Conflict Theory Essays (Examples)

Studyspark

Study Document Study Document

Using Tactical Empathy And Effective Silence To Negotiate An Outcome

Pages: 8 (2314 words) Sources: 7 Document Type:Essay Document #:57733718

… the life raft has equal status and rank, the need to negotiate which items are most important has to be considered.
Dealing with conflict
In any negotiation there will be conflict. conflict is the result of individual parties wanting different or opposing things. conflict theory can help to explain conflict especially in light of negotiation, as it is based on the idea of Marx and is predicated on the notion that society is … engaged in a continuous struggle that comes about as a result of there only being a finite supply of resources. From this seed, conflict theory emerged in sociology in response to structural functionalism, which posits that society functions as a result of various groups and organizations working together … organizations working together in a stable and functioning manner (Ritzer & Stepnisky, 2017). However, the stability is but one face of society, in conflict theory—the other……

References

References

Brown, M. E., & Treviño, L. K. (2014). Do role models matter? An investigation of role modeling as an antecedent of perceived ethical leadership. Journal of Business Ethics, 122(4), 587-598.

Combs, J. P., Harris, S., & Edmonson, S. (2015). Four Essential Practices for Building Trust. Educational Leadership, 72(7), 18-22.

Fisher, R. & Ury, W. (1991). Getting to Yes. NY: Penguin.

Lunenburg, F. C. (2012). Power and leadership: An influence process. International Journal of Management, Business, and Administration, 15(1), 1-9.

Maslow, A. H. (1943). A theory of human motivation. Psychological Review, 50(4), 370.

Ritzer, G. & Stepnisky, J. (2017). Modern sociological theory. Thousand Oaks, CA: SAGE.

Singh-Sengupta, S. (1997). Leadership: A Style or an Influence Process. Indian Journal of Industrial Relations, 265-286.

Studyspark

Study Document Study Document

Counterintelligence Issues Within United States

Pages: 13 (3766 words) Sources: 16 Document Type:Essay Document #:41694312

… In counterintelligence, there is even less emphasis on ethical cohesion; as Valentine (2016) has revealed, the history of US counterintelligence is fraught with conflict of interest, human failings, ulterior motives, problematic relationships, and questionable tactics (33-39). Counterintelligence has often been linked with the idea of national security, … operations could be used to deliberately leak false information to known foreign actors, but doing so runs the risk of escalating a larger conflict among nations, as Bernardi (2013) notes, and from an ethical standpoint it is difficult to determine where the line should be in terms … the FBN was eventually closed for that reason (Valentine 2016).
Summation
Since counterintelligence came to maturity in the US in an era of conflict, it is helpful to approach the subject from the standpoint of conflict theory and the theories developed around it, all of which focus on the ways in which power……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. \\\\\\"The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles.\\\\\\" Bachelor\\\\\\'s thesis, Università Ca\\\\\\'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Erskine, Toni. 2004. \\\\\\"\\\\\\'As Rays of Light to the Human Soul\\\\\\'? Moral Agents and Intelligence Gathering.\\\\\\" Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. \\\\\\"Strategic denial and deception.\\\\\\" International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Horkheimer, Max. 1972. Critical Theory. New York: Seabury Press.

Intelligence and National Security Alliance. 2020. Counterintelligence for the 21st Century. Arlington, VA.

Studyspark

Study Document Study Document

Counterintelligence Issues Within The United States

Pages: 18 (5457 words) Sources: 29 Document Type:Research Paper Document #:72238996

… long-term negative effects. When deception is used cautiously and morally, the adversary is more willing to accept it as a norm of state conflict; moreover, the adversary, who may become a state ally in the future, will not hold any ill-will on this account (Mattox 2002). But … a more unified, standardized moral framework applied throughout counterintelligence, it is likely that its history in the US would be less fraught with conflict of interest, human failings, ulterior motives, problematic relationships, and questionable tactics. The reason such a framework has not been applied is that it … operations could be used to deliberately leak false information to known foreign actors, but doing so runs the risk of escalating a larger conflict among nations, as Bernardi (2013) notes. Bernardi (2013), like the others, highlights the problem but does not point to a solution. From an … conditions necessary for collaboration and……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. "The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles." Bachelor's thesis, Università Ca'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Cohen, Shlomo. 2016. "Are There Moral Limits to Military Deception?." Philosophia 44 (4): 1305-1318.

Coyne, John, Peter Bell, and Shannon Merrington. 2013. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2 (10): 27-37.

Erskine, Toni. 2004. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. "Strategic denial and deception." International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Studyspark

Study Document Study Document

Angleton S Counterintelligence Program And What Went Wrong

Pages: 9 (2657 words) Sources: 8 Document Type:Essay Document #:36485484

… provide insight into what went wrong with counterintelligence and how those problems can be prevented in the future. It uses a combination of conflict theory, structural functionalism and critical theory to explore the dimensions of counterintelligence in the 1950s, 1960s, and 1970s. The research design is qualitative with the case study approach to … have always included work within private industry, but in many cases…[break]…problems that arose within the counterintelligence program from the 1950s to the 1970s. conflict theory was posited as a response to structural functionalism, and critical theory arose out of the failure of conflict theory to fully account for the failure of the Marxist prophecy, so by itself it is an inadequate theory—but in combination with others, and with a focus on how ethics play a part in decision-making—it can help to explain the complex nature … Johnston, Wallis, Oprescu,and Gray (2017).
Conclusion
Just as Erikson’s……

References

Reference List

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Bartos, C. and P. Wehr. 2002. Using conflict theory. UK: University of Cambridge.

Bellaby, Ross. "What's the Harm? The Ethics of Intelligence Collection." Intelligence and National Security 27, no. 1 (2012): 93-117.

Church Committee. “Final report of the Select committee to study governmental operations With respect to Intelligence activities United states senate Together with Additional, supplemental, and separate Views.” Intelligence.senate.gov, 1976. https://www.intelligence.senate.gov/sites/default/files/94755_I.pdf

Coyne, John, Peter Bell, and Shannon Merrington. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2, no. 10 (2013): 27-37.

Erskine, Toni. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19, no. 2 (2004): 359-381.

Nakashima, Ellen. “Top counterintelligence official challenges the private sector to step up defenses against foreign spying.” Washington Post, 2020.  https://www.washingtonpost.com/national-security/top-counterintelligence-official-challenges-the-private-sector-to-step-up-defenses-against-foreign-spying/2020/02/10/d842d83c-4c15-11ea-9b5c-eac5b16dafaa_story.html 

Studyspark

Study Document Study Document

The FBI Counterproliferation And Weapons Of Mass Destruction

Pages: 6 (1839 words) Sources: 8 Document Type:Research Paper Document #:33590628

… of the number of states with nuclear weapons (Mauroni 2010, 58).
The race for nonproliferation started during the Cold War. During the era, conflict theory was relatively rational and enemies were well-defined. After 9/11, concerns about nuclear weapons began shifting from aggressive acts of nation states to the ……

References

References

Busch, Nathan, and Joyner, Daniel (ed). 2009. “Introduction: Nonproliferation at a Crossroads.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Athens, GA: The University of Georgia Press.

Reiss, Mitchell. 2009. “Foreword.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Edited by Nathan Busch, and Daniel Joyner. Athens, GA: The University of Georgia Press.

Cameron, Gavin, Pate, Jason & Vogel, Kathleen. (2001). “Planting Fear: How Real is the Threat of Agricultural Terrorism?” Bulletin of Atomic Scientists, 57(5), 38-44.

Jennings, Elain. 2013. U. S. proliferation policy and the campaign against transnational terror: Linking the U.S. non-proliferation regime to homeland security efforts. Master’s Thesis. Naval Postgraduate School.

Levi, Michael. 2009. “On Nuclear Terrorism.” Cambridge, MA: Cambridge University Press.

Mauroni, Albert. J. 2010. “A Counter-WMD Strategy for the Future.” Parameters, 58-73.

Ogilvie-White, Tanya. 2008. “Facilitating Implementation of Resolution 1540 in South- East Asia, and the South Pacific.” In Implementing Resolution 1540: The Role of Regional Organizations. Edited by Lawrence Scheinman. New York: United Nations Institute for Disarmament Research.

Pilat Joseph F. 2009. “Dealing with Proliferation and Terrorism.” In Combating Weapons of Mass Destruction: The Future of International Nonproliferation Policy, edited by Nathan E. Busch and Daniel H. Joyner. Athens, GA: University of Georgia Press.

Studyspark

Study Document Study Document

Culture Analysis At A Software Company

Pages: 5 (1573 words) Sources: 5 Document Type:Research Paper Document #:44019185

… the organization’s biggest challenges. This paper will outline the culture at K via primary sources, supplemented with secondary source material on organizational culture theory.
Primary research consisting of several employee interviews revealed some challenges, especially the domains of underlying assumptions and values. There is a lack of ……

References

References

Chambers, K. & Honeycutt, A. (2009) Telecommunications mega-mergers: Impact on employee morale and turnover intention. Journal of Business & Economics Research. Vol. 7 (2) 43-52.

Dencker, J., Joshi, A, & Martocchio, J. (2007) Employee benefits as context for intergenerational conflict Human Resource Management Review. Vol. 17 (2) 208-220.

Lund, D. (2003) Organizational culture and job satisfaction. Journal of Business and Industrial Marketing. Vol. 18 (3) 219-236.

North, M. & Fiske, S. (2015) Intergenerational resource tensions in the workplace and beyond: Individual, interpersonal, institutional and international. Research in Organizational Behavior. Vol. 35 (2015) 159-179.

Yamanoi, J. & Sayama, H. (2013). Post-merger cultural integration from a social network perspective: A computational modeling approach. Computational and Mathematical Organization Theory Vol. 19 (2013) 516-537.

Studyspark

Study Document Study Document

Psychology

Pages: 5 (1482 words) Sources: 8 Document Type:question answer Document #:99253146

… trying to identify the occurrence of cognitive dissonance in the experiment through the motivations of the groups, thereby proving the validity of their theory over the behaviorist and reinforcement approach. The main difference between all the groups is the motivation/level of dissonance experienced. The control group experienced …
Question 2
What does dissonance do to a person, and what can they do the reduce it?
Cognitive dissonance being a state of conflict between a person’s belief and outward actions or expressions results in varying degrees of discomfort and uneasiness, depending on the degree of conflict within the person (Van Kampen, 2019. p. 7). The discomfort associated with cognitive dissonance is usually in form of anxiety, shame or guilt … in form of anxiety, shame or guilt (Legg, 2019). Since a person can only tolerate an inconvenient cognitive state for a period, the conflict person attempts to reduce their dissonance……

References

References

Cherry, K. (2020). The Incentive Theory of Motivation. Retrieved from:  https://www.verywellmind.com/the-incentive-theory-of-motivation-2795382 

Festinger, L., & Carlsmith, J. M. (1959). Thoughts out of tune. Journal of Abnormal and Social Psychology, 58, 203-210.

Izuma, K., & Murayama, K. (2019). The neural basis of cognitive dissonance. In E. Harmon-Jones (Ed.), Cognitive dissonance: Reexamining a pivotal theory in psychology (p. 227–245). American Psychological Association.  https://doi.org/10.1037/0000135-011 

Legg, T. (2019). Cognitive dissonance: What to know. Retrieved from:  https://www.medicalnewstoday.com/articles/326738#overview 

McLeod, S. (2018). Cognitive dissonance. Retrieved from  https://www.simplypsychology.org/cognitive-dissonance.html 

Northrup, C. (2018). 4 ways to reduce cognitive dissonance. Retrieved from:  https://www.drnorthrup.com/4-ways-to-reduce-cognitive-dissonance/ 

Silverman, K., Jarvis, B. P., Jessel, J., & Lopez, A. A. (2016). Incentives and motivation. Translational Issues in Psychological Science, 2(2), 97–100. DOI:10.1037/tps0000073 Retrieved from:  https://sci-hub.tw/10.1037/tps0000073 

Van Kampen, H. S. (2019). The principle of consistency and the cause and function of behaviour. Behavioural processes, 159, 42-54. Retrieved from:  https://scihub.tw/https://doi.org/10.1016/j.beproc.2018.12.013

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… Journal of International Law and Commercial Regulation 40, (2015):445] [6: Martin Libicki, “The Coming of Cyber Espionage Norms”, 9th International Conference on Cyber conflict, 2017. https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf]
Jasper (2015) contends that the spread and increase of cyber espionage in the modern world is attributable to the struggle for ……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Studyspark

Study Document Study Document

Traditional Medicine Usage In African Nations

Pages: 12 (3615 words) Sources: 30 Document Type:Essay Document #:38085332

Overview of Africa’s Post-conflict History
Historical Formal Institutions
Colonial legacies persist in Africa in spite of a post-colonial era (Austin, 2010). These legacies have continued in post-conflict Africa’s history. In Africa, there has been no real unifying factor bringing individuals together, primarily because of the communal aspect of society throughout … for their role in wrestling sovereign statehood from the jaws of European colonialism” (p. 472). The result is an Africa whose post-colonial and post-conflict narrative has been written by individuals who have succeeded in rising to the top: the narrative is a type of political propaganda.
Nigeria … of African collectivism was to be applied to organizations and adopted as the ethos, it could lead to communities supporting each other, reduced conflict, and nations recording higher productivity (Wasilwa, 2017). The application of African collectivism can also lead to longer-term sustainability of organizations as is the ……

References

References

Afro-centric Alliance, A. (2001). Indigenisingorganizational change: Localisation in Tanzania and Malawi. Journal of Managerial Psychology, 16(1), 59-78.

Asiseh, F., Owusu, A., & Quaicoe, O. (2017). An analysis of family dynamics on high school adolescent risky behaviors in Ghana. Journal of Child & Adolescent Substance Abuse, 26(5), 425-431.

Austin, G. (2010). African economic development and colonial legacies (Vol. 1, No. 1, pp. 11-32). Institut de hautes études internationales et du développement.

Brager, G., Specht, H., Torczyner, J. L., &Torczyner, J. (1987). Community organizing. Columbia University Press.

Bratton, M., & Van de Walle, N. (1997). Democratic experiments in Africa: Regime transitions in comparative perspective. Cambridge university press.

Burnham, G. M., Pariyo, G., Galiwango, E., & Wabwire-Mangen, F. (2004). Discontinuation of cost sharing in Uganda. Bulletin of the World Health Organization, 82, 187-195.

Dillard, C., Duncan, K. L., & Johnson, L. (2017). Black History Full Circle: Lessons from a Ghana Study Abroad in Education Program. Social Education, 81(1), 50-53.

Ehui, S. (2020). Protecting food security in Africa. Retrieved from https://www.brookings.edu/blog/africa-in-focus/2020/05/14/protecting-food-security-in-africa-during-covid-19/

Studyspark

Study Document Study Document

Maslow S Hierarchy Of Needs Model And Its Application In Human Resources

Pages: 12 (3607 words) Sources: 9 Document Type:Research Paper Document #:83319615

… asking for referrals, it may better obtain a diverse staff by asking employees for leads (Ranade, 2020). This paper will examine the findings, theory to apply, and a case example to illustrate why referral-referee relationships matter when it comes ensuring equitability in the workplace and why using … deliberately asking for diverse referrals or even for leads instead of referrals can help reduce the risk of non-diverse hires.
Research Findings
The theory used to assess the findings for this research was agency theory, which is used to explain the relationship between agents and principles. The theory helps one to understand the limitations of this relationship as well as the function of trust within the relationship. For HR to be … of the manner in which referrals from employees, if followed blindly, can be detrimental to the workplace it is helpful to understand agency theory. Additionally, Maslow’s hierarchy of needs……

References

Bibliography

Bussin, M., & Christos, D. (2018). Blind hiring not as crazy as it sounds. HR Future,  2018(Sep 2018), 36-39.

CBS News (2017). Retrieved from  http://www.cbsnews.com/videos/meet-bozoma-saint-john-the-woman-tasked-with-fixing-ubers-image/ 

Eisenhardt, K. M. (1989). Agency theory: An assessment and review. Academy of management review, 14(1), 57-74.

Frank, L. (2018). How to Use Employee Referrals Without Giving Up Workplace Diversity. Retrieved from  https://hbr.org/2018/03/how-to-use-employee-referrals-without-giving-up-workplace-diversity 

Jensen, M., & Meckling, W. (1976) Theory of the firm: Man- agerial behavior, agency costs, and ownership structure. Journal of Financial Economics, 3, 305-360.

Larcker, D. F., & Tayan, B. (2017). Governance Gone Wild: Epic Misbehavior at Uber Technologies. Rock Center for Corporate Governance at Stanford University Closer Look Series: Topics, Issues and Controversies in Corporate Governance No. CGRP-70, 18-3.

Payscale. (2018). Retrieved from  https://www.payscale.com/data/job-referral s

ProActive Solutions. (2020). Agency theory. Retrieved from http://knowledgegrab.com/learners-zone/study-support/performance-management-review/framework-introduction-to-hrm/agency-theory/

Join thousands of other students and

"spark your studies".