Context Essays (Examples)

Studyspark

Study Document Study Document

Deregulation Under The Trump Administration And Its Impact On The

Pages: 7 (2006 words) Sources: 5 Document Type:Essay Document #:81227752

...Context Deregulation under the Trump Administration and Its Impact on the Non-Profit Sector
Introduction
President Trump touted deregulation as one of the issues he would push for during his campaign leading up to the 2016 election. Once placed in the White House, he held true to his push for deregulation and that policy has had some impact on the non-profit sector in the US. This paper will show how that impact has benefited the nonprofit sector in some ways and how in other ways it remains to be seen whether negative fallout will occur or not. Specifically this paper will explain how deregulation under the Trump Administration is impacting the non-profit sector in various beneficial ways, such as
by allowing nonprofits to keep anonymous the names of donors; and by capping the amount federal agencies can force nonprofits to spend—the idea being that this will prohibit agencies from shifting costs for……

References

References

Belton, K. & Graham, J. (2019). Trump’s Deregulatory Record: An Assessment at the Two-Year Mark. Retrieved from  http://accf.org/wp-content/uploads/2019/03/ACCF-Report_Trump-Deregulatory-Record-FINAL.pdf 

Benson, M. L., Stadler, W. A., & Pontell, H. N. (2019). Harming America: Corporate Crime in a Context of Deregulation. Victims & Offenders, 14(8), 1063-1083.

Brookings Institute. (2020). Tracking deregulation in the Trump era. Retrieved from  https://www.brookings.edu/interactives/tracking-deregulation-in-the-trump-era/ 

Morrow, D. (2017). Deregulation in the Trump Administration will likely impact nonprofits. Retrieved from  http://blog.abila.com/deregulation-trump-administration-impacting-nonprofits/ 

Weaver, H. L. (2018). One for the price of two: the hidden costs of regulatory reform under executive order 13,771. Administrative Law Review, 70(2), 491-512.

Studyspark

Study Document Study Document

Cultural Examination Of Portugal

Pages: 8 (2519 words) Sources: 2 Document Type:Essay Document #:50058596

...Context Comparative cultures: Portugal
Section I: Concrete Experience
I have been attracted to Portugal for most of my life, because I have some Portuguese ancestry. I was curious, for example, about how much of the culture of family has been influenced by this background, and what elements. But as I got older I also started just to take an interest in the country in general. I would cheer for Portugal at the World Cup and things like that, for example, when I don’t know if I had any reason to. I started to become quite curious about this place that was on one hand a fairly normal Western country that seemed like it would be familiar in many respects to my own life, but on the other hand also seemed to be quite a bit different – slower pace of life, high family orientation, less work-obsessed than one might normally find……

References

References

Hofstede Insights (2020) Country comparison: Portugal. Hofstede Insights. Retrieved May 24, 2020 from  https://www.hofstede-insights.com/country-comparison/portugal/ 

Mudge, E. (2019) Portuguese culture: food, fado and festivals. Portugal.com. Retrieved May 24, 2020 from  https://portugal.com/portugal-blogs/portuguese-culture 

Studyspark

Study Document Study Document

Influence Of Political Interests Groups On The Educational Policy

Pages: 6 (1844 words) Sources: 8 Document Type:Essay Document #:31534900

… text concerns itself with the influence of political interest groups on the educational policy-making process, with regard to budget and resource allocation. The context of this particular discussion will be Florida and Texas.
Discussion
Interest groups do not have an assigned definition. This is to say that ……

References

References

Abbott, I., Rathbone, M. & Whitehead, P. (2012). Education Policy. New York, NY: SAGE.

Anderson, J.E. (2003).Public Policy-Making. Mason, OH: Cengage Learning.

Delaney, J. A., & Doyle, W. R. (2007). The role of higher education in state budgets. Journal of Education Finance, 36(4), 343-268.

Grapevine. (2016). Appropriations: State Tax Funds for Operating Expenses of Higher Education, 1983-1984. Retrieved from:  https://education.illinoisstate.edu/grapevine/tables/ 

Larrabee, B. (2016). Education groups put big money into political causes. Retrieved from https://www.gainesville.com/news/20160828/education-groups-put-big-money-into-political-causes

Tandberg, D. A. (2009). Interest groups and governmental institutions: The politics of state funding of public higher education. Educational Policy, 24(5), 104-117.

Vote Smart (2020). Texas Education Special Interest Groups. Retrieved from  https://votesmart.org/interest-groups/TX/27#.XrVCzsBRW00 

Vote Smart (2020). Florida Education Special Interest Groups. Retrieved from  https://votesmart.org/interest-groups/FL/27#.XrVKScBRW01

Studyspark

Study Document Study Document

Cyberbullying

Pages: 7 (2781 words) Sources: 6 Document Type:Essay Document #:823825




How Cyberbullying Extends the Reach of Schoolyard Bullies


Can Adults Be Cyberbullied? 





When Does Online Behavior Cross the Line: Understanding Cyberbullying in the Context of Internet Social Rules





Cyberbullying Essay Hooks


Cyberbullying combines all of the worst aspects of bullying and stalking, because the victim can never … some types of cyberbullying may occur in a private setting, such as direct messages or emails, much cyberbullying occurs in a more public context.  Group texts, chatting applications, message boards, and social media are all popular public or semi-public venues where cyberbullying is common.  However, it can ……

References

Bazarova, Natalie.  (14 May 2018).  Key Questions in the Fight Against Cyberbullying.  Psychology Today.   https://www.psychologytoday.com/us/blog/social-media-stories/201805/key-questions-in-the-fight-against-cyberbullying .  Accessed 16 July 2020.  

Ben-Joseph, Elena Pearl.  (April 2018).  Cyberbullying.  TeensHealth.   https://kidshealth.org/en/teens/cyberbullying.html .  Accessed 16 July 2020.

Scheff, Sue.  (29 November 2019).  Adult Cyberbullying Is More Common Than You Think. Psychology Today.   https://www.psychologytoday.com/us/blog/shame-nation/201911/adult-cyberbullying-is-more-common-you-think .  Accessed 16 July 2020.  

John, Ann et al.,  (2018).  Self-Harm, Suicidal Behaviors, and Cyberbullying in Children and Young People: Systematic Review.  Journal of Medical Internet Research, 20(4): e129 DOI: 10.2196/jmir.9044.

Oakes, Kelly.  (15 September 2019).  Why Children Become Bullies at School.  BBC.com.   https://www.bbc.com/future/article/20190913-why-some-children-become-merciless-bullies .  Accessed 16 July 2020.  

Studyspark

Study Document Study Document

Ethical Issues In Criminal Justice

Pages: 4 (1197 words) Sources: 4 Document Type:Essay Document #:16567736

… one would be able to justify with reason the action if necessary before the public.
2 Ethics within Philosophy in a Criminal Justice Context
The three main ethical philosophies are Virtue Ethics, Deontology (Duty Ethics) and Utilitarianism. A fourth ethical philosophy is often used to justify questionable ……

References

References

Cahn, S. & Markie, P. (2011). Ethics: History, Theory and Contemporary Issues, 5th Edition. UK: Oxford University Press.

Hehman, E., Flake, J. K., & Calanchini, J. (2018). Disproportionate use of lethal force in policing is associated with regional racial biases of residents. Social psychological and personality science, 9(4), 393-401.

Holmes, A. (2007). Ethics: Approaching moral decisions. Downers Grove, IL: InterVarsity Press.

Roufa, T. (2019). Ethics in law enforcement. Retrieved from  https://www.thebalancecareers.com/ethics-in-law-enforcement-and-policing-974542 

Studyspark

Study Document Study Document

How Does Philosophy Relate To Biblical Studies

Pages: 9 (2773 words) Sources: 13 Document Type:Research Paper Document #:60991740

… texts unite to come up with the different primary text categories. It means the study focuses on the different literary and historical story context, with the aim of relating its meaning to the story itself. As an example, biblical theology seeks to find out how covenant and ……

References

References

Addinall, P. (1991). Philosophy and biblical interpretation: A study in nineteenth-century conflict. Cambridge: Cambridge University Press.

Amanze, N. (2012). Biblical Studies, Theology, Religion and Philosophy: An Introduction for African Universities.

Carson, D. A. (2012). Christ and culture revisited. Grand Rapids, MI ; Cambridge: Eerdmans.

DeWeese, G. J. (2011). Doing Philosophy as a Christian. Westmont: InterVarsity Press.

Hamilton, J. M. (2010). God\\'s glory in salvation through judgment: A biblical theology. Wheaton, Ill: Crossway.

Hamilton, J. M. (2014). What is biblical theology?: A guide to the Bible\\'s story, symbolism, and patterns.

In Bartholomew, C. G. (2011). \\"Behind\\" the text: History and Biblical Interpretation.

Johnson, D. (2014). Biblical knowing: A scriptural epistemology of error. Havertown: James Clarke & Co.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

… is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Code Of Ethics For Managers In Acquisition

Pages: 11 (3162 words) Sources: 5 Document Type:Research Paper Document #:25977313

… and thereby improve the variety of political, social and economic outcomes that go along with acquisitions.
Edelstein and Clegg (2016) provide some important context for the role of a code of ethics in organizations, and these lessons apply well to managers of contracts in acquisition. They note … focus on issues like cross-cultural ethics, as this can be a particularly tricky area, and control Discussion of control helps contract managers to contextualize the code – they understand what happens if they violate it, and what that process looks like and the punishments. That context helps to make the code real, especially when combined with senior leadership buy-in.
While some might take a cynical view that a code ……

References

References

Adelstein, J. & Clegg, S. (2016) Code of ethics: A stratified vehicle for compliance. Journal of Business Ethics. Vol. 138 (1) 53-66.

Lazeros, M. (2008) Leaders can learn from Druyun’s ethical lapses and their consequences. USAWC Research Project. Retrieved October 25, 2019 from  https://apps.dtic.mil/dtic/tr/fulltext/u2/a479019.pdf 

McConnnell, A. & Rood, T. (1997) Ethics in government: A survey of misuse of position for personal gain and its implications for developing acquisition strategy. Journal of Business Ethics. Vol. 16 (1997) 1107-1116.

McConnell, T. (2018). Moral dilemmas. Stanford Encyclopedia of Philosophy Retrieved October 25, 2019 from  https://plato.stanford.edu/entries/moral-dilemmas/ 

Neu, D., Everett, J. & Rahaman, A. (2015) Preventing corruption within government procurement: Constructing the disciplined and ethical subject. Critical Perspectives on Accounting. Vol. 28 (2015) 49-61.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

...Context Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber warfare, helps to establish appropriate countermeasures against cyberattacks and potential threats in cyberspace, and enhances intelligence gathering. While the study provides significant insights on this topic, future studies should examine the……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… (3) experience, and (4) voluntariness that can facilitate the analysis of behavioral intention levels to actually use a new technology, generally in organizational contexts (Venkatesh et al., 2016). An analysis of the accuracy of the four key factors of the UTAUT model in predicting new technology acceptance … business risks related?
RQ2a. Under what conditions would SMEs adopt IoT implementation?
RQ3. Why is the IoT applicable and beneficial in an SME context?
RQ3a.
What evidence is available to indicate that IoT will benefit SMEs?
Overview of the Internet of Things
The game-changing nature of the … traditionally not been viewed as being amenable can be incorporation into computer-based networks in meaningful ways. As Kaushik (2019) points out, “In the context of internet of things (IoT), the things may be anything like cell phones, iPods, mobile devices, resources, services, education, people, animal, any physical ……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".