Case Study Essays (Examples)

Studyspark

Study Document Study Document

Code Of Ethics For Managers In Acquisition

Pages: 11 (3162 words) Sources: 5 Document Type:Research Paper Document #:25977313

… the flaws in codes of ethics has a valuable purpose – to highlight areas of potential improvement, and strengthen future codes of ethics.
case-Based Training
One of the challenges for a code of ethics is to tie it to the training that managers must undergo. Harkrider et … challenges for a code of ethics is to tie it to the training that managers must undergo. Harkrider et al (2012) note that case-based ethics training is one of the most common forms of ethical training. In order to have effective case-based training, however, it is necessary that the training be aligned with some existing standard of ethics. The code of ethics, therefore, serves as … aligned with some existing standard of ethics. The code of ethics, therefore, serves as the basis for the training. The authors note that case-based training is most effective when combined with codes of ethics. Codes……

References

References

Adelstein, J. & Clegg, S. (2016) Code of ethics: A stratified vehicle for compliance. Journal of Business Ethics. Vol. 138 (1) 53-66.

Lazeros, M. (2008) Leaders can learn from Druyun’s ethical lapses and their consequences. USAWC Research Project. Retrieved October 25, 2019 from  https://apps.dtic.mil/dtic/tr/fulltext/u2/a479019.pdf 

McConnnell, A. & Rood, T. (1997) Ethics in government: A survey of misuse of position for personal gain and its implications for developing acquisition strategy. Journal of Business Ethics. Vol. 16 (1997) 1107-1116.

McConnell, T. (2018). Moral dilemmas. Stanford Encyclopedia of Philosophy Retrieved October 25, 2019 from  https://plato.stanford.edu/entries/moral-dilemmas/ 

Neu, D., Everett, J. & Rahaman, A. (2015) Preventing corruption within government procurement: Constructing the disciplined and ethical subject. Critical Perspectives on Accounting. Vol. 28 (2015) 49-61.

Studyspark

Study Document Study Document

Intelligence Oversight Ethics

Pages: 11 (3311 words) Sources: 15 Document Type:Research Paper Document #:23829007

… required if undertaken for law enforcement purposes, provided that such techniques shall not be undertaken unless the Attorney General has determined in each case that there is probable cause to believe that the technique is directed against a foreign power or an agent of a foreign power ……

References

References

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Brown, William F., and Americo R. Cinquegrana. \\\\\\\\\\\\"Warrantless Physical Searches for Foreign Intelligence Purposes: Executive Order 12,333 and the Fourth Amendment.\\\\\\\\\\\\" Cath. UL Rev. 35 (1985): 97.

Cantarella, Michele. \\\\\\\\\\\\"Intelligence ethics in the digital age.\\\\\\\\\\\\" (2016).

Congressional Research Service, “CIA Ethics Education: Background and Perspectives” (2018).

Ferrari, Rachel. \\\\\\\\\\\\"Moral Relativism and Dangerous Ethical Dilemmas in the US Intelligence Community.\\\\\\\\\\\\" (2018).

Ford, Christopher M. \\\\\\\\\\\\"Intelligence Demands in a Democratic State: Congressional Intelligence Oversight.\\\\\\\\\\\\" Tul. L. Rev. 81 (2006): 721.

Goldman, Jan. \\\\\\\\\\\\"Teaching About Intelligjence and Ethics.\\\\\\\\\\\\" Journal of US Intelligence Studies 20, no. 2 (2013): 79.

Hayes, Jonathan. \\\\\\\\\\\\"The Cinema of Oliver Stone: Art, Authorship and Activism by Ian

Studyspark

Study Document Study Document

The Ethics Of Clandestine Operations

Pages: 11 (3151 words) Sources: 14 Document Type:literature review Document #:69864024

...Case study Ethics of Clandestine Intelligence Operations
Introduction
One of the most common yet least understood methods of operations in the art of statecraft is the clandestine operation (Sheldon 1997). Though popularized in pulp fiction and film, such as the James Bond series franchise and numerous other spy thrillers, clandestine operations remain relatively unknown in the public consciousness—and when they are discussed it is generally with distaste, distrust and vilification (Sheldon 1997). Yet as Sheldon (1997) shows, clandestine operations are not new or unique to the modern world and in fact ancient Rome used them whenever military operations were impractical. Thus, “political influence operations, seeding, propaganda, political patronage, safe havens, political assassination, and paramilitary operations” can all be traced back more or less to similar operations implemented by the ancient Romans (Sheldon 1997, 299). Today, there are many different facets to clandestine operations, and many agencies that use them—from the CIA to……

References

Bibliography

Arnold, A. and D. Salisbury. The Long Arm, 2019. Retrieved from https://www.belfercenter.org/publication/long-arm

Barker, Michael J. \\\\\\"Democracy or polyarchy? US-funded media developments in Afghanistan and Iraq post 9/11.\\\\\\" Media, Culture & Society 30, no. 1 (2008): 109-130.

Best, Richard A. Intelligence to Counter Terrorism: Issues for Congress. Congressional Research Service: CRS Report for Congress, 2002.

Carter, Ashton B. \\\\\\"Overhauling counterproliferation.\\\\\\" Technology in Society 26, no. 2-3

(2004): 257-269.

Crumpton, Henry A. The art of intelligence: lessons from a life in the CIA\\\\\\'s clandestine service. Penguin, 2013.

Hersh, Seymour. Selective Intelligence. The New Yorker, 2003.  http://www.newyorker.com/magazine/2003/05/12/selective-intelligence 

McCormick, G. H., & Owen, G. “Security and coordination in a clandestine organization.” Mathematical and Computer Modelling, 31, no. 6-7 (2000), 175-192.

Studyspark

Study Document Study Document

Victims Of Homelessness

Pages: 5 (1359 words) Sources: 8 Document Type:Research Paper Document #:74972177

...Case study Homelessness is an issue that has persisted in the United States because of the ever-changing demographic factors and economic circumstances. The composition and size of the homeless population in the country continues to change due to these varying factors. Over the past decade, homelessness has attracted public attention given the dramatic increase in the number and composition of victims. While numerous efforts have been undertaken to address the issue, homelessness remains a major problem for policymakers and the public. An important element in dealing with the problem of homelessness is understanding victimization and its contributing factors. Through understanding victimization, policymakers and other stakeholders will develop suitable policies and approaches to address homelessness. This paper explores street crime victimization of homeless women and children.
Importance of the Issue
According to Stanley et al. (2016), homelessness is an ongoing problem facing the United States as the size of the homeless population continues……

References

References

Bachega, H. (2018, October 8). Homeless in US: A Deepening Crisis on the Streets of America. BBC. Retrieved November 22, 2019, from  https://www.bbc.co.uk/news/world-us-canada-45442596 

Bendix, A. (2019, November 18). The 9 States with the Worst Homelessness Crises Reveal How Bad the Housing Crunch Has Gotten in US Cities. Business Insider. Retrieved November 22, 2019,  https://www.businessinsider.com/photos-homelessness-states-worst-crises-2018-11?IR=T 

Ellsworth, J.T. (2018, December 3). Street Crime Victimization Among Homeless Adults: A Review of the Literature. Victims & Offenders: An International Journal of Evidence-based Research, Policy and Practice, 14(1), 96-118.

Family & Youth Services Bureau. (2016, June 24). Domestic Violence and Homelessness: Statistics (2016). Retrieved from U.S. Department of Health and Human Services website:  https://www.acf.hhs.gov/fysb/resource/dv-homelessness-stats-2016 

Norris, S. (2019, September 9). Women Fleeing Abuse Are Being ‘re-traumatized’ by the Housing System. City Metric. Retrieved November 22, 2019, from https://www.citymetric.com/politics/women-fleeing-abuse-are-being-re-traumatised-housing-system-4769

Stanley, J.L., Jansson, A.V., Akinyemi, A.A. & Mitchell, C.S. (2016, November). Characteristics of Violent Deaths Among Homeless People in Maryland, 2003-2011. American Journal of Preventive Medicine, 51(5), S260-S266.

Turner, M.M., Funge, S.P. & Gabbard, W.J. (2018). Victimization of the Homeless: Perceptions, Policies, and Implications for Social Work Practice. Journal of Social Work in the Global Community, 3(1), 1-12.

Tyler, K.A. & Beal, M.R. (2010). The High-risk Environment of Homeless Young Adults: Consequences for Physical and Sexual Victimization. Violence and Victims, 25(1), 101-115.

Studyspark

Study Document Study Document

Privacy In Social Networks Regarding Machine Learning

Pages: 8 (2537 words) Sources: 10 Document Type:Research Paper Document #:98311751

… the one developed by Bilogrevic (2016) that are simultaneously being designed to protect and preserve users’ privacy.
Another such example is in the study by Mohassel and Zhang (2017). Mohassel and Zhang (2017) use a two-server model with machine learning algorithms for the purposes of training linear ……

References

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

Studyspark

Study Document Study Document

Teaching Sexual Education In Public School

Pages: 8 (2487 words) Sources: 9 Document Type:Term Paper Document #:19342188

… Some religious groups and cultural groups might postulate that sexuality is too culturally bound to be taught in schools. If that were the case, then schools would simply need to introduce students to the anthropology of human sexuality to highlight the diversity of beliefs and practices around ……

References

References

Abbott, K., Ellis, S. J., & Abbott, R. (2016). “We”ve got a lack of family values’: an examination of how teachers formulate and justify their approach to teaching sex and relationships education. Sex Education, 16(6), 678–691. doi:10.1080/14681811.2016.1169398 

“America’s Sex Education: How We Are Failing Our Students,” (2017). USC Department of Nursing. Retrieved from  https://nursing.usc.edu/blog/americas-sex-education/ 

Bauman, S.D. (2018). When sex ed pretends to be secular. Senior Independent Study Theses. Paper 8059. Retrieved from  https://openworks.wooster.edu/independentstudy/8059 

Kirby, D. B. (2008). The impact of abstinence and comprehensive sex and STD/HIV education programs on adolescent sexual behavior. Sexuality Research and Social Policy, 5(3), 18-27

Lepore, J. (2015). The facts of life. 94 Foreign Aff. 144 (2015).

National Conference of State Legislatures (2019). State policies on sex education in schools. Retrieved from  http://www.ncsl.org/research/health/state-policies-on-sex-education-in-schools.aspx 

Pardini, P. (2019). The history of sexuality education. Rethinking Schools. Retrieved from  http://rethinkingschools.aidcvt.com/sex/sexhisto.shtml 

Planned Parenthood (2019). What is sex education? Retrieved from  https://www.plannedparenthood.org/learn/for-educators/what-sex-education

Studyspark

Study Document Study Document

Brown V Board Of Education And Civil Rights Moment By Michael Klarman

Pages: 6 (1764 words) Sources: 3 Document Type:Essay Document #:64441378

… southerners, ‘who are to be coerced out of segregation,’ than with blacks, ‘who are coerced into it.’”[footnoteRef:3] The decision rendered in the court case was supported by the majority of the American public, polls showed.[footnoteRef:4] The Justices were not going against the grain of American sentiment or … of segregation, racism, and how to transform a society at the most basic, fundamental level—the school system. Klarman’s book suggests, ultimately, that the case probably never should have been heard and that the Court was essentially behind the curve on this one. It stuck its fingers into ……

References

Bibliography

Cripps, Thomas and and David Culbert. “The Negro Soldier (1944): Film Propaganda in Black and White.” American Quarterly Vol. 31, No. 5, Special Issue: Film and American Studies (Winter, 1979), pp. 616-640: The Josh Hopkins University Press.

German, Kathleen M. Promises of Citizenship: Film Recruitment of African Americans in World War 2. University Press of Mississippi, 2017.

Klarman, Michael. Brown v Board of Education and the Civil Rights Moment. New York, NY: Oxford University Press, 2007.

Studyspark

Study Document Study Document

Reforming The High School System

Pages: 10 (2967 words) Sources: 7 Document Type:Essay Document #:70939676

… But the person has to know more about the source of this light so begins to climb upwards towards it. Plato makes the case that this is what true philosophy is all about and that most people do not pursue it because the pursuit is actually hard ……

References

Works Cited

Adorno, Theodor and Max Horkheimer. The culture industry: Enlightenment as mass deception. Stardom and celebrity: A reader, 34, 2007.

DoSomething.org. “11 Facts about High School Dropout Rates.”  https://www.dosomething.org/us/facts/11-facts-about-high-school-dropout-rates#fn1 

Freire, Paulo. Pedagogy of the oppressed. Bloomsbury Publishing USA, 2018.

Kristjánsson, Kristján. \\\\\\\\\\\\"There is Something About Aristotle: The Pros and Cons of Aristotelianism in Contemporary Moral Education.\\\\\\\\\\\\" Journal of philosophy of education 48.1 (2014): 48-68.

Lickona, Thomas. \\\\\\\\\\\\"The return of character education.\\\\\\\\\\\\" Educational leadership 51.3 (1993): 6-11.

Micheletti, Gabrielle. “Re-Envisioning Paulo Freire\\\\\\\\\\\\'s “Banking Concept of Education’.” Inquiries Journal 2.2 (2010): 1.  http://www.inquiriesjournal.com/articles/171/re-envisioning-paulo-freires-banking-concept-of-education 

Plato. Allegory of the Cave.  https://web.stanford.edu/class/ihum40/cave.pdf 

Studyspark

Study Document Study Document

Observation Portfolio Classroom Of Special Education

Pages: 12 (3573 words) Sources: 3 Document Type:Essay Document #:58451564

...Case study Observation Portfolio – Special Education Classroom
Introduction
This observation portfolio paper presents a summary of my experience and knowledge gained from analyzing four observation sessions in a special education classroom setting. Observation 1 and 2 was conducted in the morning, observation 3 of 4 took place during lunch break, and observation 4 of 4 was conducted in the afternoon. Each of the four observation sessions is discussed below.
Observation 1 of 4
Observation Summary
The class consisted of nine students; eight students were male and one was female. During my observation, I walked and looked around as the students started each morning with snacks, milk, and orange juice for breakfast followed by typing lessons, mathematics lessons, group calendar practice, and personal information binders. Before starting the mathematics lesson, the students played a game as a way to facilitate smooth transition from one activity to another. Personal information binders included practicing……

References

References

Hallahan, D. P., Kauffman, J. M., & Pullen, P. C. (2018). Exceptional Learners: An Introduction to Special Education (14th ed.). New York, NY: Pearson.

Holley, D., & Park, S. (2017). LESSONS LEARNED AROUND THE BLOCK: AN ANALYSIS OF RESEARCH ON THE IMPACT OF BLOCK SCHEDULING ON SCIENCE TEACHING AND LEARNING. Retrieved from https://www.isres.org/books/chapters/Education_Research_Highlights_in_Mathematics_Science_and_Technology_2017_15_21-12-2017.pdf

Shabani, K., Khatib, M., & Ebadi, S. (2010, December). Vygotsky\\\\\\'s Zone of Proximal Development: Instructional Implications and Teachers\\\\\\' Professional Development. Retrieved from  https://files.eric.ed.gov/fulltext/EJ1081990.pdf 

Studyspark

Study Document Study Document

Healthcare Marketing

Pages: 11 (3219 words) Sources: 3 Document Type:Essay Document #:80789957

… marketing who feel that the healthcare companies take advantage of consumers’ ignorance by appealing and directly advertising to them. This is especially the case with TV spots, which tend to target older persons (younger people tend to use more Internet-based sources for entertainment). Older consumers do not ……

References

References

Arnold, D. G., & Oakley, J. L. (2013). The politics and strategy of industry self-regulation: the pharmaceutical industry's principles for ethical direct-to-consumer advertising as a deceptive blocking strategy. Journal of Health Politics, Policy and Law, 38(3), 505-544.

Blythe, J. (2009). Key Concepts in Marketing. Los Angeles: SAGE Publications Ltd.

Chand, S. (2019). Target Marketing: Four Generic Target Marketing Strategies. Retrieved from  http://www.yourarticlelibrary.com/marketing/target-marketing-four-generic-target-marketing-strategies/13400 

Dolliver, M. (2009). Take care when targeting the younger generations. Retrieved from  https://www.adweek.com/digital/take-care-when-targeting-the  younger generations-online-113643/

Goi, C. L. (2009). A review of marketing mix: 4Ps or more?. International journal of marketing studies, 1(1), 2.

Hartley, K. & Rudelius, W. (2001). Marketing, The Core, 4th Ed., McGraw-Hill.

Hawn, C. (2009). Take two aspirin and tweet me in the morning: how Twitter, Facebook, and other social media are reshaping health care. Health affairs, 28(2), 361-368.

Lane, T. (2019). Healthcare marketing laws. Retrieved from  https://smallbusiness.chron.com/healthcare-marketing-laws-67307.html

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".