Change Process Essays (Examples)

Studyspark

Study Document Study Document

How To Use Employee Referrals To Increase Workforce But Still Be

Pages: 10 (3022 words) Sources: 5 Document Type:Research Paper Document #:50167640

… to look closely at the relationship between the referring source and the referral. HR should also be careful about how it conducts the process of recruiting candidates: instead of asking for referrals, it may better obtain a diverse staff by asking employees for leads (Ranade, 2020). This … First are the needs of shelter and sustenance, then love and esteem, then the individual can move on to self-actualization, which is the process of being internally or intrinsically motivated—i.e., motivated for the sake of doing a good work. The more self-actualized an employee is, the more ……

References

Bibliography

Bussin, M., & Christos, D. (2018). Blind hiring not as crazy as it sounds. HR Future,  2018(Sep 2018), 36-39.

CBS News (2017). Retrieved from  http://www.cbsnews.com/videos/meet-bozoma-saint-john-the-woman-tasked-with-fixing-ubers-image/ 

Eisenhardt, K. M. (1989). Agency theory: An assessment and review. Academy of management review, 14(1), 57-74.

Frank, L. (2018). How to Use Employee Referrals Without Giving Up Workplace Diversity. Retrieved from  https://hbr.org/2018/03/how-to-use-employee-referrals-without-giving-up-workplace-diversity 

Jensen, M., & Meckling, W. (1976) Theory of the firm: Man- agerial behavior, agency costs, and ownership structure. Journal of Financial Economics, 3, 305-360.

Larcker, D. F., & Tayan, B. (2017). Governance Gone Wild: Epic Misbehavior at Uber Technologies. Rock Center for Corporate Governance at Stanford University Closer Look Series: Topics, Issues and Controversies in Corporate Governance No. CGRP-70, 18-3.

Payscale. (2018). Retrieved from  https://www.payscale.com/data/job-referral s

ProActive Solutions. (2020). Agency theory. Retrieved from http://knowledgegrab.com/learners-zone/study-support/performance-management-review/framework-introduction-to-hrm/agency-theory/

Studyspark

Study Document Study Document

Walt Disney

Pages: 12 (3606 words) Sources: 1 Document Type:Case Study Document #:25870152

… The company thus needs to conduct internal analysis to see how well its resources are being inbounded, how well operations are performing in process resources into goods or services, how well…[break]…shifted and this is where it is going to stay now that COVID-19 has scared people into ……

References

References

Wheelen, T. L., Hunger, J. D., Hoffman, A. N., & Bamford, C. E. (2010). Strategic management and business policy. Upper Saddle River, NJ: Prentice Hall.

Studyspark

Study Document Study Document

Challenges In Management Facing Transformational Leaders Service

Pages: 5 (1606 words) Sources: 5 Document Type:Annotated Bibliography Document #:57833590

… has been considered one of the key elements impacting innovation. This approach to leadership arguably contributes significantly to the development of an environment, process, and structure for organizational innovation. The aim of this study was: studying the effect TL has on two innovation facets: process and product innovation. The article banked on explanatory and quantitative analysis using SEM (structural equations modeling) with AMOS 20 for researching the link … TL’s significance when it comes to improving innovation within the banking sector. Its main implication is: customized consideration forms the greatest predictor of process and product innovation; the next greatest would be an idealized influence and inspirational motivation.
Meanwhile, intellectual stimulation doesn’t significantly impact the process and product innovation. Study findings indicate how the TL approach gives rise to improved results for banks by mobilizing its staff members to … innovation. Study findings indicate how the TL approach gives rise……

References

References

Al Ahmad, S., Easa, N. F., & Mostapha, N. (2019). The Effect of Transformational Leadership on Innovation: Evidence from Lebanese Banks. European Research Studies Journal, 22(4), 215-240.

Aldholay, A. H., Isaac, O., Abdullah, Z., & Ramayah, T. (2018). The role of transformational leadership as a mediating variable in DeLone and McLean information system success model: The context of online learning usage in Yemen. Telematics and Informatics, 35(5), 1421-1437.

Carreiro, H., & Oliveira, T. (2019). Impact of transformational leadership on the diffusion of innovation in firms: Application to mobile cloud computing. Computers in Industry, 107, 104-113.

Zappalà, S., & Toscano, F. (2019). Transformational leadership and innovation adoption: Is there a moderation role of personal initiative and job control?. Psychologica, 119.

Zhang, Y., Zheng, J., & Darko, A. (2018). How does transformational leadership promote innovation in construction? The mediating role of innovation climate and the multilevel moderation role of project requirements. Sustainability, 10(5), 1506.

Studyspark

Study Document Study Document

Domestic Terrorism And Extremist Groups

Pages: 13 (3981 words) Sources: 12 Document Type:Research Paper Document #:80039324

...Change process Right and Left Wing Terror Groups in America
1
Extremism in the U.S. is on the rise, based on the rise in polarization throughout the country as the Left and the Right become more and more opposed to one another ideologically, politically, socially, and emotionally. There is a strong rift between the two and little sense of common ground. Much of this rise has come on the heels of the rise in social media use, which allows individuals to promote their views to the rest of the world in a way that was literally unheard of prior to the digital revolution (Freberg, Graham, McGaughey & Freberg, 2011). As social media use has essentially risen exponentially since its inception in the 2000s, the level of ideologically-driven Influencers in the space is a reflection and facilitator of the level of extremism in the United States.
As both the popularity of groups like……

References

References

Barnett, B. A. (2015). 20 Years Later: A Look Back at the Unabomber Manifesto.  Perspectives on Terrorism, 9(6), 60-71.

Beinart, P. (2017). The rise of the violent left. Retrieved from  https://www.theatlantic.com/magazine/archive/2017/09/the-rise-of-the-violent-left/534192/ 

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Costello, M., & Hawdon, J. (2018). Who are the online extremists among us? Sociodemographic characteristics, social networking, and online experiences of those who produce online hate materials. Violence and gender, 5(1), 55-60.

DeCook, J. R. (2018). Memes and symbolic violence:# proudboys and the use of memes for propaganda and the construction of collective identity. Learning, Media and Technology, 43(4), 485-504.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Hamm, M &Spaaj, R. (2015). Lone wolf terrorism in America: Using knowledge of radicalization pathways to forge prevention strategies. U.S. Department of Justice. Retrieved from  https://www.ncjrs.gov/pdffiles1/nij/grants/248691.pdf 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Studyspark

Study Document Study Document

Manufacturing Systems In Automotive Industry

Pages: 12 (3647 words) Sources: 16 Document Type:Research Paper Document #:87931381

… the contemporary automotive manufacturing systems and automotive industries is automation. An automated manufacturing system alludes to an intersected or interrelated system of material process stations with the capability of automatically process an extensive range of part types simultaneously under computer control. Imperatively, the system is not just interlinked by a material transport system but … system but also interconnected by a communication network for assimilating all aspects of manufacturing. This sort of system portrays flexibility in handling, routing, process, and changing of tools. Also, an automated manufacturing system demonstrates key features, including a high magnitude of automation, integration, and flexibility (Swamidass, 2000). … in Automotive Industry
A manufacturing system is delineated as a set of integrated equipment and human resources that carry out one or more process as well as assembly process on a starting work material, components, or set of components. The integrated equipment comprises of production machines,……

References

References

Boone, L. E., Kurtz, D. L., & Khan, M. H. (2009). Contemporary business. Hoboken: John Wiley & Sons.

Chui, M., George, K., Manyika, J., Miremadi, M. (September 2017). Human + machine: A new era of automation in manufacturing. McKinsey & Company.

Deng, W., Luo, Q. (2012). Advanced Technology for Manufacturing Systems and Industry. New York: Pearson.

Groover, M. P. (2007). Fundamentals of modern manufacturing: materials processes, and systems. John Wiley & Sons.

HR Cloud. (2020). HR Automation - The Future of Human Resource Process Management. Retrieved from:  https://kissflow.com/hr-process/ 

Joshi, V., Adhikari, M. S., Patel, R., Singh, R., Gehlot, A. (2018). Industrial Automation: Learn the current and leading-edge research on SCADA Automation. New Delhi: Pearson.

Krar, S. F., & Gill, A. (2003). Exploring advanced manufacturing technologies. Industrial Press, Inc.

Ladet, P., & Vernadat, F. (Eds.). (2013). Integrated manufacturing systems engineering. Springer.

Studyspark

Study Document Study Document

Ethical Issues Conflicts Of Interest

Pages: 4 (1232 words) Sources: 10 Document Type:Essay Document #:89213693

… circle sentencing was initially meant to address the needs of the aborigines, it is now applied to non-aboriginal offenders. It is a flexible process that can be applied to the young and old in a wide range of circumstances, including disputes to do with child welfare. Circle ……

References

References

Alterio, E. (2011). From judicial comity to legal comity: A judicial solution to global disorder?I-CON, 9(2), 394-424. doi: 10.1093/icon/mor036

BrainMass. (2019). Correctional officer subculture: Ethics. Retrieved from  https://brainmass.com/law/familylaw/correctional-officer-subculture-ethics-165895 

Filgueiras, F. (2011).Transparência e controle da corrupção no Brasil. In: Corrupção e sistemapolítico no Brasil, edited by Leonardo Avritzer and Fernando Filgueiras. Rio de Janeiro: CivilizaçãoBrasileira.

Kindregan, C. (1975).Conflict of interest and the lawyer in civil practice. Retrieved from  https://scholar.valpo.edu/vulr/vol10/iss3/2 

Legal Dictionary. (2018). Conflict of interest. Retrieved from  https://legaldictionary.net/conflict-of-interest/ 

Lilles, H. (2002). Circle sentencing: Part of the restorative justice continuum. IIRP. Retrieved from  https://www.iirp.edu/news/circle-sentencing-part-of-the-restorative-justice-continuum 

Montes, A., Mears, D., &Conchran, J. (2016). The privatization debate: A conceptual framework for improving (public and private) corrections. Journal of Contemporary Criminal Justice. 32(4). Retrieved from https://www.researchgate.net/publication/305418634_The_Privatization_Debate_A_Conceptual_Framework_for_Improving_Public_and_Private_Corrections

Off, C. (1999). How can we trust our fellow citizens? In: Democracy and trust, edited by Mark Warren. Cambridge: Cambridge University Press.

Studyspark

Study Document Study Document

The Government S Economic Policies Effect Good Or Bad Economy

Pages: 4 (1226 words) Sources: 5 Document Type:Essay Document #:48706943


Monetary Policy
Monetary policy is classified as the procedure by which the Federal Reserve uses monetary policy tools to regulate the money supply, change rate, and interest rates (the price of money) to stabilize the economy (Labonte, 2020). The interest rate is classified as the cost of … the reward for saving. The money supply can be defined as the total sum of money that is available in the economy. The change rate is the cost of the domestic currency concerning other currencies. The Fed uses various monetary tools, but over the years, they have ……

References

References

Federal Reserve. (2020, March 15). Federal open market committee. Retrieved March 30, 2020, from  https://www.federalreserve.gov/monetarypolicy/fomccalendars.htm 

Labonte, M. (2020). Monetary policy and the Federal Reserve: Current policy and conditions (RL30354). Retrieved from Congressional Research Service website:  https://fas.org/sgp/crs/misc/RL30354.pdf 

Madimutsa, C. (2008). The Policy Formulation Process. Retrieved from  https://www.researchgate.net/publication/336927323_The_Policy_Formulation_Proce ss

McGraw-Hill Education. (n.d.). The role of government. Retrieved from  https://www.jasonsclassroom.com/social-studies/cc-basics/chapter-5/lesson-5.3/ 

Suman, S. (2015, October 26). Monetary policy: Objectives, advantages, and disadvantages. Retrieved from  https://www.economicsdiscussion.net/monetary-policy/advantages/monetary-policy-objectives-advantages-and-disadvantages/12768 

Studyspark

Study Document Study Document

Improving Medication Safety And Nursing Care

Pages: 4 (1193 words) Sources: 4 Document Type:Essay Document #:71997701

… focuses on providing a theoretical foundation for nursing practice. This implies that the application of a nursing theoretical model is a relatively complex process in comparison to PDSA cycle. Some of the benefits of using PDSA methodology in comparison to a nursing theoretical model include structured experimental … PDSA cycle. Some of the benefits of using PDSA methodology in comparison to a nursing theoretical model include structured experimental learning in which change are tested prior to full implementation (Taylor et al., 2013). Additionally, PDSA incorporates different steps that are carried out systematically and comprehensively unlike ……

References

References

Getnet, M.A. & Bifftu, B.B. (2017, November 20). Work Interruption Experienced by Nurses during Medication Administration Process and Associated Factors, Northwest Ethiopia. Nursing Research and Practice. Retrieved from  https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5735655/ 

Monteiro, C., Avelar, A.F.M. & Pedreira, M.G. (2015, Jan-Feb). Interruptions of Nurses’ Activities and Patient Safety: An Integrative Literature Review. Revista Latino Americana de Enfermagem, 23(1), 169-179.

Taylor, M.J., McNicholas, C., Nicolay, C., Darzi, A., Bell, D. & Reed, J.E. (2013). Systematic Review of the Application of the Plan-Do-Study-Act Method to Improve Quality in Healthcare. BMJ Quality & Safety, 23(4), 290-298.

Westbrook, J.I., Li, L., Hooper, T.D., Raban, M.Z., Middleton, S. & Lehnbom, E.C. (2016). Effectiveness of a “Do not Interrupt” Bundled Intervention to Reduce Interruptions During Medication: A Cluster Randomized Controlled Feasibility Study. BMJ Quarterly & Safety, 26(9), 734-742.

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… the past, lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In this paper, the process information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, … information systems from such physical threats.
The controls include different kinds of locks, hardware insurance coverage, and coverage of information recreation costs, having process in place for everyday data and information system backups, tested, state-of-the-art disaster recovery interventions, and rotation and off-site backup data storage in a … and public-key cryptography, several information systems continue to be at risk of internal as well as external attacks. Security setups are a time-consuming process and do not play any part in helpful output; hence, nobody will realize until an audit is done or the system is attacked, … of risks to a satisfactorily……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Banking Industry Crimes

Pages: 6 (1933 words) Sources: 6 Document Type:Essay Document #:73861053

… by insiders who “have exclusive access to accounts payable or suspense accounts, which are used to temporarily record items such as loans in process, interdepartmental transfers, or currency in transit” (74). It therefore follows that in such a case, insiders can easily initiate the movement of funds … activity, there are a number of suggestions that I would make. To begin with, I would recommend that the bank implements systems and process of red-flagging accounts that could have possibly been compromised. The system should ideally cover credit card, savings, as well as checking accounts and … customer addresses be vigorously verified especially in those instances relating to credit card and debit card requests or where there are requests for change of address. It is also important to note that in seeking to protect customers from identity theft threats originating from both within and ……

References

References

Albrecht, W.S., Albrecht, C.C., Albrecht, C.O. & Zimbelman, M.F. (2008). Fraud Examination (3rd ed.). Mason, OH: Cengage Learning.

Dionne, B. (2020). Regions Bank Teller Accused of Stealing Customer Identities Faces Felony Charges. Retrieved  https://www.wbrc.com/2020/01/30/regions-bank-teller-accused-stealing-customer-identities-facing-felony-charges/ 

Golden, T.W., Skalak, S.L. & Clayton, M.M. (2006). A Guide to Forensic Accounting Investigation. Hoboken, NJ: John Wiley & Sons.

Krancher, M., Riley, R. & Wells, T.J. (2010). Forensic Accounting and Fraud Examination. Hoboken, NJ: John Wiley & Sons.

Singleton, T.W., Singleton, A.J. & Bologna, R.J. (2006). Fraud Auditing and Forensic Accounting (3rd ed.). Hoboken, NJ: John Wiley & Sons.

Zagaris, B. (2010). International White Collar Crime: Cases and Materials. New York, NY: Cambridge University Press.

Join thousands of other students and

"spark your studies".