Conflict Of Interest Essays (Examples)

Studyspark

Study Document Study Document

Gender And Veterans Differences In Access To Mental Health Care Services

Pages: 10 (2880 words) Sources: 8 Document Type:literature review Document #:16426783

… depression care as well. So, per person, the medical costs of women are higher than men in general.
If women are deployed in conflict areas of war while being in the army, the medical costs might be higher (high outpatient and pharmacy costs) due to resulting mental … Definite Need for Mental Health Care for Military Veterans
Various studies have now emerged which prove that military veterans who have served in conflict seas like Iraq and Afghanistan need special mental health care. The reason for this being that they suffer from severe mental impacts of … might not be deployed directly to the war field they work in the same area in assisting roles and are close to the conflict area.
The negative impacts on their mental health are quite noticeable and are important to be dealt with as soon as possible, as ……

References

References

Adams, R.E., Urosevich, T.G., Hoffman, S.N., Kirchner, H.L., Figley, C.R., Withey, C.A., Boscarino, J.J., Dugan, R.J. & Boscarino, J.A. (2019). Social and psychological risk and protective factors for veteran well-being: The role of veteran identity and its implications for intervention. Military Behavioral Health, 7(3), 304-314.  https://doi.org/10.1080/21635781.2019.1580642 

Allore, H.G., Ning, Y., Brandt, C.A., & Goulet, J.L. (2013). Accounting for the hierarchical structure in veterans’ health administration data: Differences in healthcare utilization between men and women veterans. International Journal of Statistics in Medical Research, 2(2), 94-103. DOI: 10.6000/1929-6029.2013.02.02.03

Brooks, C. & Chopik, W. (2010, June 17). Research finds deployment affects mental health of veterans differently. Michigan State University.  https://msutoday.msu.edu/news/2020/research-finds-deployment-affects-mental-health-of-veterans-differently/ 

Duggal, M., Goulet, J.L., Womack, J., Gordon, K., Mattocks, K., Haskell, S.G., Justice, A.C. & Brandt, C.A. (2010). Comparison of outpatient health care utilization among returning women and men veterans from Afghanistan and Iraq. BMS Health Services Research, 10 (175).  https://doi.org/10.1186/1472-6963-10-175 

Harpaz-Rotem, I. & Rosenheck, R.A. (2011). Serving those who served: Retention of newly returning veterans from Iraq and Afghanistan in mental health treatment. Psychiatric Services, 62(1), 22-27. DOI: 10.1176/ps.62.1.pss6201_0022.

Haskel, S.G., Brandt, C.A., Krebs, E.E., Skanderson, M., Kerns, R.D., & Goulet, J.L. (2009). Pain among veterans of operations enduring freedom and Iraqi freedom: Do women and men differ? Pain Medicine, 10(7), 1167-1173.  https://doi.org/10.1111/j.1526- 4637.2009.00714.x

Kaur, S., Stechuchak, K.M., Coffman, C.J., Allen, K.D., & Bastain, L.A. (2007). Gender differences in health care utilization among veterans with chronic pain. Journal of General Internal Medicine, 22(2), 228-233. DOI: 10.1007/s11606-006-0048-5

Koo, K.H., Madden, E. & Maguen, S. (2015). Race, ethnicity, and gender differences in V.A. health care service utilization among U.S. veterans of recent conflicts. Psychiatric Services, 66(5), 507-513.  https://doi.org/10.1176/appi.ps.201300498

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… Journal of International Law and Commercial Regulation 40, (2015):445] [6: Martin Libicki, “The Coming of Cyber Espionage Norms”, 9th International Conference on Cyber conflict, 2017. https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf]
Jasper (2015) contends that the spread and increase of cyber espionage in the modern world is attributable to the struggle for ……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Studyspark

Study Document Study Document

Depression Among Adolescents

Pages: 12 (3576 words) Sources: 6 Document Type:Term Paper Document #:12294857

The Social Issue
Depression is a significant social issue of interest to me as I have seen it affect numerous people in my own life and have even struggled with it at times myself. … they are impacted by peers, groups and media to think, act, and feel a certain way (Bandura, 2018). It sets them up for conflict, both internal and external, and teens who are unable to cope with the conflict can succumb to negative impulses, such as depressed thoughts and feelings. According to Erikson’s model of human development, the adolescent stage of development … of human development, the adolescent stage of development is the fifth stage of development, as is typified by the Identity vs. Role Confusion conflict, which commonly lasts from ages 12-18—i.e., the teenage years (Shriner & Shriner, 2014). It is during this stage of development that teens struggle … with their lives, their talents,……

References

References

Anderson, M. & Jiang, J. (2018). Teens, Social Media & Technology 2018. Retrieved from  https://www.pewresearch.org/internet/2018/05/31/teens-social-media-technology-2018/ 

Bandura, A. (2018). Toward a psychology of human agency: Pathways and reflections.  Perspectives on Psychological Science, 13(2), 130-136.

Chester, J., & Montgomery, K. (2008). No escape: Marketing to kids in the digital age. Multinational Monitor, 29(1), 11.

Greenberg, P. (2015). The Growing Economic Burden of Depression in the U.S. Retrieved from  https://blogs.scientificamerican.com/mind-guest-blog/the-growing-economic-burden-of-depression-in-the-u-s/ " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Influence Of The PRC With Great Power Competition Globalization

Pages: 6 (1708 words) Sources: 9 Document Type:Essay Document #:99402887

… of trade and technology, it does underscore the risk that the competition could extend beyond that, especially if the US perceives that its interest in Asia are threatened by the PRC’s growing power.
The structural realist approach to international relations holds that the balance of power and ……

References

References

Chatzky, A. & McBride, J. (2019) China’s massive Belt and Road Initiative. Council on Foreign Relations. In possession of the author.

“China as a Trading State” (n.d.) In possession of the author. s

“Foreign Direct Investment” (n.d.) In possession of the author.

Global Times (2018) Best strategic opportunity since the Cold War. Global Times. In possession of the author.

Hoffman, S. (2002) Clash of globalizations. Foreign Affairs. July/August 2002. 105-115.

Morrison, W. (2017) China’s economic rise: History, trends, challenges, and implications for the United States. Congressional Research Service. September 15, 2017. In possession of the author.

NIC (2017) Paradox of progress. National Intelligence Council. In possession of the author.

Pollack, J. (no date). Competing visions: China, America and the Asia-Pacific Security Order. In possession of the author.

Studyspark

Study Document Study Document

Test1

Pages: 8 (2254 words) Sources: 7 Document Type: Document #:19731108

… data specific points on the trends associated with the two oppressed/marginalized population (LGBTC Youth and Homeless Youth). B. Indicate the reason behind your interest in the population, and its direct connection to social work practice.
LGBTC youths are overrepresented amongst the homeless population. In spite of the … to other youth populations. Akin to several other homeless youths, LGBTC youth more often than not report abuse, neglect, as well as family conflict as the basis for fleeing from home. Notably, rejection on the basis of their gender identity or sexual orientation is considered to be … from home. Notably, rejection on the basis of their gender identity or sexual orientation is considered to be the foundation for the family conflict. Notably, family conflict is deemed to be the most underlying reason for all youth homelessness. 50 percent of all teenagers experience a negative reaction from their … in four……

References

References

Bilodeau, B. L., & Renn, K. A. (2005). Analysis of LGBT identity development models and implications for practice. New directions for student services, 2005(111), 25-39.

Cray, A., Miller, K., & Durso, L. E. (2013). Seeking shelter: The experiences and unmet needs of LGBT homeless youth. Washington, DC: Center for American Progress.

Cunningham, M., Pergamit, M., Astone, N., & Luna, J. (2014). Homeless LGBTQ youth. Washington, DC: Urban Institute.

Dank, M., Yahner, J., Madden, K., Bañuelos, I., Yu, L., Ritchie, A., ... & Conner, B. (2015). Surviving the Streets of New York: Experiences of LGBTQ Youth, YMSM and YWSW Engaged in Survival Sex. Washington, DC: Urban Institute.

D'augelli, A. R. (2006). Developmental and contextual factors and mental health among lesbian, gay, and bisexual youths. American Psychological Association.

Durso, L. E., & Gates, G. J. (2012). Serving our youth: Findings from a national survey of services providers working with lesbian, gay, bisexual and transgender youth who are homeless or at risk of becoming homeless. Los Angeles: The Williams Institute with True Colors and the Palatte Fund.

Foss, S. (2017). A Guide to Social Work Advocacy for Transgender Adolescents and Young Adults. Texas State University.

Higa, D., Hoppe, M. J., Lindhorst, T., Mincer, S., Beadnell, B., Morrison, D. M., ... & Mountz, S. (2014). Negative and positive factors associated with the well-being of lesbian, gay, bisexual, transgender, queer, and questioning (LGBTQ) youth. Youth & Society, 46(5), 663-687.

Studyspark

Study Document Study Document

Depression And Social Media

Pages: 8 (2464 words) Sources: 13 Document Type:Research Paper Document #:12318199

… that do not go away and come on for seemingly no reason, frustration over small matters, hopelessness, feeling of emptiness, irritability, loss of interest in past pleasures and in family or friends, no self-esteem, sense of worthlessness or guilt, fixation on self-criticism, inability to focus thoughts or … where they are impacted by peers, groups and media to think, act, and feel a certain way (Bandura). It sets them up for conflict, both internal and external, and young adults who are unable to cope with such conflict can succumb to negative impulses, such as depressed thoughts, self-doubt, and feelings of loneliness and separation.
According to Erikson’s model of human development, … of human development, the adolescent stage of development is the fifth stage of development, as is typified by the Identity vs. Role Confusion conflict, which commonly lasts from ages 12-18—i.e., the teenage years (Shriner & Shriner). The next……

References

Works Cited

Andreassen, Cecilie Schou, Ståle Pallesen, and Mark D. Griffiths. \\\\\\\\\\\\"The relationship between addictive use of social media, narcissism, and self-esteem: Findings from a large national survey.\\\\\\\\\\\\" Addictive behaviors 64 (2017): 287-293.

Bandura, A. “Toward a psychology of human agency: Pathways and reflections.”  Perspectives on Psychological Science 13.2 (2018): 130-136.

Chester, Jeff, and Kathryn Montgomery. \\\\\\\\\\\\"No escape: Marketing to kids in the digital age.\\\\\\\\\\\\" Multinational Monitor 29.1 (2008): 11.

Greenberg, P. The Growing Economic Burden of Depression in the U.S. 2015. Retrieved from  https://blogs.scientificamerican.com/mind-guest-blog/the-growing-economic-burden-of-depression-in-the-u-s/ " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Elder Abuse

Pages: 7 (2239 words) Sources: 4 Document Type:Term Paper Document #:22335640

… and identify elder abuse (Lachs, Teresi, Ramirez, et al., 2016). Nurses have a responsibility to protect their patients from abuse, but may encounter conflict when they suspect family members, other residents, or other healthcare workers are perpetrating some form of elder abuse. Misreading cues, misunderstanding cultural communication ……

References

References

Falk, N. L., Baigis, J., Kopac, C., (August 14, 2012) \\\\\\\\\\\\"Elder Mistreatment and the Elder Justice Act\\\\\\\\\\\\" OJIN: The Online Journal of Issues in Nursing 17(3).

Forum on Global Violence Prevention; Board on Global Health; Institute of Medicine; National Research Council (2014). Ethical considerations. Washington (DC): National Academies Press (US); 2014 Mar 18.

Lacher, S., Wettstein, A., Senn, O., et al. (2016). Types of abuse and risk factors associated with elder abuse. Swiss Medical Weekly 2016(146): 1-10.

Lachs, M.S., Teresi, J.A., Ramirez, M., et al. (2016). The prevalence of ersident-to-resident elder mistreatment in nursing homes. Annals of Internal Medicine 165(4):229-236.

Malmedal, W., Iversen, M.H. & Kilvik, A. (2014). Sexual abuse of older nursing home residents: A literature review. Nursing Research and Practice 2015(Article 902515):  http://dx.doi.org/10.1155/2015/902515 

Roberto, K.A. (2016). The complexities of elder abuse. American Psychologist 71(4): 302-311.

Saghafi, A., Bahramnezhad, F., Poormollamirza, A., et al. (2019). Examining the ethical challenges in managing elder abuse: a systematic review. Journal of Medical Ethics and History of Medicine 2019(12):  https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6642445/ 

Wangmo, T., Nordstrom, K. & Kressig, R.W. (2017). Preventing elder abuse and neglect in geriatric institutions: Solutions from nursing care providers. Geriatric Nursing 38(5): 385-392.

Studyspark

Study Document Study Document

What Followers Can Learn From Their Leaders During Crisis

Pages: 10 (2861 words) Sources: 5 Document Type:Research Paper Document #:13609293

… are going to consider during decision-making and when they are going to provide much-needed answers. The third interviewee states that when crises or conflict happen, it is up to leaders to communicate clearly about the situation and to make it known that they are going to make … about the situation and to make it known that they are going to make the best ethical decisions to resolve the crises or conflict that have occurred (Int-3).
Part of providing psychological security is to make things feel normal. Leaders need to do this by providing updates ……

References

References

Birnbaum, T., & Friedman, H. H. (2014). Ezra and Nehemiah: Lessons in Moral and Spiritual Leadership. Available at SSRN 2390230.

Carrington, D. J., Combe, I. A., & Mumford, M. D. (2019). Cognitive shifts within leader and follower teams: Where consensus develops in mental models during an organizational crisis. The Leadership Quarterly, 30(3), 335-350.

Harter, J. (2019). Why Some Leaders Have Their Employees\\\\\\' Trust, and Some Don\\\\\\'t. Workplace. Gallup.

Hofmeyr, K., Cook, J., & Richardson, A. (2011). How leaders generate hope in their followers. South African Journal of Labour Relations, 35(2), 47-66.

Kranke, D., Gin, J., Der-Martirosian, C., Weiss, E. L., & Dobalian, A. (2020). VA social work leadership and compassion fatigue during the 2017 hurricane season. Social Work in Mental Health, 18(2), 188-199.

Patton, C. (2017). What made Nehemiah an effective leader?. Journal of Applied Christian Leadership, 1(1), 8-14.

Rogers, A. P., & Barber, L. K. (2019). Workplace intrusions and employee strain: the interactive effects of extraversion and emotional stability. Anxiety, Stress, & Coping, 32(3), 312-328.

Skeet, A. (2020, April 4). Ethical Followership in Times of Crisis. Markkula Center for Applied Ethics, Santa Clara University.

Studyspark

Study Document Study Document

Psychology

Pages: 5 (1482 words) Sources: 8 Document Type:question answer Document #:99253146


Question 2
What does dissonance do to a person, and what can they do the reduce it?
Cognitive dissonance being a state of conflict between a person’s belief and outward actions or expressions results in varying degrees of discomfort and uneasiness, depending on the degree of conflict within the person (Van Kampen, 2019. p. 7). The discomfort associated with cognitive dissonance is usually in form of anxiety, shame or guilt … in form of anxiety, shame or guilt (Legg, 2019). Since a person can only tolerate an inconvenient cognitive state for a period, the conflict person attempts to reduce their dissonance by equally reducing the conflict within them. This motivation to escape from the mental cage of cognitive dissonance is termed “the principle of cognitive consistency” (Van Kampen, 2019. … & Murayama, 2019). As prescribed by the principle of cognitive consistency, the human mind continuously tries to harmonize itself……

References

References

Cherry, K. (2020). The Incentive Theory of Motivation. Retrieved from:  https://www.verywellmind.com/the-incentive-theory-of-motivation-2795382 

Festinger, L., & Carlsmith, J. M. (1959). Thoughts out of tune. Journal of Abnormal and Social Psychology, 58, 203-210.

Izuma, K., & Murayama, K. (2019). The neural basis of cognitive dissonance. In E. Harmon-Jones (Ed.), Cognitive dissonance: Reexamining a pivotal theory in psychology (p. 227–245). American Psychological Association.  https://doi.org/10.1037/0000135-011 

Legg, T. (2019). Cognitive dissonance: What to know. Retrieved from:  https://www.medicalnewstoday.com/articles/326738#overview 

McLeod, S. (2018). Cognitive dissonance. Retrieved from  https://www.simplypsychology.org/cognitive-dissonance.html 

Northrup, C. (2018). 4 ways to reduce cognitive dissonance. Retrieved from:  https://www.drnorthrup.com/4-ways-to-reduce-cognitive-dissonance/ 

Silverman, K., Jarvis, B. P., Jessel, J., & Lopez, A. A. (2016). Incentives and motivation. Translational Issues in Psychological Science, 2(2), 97–100. DOI:10.1037/tps0000073 Retrieved from:  https://sci-hub.tw/10.1037/tps0000073 

Van Kampen, H. S. (2019). The principle of consistency and the cause and function of behaviour. Behavioural processes, 159, 42-54. Retrieved from:  https://scihub.tw/https://doi.org/10.1016/j.beproc.2018.12.013

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

...Conflict interest Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage,……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".