Behavior Essays (Examples)

Studyspark

Study Document Study Document

Foxtrot Phone Scandal

Pages: 6 (1877 words) Sources: 6 Document Type:Case Study Document #:53518196

… members of the upper classes and cadets from other company areas are seemingly using the telephone…[break]…to safeguard trust and uphold ethical standards and behavior.
Action
to be Taken
The roommate should be informed about the free “pay” phones and encouraged not to engage in the practice. After … addressing the problem.
Ethical Criteria Used to Determine Action
Corporate Ethical Virtues (CEV) Model postulate that organizations explicitly state the kind of ethical behavior expected of managers and employees (Kapstein, 2015). Based on this model, managers and employees are provided with adequate resources at their disposal to … duty and have adequate resources to do so. Their engagement in this practice does not reflect commitment to these values and desired ethical behavior. As a result, notifying the management of their unethical behavior is demonstration of commitment to the desired ethical behavior. Utilitarian theory emphasizes the significance of individual actions instead of……

References

References

Cooper, T.L. (2012). The responsible administrator: An approach to ethics for the administrative role (6th ed.). San Francisco, CA: Jossey-Bass.

European Ombudsman. (2012, November 15). Ensuring Ethics in Public Administration: The Role of the Ombudsman. Retrieved June 7, 2020, from  https://www.ombudsman.europa.eu/en/speech/en/49379 

Kapstein, M. (2015). The Battle for Business Ethics: A Struggle Theory. Journal of Business Ethics, 144, 343-361.

Ondrova, D. (2017). Challenges of Modern Public Administration and Ethical Decision-Making. RAP, 3, 255-279.

Singh, A.K. & Mishra, N.K. (2018). Ethical Theory & Business – A Study Based on Utilitarianism and Kantianism. International Journal of Humanities and Social Development Research, 2(1), 97-113.

Stein, C. (2019, January 25). Ethical Considerations in Public Administration. PA Times. Retrieved June 7, 2020, from  https://patimes.org/ethical-considerations-in-public-administration/ 

Studyspark

Study Document Study Document

Criminology Sociology And Three Theories Of Crime

Pages: 2 (570 words) Sources: 3 Document Type:Essay Document #:12132142

The key assumptions underlying strain, control, and learning theories of criminal behavior are similar, which is why they are sometimes integrated or at least interrelated in criminological discourse. Strain theories evolved from Durkheim’s theory of … sociological problems such as inequality, injustice, or disparity.
Control theories posit a set of internal and external controls on individual or even collective behavior. Social institutions are assumed to serve as mechanisms of social control, also influencing individual behaviors via a series of real or perceived constraints. Like strain theories, control theories assume that social cohesion is important for normative behavior, whereas the breakdown of social cohesion leads to the disregard for the institutions and the norms they uphold. Without institutions or their overarching … learned, either through basic conditioning or through modeling. Differential association theory explains social learning in terms of an individual’s subcultural alignment, as deviant behaviors are labeled as normative within……

References

References

Crossman, A. (2019). Deviance and strain theory in sociology. Thoughtco. Retrieved from:  https://www.thoughtco.com/structural-strain-theory-3026632 

“Differential Association, Strain and Control Theories,” (n.d.). Retrieved from: julianhermida.com/contbondstrain.htm

Rukus, J., Stogner, J. & Miller, B. (2016). LBGT novel drug use as contextualized through control, strain, and learning theories. Social Science Quarterly. https://www.researchgate.net/profile/Bryan_Miller4/publication/308669239_LGBT_Novel_Drug_Use_as_Contextualized_Through_Control_Strain_and_Learning_Theories_LGBT_Novel_Drug_Use/links/5a579e46aca2726376b66832/LGBT-Novel-Drug-Use-as-Contextualized-Through-Control-Strain-and-Learning-Theories-LGBT-Novel-Drug-Use.pdf

Studyspark

Study Document Study Document

Leadership Development Plan

Pages: 5 (1638 words) Sources: 7 Document Type:Essay Document #:72976137

… each day on worker feedback
· Develop cultural competency by studying one new culture every week and revisiting old material
· Study human behavior and how people respond w/ words, body language so as to develop SI and EI
· Practice developing and communicating a vision
Open-ended … a week
· Reflection should be 15 mins each day
· 1 hour for cultural studies per week
· 1 hour for human behavior studies
· 30 mins for studying how to communicate a vision
· Worker morale has improved as determined by self-reported surveys
· Workers … of leader’s use of EI and SI
Having a leadership development plan is essential for identifying the opportunities available for improving leadership skills, behaviors and styles. It enables one to see which competencies need to be acquired, what key behaviors should be developed, and what styles of leadership should be practiced. The aim……

References

References

Atkin-Plunk, C. A., & Armstrong, G. S. (2013). Transformational leadership skills and correlates of prison warden job stress. Criminal Justice and Behavior, 40(5), 551-568.

Doody, O., & Doody, C. M. (2012). Transformational leadership in nursing practice. British Journal of Nursing, 21(20), 1212-1218.

Leininger, M. (2008). Transcultural nursing: Its importance in nursing practice. Journal of cultural diversity, 15(1), 37-43.

Mikkelson, A. C., York, J. A., & Arritola, J. (2015). Communication competence, leadership behaviors, and employee outcomes in supervisor-employee relationships. Business and Professional Communication Quarterly, 78(3), 336-354.

Ruben, B. D., & Gigliotti, R. A. (2017). Communication: Sine qua non of organizational leadership theory and practice. International Journal of Business Communication, 54(1), 12-30.

Shanks, N. H. & Buchbinder, S. B. (2012). Introduction to health care management. Burlington, MA: Jones & Bartlett Learning. 

Warrick, D. D. (2011). The urgent need for skilled transformational leaders: Integrating transformational leadership and organization development. Journal of Leadership, Accountability and Ethics, 8(5), 11-26.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

… its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as … and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage, acceptability, proposition, state behavior, cyberattack, relationship, intelligence gathering, national security.
Introduction
Cyberspace has become an important element is the operations of any given country because of today’s … of the owner/possessor of the information.[footnoteRef:2] While it is a form of cyberattack, there is a proposition cyber espionage is an acceptable state behavior. [1: Magnus Hjortdal, “China’s Use of Cyber Warfare: Espionage……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as … and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage, acceptability, proposition, state behavior, cyberattack, relationship, intelligence gathering, national security.
Introduction
Cyberspace has become an important element ins the operations of any given country because of today’s … the owner/possessor of the information.[footnoteRef:2] While it is a form of cyberattack, there is a proposition that cyber espionage is an acceptable state behavior. [1: Magnus Hjortdal, “China’s Use of Cyber Warfare: Espionage……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Learning Goals Real Life Experience And Personal Experience

Pages: 10 (3023 words) Document Type:Essay Document #:36646335

… male adults. Normally, the treatment is provided separately for females and males. There are special therapies or treatments for juveniles who have sexual behavior issues or problems. Generally, treatment approaches for younger children and adolescents differ from those used for adults. Treatment is often commences with specialized … are conducted by…[break]…a combination of field and office contacts.
The bureau of parole and probation is aware of how important it is for behavior-changing interactions between offenders and other people to go on in workplaces, treatment settings, and home environments. This is why officers are encouraged to ……

Studyspark

Study Document Study Document

Social Media And Its Effects On Girls

Pages: 12 (3470 words) Sources: 3 Document Type:Essay Document #:56099073

… crisis. Chronic news exposure may create vicarious trauma and PTSD” (7). Conversely, under-use or non-use of social media platforms may result in unhealthy behaviors such as violating stay-at-home orders or social distancing guidelines (Hutchinson).
One of the more insidious aspects of social media platforms is the manner … that social media platforms like Facebook are unofficial news channels and deliver news tailored for you (some of it fake) based on your behaviors and preferences gleaned over the last decade. Algorithms are used to give you the news that you will most likely consume, and that ……

References

Works Cited

Ali, S. (2018). “Social Media Usage among Teenage Girls in Rawalpindi and Islamabad.” Global Media Journal, vol. 16, p. 31.

Chukwuere, Joshua Ebere and Chukwuere, Precious. (2017, December). Cyberbullying of female students: An exploration of literature study. Gender & Behaviour, vol. 13, no. 4, pp. 9983-9991.

Goodwin, Robin, Palgi,Yuval, Osnat, Lavenda, Yaira, Hamama-Raz and Ben-Ezra, Menachem. (2015), “Association between Media Use, Acute Stress Disorder and Psychological Distress.” Psychotherapy and Psychosomatics, vol. 84, no. 4, pp. 253-254

Granello, Paul F. and Zyromski, Brett. (2018, September-August). “Developing a Comprehensive School Suicide Prevention Program.” Professional School Counseling, vol. 22, no. 1, pp. 37-42.

Hutchinson, Tracy S. (2020, April 19). Ten things mentally strong people do during a pandemic. Psychology Today. [online] available: https://www.psychologytoday.com/us/blog/the-pulse-mental-health/202004/10-things-mentally-strong-people-do-during-pandemic.

Kemp. Simon. (2020, January). “Digital 2020.” We Are Social. [online] available: https://wearesocial.com/blog/2020/01/digital-2020-3-8-billion-people-use-social-media.

Redden, Crystal V. (2018, December). “The Media\\\\\\\\\\\\'s Influence on Female Relational Aggression and Its Implications for Schools.” Canadian Journal of Education, vol. 36, no. 4, pp. 374-381.

Reinberg, Steven. (2019, August 14). “Here\\\\\\\\\\\\'s How Too Much Social Media Can Harm Girls.” WebMD. [online] available: https://www.webmd.com/mental-health/news/20190814/ heres-how-too-much-social-media-can-harm-girls#1.

Studyspark

Study Document Study Document

Ethical Issues In Reporting

Pages: 2 (694 words) Sources: 3 Document Type:Research Paper Document #:41848263

Ethics and ethical behavior can be taught, just as one can teach right and wrong to a child. A child without such an education is more likely … as one can teach right and wrong to a child. A child without such an education is more likely to stumble into deviant behavior, and the same goes for an adult who is not trained in ethics and what constitutes ethical behavior. The whole point of Socrates’ teaching the youth of Athens was to train their minds and wills so that they can pursue the … wills so that they can pursue the higher, nobler truths and live a life that aligned with the Good. Were ethics and ethical behavior incapable of being taught, Socrates would not have succeeded in laying the foundation of Western philosophy, his pupil Plato would not have succeeded … culture has to be put in class and……

References

References

Bedi, A., Alpaslan, C. M., & Green, S. (2016). A meta-analytic review of ethical leadership outcomes and moderators. Journal of Business Ethics, 139(3), 517-536.

Holyoke, T. T., Brown, H., & LaPira, T. M. (2015). Learnable skills, or unteachable instinct? What can and what cannot be taught in the lobbying profession. Interest Groups & Advocacy, 4(1), 7-24.

Kalshoven, K., van Dijk, H., & Boon, C. (2016). Why and when does ethical leadership evoke unethical follower behavior?. Journal of Managerial Psychology, 31(2), 500-515.

Studyspark

Study Document Study Document

Social Skills Training With Autism In Secondary Classroom

Pages: 10 (3100 words) Sources: 10 Document Type:Research Proposal Document #:23519150

… skill to a real-life scenario. In education circles, the term generalization is often used. It is usually used to show when a person’s behavior or response is produced in scenarios where it is actually not directly instructed/ or taught. This is a very common experience among social … for young people diagnosed with autism to develop and utilize social skills. According to Shindorf (2016), social skills include all elements of understanding, behavior, and communication that are important for effective social interactions. It is crucial to take cognizance of the complexity of social skills and how … social skills training for youths with autism in a high school setting.
Literature review
Social Skills
Social skills include all elements of understanding, behavior, and communication that are important for effective social interactions. Young people with autism spectrum disorders usually face social difficulties because of poor social ……

References

References

Adams, C., Lockton, E., Freed, J., Gaile, J., Earl, G., McBean, K., ... & Law, J. (2012). The Social Communication Intervention Project: a randomized controlled trial of the effectiveness of speech and language therapy for school?age children who have pragmatic and social communication problems with or without autism spectrum disorder. International Journal of Language & Communication Disorders, 47(3), 233-244.

Adams, C., Lockton, E., Freed, J., Gaile, J., Earl, G., McBean, K., Nash, M., Green, J., Vail, A., and Law, J. (2011). An evidence-based program for school, & aged children: Social communication intervention project. Research report. Uppsala: Inst.

American Psychological Association (APA) (2006). Evidence-Based Practice in Psychology. American Psychologist, 61(4), 271–285. doi: 10.1037/0003-066X.61.4.271

Cohen, J. (2013). Statistical power analysis for the behavioral sciences. Routledge.

Egger, M., Smith, G. D., Schneider, M., & Minder, C. (1997). Bias in meta-analysis detected by a simple, graphical test. Bmj, 315(7109), 629-634.

Higgins, J. P., & Green, S. (Eds.). (2011). Cochrane handbook for systematic reviews of interventions (Vol. 4). John Wiley & Sons.

Hutchins, N. S., Burke, M. D., Bowman-Perrott, L., Tarlow, K. R., & Hatton, H. (2019). The Effects of Social Skills Interventions for Students With EBD and ASD: A Single-Case Meta-Analysis. Behavior modification, 0145445519846817.

Radley, K. C., O’Handley, R. D., & Sabey, C. V. (2017). Social Skills Training for Children and Adolescents with Autism Spectrum Disorder. In Handbook of Treatments for Autism Spectrum Disorder (pp. 231-254). Springer, Cham.

Studyspark

Study Document Study Document

Violence Prevention Programs

Pages: 9 (2805 words) Sources: 6 Document Type:Essay Document #:52417572

...Behavior Using Social Media to Build Out Support Systems
Introduction
Violence prevention programs focus on curtailing forms of violence in society, such as child abuse, domestic violence and sexual assault. These programs often emphasize personal responsibility, information about what constitutes violence (it is often the case that offenders do not even realize they are being abusive), why long-term solutions are better than quick-fixes, and how to engage in respectful rather than abusive communication (Alternative Paths, 2020). This paper will discuss this topic, explain it from the theoretical perspective of strain theory, describe the present literature, and make recommendations based on the problems with violence prevention programs from a strain theory perspective and what can be done to solve those issues.
Violence Prevention Programs
Violence prevention programs are programs designed to address the needs of the community afflicted with violence issues, such as child abuse, sexual assault or domestic violence. For the……

References

References

Altafim, E. R. P., & Linhares, M. B. M. (2016). Universal violence and childmaltreatment prevention programs for parents: A systematic review. Psychosocial Intervention, 25(1), 27-38.

Alternative Paths. (2020). Violence prevention. Retrieved from  https://www.alternativepaths.org/services/diversion-programs/violence-prevention-program 

Farrell, A. D., Meyer, A. L., Kung, E. M., & Sullivan, T. N. (2001). Development and evaluation of school-based violence prevention programs. Journal of clinical child psychology, 30(2), 207-220.

Johnson, D. W., & Johnson, R. T. (1995). Why violence prevention programs don't work--and what does. Educational Leadership, 52(5), 63-68.

Lee, C., & Wong, J. S. (2020). Examining the effects of teen dating violence prevention programs: a systematic review and meta-analysis. Journal of Experimental Criminology, 1-40.

Siegel, L. (2018). Criminology, 7th Ed. Cengage Learning.

Stagg, S. J., & Sheridan, D. (2010). Effectiveness of bullying and violence prevention programs: A systematic review. Aaohn Journal, 58(10), 419-424.

Join thousands of other students and

"spark your studies".