Definition Essays (Examples)

Studyspark

Study Document Study Document

Mission Command

Pages: 6 (1941 words) Sources: 6 Document Type:Essay Document #:97292370

Introduction
There is no assigned definition for mission command. This is to say that there are various definitions that have been floated in the past in an attempt to express this particular warfighting function. As a matter of fact, there are … have been floated in the past in an attempt to express this particular warfighting function. As a matter of fact, there are different definitions assigned to mission command under Army doctrine and the Joint Doctrine. In addition to highlighting what I learnt about mission command, this discussion … decentralized execution based upon mission-type orders” (Join Chiefs of Staff, 2012). It should be noted that in seeking to promote clarity, the former definition will be utilized in this context.
In as far as the army doctrine terminology is concerned, mission command happens to a relatively new ……

References

References

Hill, A. & Niemi, H. (2017). The Trouble with Mission Command: Flexive Command and the Future of Command and Control. Retrieved from  https://ndupress.ndu.edu/Media/News/Article/1223929/the-trouble-with-mission-command-flexive-command-and-the-future-of-command-and/ 

Join Chiefs of Staff (2012). Mission Command White Paper. Retrieved from  https://www.jcs.mil/Portals/36/Documents/Publications/missioncommandwhitepaper2012.pdf 

Muth, J. (2011). Command Culture: Officer Education in the U.S. Army and the German Armed Forces, 1901-1940, and the Consequences for World War II. Denton, TX: University of North Texas Press.

Shamir, E. (2011). Transforming Command: The Pursuit of Mission Command in the U.S., British, and Israeli Armies. Stanford, CA: Stanford University Press.

U.S. Army (2012). ADP 6-0: Mission Command – Command and Control of Army Forces. Retrieved from  https://armypubs.army.mil/epubs/DR_pubs/DR_a/pdf/web/ARN19189_ADP_6-0_FINAL_WEB_v2.pdf 

Vandergriff, D.E. (2017). Adopting Mission Command: Developing Leaders for a Superior Command Culture. Washington, DC: Naval Institute Press.

Studyspark

Study Document Study Document

Criminal Profiling Of Serial Killers

Pages: 12 (3545 words) Sources: 10 Document Type:Essay Document #:59713406

… a reliable source, and is understood more as an investigatory tool than as a prosecutorial tool (Van Aken, 2015). The FBI’s NVAVC has definitions and typographies that can be used to assist law enforcement investigations in the identification of or search for serial killers in cases where … phrase “mass murderer” and the overlapping nature of the two categories, including time spans and number of victims, there has been no precise definition of serial killer.
The process of criminal profiling of serial killers begins with establishing what type of individual is most likely to engage … person at various times; i.e., there should be some amount of time that passes between killings (Van Aken, 2015). Aside from this broad definition, there are typographies of serial killers that have developed over time. These typographies include: the control type, the predator type, the hedonistic type, ……

References

References

Alldredge, J. (2015). The" CSI Effect" and Its Potential Impact on Juror Decisions. Themis: Research Journal of Justice Studies and Forensic Science, 3(1), 6.

Bonn, S. (2019). How the FBI Profiles Serial Offenders. Retrieved from https://www.psychologytoday.com/us/blog/wicked-deeds/201905/how-the-fbi-profiles-serial-offenders

Dogra, T.D. et al. (2012). A psychological profile of a serial killer: A case report. Omega: Journal of Death & Dying 65(4), 299-316.

FBI. (2019). Summary of the Uniform Crime Reporting Program. Retrieved from  https://www2.fbi.gov/ucr/killed/2009/aboutucr.html 

Karson, M. (2017). Why Profiling Serial Killers Can’t Work. Retrieved from https://www.psychologytoday.com/us/blog/feeling-our-way/201711/why-profiling-serial-killers-can-t-work

Miller, L. (2014). Serial killers: I. Subtypes, patterns and motives. Aggression and Violent Behavior 19, 1-11.

Samuel, D. B., & Widiger, T. A. (2007). Describing Ted Bundy's personality and working towards DSM-V. Practice, 27, 20-22.

Sarteschi, C. M. (2016). Serial Murder. In Mass and Serial Murder in America (pp. 45-67). Springer, Cham.

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384

… 5
1.5 Purpose of the Study 5
1.6 Methodology 5
1.7 Good Title for Study 5
2 Literature Review 6
2.1 Cloud Computing Definition 6
2.2 Types of Cloud Computing Services 6
2.2.1 Infrastructure as a Service (IaaS) 6
2.2.2 Platform as a Service (PaaS) 7
2.2.3 … for Study
A suitable title for the study would be The cost-effectiveness of cloud computing within an accounting organization.
Literature Review
Cloud Computing Definition
Cloud computing is delineated as a computing capability that facilitates a construct between the computing resource and its fundamental technical construction and design, … collective group of configurable computing resources that can be quickly provided and divulged with negligible management struggle or service provider contact. This basic definition of cloud computing accentuates the five fundamental features, which include on-demand self-service, wide-ranging network accessibility, resource sharing, rapid elasticity, and services that are ……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

Purchasing And Supply Management

Pages: 9 (2780 words) Sources: 8 Document Type:Essay Document #:73672529

...Definition Purchasing and Supply Management
Introduction
Why is purchasing and supply management so important to a firm’s success? Burt (2010) perhaps puts it best: “Historically, supply management has been considered important because of its impact on costs” (p. 9). In other words, a firm seeking to be competitive and profitable must have a good purchasing and supply management process in place—otherwise it risks watching its bottom line whittle away due to costs that it did not try its hardest to reduce. This paper will discuss the importance and value of purchasing and supply management by 1) looking at how the function relates to selecting a qualified supplier, 2) selecting the best strategies for negotiating prices, 3) creating a project supply, service and material budget for detailed requirements, 4) discussing the benefits and costs of outsourcing, and 5) evaluating various organizations that are benchmarks in purchasing and supply management and identifying their……

References

References

BDC. (2019). 6 ways the purchasing department can improve your business. Retrieved from  https://www.bdc.ca/en/articles-tools/operations/purchasing/pages/purchasing-department-objectives.aspx 

Benton, W. C. (2013). Supply chain focused manufacturing planning and control. Nelson Education.

Burt, D. N. (2010). Supply Management, 8th Edition. Devry.

Harland, C., Brenchley, R., & Walker, H. (2003). Risk in supply networks. Journal of Purchasing and Supply management, 9(2), 51-62. Retrieved from  http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.471.2910&rep=rep1&type=pdf 

Holmlund, M. & Strandvik, T. (1999) Perception configuration in business relationship, Management Decision, 37(9), 686-696

MacNeil/Lehrer Productions (Producer). (1999). Your computer, your way: Dell and thedirect sales model [Video file]. Retrieved from https://libraryresources.columbiasouthern.edu/login

Monczka, R. & Handfield, R. (2016). Purchasing and supply chain management. Boston, MA: Cengage.

NC State University. (2003). Negotiating for success. Retrieved from  https://scm.ncsu.edu/scm-articles/article/negotiating-for-success

Studyspark

Study Document Study Document

Carl Rogers The Ideal Self And Animal Therapy

Pages: 6 (1743 words) Sources: 6 Document Type:Evidence Based Practice Document #:76426063

… proof that the practice improves client/patient outcomes. The practice should be supported by sufficient documentation and peer-reviewed research that shows its effectiveness (Operational Definition for Evidence-Based Practices Addictions and Mental Health Division, 2017).
Programs draw from theory in that the theoretical framework developed by researchers and professionals ……

References

References

Asen, E. & Fonagy, P (2012) Handbook of Mentalizing in Mental Health Practice. Washington DC.

Kern-Godal, A., Arnevik, E. A., Walderhaug, E., &Ravndal, E. (2015). Substance use disorder treatment retention and completion: a prospective study of horse-assisted therapy (HAT) for young adults. Addiction science & clinical practice, 10(1), 21.

Rogers, C. (1951). Client-Centered Therapy. MA: Riverside Press. Evidence-Based Practice in Psychology. (2006). American Psychologist, May-June, 271-285.

Muela, A., Balluerka, N., Amiano, N., Caldentey, M. A., &Aliri, J. (2017). Animal-assisted psychotherapy for young people with behavioural problems in residential care. Clinical Psychology and Psychotherapy, 24(6), O1485 O1494. doi: http://fir.tesu.edu:2074/10.1002/cpp.2112 

Operational Definition for Evidence-Based Practices Addictions and Mental Health Division. (2017). Week 4 material.

Studyspark

Study Document Study Document

Intelligence Oversight Ethics

Pages: 11 (3311 words) Sources: 15 Document Type:Research Paper Document #:23829007

...Definition

This literature review first looks at the history if intelligence oversight (IO) and then explains the current problem it faces in terms of ethics and the arrival of the Digital Age, which has complicated the matter. It next synthesizes the literature on what the various ethical theories are and how this further complicates the issue of IO. Finally, it discusses research on the fundamentals of ethics and gives recommendations for future research.
History of IO
The history of IO begins with the purpose for which it was established, which was to safeguard the privacy and rights of U.S. persons while enabling the Department of Defense to carry out its intelligence functions most effectively (Ford 2006, 721). The question that has always been at the forefront of IO, however, is the question of ethics. As Goldman (2013) notes, as far back as 1929 this question of ethics and its role in……

References

References

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Brown, William F., and Americo R. Cinquegrana. \\\\\\\\\\\\"Warrantless Physical Searches for Foreign Intelligence Purposes: Executive Order 12,333 and the Fourth Amendment.\\\\\\\\\\\\" Cath. UL Rev. 35 (1985): 97.

Cantarella, Michele. \\\\\\\\\\\\"Intelligence ethics in the digital age.\\\\\\\\\\\\" (2016).

Congressional Research Service, “CIA Ethics Education: Background and Perspectives” (2018).

Ferrari, Rachel. \\\\\\\\\\\\"Moral Relativism and Dangerous Ethical Dilemmas in the US Intelligence Community.\\\\\\\\\\\\" (2018).

Ford, Christopher M. \\\\\\\\\\\\"Intelligence Demands in a Democratic State: Congressional Intelligence Oversight.\\\\\\\\\\\\" Tul. L. Rev. 81 (2006): 721.

Goldman, Jan. \\\\\\\\\\\\"Teaching About Intelligjence and Ethics.\\\\\\\\\\\\" Journal of US Intelligence Studies 20, no. 2 (2013): 79.

Hayes, Jonathan. \\\\\\\\\\\\"The Cinema of Oliver Stone: Art, Authorship and Activism by Ian

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

...Definition Executive Summary
The purpose of this study is to develop timely and informed answers to a series of guiding research questions and subquestions to identify the risks and barriers that are associated with Internet of Things implementations. These types of studies are important today because the Internet of Things is changing the manner in which companies of all sizes and types operate their businesses, and current trends indicate that these implementations are increasing exponentially. The Internet of Things allows conventional computer-based networks to incorporate data collected from everyday objects to provide real-time analyses and new applications for these technologies are being developed every day. Indeed, there are already more mobile devices in use around the world than there are people, and most authorities agree that the Internet of Things deployments will continue to increase well into the foreseeable future. Chapter one of the study provides the rationale in support of……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Elder Abuse

Pages: 7 (2239 words) Sources: 4 Document Type:Term Paper Document #:22335640

… estimates as many as one in every ten American elders experience some kind of abuse. Unfortunately, “there is no uniform term or agreed-upon definition used among state governments, researchers, health care and service providers, and advocates,” (Roberto, 2016, p. 302). Cultural and religious diversity further impedes the … and service providers, and advocates,” (Roberto, 2016, p. 302). Cultural and religious diversity further impedes the evolution of a comprehensive and universally applicable definition of elder abuse, in spite of the fact that some forms of abuse and certain instances can be considered unequivocal (Saghafi, Bahramnezhad, Poormollamirza, ……

References

References

Falk, N. L., Baigis, J., Kopac, C., (August 14, 2012) \\\\\\\\\\\\"Elder Mistreatment and the Elder Justice Act\\\\\\\\\\\\" OJIN: The Online Journal of Issues in Nursing 17(3).

Forum on Global Violence Prevention; Board on Global Health; Institute of Medicine; National Research Council (2014). Ethical considerations. Washington (DC): National Academies Press (US); 2014 Mar 18.

Lacher, S., Wettstein, A., Senn, O., et al. (2016). Types of abuse and risk factors associated with elder abuse. Swiss Medical Weekly 2016(146): 1-10.

Lachs, M.S., Teresi, J.A., Ramirez, M., et al. (2016). The prevalence of ersident-to-resident elder mistreatment in nursing homes. Annals of Internal Medicine 165(4):229-236.

Malmedal, W., Iversen, M.H. & Kilvik, A. (2014). Sexual abuse of older nursing home residents: A literature review. Nursing Research and Practice 2015(Article 902515):  http://dx.doi.org/10.1155/2015/902515 

Roberto, K.A. (2016). The complexities of elder abuse. American Psychologist 71(4): 302-311.

Saghafi, A., Bahramnezhad, F., Poormollamirza, A., et al. (2019). Examining the ethical challenges in managing elder abuse: a systematic review. Journal of Medical Ethics and History of Medicine 2019(12):  https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6642445/ 

Wangmo, T., Nordstrom, K. & Kressig, R.W. (2017). Preventing elder abuse and neglect in geriatric institutions: Solutions from nursing care providers. Geriatric Nursing 38(5): 385-392.

Studyspark

Study Document Study Document

Walmart And Starbucks Sustainability

Pages: 10 (2956 words) Sources: 15 Document Type:Essay Document #:82035570

… perception and market value. Given that CSR is difficult to quantify and looks different in different companies owing to their being no set definition, the structure of this study looks suspiciously like trolling for a specific finding. When you look at poorly run companies and your conclusions ……

References

References

Aguilera, R, Rupp, D., Williams, C. & Ganapathi, J. (2005) Putting the S back in corporate social responsibility: A multi-level theory of social change in organizations. Academy of Management Review. (2005). Retrieved November 4, 2017 from  https://www.ideals.illinois.edu/bitstream/handle/2142/1768/TS_Aguilera.pdf?sequence=2&isAllowed=y 

Banerjee, S. (2008) Corporate social responsibility: the good, bad and the ugly. Critical Sociology. Vol. 34 (1)

Blowfield, M., Frynas, J. (2005) Editorial setting new agendas: Critical perspectives on corporate social responsibility in the developing world. International Affairs. Vol. 81 (3) 499-513.

Brammer, S., Jackson, G. & Matten, D. (2012). Corporate social responsibility and institutional theory: New perspectives on private governance. Socio-Economic Review. Vol. 10 (2012) 3-28.

Campbell, J. (2007) Why would corporations behave in socially responsible ways? An institutional theory of corporate social responsibility The Academy of Management Review. Vol. 32 (3) 946-967.

Epstein, E. (1987) The corporate social policy process: Beyond business ethics, corporate social responsibility, and corporate social responsiveness. California Management Review. Vol. 29 (3) 99.

Friedman, M. (1970) The social responsibility of business is to increase its profits. New York Times Magazine. Retrieved November 4, 2017 from https://www.colorado.edu/studentgroups/libertarians/issues/friedman-soc-resp-business.html

Heningway, C. & Maclagan, P. (2004) Managers' personal values as drivers of corporate social responsibility. Journal of Business Ethics. Vol. 50 (1) 33-44.

Studyspark

Study Document Study Document

Developing A Research Hypothesis

Pages: 8 (2368 words) Sources: 10 Document Type:Essay Document #:36304259

… reviews of the system go a long way in improving clinical decisions. Usually, the PICO guideline is applied in developing a comprehensive, focused definition of clinical concern. In such a system, clinical problems are broken into four parts, i.e., the P: patient/problem; I; intervention; C: comparison; O: ……

References

References

Considine, J., Shaban, R. Z., Fry, M., & Curtis, K. (2017). Evidence-based emergency nursing: designing a research question and searching the literature. International emergency nursing, 32, 78-82.

Eriksen, M. B., & Frandsen, T. F. (2018). The impact of patient, intervention, comparison, outcome (PICO) as a search strategy tool on literature search quality: a systematic review. Journal of the Medical Library Association: JMLA, 106(4), 420.

Yuan, X., Xiaoli, L., Shilei, L., Qinwen, S., & Ke, L. (2019, May). Extracting PICO elements from RCT abstracts using 1-2gram analysis and multitask classification. In Proceedings of the third International Conference on Medical and Health Informatics 2019 (pp. 194-199).

Scells, H., Zuccon, G., Koopman, B., Deacon, A., Azzopardi, L., &Geva, S. (2017, November). Integrating the framing of clinical questions via PICO into the retrieval of medical literature for systematic reviews. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management (pp. 2291-2294).

Basmaci, R., Vazouras, K., Bielicki, J., Folgori, L., Hsia, Y., Zaoutis, T., &Sharland, M. (2017). Urinary tract infection antibiotic trial study design: a systematic review. Pediatrics, 140(6).

Misra, D. P., & Agarwal, V. (2018). Systematic reviews: challenges for their justification, related comprehensive searches, and implications. Journal of Korean medical science, 33(12).

Belcher, B. M., Rasmussen, K. E., Kemshaw, M. R., &Zornes, D. A. (2016). Defining and assessing research quality in a transdisciplinary context. Research Evaluation, 25(1), 1-17.

Fu, D. Y., & Hughey, J. J. (2019). Meta-Research: Releasing a preprint is associated with more attention and citations for the peer-reviewed article. Elife, 8, e52646.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".