Confidentiality Essays (Examples)

Studyspark

Study Document Study Document

Online Auctions For Fund Raising By Non Profit Organizations

Pages: 8 (2322 words) Sources: 4 Document Type:Essay Document #:34213505

… sold to the bidder providing the highest price; therefore is also popularly known as the first bid auction. McAfee (2017) notes that the confidentiality nature and the documented nature of the sealed option ensure accountability. Hence it's popular among government entities and corporate organizations. The Vickrey auctions, ……

References

References

Cachon, G. P., Daniels, K., & Lobel, R. (2015). The Role of Surge Pricing on a Service Platform with Self-Scheduling Capacity.  https://ssrn.com/abstract=2698192 

Connelly, A., & Winter, M. (2003). Going...Going...Gone!: Successful Auctions for Non-Profit Institutions (Second). Target Funding Group, Inc. All.

Fasli, M., Co, C., & Co, C. (2014). Designing and Implementing E-market Games. Designing and Implementing e-Market Games. January 2005.

Forbes Magazine. (2019). The 100 Largest U.S. Charities. Forbes Magazine.  https://doi.org/10.1007/springerreference_75918 

Hasker, K., & Sickles, R. (2010). eBay in the Economic Literature: Analysis of an Auction Marketplace. Review of Industrial Organization, 37(1), 3–42.  https://doi.org/10.1007/s11151-010-9257-5 

Kingston, K. (2015). A Higher Bid: How to Transform Special Event with Strategic Benefit Auctions. John Wiley & Sons, Inc., Hoboken, New Jersey.

Klemperer, P. (2004). Auctions: Theory and Practice. In Princeton University Press.  https://doi.org/10.4337/9781839107429.00004 

McAfee, P. (2017). The Ideal Auction - Numberphile. YouTube.  https://www.youtube.com/watch?v=4kWuxfVbIaU

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384

… desire devoid of any sort of consequences (Saunders, Lewis, and Thornhill, 2015).
An additional ethical consideration integrated into the study is privacy and confidentiality. To begin with, the researcher will guarantee that no personal data and information from the research participants will be divulged. Any personally identifiable ……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

Jim Collins And The Five Levels Of Leadership

Pages: 8 (2457 words) Sources: 3 Document Type:White Paper Document #:12906467

...Confidentiality Level Five Leadership
Introduction: What is Level Five Leadership?
Level Five Leadership is a concept developed by Jim Collins in the book Good to Great. Level Five Leaders are top notch leaders: they are the greats who make big things happen. They are ones about whom books are written. They are the ones who leave the biggest shoes to fill when they are gone.
Collins describes five levels of leadership. This paper will briefly discuss the four levels that precede the top level. Then it will define what it means to be a Level Five Leader and will provide some examples of Level Five Leadership that can be found in the world today.
The First Four Levels of Leadership
The first four levels of leadership range from capable leaders to effective leaders: these are not bad levels of leadership by any means—but they are not what can be called great.……

References

Works Cited

Chamers, M.M. (2014). An Integrative Theory of Leadership (4thed.). New York, NY: Psychology Press.

Collins, Jim. “Level 5 Leadership: The Triumph of Humility and Fierce Resolve.” Harvard Business Review, July-August (2005).  https://hbr.org/2005/07/level-5-leadership-the-triumph-of-humility-and-fierce-resolve 

Maslow, A. H. (1943). A theory of human motivation. Psychological Review, 50(4), 370.

Studyspark

Study Document Study Document

MacBook Pro By Apple Inc Quality Management

Pages: 11 (3159 words) Sources: 5 Document Type:Essay Document #:17953236

… formation of a new product team. In this phase, a fresh team is well-organized and isolated from the rest of the organization by confidentiality agreements and, even at the time, physical barriers. This provides exclusive space for the teams working on a new product (Panzarino, 2012).
Once ……

References

References

Hill, C. W., Jones, G. R., & Schilling, M. A. (2014). Strategic management: theory: an integrated approach. Cengage Learning.

Panzarino, M. (2012). This is how Apple\\\\\\'s top-secret product development process works. The Next Web. Retrieved from:  https://thenextweb.com/apple/2012/01/24/this-is-how-apples-top-secret-product-development-process-works/ 

Interaction Design Foundation. (2020). Apple\\\\\\'s Product Development Process – Inside the World\\\\\\'s Greatest Design Organization. Retrieved from:  https://www.interaction-design.org/literature/article/apple-s-product-development-process-inside-the-world-s-greatest-design-organizatio " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Gestalt Theory

Pages: 9 (2559 words) Sources: 3 Document Type:Research Paper Document #:29092375

...Confidentiality Abstract
Gestalt is a German word signifying a pattern or shape. The roots of Gestalt therapy can be traced to Max Wertheimer, who studied human perceptual illusions. Wertheimer’s research led to a holistic view of the human psyche that provided a necessary counterpoint to the fragmented, reductionist, and structuralist views that prevailed in research psychology. Gestalt therapy emerged after blending the principles of Gestalt with the goals of psychotherapy. In particular, Gestalt therapists like Frederick “Fritz” Perls used the concept of a Gestalt to emphasize the importance of holism in psychotherapy. Humanism also became a cornerstone of Gestalt therapy, which promotes an “I/Thou” therapeutic relationship based on points of contact between individuals who are connected in an integrated social network. Group therapy and art therapy are also methods used in Gestalt psychology.
Although the phrase may seem out of vogue, Gestalt psychology underwrites a lot of contemporary psychotherapies and therapeutic……

References

References

Corey, G. (2016). Theory and Practice of Counseling and Psychotherapy. Boston, MA: Cengage Learning.

Levine, T. B. Y. (2012). Gestalt Therapy: Advances in Theory and Practice. New York, NY: Taylor & Francis.

Woldt, A. L., & Toman, S. M. (2005). Gestalt Therapy: History, Theory, and Practice. Thousand Oaks, CA: SAGE Publications.

Studyspark

Study Document Study Document

Enhancing Communication Migration From 4G To 5G

Pages: 6 (1692 words) Document Type:Essay Document #:96575438

...Confidentiality Enhancing Communication, migration from 4G to 5G
Aims and objectives
1. To determine how the migration from 4G to 5G will enhance Communication
The primary aim of the dissertation is to determine how the migration from 4G to 5G will enhance Communication. Migration to 5G is expected to bring various enhancements as compared to the 4G. These enhancements include low latencies, high speeds, low power consumption, enhanced reliability, and greater terminal device densities. Also, and perhaps the most important features of 5G is the new network capabilities that could allow several virtual networks with differential performance capabilities to be supported by a single physical network (Alkhazaali 2017). Given these capabilities, this paper aims to determine how Communication will be enhanced.
2. To identify some of the challenges of 5G
Experience has shown that technology, however, how advanced, has some peculiar limitations that make it vulnerable. As a result, this dissertation……

References

References

Alkhazaali, N.H., 2017. Mobile Communication through 5G Technology (Challenges and Requirements). International Journal of Communications, Network and System Sciences, 10(05), p.202.

Gandotra, P., and Jha, R.K., 2016. Device-to-device communication in cellular networks: A survey. Journal of Network and Computer Applications, 71, pp.99-117.

Penttinen, Jyrki T. J., et al. 2019. "Deployment," in 5G Explained: Security and Deployment of Advanced Mobile Communications, Wiley, pp.271-291

Shen, Xuemin. "Device-to-device communication in 5G cellular networks." IEEE Network 29, no. 2 (2015): 2-3.

Tehrani, M.N., Uysal, M., and Yanikomeroglu, H., 2014. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), pp.86-92.

Zhang, A., and Lin, X., 2017. Security-aware and privacy-preserving D2D communications in 5G. IEEE Network, 31(4), pp.70-77.

Studyspark

Study Document Study Document

Professional Nursing Practice And Leadership

Pages: 4 (1182 words) Sources: 3 Document Type:Essay Document #:82581333

...Confidentiality The Importance of Effective Nursing Leadership Today
Today, the nursing profession is under unprecedented pressures to deliver high quality patient-centered care in the wake of the ongoing global coronavirus pandemic. In far too many instances, nurses are being overwhelmed on the front lines of patient care, and it may be weeks or even months before the peak of the pandemic is fully experienced. Against this backdrop, identifying ways that professional nurses can help achieve this goal by assuming appropriate leadership roles has assumed new importance and relevance. To determine the facts, the purpose of this paper is to provide a review of the relevant literature, including the student handbook, to describe the importance of leadership for professional nursing practice. Finally, a summary of the research and important findings about professional nursing practice and leadership are presented in the paper’s conclusion.
Review and Discussion
In some ways, the nursing profession is……

References

References

ANA leadership and governance. (2020). American Nurses Association. Retrieved from  https://www.nursingworld.org/ana/leadership-and-governance/ .

Delgado, C. & Mitchell, M. M. (2016, January-February). A survey of current valued academic leadership qualities in nursing. Nursing Education Perspectives, 37(1), 10-13.

Meliniotis, C. (2015, March 30). Effective nursing leadership. Elite Healthcare. Retrieved from  https://www.elitecme.com/resource-center/nursing/effective-nursing-leadership/ .

Student handbook.

Studyspark

Study Document Study Document

Gestalt Therapy Counseling Psychology History And Interventions

Pages: 7 (2051 words) Sources: 8 Document Type:Research Paper Document #:37769060

… as special relationships like the one that develops between counselor and client. The counselor-client relationship itself has a boundary, which is respected via confidentiality and privacy agreements and mutual trust. Points of contact emerge between the counselor and client, and those points of contact become opportunities for ……

References

References

Brownell, P. (2016). Contemporary Gestalt therapy. In D. J. Cain, K. Keenan, & S. Rubin (Eds.), Humanistic psychotherapies: Handbook of research and practice (p. 219–250). American Psychological Association.  https://doi.org/10.1037/14775-008 

Cherry, K. (2019). Gestalt psychology overview. Very Well Mind. Retrieved from:  https://www.verywellmind.com/what-is-gestalt-psychology-2795808 

Covey, G. (2017). Theory and practice of counseling and psychotherapy, enhanced, 10th edition. Cengage.

Jacobs, L. (1989). Dialogue in Gestalt theory and therapy. The Gestalt Journal 12(1): 1-25. Retrieved from:  http://www.gestaltpsychotherapie.de/jacobs1.pdf 

Kepner, E. (n.d.). Gestalt group processes. Retrieved from:  http://www.elementsuk.com/libraryofarticles/gestalt.pdf 

Oaklander, V. (1994). Gestalt play therapy. In O’Connor, K.J. & Schaefer, C.E. (Eds.). Handbook of play therapy. John Wiley & Sons, pp. 143-156.

Rock, I. & Palmer, S. (1990). The legacy of Gestalt psychology. Scientific American 263(6): 84-91.

Yontef, G. & Jacobs, L. (n.d.). Gestalt therapy. Retrieved from:  https://pdfs.semanticscholar.org/1211/3bf06e5fa3208fea4330873403ae65b0891c.pdf

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… what was the reason for its occurrence").
The goal of user access control security is the optimization of productive computing time, guaranteeing data confidentiality, mitigating fraud and error risks, and preventing unauthorized access. Further, permanent monitoring of system activity is vital, as malicious fraud and sabotaging will ……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Healthcare Scientific Merit

Pages: 11 (3267 words) Sources: 8 Document Type:Paper Document #:78470537

… the comments or questions of the researcher. This study maintained an overt data collection process and provided a complete record of findings. Because confidentiality cannot be guaranteed in absolute terms in a scenario where complete written records are made of the information provided by the participants, consent ……

References

References

Brook, R. H., & Vaiana, M. E. (2015). Using the knowledge base of health services research to redefine health care systems. Journal of general internal medicine, 30(10), 1547-1556.

Cutcliffe, J. R., & McKenna, H. P. (1999). Establishing the credibility of qualitative research findings: the plot thickens. Journal of advanced nursing, 30(2), 374-380.

Doekhie, K. D., Strating, M. M., Buljac?Samardzic, M., van de Bovenkamp, H. M., & Paauwe, J. (2018). The different perspectives of patients, informal caregivers, and professionals on patient involvement in primary care teams. A qualitative study. Health Expectations, 21(6), 1171-1182.

Eccles, M., Grimshaw, J., Walker, A., Johnston, M., & Pitts, N. (2005). Changing the behavior of healthcare professionals: the use of theory in promoting the uptake of research findings. Journal of clinical epidemiology, 58(2), 107-112.

Leedy, P.D. & Ormrod, J. E. (2019). Practical research: Planning and design, 12th edition. Pearson Education, Hudson Street, NY.

Sanjari, M., Bahramnezhad, F., Fomani, F. K., Shoghi, M., & Cheraghi, M. A. (2014). Ethical challenges of researchers in qualitative studies: The necessity to develop a specific guideline. Journal of medical ethics and history of medicine, 7.

Swan, J., Clarke, A., Nicolini, D., Powell, J., Scarbrough, H., Roginski, C., ... & Taylor-Phillips, S. (2012). Evidence in Management Decisions (EMD): advancing knowledge utilization in healthcare management.

Thomas, D. R. (2017). Feedback from research participants: are member checks useful in qualitative research?. Qualitative Research in Psychology, 14(1), 23-41.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".