Business Continuity Essays (Examples)

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… studies are important today because the Internet of Things is changing the manner in which companies of all sizes and types operate their business, and current trends indicate that these implementations are increasing exponentially. The Internet of Things allows conventional computer-based networks to incorporate data collected from … questions and subquestions.
The Implementation of Internet of Things (IoT): A Case Study of the Barriers that Prevent Implementation of IoT within Small business
Chapter 2: Literature Review
Chapter Introduction
The review of literature will be critical to establishing the current scope of innovation related to the … are associated with the implementation of IoT is followed by an analysis of other barriers that prevent the implementation of IoT by small business. Finally, a summary of the research and the key findings that emerged from a synthesis of the relevant literature conclude the chapter.
Theoretical/Conceptual … using IoT a risk?
RQ1a.……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Quality Improvement Plan

Pages: 8 (2259 words) Sources: 3 Document Type:Essay Document #:15328013

… is a faster response to the customer query and the customer can receive the message promptly. With a focus on the customer, a business must be able to meet the customer where the customer feels most comfortable (Carvalho, Magalhaes, Varela, Sa, & Gonçalves, 2016). Some customers would … 2016). Some customers would prefer to interact via calls and others will prefer social media. With a presence in both these avenues, the business can be assured that it can interact with the customers and the business is able and willing to attend to customer problems or queries.
Customer loyalty will have a positive impact on output satisfaction. This is … or queries.
Customer loyalty will have a positive impact on output satisfaction. This is because loyal customers will become repeat customers and the business will increase its outputs. Therefore, the business will benefit since the customers will be satisfied with……

References

References

Brown, C. (2019). Why and how to employ the SIPOC model. Journal of business continuity & emergency planning, 12(3), 198-210.

Carvalho, M. S., Magalhaes, D. S., Varela, M. L., Sa, J. O., & Gonçalves, I. (2016). Definition of a collaborative working model to the logistics area using design for Six Sigma. International Journal of Quality & Reliability Management, 33(4), 465-475.

Shojaie, A. A., Raissi, S., & Dogahe, R. A. (2016). Impact analysis of TQM\\\\\\'s hard aspects on sigma level in electronics and telecommunication production process. International Journal of Productivity and Quality Management, 18(4), 425-439.

 

Studyspark

Study Document Study Document

Optimizing Health Information Systems

Pages: 12 (3717 words) Sources: 16 Document Type:Research Paper Document #:99273225

Optimizing Merged Health Information Systems
Although the merger of two comparably sized companies competing in the same industry is a relatively commonplace business strategy, the process is fraught with obstacles and challenges and a significant percentage of merged entities fail outright because of these problems (Murphy, ……

References

References

Abouzhar, C. & Boerma, T. (2009, August). Health information systems: The foundations of public health. Bulletin of the World Health Organization, 83(8), 578-583.

Cresswell, K. & Aziz, S. (2013, May). Organizational issues in the implementation and adoption of health information technology innovations: An interpretative review. International Journal of Medical Informatics, 87(5), 73-86.

Drazen, E. L. (2006, February). Maximizing the benefits of health care information systems. Journal of Medical Systems, 10(1), 51-56.

Kruse, C. S. & Smith, D. (2017, July). Security techniques for the electronic health records. Journal of Medical Systems, 41(8), 127.

Kumar, V. (2011). Impact of health information systems on organizational health communication and behavior. The Internet Journal of Allied Health Sciences and Practice, 9(2), 37-44.

McGrail, K. M. & Black, C. (2009, August). Access to data in health information systems. Bulletin of the World Health Organization, 83(8), 563-569.

Murphy, M. L. (2019, March). Mastering accounting for business combinations: Mergers and acquisitions present challenges that finance can overcome by staying involved with the deal and preparing in advance of the closing. Journal of Accountancy, 227(3), 24-27.

NAHQ code of ethics for healthcare quality. (2019). National Association for Healthcare Quality. Retrieved from  https://nahq.org/about/code-of-ethics .

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

Abstract
Cybercrime, data breaches, and fraud represent evils that significantly threaten business. Companies have, in the past, lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In … and (7) policy auditing – which is an audit of the firm's security policy for making sure it is aligned with the firm's business aims.
In the course of, as well as, after the culmination of, security auditing, a succession of reports can be described, including reports ……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Incident Command System ICS

Pages: 9 (2818 words) Sources: 7 Document Type:Essay Document #:51934248

… of a crew came up with a standardized procedure for equipment decontamination and it was implemented by other response teams. A general knowledge continuity was also possible among the participating response team members due to the staggered Corps schedules. Execution of duties differed in various critical aspects ……

References

References

AmeriCorps St. Louis. (2016). “Missouri Winter Flooding 2016.” Retrieved from https://www. americorps-stl.org/our-teams/emergency-response-team/disaster-deployment-archive/missouri-winter-flooding-2016/.

Buck, Dick A., Joseph E. Trainor, and Benigno E. Aguirre. (2006). “A Critical Evaluation of the Incident Command System and NIMS.” Journal of Homeland Security and Emergency Management, 3(3).

Bigley, Gregory A. and Karlene H. Roberts. (2001). “The Incident Command System: High-Reliability Organizing for Complex and Volatile Task Environments.” Academy of Management Journal, 44(6): 1281-1299.

Butterfield, Karen. (2016, January 21). “AmeriCorps Helping Flood Victims Find Place to Stay.” The Missourian. Retrieved from http://www.emissourian.com/local_news/washington/americorps-helping-flood-victims-find-place-to-stay/article_56f75bab-87de-5198-843e-bdfdb8229b5a.html.

Cardwell, Michael D. and Patrick T. Cooney. (2000). “Nationwide Application of the Incident Command System: Standardization Is the Key.” FBI Law Enforcement Bulletin 69.10: 10-16.

Cole, Dana. (2000). The Incident Command System: A 25-Year Evaluation by California Practitioners. National Fire Academy.

Corporation for National and Community Service (CNCS). (2014). “Disaster Response Framework.” Retrieved from  http://www.nationalservice.gov/sites/default/files/documents/CNCS%20DSU%20  Disaster%20Response%20Framework.pdf.

Dynes, Russell Rowe. (1970). Organized Behavior in Disaster. Lexington, MA: Heath Lexington.

Studyspark

Study Document Study Document

Pediatric Nursing And Gastroenteritis

Pages: 11 (3217 words) Sources: 7 Document Type:Case Study Document #:91020805

… hospitalized children. The importance of play increases as the child's condition moves to critical status, disability, and even life-threatening health conditions. Play restores continuity in a child's psychosocial life. Healthcare professionals can gain useful insights regarding the child's health and mental condition through the use of play ……

References

References

Campos, M. C., Rodrigues, K. C. S., & Pinto, M. C. M. (2010). Evaluation of the behavior of the pre-school one just admitted in the unit of pediatrics and the use of the therapeutic toy. Einstein (São Paulo), 8(1), 10-17.

Caplin, D., & Cooper, M. (2007). Child development for inpatient medicine. In Comprehensive pediatric hospital medicine (pp. 1285-1292). Mosby.

Emde, R. N., & Harmon, R. J. (Eds.). (2012). Continuities and discontinuities in development. Springer Science & Business Media.

Hockenberry, M. J., & Wilson, D. (2019). Wong\\\\\\\\\\\\'s nursing care of infants and children E-book. Elsevier Health Sciences.

Koukourikos, K., Tzeha, L., Pantelidou, P., & Tsaloglidou, A. (2015). The Importance of Play during Hospitalization of Children. Materia socio-medica, 27(6), 438–441.  https://doi.org/10.5455/msm.2015.27.438-441 

Li, W. H., Chung, J. O. K., Ho, K. Y., & Kwok, B. M. C. (2016). Play interventions to reduce anxiety and negative emotions in hospitalized children. BMC pediatrics, 16(1), 36.

National Collaborating Centre for Women\\\\\\\\\\\\'s and Children\\\\\\\\\\\\'s Health; UK. (2009). Diarrhea and vomiting caused by gastroenteritis: diagnosis, assessment, and management in children younger than 5 years.

Studyspark

Study Document Study Document

Weapons Of Mass Destruction WMD Antifa

Pages: 13 (3787 words) Sources: 12 Document Type:Research Paper Document #:67320498


An electro-magnetic pulse (EMP) attack could crash the American economy and bring virtually every industry to a standstill—such is the reliance of modern business upon the digital infrastructure. Thus, considering an EMP attack is something that government should take very seriously. As more and more of the … Without a functioning electrical, oil and gas pipelines, etc., a nation can quickly become plunged in darkness and chaos. Energy keeps a nation’s business and activities operational and therefore the economic and social life of a nation depends upon having a functioning energy infrastructure (Maras, 2014). Making … increasingly hostile world (Wilshusen, 2012, p. 2).
Energy has to be constantly generated and delivered for a nation to function healthily. Stability and continuity are essential to the nation’s vitality and if there is ever any disruption in the generation or delivery of energy, the nation’s progress … all over the country to……

References

References

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Christenson, G. (2015). CBRN response. National Guard Bureau.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from  https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat 

Jennings, P. (2006). Miami port poses serious risks. Retrieved from  https://abcnews.go.com/WNT/story?id=131634&page=1 

Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from  http://www.johnstonsarchive.net/terrorism/chembioattacks.html 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Maras, M-H. (2014). Transnational Security. Florida: CRC Press.

Studyspark

Study Document Study Document

Leadership In Spiritual Dimensions

Pages: 11 (3292 words) Sources: 8 Document Type:Creative Writing Document #:51024009

… aim to pursue. The path towards this goal will focus on striving to be in the soul, establishing a sense of consistency and continuity by embracing the spiritual rhythms of life and giving thanks to God routinely and habitually; and recognizing……

References

References

Barton, R. H. (2018). Strengthening the soul of your leadership. InterVarsity Press.

Boa, K. D. (2001). Conformed to his image. Zondervan.

Cashman, K. (2017). Leadership from the inside out (3rd ed.). Berrett-Koehler,Publishers.

Chandler, D. J. (2014). Christian spiritual formation. InterVarsity Press.

Houghton, J. D., Neck C.P., & Krishnakumar, S. (2016). The what, why, and how of spirituality in the workplace revisited: a 14-year update and extension. Journal of Management, Spirituality and Religion, 13(3), 177-205.

King, S. N., Altman, D. G., & Lee, R. J. (2011). Discovering the leader in you: How to realize your leadership potential. Jossey-Bass.

Sweeney, P. J., & Fry, L. W. (2012). Character through spiritual leadership. Consulting Psychology Journal: Practice and Research, 64(2), 89-107.

Van Velsor, E., McCauley, C. D., & Ruderman, M. N. (2010). Handbook of leadership development. Jossey-Bass.

Studyspark

Study Document Study Document

Organizational Situations And Interventions

Pages: 6 (1880 words) Sources: 8 Document Type:Essay Document #:43843471

… the effectiveness of the intervention could be enhanced through some changes. First, the intervention could be enhanced through hiring more staff to promote continuity of services provided to patients. Nursing shifts exacerbated the current shortage of nurses faced by the facility. Hiring more staff would help enhance ……

References

References

Bhui, K., Dinos, S., Galant-Miecznikowska, M., de Jongh, B. & Stanfeld, S. (2016, December). Perceptions of Work Stress Causes and Effective Interventions in Employees Working in Public, Private and Non-governmental Organizations: A Qualitative Study. BJPsych Bulletin, 40(6), 318-325.

Kelly, E.L., Moen, P. & Tranby, E. (2011, April). Changing Workplaces to Reduce Work-Family Conflict: Schedule Control in a White-Collar Organization. American Sociological Review, 76(2), 265-290.

Khan, N. & Khurshid, S. (2017, February). Workplace Stress and Employee Wellbeing: Case of Health Care Staff in UAE. European Scientific Journal, 13(5), 217-226.

Korte, R.F. (2007). The Socialization of Newcomers into Organizations: Integrating Learning and Social Exchange Processes. Retrieved from Institute of Education Sciences website:  https://files.eric.ed.gov/fulltext/ED504550.pdf 

Kossek, E.E. & Lee, K. (2017, October). Work-Family Conflict and Work-Life Conflict. Retrieved March 24, 2020, from https://oxfordre.com/business/view/10.1093/acrefore/9780190224851.001.0001/acrefore-9780190224851-e-52?print=pdf

Njegovan, B.R. & Kostic, B. (2014). Impact of Organizational Socialization Towards Employees’ Social Adaptation. Journal of Engineering Management and Competitiveness, 4(1), 34-40.

Van Kleef, D., Steen, T. & Schott, C. (2017, October 26). Informal Socialization in Public Organizations: Exploring the Impact of Informal Socialization on Enforcement Behavior of Dutch Veterinary Inspectors. Public Administration, 97(1), 81-96.

Zhou, S., Da, S., Guo, H. & Zhang, X. (2018, April 17). Work-Family Conflict and Mental Health Among Female Employees: A Sequential Mediation Model via Negative Affect and Perceived Stress. Frontiers in Psychology, 9(544), doi:  https://doi.org/10.3389/fpsyg.2018.00544

 

Join thousands of other students and

"spark your studies".