Department Of Energy Essays (Examples)

Study Document

Acquisition Process In Action At The Department Of Energy

Pages: 10 (2943 words) Sources: 8 Document Type:Research Paper Document #:56403146

… of approaches to the acquisition process. One organization that has recognized the importance of using a formal, standardized acquisition process in the U.S. department of energy oversees dozens of major projects each year. The purpose of this paper is to provide a detailed review of a major program … to provide a detailed review of a major program that has been managed, via the acquisition process, over the past decade, by the department of energy the Y-12 National Security Complex. A description of the demolition project is followed by a discussion concerning the acquisition process that was … obtaining needed funding to achieve a project’s goals. These steps were closely followed in the demolition and disposal operations conducted by the U.S. department of Defense (DOE) in its Alpha 5 project. The stated mission of the DOE is “to ensure America’s security and prosperity by addressing … Defense……

References

References

About DOE. (2020). U.S. Department of Energy. Retrieved from  https://www.energy.gov/about-us ,

About Y-12. (2020). U.S. Department of Energy. Retrieved from  https://www.y12.doe.gov/  about.

Birchfield, J. W. & Albrecht, L. (2012). Successful characterization strategies for the active high risk Y-12 National Security Complex 9201-5 (Alpha-5) Facility, Oak Ridge, TN - 12164. United States.

Recovery cleanup project at Y-12. (2010). U.S. Department of Energy. Retrieved from  https://www.energy.gov/orem/articles/recovery-cleanup-project-y-12-leaves-alpha-5-empty-feeling .

Standard review plan: Acquisition strategy review module. (2010, March). Washington, DC: Office of Environmental Management.

Supplement analysis for the site-wide environmental impact statement for the Y-12 National Security Complex (DOE/EIS-0387-SA-02). (2018, May). U.S. Department of Energy. Retrieved from  https://www.energy.gov/sites/prod/files/2018/05/f51/EIS-0387-SA02-2018_0.pdf .

Teamwork successfully brings down the Alpha 5 Annex. (2018). U.S. Department of Energy. Retrieved from

Study Document

Energy Industry Security

Pages: 2 (574 words) Sources: 5 Document Type:Essay Document #:28032329

Climate change and extreme weather events pose certain risks to the energy industry and infrastructure (Maras, 2014). Vulnerabilities within the largely private energy industry pertain to regional issues: for example, in the Southeast, the energy industry sits mainly in low-lying areas where flooding can occur in the wake of hurricanes or storms. Flooding here can impair oil and … the California region have led to the electric companies implementing deliberate blackouts to reduce the risk of fires caused by damaged electric wires (department of energy, 2019). In other parts of the country, seasonal droughts and lack of snowfall can lead to declines in hydroelectric output which negatively impacts … cooling purposes (DOE, 2013).
Several measures can be taken to reduce these vulnerabilities, according to Pershing (2013). These steps include:
· Enhancing climate-resilient energy…[break]…to protect their energy industries and infrastructures. In the U.S., because the energy industry is mainly in the……

References

References

Department of Energy. (2019). U.S. Energy Sector Vulnerabilities and Resilience Solutions Reports. https://www.energy.gov/policy/downloads/climate-change-and-us-energy-sector-regional-vulnerabilities-and-resilience

DHS. (2016). Energy Sector-Specific Plan. https://www.dhs.gov/sites/default/files/publications/nipp-ssp-energy-2015-508.pdf

DOE. (2013). Electric Light & Power. Retrieved from: http://www.elp.com/articles/2013/07/energy-sector-vulnerabilities-assessed-by-doe.html

Maras, M-H. (2014). Transnational Security. Florida: CRC Press.

Pershing, J. (2013). U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather. Retrieved from  http://annualmeeting.naseo.org/Data/Sites/2/presentations/Pershing-Climate-Vulnerabiities.pdf 

Study Document

Strategic Marketing Plan For Lemon Thirst Energy Drink

Pages: 11 (3288 words) Sources: 10 Document Type:Research Paper Document #:54106401

… has resulted in the steady growth of healthier non-carbonated drinks (Al-Shaar et al., 2017). Among the many alternative drinks recording, steady growth in energy drinks.
The energy drink market has seen steady growth since its launch in the United States in the year 1997. According to Kunst (2019), since energy drinks were launched in the United States in 1997, the market or segment has grown steadily at an annual rate of about 20 … at over 53 billion U.S. dollars in sales every year and has recently overtaken the soft drinks market (Kunst, 2019). More and more energy drinks are being sold every year for increased energy. The popularity of energy drinks is also increasing because of their association with different sports disciplines and with the alcoholic beverages industry.
The Lemon Thirst Beverage Company … with different sports disciplines and with the alcoholic beverages industry.
The Lemon Thirst Beverage……

References

References

Ahmed, R. R., Vveinhardt, J., Streimikiene, D., & Awais, M. (2016). Mediating and Marketing factors influence the prescription behavior of Physicians: An Empirical Investigation. Amfiteatru Economic Journal, 18(41), 153-167.

Al-Shaar, L., Vercammen, K., Lu, C., Richardson, S., Tamez, M., & Mattei, J. (2017). Health effects and public health concerns of energy drink consumption in the United States: a mini-review. Frontiers in public health, 5, 225.

Barney, J. B., & Hesterly, W. S. (2010). Strategic management and competitive advantage: Concepts and cases (pp. 4-25). Upper Saddle River, NJ: Prentice-Hall.

Freeman, B., Kelly, B., Vandevijvere, S., & Baur, L. (2016). Young adults: beloved by food and drink marketers and forgotten by public health?. Health promotion international, 31(4), 954-961.

Hitt, M. A., Ireland, R. D., & Hoskisson, R. E. (2012). Strategic management cases: competitiveness and globalization. Cengage Learning.

Kotler, P., & Armstrong, G. (2010). Principles of marketing. Pearson education.

Kunst, A. (2019). Energy drinks consumption: consumers of energy drinks in the United States in 2018. Statista.

Mahajan, S. (2020). Sports And Energy Drinks Market Size & Share Analysis Report, 2019-2026.

Study Document

Weapons Of Mass Destruction WMD Antifa

Pages: 13 (3787 words) Sources: 12 Document Type:Research Paper Document #:67320498

… to go without some sort of major retaliation. That retaliation could come in the form of a transnational cyber attack on the nation’s energy infrastructure. After all, Iran has many non-state actors that it patronizes and can outsource an attack to. Much of the Arab community in … decades of war.
One question that one might ask is this: would the threat of cyber terrorism and cyber war upon the nation’s energy infrastructure be as great or exist at all if the U.S. were not so insistent upon attacking the energy infrastructures of other nations, from Venezuela to Syria to Iraq and so on? It seems that perhaps the real cause of transnational threats … other nations, from Venezuela to Syria to Iraq and so on? It seems that perhaps the real cause of transnational threats to America’s energy infrastructure might start right at home, with America’s own foreign……

References

References

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Christenson, G. (2015). CBRN response. National Guard Bureau.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from  https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat 

Jennings, P. (2006). Miami port poses serious risks. Retrieved from  https://abcnews.go.com/WNT/story?id=131634&page=1 

Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from  http://www.johnstonsarchive.net/terrorism/chembioattacks.html 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Maras, M-H. (2014). Transnational Security. Florida: CRC Press.

Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

...Department energy What is Cybercrime?
Definition of Cybercrime
Cybercrime is any criminal activity that is conducted using computers or the Internet. As today’s digital natives have the most experience with computers, cybercriminals tend to be of the Millennial generation—i.e., born after 1980. They are young, digitally sophisticated, and able to operate with a degree of professionalism and discipline that allows them to hide their crimes beneath legitimate-looking facades. Spearphishing is one example of a type of cybercrime used by professional criminals to lure victims into traps or sites that have the appearance of legitimacy.
Cybercrime is committed by people who know computer code, understand computer systems and networks, know how to navigate databases, access data storage, get past firewalls, exploit cloud computing services, control the Internet of Things and more. They
How Cybercrime Has Evolved over Time
Computers and the rise of the Internet ushered in the era of cybercrime. IBM’s first……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Study Document

CFOs Big Data Opportunities In Firms

Pages: 7 (2057 words) Sources: 6 Document Type:Research Paper Document #:26742092

… data collection, data processing, and data analysis. CFOs are increasingly spending their time on data analytics and analysis and the functions of their department are constantly expanding and shifting. The average finance professional has to expand their skills to include data analysis and analytics to meet the … The average finance professional has to expand their skills to include data analysis and analytics to meet the demands of the new financial department. Therefore, CFOs are prioritizing the retraining of finance professionals working under them (Zhou, Fu & Yang, 2016).
It is vital that organizations put … can be expanded with time to include greater data varieties and even bigger volumes (Turner, Schroeck & Shockley, 2013).
CFOs and other finance department professionals should train their focus towards getting the specialized skills needed within their industries and organizations. This should include the skills necessary to … data and present the data……

References

References

Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and analytics: From big data to big impact. MIS quarterly, 36(4).

Jin, X., Wah, B. W., Cheng, X., & Wang, Y. (2015). Significance and challenges of big data research. Big Data Research, 2(2), 59-64.

Joshi, N. (2018). How Big Data Can Transform the Finance Industry. Retrieved October 7, 2019, from  https://www.bbntimes.com/en/technology/big-data-is-transforming-the-finance-industry .

Nath, T. I. (2019). How Big Data Has Changed Finance. Retrieved October 7, 2019, from  https://www.investopedia.com/articles/active-trading/040915/how-big-data-has-changed-finance.asp .

Turner, D., Schroeck, M., & Shockley, R. (2013). Analytics: The real-world use of big data in financial services. IBM Global Business Services, 27.

Yin, S., & Kaynak, O. (2015). Big data for modern industry: challenges and trends [point of view]. Proceedings of the IEEE, 103(2), 143-146.

Zhou, K., Fu, C., & Yang, S. (2016). Big data driven smart energy management: From big data to big insights. Renewable and Sustainable Energy Reviews, 56, 215-225.

Study Document

Homeland Defense And Private Security After September 11 Attacks

Pages: 6 (1861 words) Sources: 5 Document Type:Essay Document #:15174853

...Department energy Introduction
The most significant terrorist attack on American soil was the September 11 attacks by Al Qaeda terrorists. The attacks changed the perception that America cannot suffer such attacks, considering how far away it is from where terrorist organizations such as Al Qaeda are based. The attacks also initiated America’s war against terrorism, which continues to date. Before the September 11 attacks, Americans had never experienced a large scale terrorist incident within their country’s borders. Moreover, most local and state security agencies had no experience with such attacks and were, therefore, very ill-prepared to respond to them. The only historic attacks or incidents that compare to the September 11 attacks were the airplane hijackings of the seventies and the eighties. The fact that Americans were not prepared and for the attacks and never expected such attacks to happen on their soil resulted in many people being very surprised and mentally……

References

References

Chanley, V. (2002). Trust in Government in the Aftermath of 9/11: Determinants and Consequences. Political Psychology, 23(3), 469-483. Retrieved May 11, 2020, from https://www.jstor.org/stable/3792588

Dugulin, R., & Niglia, A. (2015, May 17). The private sector in the protection of critical infrastructure - GRI. Global Risk Insights. https://globalriskinsights.com/2015/05/the-private-sectors-vital-role-in-the-protection-of-critical-infrastructure/

Gramlich, J. (2018, September 11). Since 9/11, Americans have seen anti-terrorism policy as a top priority. Pew Research Center.  https://www.pewresearch.org/fact-tank/2018/09/11/defending-against-terrorism-has-remained-a-top-policy-priority-for-americans-since-9-11/ 

Morgan, D. (2019). Homeland Security Research and Development: Homeland Security Issues in the 116th Congress. Current Politics and Economics of the United States, Canada, and Mexico, 21(1), 43-46.

Moteff, J., Copeland, C., & Fischer, J. (2003, January). Critical infrastructures: What makes an infrastructure critical?. Library of Congress Washington DC Congressional Research Service.

Study Document

Army Sustainment Function Of A Sergeant Major

Pages: 4 (1265 words) Sources: 4 Document Type:Case Study Document #:33714289

...Department energy A very important function that I, as a Sergeant Major takes related to army sustainment which not only provides efficient distribution of personnel and logistics, but also provides health services support to sustain and prolong the operations to ensure that the army is fully prepared through proper theater distribution, pre-positioning and other ways (Transportation Resources, 2017). This makes sure that the resources are utilized efficiently and used in a proper way which can be in terms of manpower, skill enhancement, materiel supplies and other resourcing which accomplishes the mission of the organization.
It is extremely important that we know what is required by each unit and prepare the organization for missions since it will strengthen their persisting capacity for achieving future goals. If unequal and improper or no distribution and provisions of such sustainment plan occurs, it is quite possible that the organization wouldn’t be fulfilling its core mission of……

References

Bibliography

Department of the Army . (2012). Sustainment. Washington, DC: Department of the Army .

Department of the Army . (2015). Brigade Combat Team. Washington, DC: Department of the Army .

Parins, C. L. (2011, August). The Sustainment Warfighting Function. Retrieved from Army Sustainment: https://alu.army.mil/alog/issues/julaug11/sustainment_function.html

Wade, N. M. (2015). SMFLS4: Sustainment & Multifunctional Logistics SMARTbook (4th ed.). The Lightning Press.

Study Document

How Strength And Cardio Training Help The Body

Pages: 6 (1916 words) Document Type:Essay Document #:75455813

… Rationale
Currently I would describe my starting fitness level as inadequate as compared to the median levels of fitness. As noted from the department of health and human services, “More than 80% of adults do not meet the guidelines for both aerobic and muscle-strengthening activities, and more … and muscle-strengthening activities, and more than 80% of adolescents do not do enough aerobic physical activity to meet the guidelines for youth (U.S. department of Health and Human Services, 2010).” A healthy physical lifestyle leads to a more active and productive life. As a result, I have … I expect my fat levels to decline thus allowing more oxygen and nutrients to permeate my nervous system.
Section 5: Energetics
The primary energy substrate being used will include muscle glycogen, blood glucose, and intramuscular triglyceride. Depending on the intensity and duration of my exercise regime, glucose ……

References

References:

1. Karavidas, A. et al. (2010). Aging and the cardiovascular system. Hellenic Journal of Cardiology, 51, 5, 421-427.

2. U.S. Department of Health and Human Services. Healthy People 2020. Available at:  http://www.healthypeople.gov/2020/default.aspx .

Study Document

Starbucks Corporation Operational Sustainability

Pages: 6 (1944 words) Sources: 6 Document Type:Research Paper Document #:45580397

… Starbucks’ goal of building a sustainable agricultural product (Sustainalytics, 2019).
The Green Stores Framework has been a big driver of Starbucks’ environmental and energy sustainability objectives. Looking into the future, the company has open-sourced the framework to allow other organizations to take advantage of the green solutions … the environment and Starbucks as a major company operating within this environment. Further, the company is looking to increase its investments in solar energy to make all their stores green. Other plans the company has developed include reducing waste, having a sustainable supply chain, and increasing community … way in shortening execution timelines and allowing various stakeholders to better understand the objectives the company is aiming to achieve. Further, the HR department should get all employees invested in these……

References

References

Bruhn-Hansen, S. (2012). Corporate Social Responsibility–A case study of Starbucks’ CSR: communication through its corporate website. Unpublished master’s thesis, Illinois State University. Retrieved from http://pure. au. dk/portal/files/45282206/ba_thesis. pdf.

Harnrungchalotorn, S., & Phayonlerd, Y. (2016). Starbucks with Corporate Social Responsibility (CSR):“How Starbucks succeeds in a business world with CSR” (Doctoral dissertation, Master Thesis. Faculty Board of Economic Sciences, Communication and IT Business Administration).

Juneja, P. (2018). PESTLE Analysis of Starbucks. Retrieved November 21, 2019, from  https://www.managementstudyguide.com/swot-analysis-of-unilever.htm .

Khalamayzer, A. (2017, November 16). How Starbucks brewed a stronger sustainability bond. Retrieved November 21, 2019, from  https://www.greenbiz.com/article/how-starbucks-brewed-stronger-sustainability-bond .

Steven Li. (2019, July 5). Is Starbucks actually serious about environmental sustainability? Retrieved November 21, 2019, from  https://therising.co/2019/07/05/is-starbucks-actually-serious-about-environmental-sustainability/ .

Sustainalytics. (2019). Second-Party Opinion Starbucks Sustainability Bond. Sustainalytics Second-Party Opinion Review.

Join thousands of other students and

"spark your studies".