Study Document
… factors and entrepreneurial activity. For example, if in a meeting of an entrepreneur and the investor, the formal rules and guidelines of the construction of a hotel at any site are available but whether the investor is willing to accept those rules and offer money as an ……
References
Coelho, A. (2019). The role of informal institutions in the enforcement of rules and how to improve corporate and public governance in Brazil: Studies based on a set of corporate governance cases involving state-owned companies (Working Paper). Retrieved from SSRN website https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3434037
Dacin, M.T., Goodstein, J. & Scott, W.R. (2002). Institutional theory and institutional change: Introduction to the special research forum. Academy of Management Journal, 45(1), 45- 47. DOI: 10.2307/3069284
Escandon-Barbosa, D.M., Urbano, D., Hurtado-Ayala, A., Paramo, J.S. & Dominguez, A.Z. (2019). Formal institutions, informal institutions, and entrepreneurial activity: A comparative relationship between rural and urban areas in Colombia. Journal of Urban Management, 8(3), 458-471. https://doi.org/10.1016/j.jum.2019.06.002
Estrin, S. & Prevezer, M. (2010). The role of informal institutions in corporate governance: Brazil, Russia, India, and China compared. Asia Pacific Journal of Management, 28, 41- 67. https://doi.org/10.1007/s10490-010-9229-1
Kaufmann, W., Hooghiemstra, R. & Feeney, M.K. (2018). Formal institutions, informal institutions, and red tape: A comparative study. Public Administration, 96(2), 386-403. https://doi.org/10.1111/padm.12397
Meluch, A.L. (2016, August). Understanding the organizational and institutional origins of social support in a cancer support center. (Unpublished doctoral dissertation). Retrieved from https://etd.ohiolink.edu/!etd.send_file?accession=kent1466944822&disposition=inline
Torniainen, T.J. & Sasstamoinen, O.J. (2007). Formal and informal institutions and their hierarchy in the regulation of the forest lease in Russia. Forestry: An International Journal of Forest Research, 80(5), 489-501. https://doi.org/10.1093/forestry/cpm033
Study Document
...Construction Why Ethical Egoism is a Problematic Framework for Intelligence
CI Literature Review
Introduction
The aim of this examination of the literature is to fill the wide gap that remains in counterintelligence research regarding an appropriate ethical standard that can guide and foster an ethical culture, as called for by Bellaby (2012) and Valentine (2016). The purpose of this review is to identify the lessons that have been learned and presented by researchers on this topic, and to identify an appropriate theoretical framework for assessing the way forward. The research question for this study is: How can the US counterintelligence enterprise support collaboration among the various USIC members and the private sector in an ethical and productive manner? The ultimate purpose of this study is to propose a standardized ethical framework for guiding the counterintelligence program as it works to collaborate with the private sector in the 21st century. Therefore, the……
Bibliography
2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center
Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.
Bernardi, Beatrice. 2013. "The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles." Bachelor's thesis, Università Ca'Foscari Venezia.
Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.
Cohen, Shlomo. 2016. "Are There Moral Limits to Military Deception?." Philosophia 44 (4): 1305-1318.
Coyne, John, Peter Bell, and Shannon Merrington. 2013. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2 (10): 27-37.
Erskine, Toni. 2004. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19 (2): 359-381.
Godson, Roy, and James J. Wirtz. 2000. "Strategic denial and deception." International Journal of Intelligence and Counterintelligence 13 (4): 424-437.
Study Document
...Construction Personality theories and PTSD
Alternative Theoretical Positions and Applications
The idea of personality is broadly accepted as being fundamental in psychology, but its dynamics as well as the ways that it may be identified and assessed are questions in which psychologists have been in substantial disagreement. Millon had been focused on perpetually creating a systematic program to describe standard as well as abnormal personality functioning and also to determine various kinds of personality types and conditions according to deductive thinking. This varies with the rising inductive technique that identified proportions of personality functioning and realignment according to factor evaluation of the personality lexicon qualities. The present system consists of 13 personality designs or kinds according to groups generally observed in a number of communities to varying degrees. The primary personality designs established by Millon had been all variants from the Passive, Active along with Pleasure-Pain proportions. Over his years of……
References
Pincus, A. L., & Krueger, R. F. (2015). Theodore Millon\\'s contributions to conceptualizing personality disorders. Journal of personality assessment, 97(6), 537-540.
Millon, T., Millon, C. M., Meagher, S. E., Grossman, S. D., & Ramnath, R. (2004). Personality disorders in modern life. John Wiley & Sons.
Rossi, G., & Derksen, J. (2015). International adaptations of the Millon Clinical Multiaxial Inventory: Construct validity and clinical applications. Journal of personality assessment, 97(6), 572-590.
O’Connor, B. P., & Dyce, J. A. (1998). A test of models of personality disorder configuration. Journal of Abnormal Psychology, 107(1), 3.
Lecic-Tosevski, D., Gavrilovic, J., Knezevic, G., & Priebe, S. (2003). Personality factors and posttraumatic stress: Associations in civilians one year after air attacks. Journal of Personality Disorders, 17, 537–549.
Strack, S., & Millon, T. (2007). Contributions to the dimensional assessment of personality disorders using Millon\\'s model and the Millon Clinical Multiaxial Inventory (MCMI–III). Journal of Personality Assessment, 89(1), 56-69.
Bajraktarov, S., Gudeva-Nikovska, D., Manuševa, N., & Arsova, S. (2017). Personality Characteristics as Predictive Factors for the Occurrence of Depressive Disorder. Open Access Macedonian Journal of Medical Sciences, 5(1), 48–53. https://doi.org/10.3889/oamjms.2017.022
Framingham, J. (2018). Millon Clinical Multiaxial Inventory (MCMI-III). Psych Central.
Study Document
...Construction Education, especially bilingual education and its evolution in the United States, has paved its way in every state with differences in approaches and choices of language being taught. A part of US schooling history is its rich history and practice of native language teaching and bilingual education. Ovando (2003), in his study, found that it was about two hundred years ago that American communities first started assembling large numbers of young children to educate them. Instruction typically took place in languages besides English, and in two or more languages (e.g., Dutch and German in Pennsylvania, German and Spanish in Texas, and the French language in Louisiana). The toleration and use of several languages for education and interaction suggest a wide linguistic pluralism ideology in this era (Ovando, 2003). Keeping in mind the variations and interactions of the different languages, one sees a rich and vibrant culture of bilingual education that……
References
Banks, J. A. (1995). Multicultural Education: Its Effects on Students\\\\\\\\\\\\' Racial and Gender Role Attitudes. Handbook of Research on Multicultural Education (pp. 617-627). New York: Macmillan.
Gándara, P., & Escamilla, K. (2017). Bilingual education in the United States. Bilingual and multilingual education, 1-14.
Ovando, C. J. (2003). Bilingual education in the United States: Historical development and current issues. Bilingual research journal, 27(1), 1-24.
Saravia-Shore, M., & Arvizu, S. F. (2017). Cross-cultural literacy: An anthropological approach to dealing with diversity. In Cross-cultural Literacy (pp. xv-xxxviii). Routledge.
Wei, L. (2013). Integration of Multicultural Education into English Teaching and Learning: A Case Study in Liaoning Police Academy. Theory & Practice in Language Studies, 3(4).
Study Document
...Construction Morality of Counterintelligence Ethical Implications and the Need for a Theoretical Framework
CI Literature Review
Deception is at the core of counterintelligence: yet, it is a problematic core because of the corruption associated with deception in ethical systems. Mattox (2002), for example, observed that the practice of deception “is subject to limitations imposed by the demands of morality” (4). Unfortunately, morality within the realm of counterintelligence is often the first casualty, as history shows (Valentine 2016). The official beginnings of counterintelligence under the leadership of James Jesus Angleton have illustrated the extent to which the art of deception can create problems within the intelligence community (Morley 2017, 69). Within this community itself there is no standard ethical framework applied (Bailey and Galich 2012, 77). In counterintelligence, there is even less emphasis on ethical cohesion; as Valentine (2016) has revealed, the history of US counterintelligence is fraught with conflicts of interest,……
Bibliography
2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center
Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.
Bernardi, Beatrice. 2013. \\\\\\"The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles.\\\\\\" Bachelor\\\\\\'s thesis, Università Ca\\\\\\'Foscari Venezia.
Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.
Erskine, Toni. 2004. \\\\\\"\\\\\\'As Rays of Light to the Human Soul\\\\\\'? Moral Agents and Intelligence Gathering.\\\\\\" Intelligence & National Security 19 (2): 359-381.
Godson, Roy, and James J. Wirtz. 2000. \\\\\\"Strategic denial and deception.\\\\\\" International Journal of Intelligence and Counterintelligence 13 (4): 424-437.
Horkheimer, Max. 1972. Critical Theory. New York: Seabury Press.
Intelligence and National Security Alliance. 2020. Counterintelligence for the 21st Century. Arlington, VA.
Study Document
...Construction The Issue of Age in Cultural Diversity
Introduction
Age is an important aspect of cultural diversity that often goes ignored. For that reason ageism is a particularly problematic issue. Racism and sexism are often reported on but prejudice against the elderly is not so commonly touched upon in society. For example, the current presidential candidate Joe Biden is often mocked on social media by people engaging in ageist behavior, attacking him for being senile and having dementia because he stutters or stumbles in his speech or train of thought while campaigning. What people do not realize is that they would likely not fare any better were they to hit the campaign trail and have to give numerous speeches. As Albom (2019) notes, “jabs at Joe Biden mask our growing ageism issue.” This paper will discuss the cultural factors regarding age, developmental theory models, relevant laws, other diversity issues, resources available……
References
Albom, M. (2019). Jabs at Joe Biden mask our growing ageism issue. Retrieved from https://www.chicagotribune.com/lifestyles/sns-201909161301--tms--tuemitchctntm-a20190916-20190916-story.html
David, K. E. (2018). The Poster Child of the “Second” Cultural Revolution: Huang Shuai and Shifts in Age Consciousness, 1973–1979. Modern China, 44(5), 497-524.
Heggeness, M. L., Carter-Johnson, F., Schaffer, W. T., & Rockey, S. J. (2016). Policy implications of aging in the NIH-funded workforce. Cell Stem Cell, 19(1), 15-18.
Landeiro, F., Barrows, P., Musson, E. N., Gray, A. M., & Leal, J. (2017). Reducing social isolation and loneliness in older people: a systematic review protocol. BMJ Open, 7(5), e013778.
Lassila, S. (2019). Managing Risks of an Aging Workforce. Construction Executive, 2020. Retrieved from https://constructionexec.com/article/managing-risks-of-an-aging-workforce
Liu, S. J., Lin, C. J., Chen, Y. M., & Huang, X. Y. (2007). The effects of reminiscence group therapy on self-esteem, depression, loneliness and life satisfaction of elderly people living alone. Mid-Taiwan Journal of Medicine, 12(3), 133-142.
Lumen. (2019). Theoretical perspectives on deviance. Retrieved from https://courses.lumenlearning.com/sociology/chapter/theoretical-perspectives-on-deviance/
McLeod, S. (2018). Erik Erikson's Stages of Psychosocial Development. Retrieved from https://www.simplypsychology.org/Erik-Erikson.html
Study Document
...Construction Right and Left Wing Terror Groups in America
1
Extremism in the U.S. is on the rise, based on the rise in polarization throughout the country as the Left and the Right become more and more opposed to one another ideologically, politically, socially, and emotionally. There is a strong rift between the two and little sense of common ground. Much of this rise has come on the heels of the rise in social media use, which allows individuals to promote their views to the rest of the world in a way that was literally unheard of prior to the digital revolution (Freberg, Graham, McGaughey & Freberg, 2011). As social media use has essentially risen exponentially since its inception in the 2000s, the level of ideologically-driven Influencers in the space is a reflection and facilitator of the level of extremism in the United States.
As both the popularity of groups like……
References
Barnett, B. A. (2015). 20 Years Later: A Look Back at the Unabomber Manifesto. Perspectives on Terrorism, 9(6), 60-71.
Beinart, P. (2017). The rise of the violent left. Retrieved from https://www.theatlantic.com/magazine/archive/2017/09/the-rise-of-the-violent-left/534192/
Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).
Costello, M., & Hawdon, J. (2018). Who are the online extremists among us? Sociodemographic characteristics, social networking, and online experiences of those who produce online hate materials. Violence and gender, 5(1), 55-60.
DeCook, J. R. (2018). Memes and symbolic violence:# proudboys and the use of memes for propaganda and the construction of collective identity. Learning, Media and Technology, 43(4), 485-504.
Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.
Hamm, M &Spaaj, R. (2015). Lone wolf terrorism in America: Using knowledge of radicalization pathways to forge prevention strategies. U.S. Department of Justice. Retrieved from https://www.ncjrs.gov/pdffiles1/nij/grants/248691.pdf
Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.
Study Document
...Construction Public Relations
Introduction: Public Safety
The aim of the public safety sector is the provision of products and services geared at safeguarding individuals and their property. Over 286,000 individuals are employed in this sector, which can be segregated into the following two key segments: commercial and governmental organizations. Federal, regional, state, and local level governmental public safety organizations agencies have outnumbered commercial ones all through the course of the past decade. Most individuals working in this sector are hired by governmental organizations, including the fire department, police department, and sheriff's department. Some federal level public safety institutions include the CIA, FBI, Department of Homeland Security, and Border Patrol (Vault, 2020).
The most predominant public safety jobs are connected with the police: police officers, detectives/ investigators, or correctional officers. EMT personnel, highway patrol officials, and firefighters make up another major public safety employee cluster. The majority of private-sector safety personnel include……
References
Achim, A. C. (2014). Risk management issues in policing: from safety risks faced by law enforcement agents to occupational health. Procedia Economics and Finance, 15, 1671-1676.
Bornstein, A. (2005). Antiterrorist policing in New York City after 9/11: Comparing perspectives on a complex process. Human Organization, 64(1), 52-61. Retrieved from https://www.jstor.org/stable/44127004?seq=1
Buyantseva, L. V., Tulchinsky, M., Kapalka, G. M., Chinchilli, V. M., Qian, Z., Gillio, R., et al. (2007). Evolution of lower respiratory symptoms in New York police officers after 9/11: A prospective longitudinal study. J Occup Environ Med, 49, 310–17.
Homeland Security. (2005). Grand reform: The faster and smarter funding for first responders. Washington, DC: U.S. Government Printing Office.
Lippmann, M., Cohen, M. D., & Chen, L-C. (2015). Health effects of World Trade Center (WTC) Dust: An unprecedented disaster with inadequate risk management. Crit Rev Toxicol, 45(6), 492-530. DOI: 10.3109/10408444.2015.1044601
NYPD. (2020). About NYPD. Retrieved from https://www1.nyc.gov/site/nypd/about/about-nypd/about-nypd-landing.page
OHS. (2008). Occupational Health and Safety Code of Practice. Australian Government.
Vault. (2020). Overview. Retrieved from https://www.vault.com/industries-professions/industries/public-safety
Study Document
...Construction Quality Management
Executive Summary
Quality management is pivotal in any product or service. One of the key aspects of ensuring this is through the product development process. The product taken into account is MacBook Pro by Apple Inc. Research indicates that the product goes through various steps in the production process, including designing, the formation of a new product team, Apple New product Process, product review, product redesign, assessment and feedback, and then finally product launching. Research also indicates that designing for manufacturing is a pivotal component of the product development cycle. It encompasses the optimization of the product's design for the different processes of manufacturing and assembly, assimilating the various product design needs and requirements with its production approach. In the case of television, the various DFM guidelines taken into consideration for improving manufacturability include a reduction in the number of parts, developing products designs that are modular, usage……
References
Hill, C. W., Jones, G. R., & Schilling, M. A. (2014). Strategic management: theory: an integrated approach. Cengage Learning.
Panzarino, M. (2012). This is how Apple\\\\\\'s top-secret product development process works. The Next Web. Retrieved from: https://thenextweb.com/apple/2012/01/24/this-is-how-apples-top-secret-product-development-process-works/
Interaction Design Foundation. (2020). Apple\\\\\\'s Product Development Process – Inside the World\\\\\\'s Greatest Design Organization. Retrieved from: https://www.interaction-design.org/literature/article/apple-s-product-development-process-inside-the-world-s-greatest-design-organizatio " target="_blank" REL="NOFOLLOW">
Study Document
...Construction Suicide Terrorism: Driven to Death
Introduction
Who are the terrorists engaging in suicide bombings? What motivates them to act? These are some of the questions Merari (2010) tackles in Driven to Death. They are not entirely new questions, as other researchers have asked them as well—but Merari (2010) does provide new insight into the phenomenon of suicide bombing by conducting field work and independent research to uncover more information on this particular subject. This paper explores some of the findings of Merari (2010) and compares them with what other researchers have had to say, particularly on the subject of what motivates terrorists to act.
Demographics
While many scholars argue that there is no demographic profile of the suicide bomber, Merari (2010) disagrees and presents his own demographic profile based on his own research. The argument of general scholarship is that anyone can be a suicide bomber, young or old, rich……
References
Bandura, A. (2018). Toward a psychology of human agency: Pathways and reflections. Perspectives on Psychological Science, 13(2), 130-136.
Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).
Costello, M., & Hawdon, J. (2018). Who are the online extremists among us? Sociodemographic characteristics, social networking, and online experiences of those who produce online hate materials. Violence and gender, 5(1), 55-60.
DeCook, J. R. (2018). Memes and symbolic violence:# proudboys and the use of memes for propaganda and the construction of collective identity. Learning, Media and Technology, 43(4), 485-504.
Koch, A. (2018). Trends in Anti-Fascist and Anarchist Recruitment and Mobilization. Journal for Deradicalization, (14), 1-51.
Merari, A. (2010). Driven to death. Oxford University Press.
We have over 150,000+ study documents to help you.
Sign Up for FREE