Authority Essays (Examples)

Studyspark

Study Document Study Document

How Does Philosophy Relate To Biblical Studies

Pages: 9 (2773 words) Sources: 13 Document Type:Research Paper Document #:60991740

… natural faculty sees and respects the world of nature is what makes the data acceptable. On the other hand, Biblical theology uses divine authority and revelations in the Bible as a starting point. The process is synonymous to how people accept, for instance, a physics professor may ……

References

References

Addinall, P. (1991). Philosophy and biblical interpretation: A study in nineteenth-century conflict. Cambridge: Cambridge University Press.

Amanze, N. (2012). Biblical Studies, Theology, Religion and Philosophy: An Introduction for African Universities.

Carson, D. A. (2012). Christ and culture revisited. Grand Rapids, MI ; Cambridge: Eerdmans.

DeWeese, G. J. (2011). Doing Philosophy as a Christian. Westmont: InterVarsity Press.

Hamilton, J. M. (2010). God\\'s glory in salvation through judgment: A biblical theology. Wheaton, Ill: Crossway.

Hamilton, J. M. (2014). What is biblical theology?: A guide to the Bible\\'s story, symbolism, and patterns.

In Bartholomew, C. G. (2011). \\"Behind\\" the text: History and Biblical Interpretation.

Johnson, D. (2014). Biblical knowing: A scriptural epistemology of error. Havertown: James Clarke & Co.

Studyspark

Study Document Study Document

Nelson Mandela

Pages: 5 (1632 words) Sources: 7 Document Type:Essay Document #:40746883

...Authority Life of a historical leader: Nelson Mandela
Introduction
Efficient leadership constitutes the main force resulting in ethical culture formation and bolstered ethicality in making decisions (Ferrell & Fraedrich, 2015). The term leadership denotes intrinsic capability of commanding and leading other people towards any specified goal. The process of leadership entails formulation of a vision and ideas, adopting and sticking to values which support the aforementioned visions, engaging in tricky decision-making whenever needed, and utilizing one's innate charisma for inspiring followers to also stick to those values. Sound leadership aids companies with vision creation that serves as the basis for corporate values. Ethical decisions form an important component of efficient leaders, in addition to their capability of driving others towards goal attainment.
The term ethics, or moral philosophy as it is otherwise referred to, entails systematization, defense and recommendation of the concepts of correct and incorrect conduct (Fisher & Lovell, 2006).……

References

References

Daft, R. L. (2010). Organization theory and design, 10th Edition. Mason, OH: South-Western Cengage Learning.

Ferrell, O. C., & Fraedrich, J. (2015). Business ethics: Ethical decision making & cases. Nelson Education.

Fisher, C., & Lovell, A. (2006). Business Ethics and Values: Individual, Corporate and International Perspectives. FT Prentice Hall.

Glad, B., & Blanton, R. (1997). FW de Klerk and Nelson Mandela: A study in cooperative transformational leadership. Presidential Studies Quarterly, 27(3), 565-590.

Masbagusdanta, K. (2013). Everyone Can Be a Moral Leader. Global ethics network. Retrieved from https://www.globalethicsnetwork.org/profiles/blogs/everyone-can-be-a-moral-leader

Schoemaker, P.J.H. & Krupp, S. (2014). 6 principles that made Nelson Mandela a renowned leader. Fortune. Retrieved from  https://fortune.com/2014/12/05/6-principles-that-made-nelson-mandela-a-renowned-leader/ 

Tutu, D. (2013). Nelson Mandela: A colossus of unimpeachable moral character. The Washington Post. Retrieved from  https://www.washingtonpost.com/local/nelson-mandela-a-colossus-of-unimpeachable-moral-character/2013/12/06/0a2cd28a-5ec9-11e3-be07-006c776266ed_story.html 

Studyspark

Study Document Study Document

Program Logic Model

Pages: 6 (1769 words) Sources: 8 Document Type:question answer Document #:91645810

… from young mothers as well as important health information from a health care professional. Thus, this approach coupled relatable stories with knowledge and authority.
3)
Describe at least three assumptions that inform the program’s design.
Three assumptions that inform the program’s design were: 1) Peer educators have ……

References

References

Bandura, A. (2018). Toward a psychology of human agency: Pathways and reflections.  Perspectives on Psychological Science, 13(2), 130-136.

Bickel, R., Weaver, S., Williams, T., & Lange, L. (1997). Opportunity, community, and teen pregnancy in an Appalachian state. The Journal of Educational Research, 90(3), 175-181.

Chapin, J. (2001). It won't happen to me: The role of optimistic bias in African American teens' risky sexual practices. Howard Journal of Communication, 12(1), 49-59.

Damon, W. (1984). Peer education: The untapped potential. Journal of applied developmental psychology, 5(4), 331-343.

Kerpelman, J. L., McElwain, A. D., Pittman, J. F., & Adler-Baeder, F. M. (2016). Engagement in risky sexual behavior: Adolescents’ perceptions of self and the parent–child relationship matter. Youth & Society, 48(1), 101-125.

Sciolla, A., Ziajko, L. A., & Salguero, M. L. (2010). Sexual health competence of international medical graduate psychiatric residents in the United States. Academic Psychiatry, 34(5), 361-368.

Stakic, S., Zielony, R., Bodiroza, A., & Kimzeke, G. (2003). Peer education within a frame of theories and models of behaviour change. Entre Nous: The European Magazine for Sexual and Reproductive Health, 56, 4-6.

Walsh-Buhi, E. R., Marhefka, S. L., Wang, W., Debate, R., Perrin, K., Singleton, A., ... & Ziemba, R. (2016). The impact of the Teen Outreach Program on sexual intentions and behaviors. Journal of Adolescent Health, 59(3), 283-290.

Studyspark

Study Document Study Document

Intelligence Oversight Ethics

Pages: 11 (3311 words) Sources: 15 Document Type:Research Paper Document #:23829007

… had gone to the FISA courts for surveillance requests (Brown and Cinquegrana 1985). Reagan’s EO, however, put an end to who had the authority to grant surveillance. What remained to be seen was how and in what manner that authority would be carried out.
Technology also improved, which made the gathering of Big Data a major opportunity for intelligence agencies to gather as ……

References

References

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Brown, William F., and Americo R. Cinquegrana. \\\\\\\\\\\\"Warrantless Physical Searches for Foreign Intelligence Purposes: Executive Order 12,333 and the Fourth Amendment.\\\\\\\\\\\\" Cath. UL Rev. 35 (1985): 97.

Cantarella, Michele. \\\\\\\\\\\\"Intelligence ethics in the digital age.\\\\\\\\\\\\" (2016).

Congressional Research Service, “CIA Ethics Education: Background and Perspectives” (2018).

Ferrari, Rachel. \\\\\\\\\\\\"Moral Relativism and Dangerous Ethical Dilemmas in the US Intelligence Community.\\\\\\\\\\\\" (2018).

Ford, Christopher M. \\\\\\\\\\\\"Intelligence Demands in a Democratic State: Congressional Intelligence Oversight.\\\\\\\\\\\\" Tul. L. Rev. 81 (2006): 721.

Goldman, Jan. \\\\\\\\\\\\"Teaching About Intelligjence and Ethics.\\\\\\\\\\\\" Journal of US Intelligence Studies 20, no. 2 (2013): 79.

Hayes, Jonathan. \\\\\\\\\\\\"The Cinema of Oliver Stone: Art, Authorship and Activism by Ian

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

...Authority Executive Summary
The purpose of this study is to develop timely and informed answers to a series of guiding research questions and subquestions to identify the risks and barriers that are associated with Internet of Things implementations. These types of studies are important today because the Internet of Things is changing the manner in which companies of all sizes and types operate their businesses, and current trends indicate that these implementations are increasing exponentially. The Internet of Things allows conventional computer-based networks to incorporate data collected from everyday objects to provide real-time analyses and new applications for these technologies are being developed every day. Indeed, there are already more mobile devices in use around the world than there are people, and most authorities agree that the Internet of Things deployments will continue to increase well into the foreseeable future. Chapter one of the study provides the rationale in support of……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

The Battleship Potemkin

Pages: 5 (1631 words) Sources: 3 Document Type:Film Analysis Document #:15032782

...Authority Eisenstein’s 1925 silent film, produced during the Soviet era, depicts the mutiny on the Battleship Potemkin from the year 1905, prior to the Soviet takeover of the state and seen as a foreshadowing of the wider revolution that was to come. In the film, the mutineers/rebels are depicted as heroes, embodying the spirit of the fight against Tsarist oppression that the good comrades of the Soviet world wanted to project. The Cossacks (themselves a symbol of Russian tradition that the Soviet era comrades despised) and the Tsarist cavalry are depicted as brutal thugs, slaughtering the innocent people of Odessa for daring to show support for the mutineers. As Odessa was one of the most open cities for Jews to live in the Pale of Settlement, the slaughter of people can be seen also as a persecution of Jews, especially since the Soviet Revolution was largely Jewish in nature and Eisenstein……

References

Works Cited

Bascomb, Neal. Red Mutiny: Eleven Fateful Days on the Battleship Potemkin. Boston: Houghton Mifflin, 2007.

Eisenstein, Sergei. The Battleship Potemkin.

Neff, Taylor. \\\\\\\\\\\\"Propaganda on the Big Screen: Film in the Soviet Union from 1925 to 1936.\\\\\\\\\\\\" The FGCUStudent Research Journal 3.2 (2017).

Osborn, Andrew. “Potemkin: the mutiny, the movie and the myth.” The Independent, June 14, 2005.  https://www.independent.co.uk/news/world/europe/potemkin-the-mutiny-the-movie-and-the-myth-225737.html 

Studyspark

Study Document Study Document

The Impact Of The Black Death On European Society

Pages: 5 (1628 words) Sources: 4 Document Type:Term Paper Document #:21928849

… overthrow the centuries-old exploitative labor systems like feudalism. Because neither church nor state responded credibly to the Black Death, the epidemic weakened the authority of the Catholic Church and fostered populist rebellions. Likewise, the Black Death prompted interest in credible scientific responses to disease, even while superstition ……

References

Works Cited

The Anonimalle Chronicle: The English Peasants’ Revolt (1381).

Boccaccio, Giovanni. The Decameron: The Plague Hits Florence. (ca. 1350).

Cohn, Samuel K. “The Black Death and the Burning of Jews.” Past & Present, Volume 196, Issue 1, August 2007, Pages 3–36,

Di Tura, Angelo. Sienese Chronicle (1348-1351).

Petrarca-Meister, The Social Order (ca. 1515).

Sloan AW. The Black Death in England. South African Medical Journal = Suid-afrikaanse Tydskrif vir Geneeskunde. 1981 Apr;59(18):646-650.

Studyspark

Study Document Study Document

Criminal Profiling Of Serial Killers

Pages: 12 (3545 words) Sources: 10 Document Type:Essay Document #:59713406

...Authority Does Criminal Profiling Work or is it Unjustified The Case of Tim Masters
Introduction
Criminal profiling allows law enforcement to develop their understanding of particular types of crime, criminals, criminal behaviors, and crime-ridden areas. The FBI’s Uniform Crime Reporting (UCR) Program is one data set tool used in criminal profiling (FBI, 2019). However, criminal profiling is not an exact science but rather more of an art and there is a high degree of subjectivity that goes into creating a criminal profile. Thus, when it comes to the criminal profiling of serial killers, there are many factors that must be considered—biological, sociological, environmental, criminological, and psychological inputs. This paper will describe what is involved in the criminal profiling of serial killers, how the process works, who conducts it, what traits of serial killers profiles tend to focus on, and how effective the process is at helping law enforcement agents catch killers.……

References

References

Alldredge, J. (2015). The" CSI Effect" and Its Potential Impact on Juror Decisions. Themis: Research Journal of Justice Studies and Forensic Science, 3(1), 6.

Bonn, S. (2019). How the FBI Profiles Serial Offenders. Retrieved from https://www.psychologytoday.com/us/blog/wicked-deeds/201905/how-the-fbi-profiles-serial-offenders

Dogra, T.D. et al. (2012). A psychological profile of a serial killer: A case report. Omega: Journal of Death & Dying 65(4), 299-316.

FBI. (2019). Summary of the Uniform Crime Reporting Program. Retrieved from  https://www2.fbi.gov/ucr/killed/2009/aboutucr.html 

Karson, M. (2017). Why Profiling Serial Killers Can’t Work. Retrieved from https://www.psychologytoday.com/us/blog/feeling-our-way/201711/why-profiling-serial-killers-can-t-work

Miller, L. (2014). Serial killers: I. Subtypes, patterns and motives. Aggression and Violent Behavior 19, 1-11.

Samuel, D. B., & Widiger, T. A. (2007). Describing Ted Bundy's personality and working towards DSM-V. Practice, 27, 20-22.

Sarteschi, C. M. (2016). Serial Murder. In Mass and Serial Murder in America (pp. 45-67). Springer, Cham.

Studyspark

Study Document Study Document

Adolescent Psychosocial Assessment

Pages: 10 (2865 words) Sources: 8 Document Type:Case Study Document #:54875989

… caters for most of the funding needs for disadvantaged youth. It was also reauthorized recently by the Every Student Succeeds Act. The Local Authority Agency Grants provides the biggest access platform for secondary education. The grants from Title I-A reach he children perceived to be low achievers ……

References

References

Alexander Jr, R. (2010). The Impact of Poverty on African American Children in the Child Welfare and Juvenile Justice Systems. In Forum on Public Policy Online (Vol. 2010, No. 4). Oxford Round Table. 406 West Florida Avenue, Urbana, IL 61801.

Belgrave, F. Z., & Allison, K. W. (2009). African American psychology: From Africa to America. Los Angeles: Sage.

Brittian A. S. (2012). Understanding African American Adolescents\\\\\\' Identity Development: A Relational Developmental Systems Perspective. The Journal of black psychology, 38(2), 172–200.  https://doi.org/10.1177/0095798411414570 

Chávez, R. (2016). Psychosocial development factors associated with occupational and vocational identity between infancy and adolescence. Adolescent Research Review, 1(4), 307-327.

Crain, W. C. (2014). Theories of development: Concepts and applications. Harlow, Essex: Pearson.

Fernandes-Alcantara, A. L. (2018). Vulnerable Youth: Background and policies.Congressional Research Service

Newman, B. M., & Newman, P. R. (2015). Theories of human development. Psychology Press.

Reubins, B. M., &Reubins, M. S. (2014). Pioneers of child psychoanalysis: Influential theories and practices in healthy child development. London: Karnac.

Studyspark

Study Document Study Document

COVID 19 In South Africa Nigeria And Swaziland

Pages: 7 (2030 words) Sources: 6 Document Type:literature review Document #:53851517

...Authority Literature Review on Coping Through The Use Of Informal Institutions during COVID 19 in South Africa, Nigeria, and Swaziland
The institutional theory deals with the outlines, regulations, standards, and procedures that are formulated in the institutions as commanding instructions for social behavior. This theory gives an understanding of how institutions are shaped, and the societal norms and frameworks are informed to all people of an organization. Communication is the sole indicator of how organizations are formulated with the help of formal rules and regulations, as that would reflect how they are conversed across all levels of the firm and in what way people are obeying them. This would ultimately build an organizational culture for coping with social and political issues. The informal institutions are socially shared instructions, typically unwritten, that are formed, transferred and imposed outside the official boundaries (Torniainen & Sasstamoinen, 2007), for example, giving tips to the food……

References

References

Coelho, A. (2019). The role of informal institutions in the enforcement of rules and how to improve corporate and public governance in Brazil: Studies based on a set of corporate governance cases involving state-owned companies (Working Paper). Retrieved from SSRN website  https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3434037 

Dacin, M.T., Goodstein, J. & Scott, W.R. (2002). Institutional theory and institutional change: Introduction to the special research forum. Academy of Management Journal, 45(1), 45- 47. DOI: 10.2307/3069284

Escandon-Barbosa, D.M., Urbano, D., Hurtado-Ayala, A., Paramo, J.S. & Dominguez, A.Z. (2019). Formal institutions, informal institutions, and entrepreneurial activity: A comparative relationship between rural and urban areas in Colombia. Journal of Urban Management, 8(3), 458-471.  https://doi.org/10.1016/j.jum.2019.06.002 

Estrin, S. & Prevezer, M. (2010). The role of informal institutions in corporate governance: Brazil, Russia, India, and China compared. Asia Pacific Journal of Management, 28, 41- 67.  https://doi.org/10.1007/s10490-010-9229-1 

Kaufmann, W., Hooghiemstra, R. & Feeney, M.K. (2018). Formal institutions, informal institutions, and red tape: A comparative study. Public Administration, 96(2), 386-403. https://doi.org/10.1111/padm.12397

Meluch, A.L. (2016, August). Understanding the organizational and institutional origins of social support in a cancer support center. (Unpublished doctoral dissertation). Retrieved from https://etd.ohiolink.edu/!etd.send_file?accession=kent1466944822&disposition=inline

Torniainen, T.J. & Sasstamoinen, O.J. (2007). Formal and informal institutions and their hierarchy in the regulation of the forest lease in Russia. Forestry: An International Journal of Forest Research, 80(5), 489-501.  https://doi.org/10.1093/forestry/cpm033 

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".