Change Theory Essays (Examples)

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Walmart And Starbucks Sustainability

Pages: 10 (2956 words) Sources: 15 Document Type:Essay Document #:82035570

… sustainability front, there is the ethics of coffee, tea, cocoa and farmer support and this combines with water, energy, green building and climate change. The company's marketing of its approach contains a lot of high level discussion, but there are opportunities to take a deeper dive into … profit. Friedman is clear that this is within the context of the law, but does not address things like lobbying to have laws change, or whether the law has reasonable distributive justice in the first place. Thus, while this is a valuable and seminal piece of literature … important because both Starbucks and Walmart focus their sustainability efforts on the areas that most benefit them – Starbucks is worried about climate change because of impacts on its supply chain; Walmart focuses on the link between efficiency, profit and sustainability. McWilliams and Siegal find that after … it does. There is certainly……

References

References

Aguilera, R, Rupp, D., Williams, C. & Ganapathi, J. (2005) Putting the S back in corporate social responsibility: A multi-level theory of social change in organizations. Academy of Management Review. (2005). Retrieved November 4, 2017 from  https://www.ideals.illinois.edu/bitstream/handle/2142/1768/TS_Aguilera.pdf?sequence=2&isAllowed=y 

Banerjee, S. (2008) Corporate social responsibility: the good, bad and the ugly. Critical Sociology. Vol. 34 (1)

Blowfield, M., Frynas, J. (2005) Editorial setting new agendas: Critical perspectives on corporate social responsibility in the developing world. International Affairs. Vol. 81 (3) 499-513.

Brammer, S., Jackson, G. & Matten, D. (2012). Corporate social responsibility and institutional theory: New perspectives on private governance. Socio-Economic Review. Vol. 10 (2012) 3-28.

Campbell, J. (2007) Why would corporations behave in socially responsible ways? An institutional theory of corporate social responsibility The Academy of Management Review. Vol. 32 (3) 946-967.

Epstein, E. (1987) The corporate social policy process: Beyond business ethics, corporate social responsibility, and corporate social responsiveness. California Management Review. Vol. 29 (3) 99.

Friedman, M. (1970) The social responsibility of business is to increase its profits. New York Times Magazine. Retrieved November 4, 2017 from https://www.colorado.edu/studentgroups/libertarians/issues/friedman-soc-resp-business.html

Heningway, C. & Maclagan, P. (2004) Managers' personal values as drivers of corporate social responsibility. Journal of Business Ethics. Vol. 50 (1) 33-44.

Studyspark

Study Document Study Document

Criminal Perspectives Social Trait Classical

Pages: 4 (1310 words) Sources: 3 Document Type:Capstone Project Document #:11929443

… gang activity, unemployment, deteriorating infrastructures, and single-parent homes, which increase the risk of engaging in crime (Hagan, 2010). According to the social disorganization theory, conventional institutions of social control including community organizations, churches, schools, and family units are weak and unable to regulate criminal behavior in such … bias and subjective evaluations in release decisions (Cole & Smith, 2007). The main disadvantage, however, is that it could reduce the inclination to change behavior since an offender is required to complete their sentence regardless of their good behavior (Cole & Smith, 2007). Generally, the indeterminate model … indeterminate model has greater potential for reducing crime as the likelihood of early release serves as an incentive for offender rehabilitation and behavioral change. The inclination to change behavior is likely to be lower if the individual does not believe that such change will be rewarded through early release.
Conclusion
In conclusion, the……

References

References

Cole, G., & Smith, C. (2007). Criminal Justice in America (5th ed.). Belmont, CA: Cengage Learning.

Hagan, F. E. (2010). Introduction to Criminology: Theory, Methods and Criminal Behavior (7th ed.). Thousand Oaks, CA: Sage.

Mackenzie, D. L. (2001). Sentencing and Corrections in the 21st century: Setting the Stage for the Future. National Criminal Justice Reference Service (NCJRS). Retrieved from  https://www.ncjrs.gov/pdffiles1/nij/189106-2.pdf 

Siegel, L. J. (2015). Criminology: Theories, Patterns and Typologies (12th ed.). Boston, MA: Cengage Learning.

Studyspark

Study Document Study Document

Sexual Behavior And Sexual Morality

Pages: 5 (1605 words) Sources: 5 Document Type:Essay Document #:69548980

… sexuality and consider that sexuality is a connecting act between individuals, making them happy and involve them in a natural bond (Soble). It change pleasure as its benefits and makes both the involved parties happy (Soble). It is deemed to be generating affection and gratitude, which further … conclusion, meta-ethics is a fruitful base of analyzing a morality as it delves deeper into understanding its origin, like in the Nagel's Secular theory to gain clarity on the moral judgments. For the Aquinas's Natural Law argument which poses a challenge to Nagel's Secular theory can be countered by Christine Gudorf which analyzes that the presence of clitoris in females has no purpose of procreation and is simply ……

References

References

Goldman, A. H. (2019, February 12). Why Sexual Morality Doesn\\\\\\'t Exist. iai News.

Haidt, J., & Hersh, M. A. (2001). Sexual Morality: The Cultures and Emotions of Conservatives and Liberals. Journal of Applied Social Psychology, 191-221.

Halwani, R. (2018, October 19). Sex and Sexuality. Stanford Encyclopedia of Philosophy.

Haqiqatjou, D. (2005, September 17). Ashley Madison and the Problem of Liberal Sexual Ethics. Public Discourse.

McCord, G. S. (2012, January 26). Metaethics. Stanford Encyclopedia of Philosophy.

Primoratz, I. (2001). Sexual Morality: Is Consent Enough? Ethical Theory and Moral Practise.

Primoratz, I. (2013, February 01). Sexual Morality. Wiley Online Library.

Soble, A. (n.d.). Philosophy of Sexuality. Internet Encyclopedia of Philosophy.

Studyspark

Study Document Study Document

Strengths Based Approach For Depression

Pages: 6 (1931 words) Sources: 7 Document Type:Case Study Document #:65081861

… as opposed to what must be resolved, and concentrates on what works as against what doesn't.
The relationship between strengths-focused care and resilience theory within the context of nursing literature has been expounded upon further by Gottlieb (2014, p. 26), whose work describes a comprehensive strengths-based nursing … an all-encompassing political and social process that espouses actions aiming to strengthen individual capabilities and skills as well as actions targeted at effecting change in social, economic, and environmental conditions, for lessening their influence on individual and community health. Lastly, health promotion enables individuals to improve control ……

References

References

Ditton, L. (2015). Depression Treatment: Strengths-based Approaches. Available at  http://www.esteempsychology.com.au 

Gan, C., & Ballantyne, M. (2016). Brain injury family intervention for adolescents: A solution-focused approach. NeuroRehabilitation, 38(3), 231-241.

Gottlieb, L. (2014). Strengths-based nursing: A holistic approach to care, grounded in eight core values. American Journal of Nursing, 114(8), 24-32.

Liu, R. T., Kleiman, E., Nestor, B., Cheek, S. (2015). The Hopelessness Theory of Depression: A Quarter Century in Review. Clin Psychol, 22(4), 345-365. DOI:10.1111/cpsp.12125.

Swartz, M. K. (2017). A Strength-Based Approach to Care. J Pediatr Health Care, 31, 1-1. Available at https://www.jpedhc.org/article/S0891-5245(16)30281-4/pdf

World Health Organization. (1998). Health Promotion Glossary. World Health Organization. Available at  https://www.who.int/healthpromotion/about/HPR%20Glossary%201998.pdf?ua=1 

Xie, H. (2013). Strengths-Based Approach for Mental Health Recovery. Iran J Psychiatry Behav Sci, 7(2), 5-10. Available at  https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3939995/ 

Studyspark

Study Document Study Document

Evaluating The Ideology Of The IRA

Pages: 9 (2717 words) Sources: 15 Document Type:Essay Document #:29993032

...Change theory The Tactics of the British Intelligence against the IRA
History of the IRA
The Provisional IRA formed in response to a war between the Irish Republican Army and the British state in Northern Ireland from 1969 to 1998. The IRA or what is commonly referred to as the IRA in the West was actually a breakaway from the Army and is better known as PIRA in Ireland. However, because it stood as the fighting force and face of the Irish resistance, it is typically referred to as IRA for short. The IRA was a formal fighting force up until the 1970s when fears of British infiltration caused the IRA to become a secret organization with a cell structure. The IRA published its Green Book, which laid out the rules of being an IRA volunteer. Meanwhile, on the political front was Sinn Fein, which negotiated behind the scenes with the British……

References

References

Bamford, B. (2005). The Role and Effectiveness of Intelligence in Northern Ireland. Intelligence and National Security, 20(4), 581-607.

Branch, S., Shallcross, L., Barker, M., Ramsay, S., & Murray, J. P. (2018). Theoretical Frameworks That Have Explained Workplace Bullying: Retracing Contributions Across the Decades. Concepts, Approaches and Methods, 1-44.

Coogan, T. P. (2002). The IRA. New York: Palgrave.

Hilton, J. L., & Von Hippel, W. (1996). Stereotypes. Annual review of psychology, 47(1), 237-271.

IRA Green Book. (1977). Accessed 14 Dec 2015 from https://tensmiths.files.wordpress.com/2012/08/15914572-ira-green-book-volumes-1-and-2.pdf

Lumen. (2019). Theoretical perspectives on deviance. Retrieved from https://courses.lumenlearning.com/sociology/chapter/theoretical-perspectives-on-deviance/

Maloney, E. (2010). Voices from the Grave: Two Men’s War in Ireland. NY: Faber, Faber.

McLeod, S. (2008) Social Identity Theory. Simply Psychology. Retrieved from http://www.simplypsychology.org/social-identity-theory.html

Studyspark

Study Document Study Document

Organizational Situations

Pages: 6 (1663 words) Sources: 8 Document Type:Essay Document #:92019167

… employee morale is sinking and workers are beginning to slack. Management wonders what it can do to motivate employees.
Two Lenses
Maslow’s (1943) theory of human motivation and the hierarchy of needs stipulates that people are motivated and become self-actualizing when all their needs are met. These … satisfied and the person is self-motivated out of a sense of self-worth and a desire to do good and be successful.
Rogers’ (1951) theory of congruence is based on the idea that there is a self-image and an ideal self conception that people have. Rogers (1951) states … this way to gauge temperament, which can be a good indicator of whether the employee will make a good leader. The Five Factor theory classifies the personality types as:
1. Extraverted
2. Agreeable
3. Open
4. Conscientious, and
5. Neurotic (Canadas-De la Fuente et al., 2015)
This … classifies the personality types as:……

References

References

Cañadas-De la Fuente, G. A., Vargas, C., San Luis, C., García, I., Cañadas, G. R., &

Emilia, I. (2015). Risk factors and prevalence of burnout syndrome in the nursing profession. International Journal of Nursing Studies, 52(1), 240-249.

Meacham, W. (2017). History of industrial and organizational psychology. Retrieved from  https://owlcation.com/social-sciences/History-of-Industrial-and-Organizational-Psychology 

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

… discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

...Change theory Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber warfare, helps to establish appropriate countermeasures against cyberattacks and potential threats in cyberspace, and enhances intelligence gathering. While the study provides significant insights on this topic, future studies should examine the……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Join thousands of other students and

"spark your studies".