Designs Essays (Examples)

Studyspark

Study Document Study Document

Acquisition Process In Action At The Department Of Energy

Pages: 10 (2943 words) Sources: 8 Document Type:Research Paper Document #:56403146

...Designs How the DOE Used the Acquisition Process to Demolish a Contaminated Building
Today, many organizations lack the resources to engage in a formal acquisition process while others rely on acquisitions processes that are specially designed for a specific project. In either case, these organizations may fail to achieve optimal outcomes due to these types of approaches to the acquisition process. One organization that has recognized the importance of using a formal, standardized acquisition process in the U.S. Department of Energy which oversees dozens of major projects each year. The purpose of this paper is to provide a detailed review of a major program that has been managed, via the acquisition process, over the past decade, by the Department of Energy at the Y-12 National Security Complex. A description of the demolition project is followed by a discussion concerning the acquisition process that was used to guide the process. Finally, a……

References

References

About DOE. (2020). U.S. Department of Energy. Retrieved from  https://www.energy.gov/about-us ,

About Y-12. (2020). U.S. Department of Energy. Retrieved from  https://www.y12.doe.gov/  about.

Birchfield, J. W. & Albrecht, L. (2012). Successful characterization strategies for the active high risk Y-12 National Security Complex 9201-5 (Alpha-5) Facility, Oak Ridge, TN - 12164. United States.

Recovery cleanup project at Y-12. (2010). U.S. Department of Energy. Retrieved from  https://www.energy.gov/orem/articles/recovery-cleanup-project-y-12-leaves-alpha-5-empty-feeling .

Standard review plan: Acquisition strategy review module. (2010, March). Washington, DC: Office of Environmental Management.

Supplement analysis for the site-wide environmental impact statement for the Y-12 National Security Complex (DOE/EIS-0387-SA-02). (2018, May). U.S. Department of Energy. Retrieved from  https://www.energy.gov/sites/prod/files/2018/05/f51/EIS-0387-SA02-2018_0.pdf .

Teamwork successfully brings down the Alpha 5 Annex. (2018). U.S. Department of Energy. Retrieved from

Studyspark

Study Document Study Document

Beginning A Public Health Campaign

Pages: 4 (1126 words) Sources: 4 Document Type:Essay Document #:70965381

...Designs Health Communications: Minority Youth Substance Abuse Solutions
Introduction: Why a Public Health Campaign is Needed
The rise of the opioid epidemic in America has been well documented by researchers (Nelson, Juurlink & Perrone, 2015; Manchikanti et al., 2012). As millions of youths are at risk of succumbing to substance abuse via street drugs and opioids, the need for a public health campaign is evident (Murthy, 2016). The issue of reducing the spread of substance abuse among minority youths is particularly important because a high percentage of those who become addicted to or substance abusers is found in minority populations and particularly high among Asian Americans (Winter, 2016). In order to prevent the spread of substance abuse among minority youth, a public health campaign should be developed and implemented.
A Key Element of Health Communication
A key element of health communication that is essential for a public health leader dealing with……

References

References

Nelson, L. S., Juurlink, D. N., & Perrone, J. (2015). Addressing the opioid epidemic.  Jama, 314(14), 1453-1454.

Manchikanti, L., Fellows, B., Janata, J. W., Pampati, V., Grider, J. S., & Boswell, M. V. (2012). Opioid epidemic in the United States. Pain Physician, 15(3 Suppl), ES9-38.

Murthy, V. H. (2016). Ending the opioid epidemic—a call to action. New England Journal of Medicine, 375(25), 2413-2415.

Smit-Kroner, C. & Brumby, S. (2015). Farmers sun exposure, skin protection, and public health campaigns: An Australian Perspective. Preventive Medicine Reports 2, 602-607.

Velasquez, A., & LaRose, R. (2015). Youth collective activism through social media: The role of collective efficacy. New Media & Society, 17(6), 899-918.

Winter, T. (2016). Addiction among different races. Retrieved from  https://sunrisehouse.com/addiction-demographics/different-races/ 

Studyspark

Study Document Study Document

Optimizing Health Information Systems

Pages: 12 (3717 words) Sources: 16 Document Type:Research Paper Document #:99273225

...Designs Optimizing Merged Health Information Systems
Although the merger of two comparably sized companies competing in the same industry is a relatively commonplace business strategy, the process is fraught with obstacles and challenges and a significant percentage of merged entities fail outright because of these problems (Murphy, 2019). These types of problems are further compounded when there are sophisticated information systems involved that must also be merged successfully. The purpose of this paper is to explicate the responsibilities involved in implementing a health information system (HIS) that meets current Health Information Technology for Economic and Clinical Health (HITECH) Act and the Health Insurance Portability and Accountability Act (HIPAA) Security and Privacy regulatory requirements. To this end, a discussion and analysis of health information systems, a description concerning how a system will affect patient care and documentation and an explanation concerning how using a system to access information will affect the quality……

References

References

Abouzhar, C. & Boerma, T. (2009, August). Health information systems: The foundations of public health. Bulletin of the World Health Organization, 83(8), 578-583.

Cresswell, K. & Aziz, S. (2013, May). Organizational issues in the implementation and adoption of health information technology innovations: An interpretative review. International Journal of Medical Informatics, 87(5), 73-86.

Drazen, E. L. (2006, February). Maximizing the benefits of health care information systems. Journal of Medical Systems, 10(1), 51-56.

Kruse, C. S. & Smith, D. (2017, July). Security techniques for the electronic health records. Journal of Medical Systems, 41(8), 127.

Kumar, V. (2011). Impact of health information systems on organizational health communication and behavior. The Internet Journal of Allied Health Sciences and Practice, 9(2), 37-44.

McGrail, K. M. & Black, C. (2009, August). Access to data in health information systems. Bulletin of the World Health Organization, 83(8), 563-569.

Murphy, M. L. (2019, March). Mastering accounting for business combinations: Mergers and acquisitions present challenges that finance can overcome by staying involved with the deal and preparing in advance of the closing. Journal of Accountancy, 227(3), 24-27.

NAHQ code of ethics for healthcare quality. (2019). National Association for Healthcare Quality. Retrieved from  https://nahq.org/about/code-of-ethics .

Studyspark

Study Document Study Document

Preventing Drug Use Among Teens

Pages: 5 (1380 words) Sources: 4 Document Type:Essay Document #:72171572

...Designs Prevention of Substance Abuse among Youth: Seeking to Understand Perspectives
Introduction
To understand an effective way to prevent substance abuse among youth, it is important to explore the perspectives of stakeholders and individuals who play a role in applying preventive strategies. For that reason, this study uses qualitative design to explore the perspectives of high school teachers toward successful teen substance abuse prevention program. This paper discusses the background of the problem, provides a problem statement, purpose statement, and research question, and reviews literature pertaining to theory, research and methodology. An annotated bibliography is included at the end.
Background to the Problem
As Murthy (2016) points out, there is a serious need to address the opioid epidemic that is scourging the nation today. Youths are among the most vulnerable population when it comes to substance abuse because they are most likely to be affected by peer pressure and media, where……

Studyspark

Study Document Study Document

Role Of Descriptive Epidemiology In Nursing Science

Pages: 6 (1672 words) Sources: 8 Document Type:Essay Document #:28360370

...Designs Introduction
Public health as a field comprises the convictions, science, and skills relating to the preservation and improvement of the health of the general public through preventative endeavors instead of curative ones. One of the basic sciences that are critical to promoting public health is epidemiology. As a tool, epidemiology is useful in the protection and promotion of public health through the application of common sense as well as scientific reasoning (Stanhope & Lancaster, 2015). One of the main areas of epidemiology is descriptive epidemiology. Descriptive epidemiology focuses on the description of diseases and their determinants. It is useful in the organization and analysis of various diseases and the occurrences of those diseases in the given geographical area over time. Descriptive epidemiology is therefore capable of generating etiological research hypotheses (Liu, 2018). This paper discusses the role of descriptive epidemiology in nursing today.
Descriptive Epidemiology
Descriptive epidemiology refers to a……

References

References

Liu, L., (2018). “Chapter 1 – Introduction.” In Heart Failure: Epidemiology and Research Methods. Elsevier Health Sciences. p. 1-12.

Stanhope, M., & Lancaster, J. (2015). Public health nursing-e-book: Population-centered health care in the community. Elsevier Health Sciences.

Richards, E. A., & Cai, Y. (2016). Integrative review of nurse-delivered physical activity interventions in primary care. Western Journal of Nursing Research, 38(4), 484-507.

Katzmarzyk, P. T., Lee, I. M., Martin, C. K., & Blair, S. N. (2017). Epidemiology of physical activity and exercise training in the United States. Progress in Cardiovascular Diseases, 60(1), 3-10.

Mandl, M., Halfens, R. J., & Lohrmann, C. (2015). Incontinence care in nursing homes: a cross?sectional study. Journal of advanced nursing, 71(9), 2142-2152.

Oyesanya, T. O., Bowers, B. J., Royer, H. R., & Turkstra, L. S. (2018). Nurses’ concerns about caring for patients with acute and chronic traumatic brain injury. Journal of clinical nursing, 27(7-8), 1408-1419.

Heavey, E. (2018). Statistics for nursing: A practical approach. Jones & Bartlett Learning.

Colditz, G., Nguyen, N., & Dart, H. (2016). Physical activity and health. In International Encyclopedia of Public Health (pp. 463-472). Elsevier Inc.

Studyspark

Study Document Study Document

Program Logic Model

Pages: 6 (1769 words) Sources: 8 Document Type:question answer Document #:91645810

...Designs 1) What social problem did the program seek to address?
The social problem that the program sought to address was the need to reduce risky sexual behaviors among teenage youths. Risky sexual behavior is common among teens (Chapin, 2001) and programs that focus on educating teens about reducing risks associated with sex can be a way to address the issue (Walsh-Buhi et al., 2016). However, there is a need to understand teens’ perspective and for adults to be able to relate to what teens are going through in order to help convey the message about risk (Kerpelman, McElwain, Pittman & Adler-Baeder, 2016). For that reason, the program aimed to find a way to help bridge the gap between adult educators and youths and the idea of using young parents as peer educators to talk to teens about sex and preventing teen pregnancy was the focus of the program in the……

References

References

Bandura, A. (2018). Toward a psychology of human agency: Pathways and reflections.  Perspectives on Psychological Science, 13(2), 130-136.

Bickel, R., Weaver, S., Williams, T., & Lange, L. (1997). Opportunity, community, and teen pregnancy in an Appalachian state. The Journal of Educational Research, 90(3), 175-181.

Chapin, J. (2001). It won't happen to me: The role of optimistic bias in African American teens' risky sexual practices. Howard Journal of Communication, 12(1), 49-59.

Damon, W. (1984). Peer education: The untapped potential. Journal of applied developmental psychology, 5(4), 331-343.

Kerpelman, J. L., McElwain, A. D., Pittman, J. F., & Adler-Baeder, F. M. (2016). Engagement in risky sexual behavior: Adolescents’ perceptions of self and the parent–child relationship matter. Youth & Society, 48(1), 101-125.

Sciolla, A., Ziajko, L. A., & Salguero, M. L. (2010). Sexual health competence of international medical graduate psychiatric residents in the United States. Academic Psychiatry, 34(5), 361-368.

Stakic, S., Zielony, R., Bodiroza, A., & Kimzeke, G. (2003). Peer education within a frame of theories and models of behaviour change. Entre Nous: The European Magazine for Sexual and Reproductive Health, 56, 4-6.

Walsh-Buhi, E. R., Marhefka, S. L., Wang, W., Debate, R., Perrin, K., Singleton, A., ... & Ziemba, R. (2016). The impact of the Teen Outreach Program on sexual intentions and behaviors. Journal of Adolescent Health, 59(3), 283-290.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

...Designs Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage,……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf 

National Counterintelligence and Security Center. “Foreign Economic Espionage in Cyberspace.” Office of the Director of National Intelligence, 2018.  https://www.dni.gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf 

Rubenstein, D. “Nation State Cyber Espionage and its Impacts.” Washington University in St. Louis, December 2014.  https://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/ 

Weissbrodt, D. “Cyber-Conflict, Cyber-Crime, and Cyber-Espionage.” Minnesota Journal of International Law 22, no. 2 (2013).

Studyspark

Study Document Study Document

The Ethics Of Clandestine Operations

Pages: 11 (3151 words) Sources: 14 Document Type:literature review Document #:69864024

...Designs Ethics of Clandestine Intelligence Operations
Introduction
One of the most common yet least understood methods of operations in the art of statecraft is the clandestine operation (Sheldon 1997). Though popularized in pulp fiction and film, such as the James Bond series franchise and numerous other spy thrillers, clandestine operations remain relatively unknown in the public consciousness—and when they are discussed it is generally with distaste, distrust and vilification (Sheldon 1997). Yet as Sheldon (1997) shows, clandestine operations are not new or unique to the modern world and in fact ancient Rome used them whenever military operations were impractical. Thus, “political influence operations, seeding, propaganda, political patronage, safe havens, political assassination, and paramilitary operations” can all be traced back more or less to similar operations implemented by the ancient Romans (Sheldon 1997, 299). Today, there are many different facets to clandestine operations, and many agencies that use them—from the CIA to……

References

Bibliography

Arnold, A. and D. Salisbury. The Long Arm, 2019. Retrieved from https://www.belfercenter.org/publication/long-arm

Barker, Michael J. \\\\\\"Democracy or polyarchy? US-funded media developments in Afghanistan and Iraq post 9/11.\\\\\\" Media, Culture & Society 30, no. 1 (2008): 109-130.

Best, Richard A. Intelligence to Counter Terrorism: Issues for Congress. Congressional Research Service: CRS Report for Congress, 2002.

Carter, Ashton B. \\\\\\"Overhauling counterproliferation.\\\\\\" Technology in Society 26, no. 2-3

(2004): 257-269.

Crumpton, Henry A. The art of intelligence: lessons from a life in the CIA\\\\\\'s clandestine service. Penguin, 2013.

Hersh, Seymour. Selective Intelligence. The New Yorker, 2003.  http://www.newyorker.com/magazine/2003/05/12/selective-intelligence 

McCormick, G. H., & Owen, G. “Security and coordination in a clandestine organization.” Mathematical and Computer Modelling, 31, no. 6-7 (2000), 175-192.

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

...Designs Executive Summary
The purpose of this study is to develop timely and informed answers to a series of guiding research questions and subquestions to identify the risks and barriers that are associated with Internet of Things implementations. These types of studies are important today because the Internet of Things is changing the manner in which companies of all sizes and types operate their businesses, and current trends indicate that these implementations are increasing exponentially. The Internet of Things allows conventional computer-based networks to incorporate data collected from everyday objects to provide real-time analyses and new applications for these technologies are being developed every day. Indeed, there are already more mobile devices in use around the world than there are people, and most authorities agree that the Internet of Things deployments will continue to increase well into the foreseeable future. Chapter one of the study provides the rationale in support of……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Privacy In Social Networks Regarding Machine Learning

Pages: 8 (2537 words) Sources: 10 Document Type:Research Paper Document #:98311751

...Designs Abstract
This paper discusses the issue of privacy in social networks with respect to advances in machine learning. It shows how machine learning protocols have been developed both to enhance and secure privacy as well as to invade privacy and collect, analyze, predict data based on users’ information and experience online. The conflict between these two directions in machine learning is likely to lead to a system wherein machine learning algorithms are actively engaged in the subversion of one another, with one attempting to conceal data and the other attempting to uncover it. This paper concludes with recommendations for social networks and the issue of privacy regarding machine learning.
Introduction
Social networks have allowed an ocean of personal data to form that is now sitting there waiting for machine learning algorithms to collect it, analyze it, and recognize individuals on social media (Oh, Benenson, Fritz & Schiele, 2016). Machine learning……

References

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".