factor of Cyber Security. Rerieved from  http://www.cs.columbia.edu/~bmbowen/papers/metrics_hst.pdf 

Bueger, C. (2015). What is Maritime Security? Maritime Policy, 53, 159-164.

Fitton, O. P. (2015). The Future of Maritime Cyber Security. Retrieved from  https://eprints.lancs.ac.uk/id/eprint/72696/1/Cyber_Operations_in_the_Maritime_Environment_v2.0.pdf 

Hadlington, L. (2018). The \\\\\\"Human Factor\\\\\\" in cybersecurity: Exploring the accidental insider. Psychological and Behavioral Examinations in Cyber Security, 4(6), 46-63.

Hareide, O. S. (2018). Enhancing Navigator Competence By Demonstrating Maritime Cyber Security. The Journal of Navigation, 71(5), 1025-1039.

Hayes, C. R. (2016). Maritime Cybersecurity: The Future of National Security. Monterey, California: Naval Post Graduate School.

Herzog, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), 49-60.

Hoffmann, J. (2018). Review of Maritime Transport. New York: UNCTAD.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".