Study Document
… argued that culture affects law and identity, and to ensure that there is fairness and justice in any given society, then the cultural context of the people cannot be ignored. In her book, The Cultural Defense, Alison Dundes Renteln argues that \"Culture shapes individual identity in crucial ……
References
Renteln, A. D. (2004). The cultural defense. Oxford University Press.
Study Document
… as the first most-downloaded Chinese app in the United States, TikTok has an approximate global userbase of over a billion people. In the context of its economic and infrastructural status and significance, TikTok is explored in this paper as regards its ownership, revenue (and source of the ……
Works-Cited List
Nieborg, David B., and Thomas Poell. "The platformization of cultural production: Theorizing the contingent cultural commodity." New Media & Society, vol. 20, no. 11, 2018, pp. 4275-4292.
Nieborg, David B., and Anne Helmond. "The political economy of Facebook’s platformization in the mobile ecosystem: Facebook Messenger as a platform instance." Media, Culture & Society, vol. 41, no. 2, 2018, pp. 196-218.
Plantin, Jean-Christophe, et al. "Infrastructure studies meet platform studies in the age of Google and Facebook." New Media & Society, vol. 20, no. 1, 2016, pp. 293-310.
Poell, Thomas and David Nieborg and José van Dijck. "Platformisation". Internet Policy Review 8.4 (2019). Web. 7 Mar. 2020.
Tiwana, Amrit. "The Value Proposition of Platforms." Platform Ecosystems, 2014, pp. 61-69.
Study Document
… it is fully global today, and that demands an entirely new skill set around understanding diversity and global issues, and working within those contexts to deliver exceptional business results.
Diversity
There are a few different ways to understand diversity. The first is to take sort of a ……
References
Dyllick, T. & Muff, K. (2015) Clarifying the meaning of sustainable business: Introducing a typology from business-as-usual to true business sustainability. Organization & Environment. Vol. 2015, 1-19.
Lozano, J. & Escrich, T. (2017) Cultural diversity in business: A critical reflection on the ideology of tolerance. Journal of Business Ethics. Vol. 142 (4) 679-696.
Maj, J. (2015) Diversity management’s stakeholders and stakeholders management. Proceedings of the 9th International Management Conference. Retrieved February 19, 2019 from https://www.researchgate.net/profile/Jolanta_Maj/publication/282848702_Diversity_management\\\\'s_stakeholders_and_stakeholders_management/links/561e400f08ae50795afd9360/Diversity-managements-stakeholders-and-stakeholders-management.pdf
Study Document
… pursued in “The Lucifer Effect” that Zimbardo describes as he recounts his own past experience with the Stanford Prison Experiment and in the context of the Abu Ghraib scandal.
What is Dehumanization?
Dehumanization is one of the most horrific experiences that can occur to a human being. ……
Works Cited
Hong, J. K. “The Lucifer Effect: Understanding how good people turn evil.” Army Lawyer, (2012), 55-58.
Maslow, Abraham. “A theory of human motivation.” Psychological Review, 50.4 (1943), 370.
Rogers, Carl. Client-Centered Therapy. MA: Riverside Press, 1951.
Unkefer, Dean. 90 Church.
Zimbardo, Philip. The Lucifer Effect. Random House, 2007.
Study Document
...Context Culture Analysis Paper
Company Overview
I’m studying a software company that shall be known as K. K is not based in Silicon Valley, but elsewhere in the US, with offices around the world. K sells SaaS products in the B2B market and has sales in the hundreds of millions, and over 1000 employees. This company has also acquired several small firms in recent years. Integrating all of those individual cultures into a cohesive one has been one of the organization’s biggest challenges. This paper will outline the culture at K via primary sources, supplemented with secondary source material on organizational culture theory.
Primary research consisting of several employee interviews revealed some challenges, especially the domains of underlying assumptions and values. There is a lack of artifacts that provide meaning, which is another problem that will need to be resolved.
Primary Research
As I know people who work in this company……
References
Chambers, K. & Honeycutt, A. (2009) Telecommunications mega-mergers: Impact on employee morale and turnover intention. Journal of Business & Economics Research. Vol. 7 (2) 43-52.
Dencker, J., Joshi, A, & Martocchio, J. (2007) Employee benefits as context for intergenerational conflict Human Resource Management Review. Vol. 17 (2) 208-220.
Lund, D. (2003) Organizational culture and job satisfaction. Journal of Business and Industrial Marketing. Vol. 18 (3) 219-236.
North, M. & Fiske, S. (2015) Intergenerational resource tensions in the workplace and beyond: Individual, interpersonal, institutional and international. Research in Organizational Behavior. Vol. 35 (2015) 159-179.
Yamanoi, J. & Sayama, H. (2013). Post-merger cultural integration from a social network perspective: A computational modeling approach. Computational and Mathematical Organization Theory Vol. 19 (2013) 516-537.
Study Document
...Context Evidence-Based Programs and Practices
Part 1: Define and Refine
Evidence-Based Theories
Evidence-based programs are defined as a prevention or treatment practice, that is based on consistent scientific evidence providing proof that the practice improves client/patient outcomes. The practice should be supported by sufficient documentation and peer-reviewed research that shows its effectiveness (Operational Definition for Evidence-Based Practices Addictions and Mental Health Division, 2017).
Programs draw from theory in that the theoretical framework developed by researchers and professionals serve as a set of parameters or guidelines for how to interpret evidence and how to implement the recommendations based on the evidence into one’s practice. Theories serve as the lens through which to look at the evidence. Just as a microscope has a lens and a focus so that one can see all the details of the subject, the theory allows the data to be put into perspective, and that perspective is defined……
References
Asen, E. & Fonagy, P (2012) Handbook of Mentalizing in Mental Health Practice. Washington DC.
Kern-Godal, A., Arnevik, E. A., Walderhaug, E., &Ravndal, E. (2015). Substance use disorder treatment retention and completion: a prospective study of horse-assisted therapy (HAT) for young adults. Addiction science & clinical practice, 10(1), 21.
Rogers, C. (1951). Client-Centered Therapy. MA: Riverside Press. Evidence-Based Practice in Psychology. (2006). American Psychologist, May-June, 271-285.
Muela, A., Balluerka, N., Amiano, N., Caldentey, M. A., &Aliri, J. (2017). Animal-assisted psychotherapy for young people with behavioural problems in residential care. Clinical Psychology and Psychotherapy, 24(6), O1485 O1494. doi: http://fir.tesu.edu:2074/10.1002/cpp.2112
Operational Definition for Evidence-Based Practices Addictions and Mental Health Division. (2017). Week 4 material.
Study Document
...Context Hash Values in Digital Forensics
Introduction
Hash values denote condensed representations of digitized or binary content within digital material; however, they offer no additional information pertaining to the contents of any material interpretable by an individual. Moreover, the hash function is algorithms that convert variable-sized text quantities into hash values (which are fixed-sized outputs). Also called “cryptographic hash functions,” they facilitate the development of digital signatures, short textual condensations, and hash tables for the purpose of analysis (Fang et al., 2011; Kumar et al., 2012). In this paper, hash functions and their significance will be addressed.
Description
H (hash function) represents a transformation taking variable-sized input „m? and returning fixed-sized strings (h or hash value; i.e., h = H (m)) (Kumar et al., 2012). The hash functions possessing only the above property can be put to various broad computational uses; however, when applied to cryptography, they normally possess a few……
References
Fang, J., Jiang, Z. L., Yiu, S. M., & Hui, L. C. (2011). An efficient scheme for hard disk integrity check-in digital forensics by hashing with combinatorial group testing. International Journal of Digital Content Technology and its Applications.
Kaya, M., & Eris, M. (2017). Hash-based block matching for digital evidence image files from forensic software tools. World Academy of Science, Engineering, and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 11(10), 1068-1071.
Kumar, K., Sofat, S., Jain, S. K., & Aggarwal, N. (2012). SIGNIFICANCE of hash value generation in digital forensic: A case study. International Journal of Engineering Research and Development, 2(5), 64-70.
Netherlands Forensic Institute, (2018a). Technical Supplement Forensic Use of Hash Values and Associated Hash Algorithms. Ministry of Justice and security.
Rasjid, Z. E., Soewito, B., Witjaksono, G., & Abdurachman, E. (2017). A review of collisions in cryptographic hash function used in digital forensic tools. Procedia computer science, 116, 381-392.
Study Document
...Context Technology Proposal/Implementation Paper
A: Introduction
The Department of Veterans Affairs (VA) remains a vital entity in as far as the provision of key services to veterans in the country is concerned. The Veteran Benefits Administration (VBA), to a large extent, concerns itself with the administration of U.S. Department of Veteran Affairs’ programs. This is more so the case with regard to the provision or advancement of various forms of support to not only veterans and survivors, but also their dependents. Towards this end, some of the main programs that VBA administers include, but they are not limited to; pension and compensation, rehabilitation and employment, loan guaranty, and insurance. In the year 2016, the National Archives and Records Administration (2016) released a records management inspection report which was categorical that “the VA Records Management Program lacks several basic records management fundamentals.” The relevance of VA records cannot be overstated when it……
References
Aziz, A.A., Mohammad Y., Mokhtar, U.A. & Ambari, D.I. (2017). Establishing Policy for the Implementation of Electronic Document and Records Management System in Public Sector in Malaysia: The Influencing Factors. Advanced Science Letters, 23(11), 10732-10736.
National Archives and Records Administration (2016). Department of Veterans Affairs Records Management Program: Records Management Inspection Report. Retrieved from https://www.archives.gov/files/records-mgmt/pdf/va-2016-inspection.pdf
U.S. Department of Veteran Affairs (2020). About VBA. Retrieved from https://www.benefits.va.gov/BENEFITS/about.a sp
Study Document
… Qualitative research examples highlight the strengths and weaknesses in both of these major approaches and show how each can be judiciously used in context.
In a dissertation presented to Liberty University, Norton (2013) uses phenomenological approaches to study the self-efficacy beliefs of teachers who persist in their ……
References
Baker, C., Wuest, J., & Stern, P. N. (1992). Method slurring: the grounded theory/phenomenology example. Journal of Advanced Nursing, 17(11), 1355–1360.doi:10.1111/j.1365-2648.1992.tb01859.x
Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing among five approaches. eBook.
Norton, S.M. (2013). A phenomenological investigation into the self-efficacy beliefs of teachers who have presisted in the teaching profession. Liberty University Dissertation.
Starks, H., & Brown Trinidad, S. (2007). Choose Your Method: A Comparison of Phenomenology, Discourse Analysis, and Grounded Theory. Qualitative Health Research, 17(10), 1372–1380.doi:10.1177/1049732307307031
Suddaby, R. (2006). From the Editors: What Grounded Theory is Not. Academy of Management Journal, 49(4), 633–642.doi:10.5465/amj.2006.22083020
Wimpenny, P. & Gass, J. (2001). Interviewing in phenomenology and grounded theory: is there a difference? Journal of Advanced Nursing 31(6): 1485-1492.
Yalof, B. (2014). Marshaling resources. The Grounded Theory Review 13(1).
Study Document
...Context Policy Analysis
Abstract
This paper focuses on a bill currently going through Congress that would restrict the right of Americans to voice their support for the oppressed and marginalized Palestinian people by joining in the BDS Movement. This paper discusses why this issue is important to social welfare policy and shows that the bill would deny people the right to advocate by using social, political and economic means. The opposition towards the Israeli settlement practices in Palestine has already been condemned by the UN, but the U.S. Congress is now seeking not only to condemn the UN for its 2016 resolution against Israel, but it is also seeking to condemn any American person engaged in interstate commerce who chooses to support the UN resolution by boycotting Israeli products. This bill therefore would marginalize and socially, politically and economically exclude Americans in a dangerous way. This policy analysis paper also shows……
References
Beinin, J. (2004). The new American McCarthyism: policing thought about the Middle East. Race & Class, 46(1), 101-115.
Corrigan, E. C. (2009). Is Anti?Zionism Anti?Semitic? Jewish Critics Speak. Middle East Policy, 16(4), 146-159.
Fischel, J. R. (2005). The new anti-Semitism. The Virginia Quarterly Review, 81(3), 225.
Greenwald, G. (2019). The House Democrats’ “Rebuke” of Rep. Ilhan Omar Is a Fraud for Many Reasons, Including Its Wild Distortion of Her Comments. Retrieved from https://theintercept.com/2019/03/05/the-house-democrats-rebuke-of-rep-ilhan-omar-is-a-fraud-for-many-reasons-including-its-wild-distortion-of-her-comments/
Gutiérrez, A. M. L., & Campos, M. V. (2015). Subjective and Objective Aspects of Points of View. In Temporal Points of View (pp. 59-104). Springer, Cham.
H.R. 1697. (2018). Israel Anti-Boycott Act. Retrieved from https://www.congress.gov/bill/115th-congress/house-bill/1697
Moritz-Rabson, D. (2018). Teacher sues Texas after being fired for refusing to sign pro-Israel contract. Retrieved from https://www.newsweek.com/teacher-fired-refusing-sign-pro-israel-document-1262083
Stein, Y. (2003). Any name illegal and immoral. Ethics & International Affairs, 17(1), 127-137.
We have over 150,000+ study documents to help you.
Sign Up for FREE