Study Document
...Compliance II. Client’s Case
D. Application of the Law to the Facts
Was Jennifer in breach of the confidentiality agreement that she signed committing never to disclose confidential/proprietary information she encounters in the course of her employ at Greene’s’s?
Case in Brief: In Hallmark Cards, Inc. v. Janet L. Murley (2013), the defendant (Murley) parted ways with the plaintiff (Hallmark Cards) and was paid a total of $735,000 as the severance package. As Hallmark’s marketing vice-president, Murley had come across and was indeed in possession of some confidential information regarding the operations of the company. The said information was inclusive of, but was not limited to, market research and business plans. Upon the payment of the severance highlighted above, Murley amongst other things agreed to dispose-off any confidential documents and ensure that the company’s confidential information was not disclosed to any third party. Years later, the defendant got hired by a……
References
Frey, M.A. (2015). Essentials of Contract Law (2nd ed.). Mason, OH: Cengage Learning.
Gross, J.A. & Compa, L.A. (2009). Human Rights in Labor and Employment Relations International and Domestic Perspectives. Champaign, IL: Labor and Employment Relations Association.
Peacock, W. (2013). Breach of Contract, Confidential Info Leak Case: Hallmark Prevails. Retrieved from https://blogs.findlaw.com/eighth_circuit/2013/01/hallmark-prevails-in-breach-of-contract-confidential-info-leak-case.html
Study Document
...Compliance Lifestyle Red Flags of Fraud Perpetrators
Introduction
As the Association of Certified Fraud Examiners (2010) points out, the average fraud perpetrator has—like David L. Miller—no prior fraud convictions. The offender is typically in the 30 to 45 years age range and is more likely to be male than female. Both of these characteristic profile traits fit Miller to a “t”. Moreover, four out of five fraud perpetrators are likely to work in the accounting department of an organization, again just like David L. Miller. And as the perpetrator ages so too does the level of fraud increase in terms of losses (Association of Certified Fraud Examiners, 2010)—again just like with the case of David L. Miller. This paper will analyze the case of David L. Miller and show why he fits the profile of a fraud perpetrator well and why companies tend not to press charges against people like him.……
References
Association of Certified Fraud Examiners. (2010). Who is Most Likely to Commit Fraud at Your Company? Retrieved from https://www.acfe.com/press-release.aspx?id=1677
Friedrichs, D. (2009). Trusted Criminals: White Collar Crime In Contemporary Society. Cengage Learning.
US Attorney’s Office. (2019). Attorney Convicted of Embezzling Over $1.5 Million from Virginia Senator, Canadian Business, and Autism Organization. Retrieved from https://www.justice.gov/usao-edva/pr/attorney-convicted-embezzling-over-15-million-virginia-senator-canadian-business-and-0
Study Document
… might be a candidate for child neglect. There is a lot of evidence pointing at neglect, including the fact that there was no compliance with provisions of healthcare, failure to seek medical help, deprivation of food, and the child's apparent inability to thrive physically. Other points of ……
References
Australian Law Reform Commission (ALRC). (2010). Family violence: A national legal response. Canberra: ALRC.
Child Family Community Australia (CFCA). (2016). Australian legal definitions: When is a child in need of protection? (CFCA Resource Sheet). Melbourne: Australian Institute of Family Studies.
New South Wales Government. (1998). Children and Young Persons (Care and Protection) Act 1998.
NSW Government, (2018a). Child wellbeing and child protection fact sheet for NSW Health workers. Retrieved from https://www.health.nsw.gov.au/parvan/childprotect/Pages/child-wellbeing.aspx
NSW Government, (2018b). About child protection and wellbeing. Retrieved from https://www.health.nsw.gov.au/parvan/childprotect/Pages/default.aspx
WHO (2002). \\\\\\\\\\\\"Chapter 3: Child abuse and neglect by parents and other caregivers.\\\\\\\\\\\\" World report on violence and health. Retrieved from https://www.who.int/violence_injury_prevention/violence/global_campaign/en/chap3.pdf
World Health Organization. (2006). Preventing child maltreatment: a guide to taking action and generating evidence. Geneva, WHO.
Study Document
...Compliance Abstract
Gestalt is a German word signifying a pattern or shape. The roots of Gestalt therapy can be traced to Max Wertheimer, who studied human perceptual illusions. Wertheimer’s research led to a holistic view of the human psyche that provided a necessary counterpoint to the fragmented, reductionist, and structuralist views that prevailed in research psychology. Gestalt therapy emerged after blending the principles of Gestalt with the goals of psychotherapy. In particular, Gestalt therapists like Frederick “Fritz” Perls used the concept of a Gestalt to emphasize the importance of holism in psychotherapy. Humanism also became a cornerstone of Gestalt therapy, which promotes an “I/Thou” therapeutic relationship based on points of contact between individuals who are connected in an integrated social network. Group therapy and art therapy are also methods used in Gestalt psychology.
Although the phrase may seem out of vogue, Gestalt psychology underwrites a lot of contemporary psychotherapies and therapeutic……
References
Corey, G. (2016). Theory and Practice of Counseling and Psychotherapy. Boston, MA: Cengage Learning.
Levine, T. B. Y. (2012). Gestalt Therapy: Advances in Theory and Practice. New York, NY: Taylor & Francis.
Woldt, A. L., & Toman, S. M. (2005). Gestalt Therapy: History, Theory, and Practice. Thousand Oaks, CA: SAGE Publications.
Study Document
… the Arab World.
In the Arabian Nights tales, women are generally treated as lesser beings by men. If they do not act in compliance with men's wishes, they are either discarded, transformed into something else, or killed. For instance, in the tale about King Shahzaman and his ……
Works cited
Blythe, Andrea. Beyond Shahrazad: Feminist Portrayals of Women in the One Thousand and One Nights. Zoetic Press, 2019.
Haddawy, Husain, and Muhsin Mahdi, eds. Arabian Nights. English.; Alf Laylah Wa-laylah. WW Norton & Company, 1995.
Nicholas, Caleb, \\\\\\\\\\\\"Living Subversive Narratives: Shahrazad\\\\\\\\\\\\'s Stories of Women.\\\\\\\\\\\\" Honors Projects, Bowling Green State University, (2016). 269.
Shamma, Tarek. \\\\\\\\\\\\"Women and Slaves: Gender Politics in the Arabian Nights.\\\\\\\\\\\\" Marvels & Tales 31.2 (2017): 239-260.
Zafar, Attiya. Arabian Nights: Seaming the Embroidery of Feminism in the \\\\\\\\\\\\"Couch.\\\\\\\\\\\\" University of Management and Technology, 2019.
Study Document
...Compliance Enhancing Communication, migration from 4G to 5G
Aims and objectives
1. To determine how the migration from 4G to 5G will enhance Communication
The primary aim of the dissertation is to determine how the migration from 4G to 5G will enhance Communication. Migration to 5G is expected to bring various enhancements as compared to the 4G. These enhancements include low latencies, high speeds, low power consumption, enhanced reliability, and greater terminal device densities. Also, and perhaps the most important features of 5G is the new network capabilities that could allow several virtual networks with differential performance capabilities to be supported by a single physical network (Alkhazaali 2017). Given these capabilities, this paper aims to determine how Communication will be enhanced.
2. To identify some of the challenges of 5G
Experience has shown that technology, however, how advanced, has some peculiar limitations that make it vulnerable. As a result, this dissertation……
References
Alkhazaali, N.H., 2017. Mobile Communication through 5G Technology (Challenges and Requirements). International Journal of Communications, Network and System Sciences, 10(05), p.202.
Gandotra, P., and Jha, R.K., 2016. Device-to-device communication in cellular networks: A survey. Journal of Network and Computer Applications, 71, pp.99-117.
Penttinen, Jyrki T. J., et al. 2019. "Deployment," in 5G Explained: Security and Deployment of Advanced Mobile Communications, Wiley, pp.271-291
Shen, Xuemin. "Device-to-device communication in 5G cellular networks." IEEE Network 29, no. 2 (2015): 2-3.
Tehrani, M.N., Uysal, M., and Yanikomeroglu, H., 2014. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), pp.86-92.
Zhang, A., and Lin, X., 2017. Security-aware and privacy-preserving D2D communications in 5G. IEEE Network, 31(4), pp.70-77.
Study Document
...Compliance Private Security and Homeland Defense
Questions 2 and 3
Question 2:
The Intelligence Community is comprised of 17 agencies. These agencies work with Federal, State, Local, Tribal and Territorial partners to protect the homeland. Four of these agencies are intelligence elements of the Department of Defense Services – Army, Navy, Marine Corps and Air Force. Please pick ONE of these Department of Defense Services intelligence elements and explain its mission. In what ways does it contribute to the intelligence cycle? Provide examples.
The Department of Defense Services intelligence element that I selected in this particular case is the Defense Intelligence Agency (DIA). The stated mission of DIA is “provide intelligence on foreign militaries to prevent and decisively win wars” (DIA, 2020). Thus, it is important to note, from the onset, that this particular agency largely concerns itself with not only the gathering, but also the production of military intelligence. As……
References
Customs and Border Protection – CBP (2020). About CBP. Retrieved from https://www.cbp.gov/about
Department of Homeland Security – DHD (2016). Section 559 Pilot Program Donations Acceptance. Retrieved from https://www.dhs.gov/sites/default/files/publications/Customs%20and%20Border%20Protection%20-%20Section%20559%20Pilot%20Program%20Donations%20Acceptance%20-%20FY%202016.pdf
Defense Intelligence Agency – DIA (2020). Strategy. Retrieved from https://www.dia.mil/About/Strategy/
Keating, T.J. (2011). Joint and National Intelligence Support to Military Operations. Washington, DC: DIANE Publishing.
Office of the Director of National Intelligence (2020). Defense Intelligence Agency. Retrieved from https://www.intelligence.gov/index.php/how-the-ic-works/our-organizations/412-dia
U.S. Government Accountability Office – GAO (2020). U.S. Ports of Entry: Update on CBP Public-Private Partnership Programs. Retrieved from https://www.gao.gov/assets/710/704191.pdf
Study Document
...Compliance Abstract
This case conceptualization covers a weekly outpatient relationships group consisting of fifteen members, ages 25-50. All group members have been formally diagnosed with Generalized Anxiety Disorder and/or Depression, and some with more than one clinical disorder. Additionally, all members have attended this group for at least six months, most of whom attend regularly on a weekly basis. The case conceptualization includes background information on the clients, behavioral observations, clinical interpretations, and diagnostic impressions based on the DSM-5. A treatment plan and interventions for the clients are grounded in two primary theoretical orientations including cognitive behavioral therapy (CBT) and psychodynamics. A summary of the treatment, including client reactions, plus future recommendations are also provided. Ethical issues and quandaries are presented in accordance with the American Counseling Association (ACA) Code of Ethics. Finally, limitations and supervision needs are discussed in light of scope of counseling practice.
Background: Presenting Problem
Clients’ Biopsychosocial……
References
American Counseling Association (2014). ACA Code of Ethics. Retrieved from: https://www.counseling.org/resources/aca-code-of-ethics.pdf
American Group Psychotherapy Association (2007). Practice guidelines for group psychotherapy. Retrieved from: https://www.agpa.org/docs/default-source/practice-resources/download-full-guidelines-(pdf-format)-group-works!-evidence-on-the-effectiveness-of-group-therapy.pdf?sfvrsn=ce6385a9_2
“Clinical Thinking Skills,” (n.d.). Retrieved from: https://in.sagepub.com/sites/default/files/upm-binaries/44297_3.pdf
Glasofer, D.R. (2019). Generalized anxiety disorder. Retrieved from: https://www.verywellmind.com/dsm-5-criteria-for-generalized-anxiety-disorder-1393147
MacNamara, A., Kotov, R. & Hajcak, G. (2016). Diagnosis and symptom-based predictors of emotional processing in generalized anxiety disorder and Major Depressive Disorder: An Event-Related Potential Study. Cognitive Therapy and Research 40(2016): 275-289.
Plummer, F., Manea, L., Trepel, D., et al. (2016). Screening for anxiety disorders with the GAD-7 and GAD-2: a systematic review and diagnostic metaanalysis. General Hospital Psychiatry 39(2016): 24-31.
Suszek, H., Holas, P., Wyrzykowski, T., et al. (2015). Short-term intensive psychodynamic group therapy versus cognitive-behavioral group therapy in day treatment of anxiety disorders and comorbid depressive or personality disorders: study protocol for a randomized controlled trial. Trials 16(2015): https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4517633/
Thimm, J.C. & Antonsen, L. (2014). Effectiveness of cognitive behavioral group therapy for depression in routine practice. BMC Psychiatry 14(292): https://bmcpsychiatry.biomedcentral.com/articles/10.1186/s12888-014-0292-x
Study Document
...Compliance Technology Proposal/Implementation Paper
A: Introduction
The Department of Veterans Affairs (VA) remains a vital entity in as far as the provision of key services to veterans in the country is concerned. The Veteran Benefits Administration (VBA), to a large extent, concerns itself with the administration of U.S. Department of Veteran Affairs’ programs. This is more so the case with regard to the provision or advancement of various forms of support to not only veterans and survivors, but also their dependents. Towards this end, some of the main programs that VBA administers include, but they are not limited to; pension and compensation, rehabilitation and employment, loan guaranty, and insurance. In the year 2016, the National Archives and Records Administration (2016) released a records management inspection report which was categorical that “the VA Records Management Program lacks several basic records management fundamentals.” The relevance of VA records cannot be overstated when it……
References
Aziz, A.A., Mohammad Y., Mokhtar, U.A. & Ambari, D.I. (2017). Establishing Policy for the Implementation of Electronic Document and Records Management System in Public Sector in Malaysia: The Influencing Factors. Advanced Science Letters, 23(11), 10732-10736.
National Archives and Records Administration (2016). Department of Veterans Affairs Records Management Program: Records Management Inspection Report. Retrieved from https://www.archives.gov/files/records-mgmt/pdf/va-2016-inspection.pdf
U.S. Department of Veteran Affairs (2020). About VBA. Retrieved from https://www.benefits.va.gov/BENEFITS/about.a sp
We have over 150,000+ study documents to help you.
Sign Up for FREE