Doctrine Essays (Examples)

Studyspark

Study Document Study Document

Analyzing The Speeches Of Angela Y Davis

Pages: 7 (2294 words) Sources: 4 Document Type:Essay Document #:45885685

...Doctrine Racism and Gender Oppression
In the speeches of Angela Y. Davis, black female activist of the 20th century, one sees a remarkable discernment of the underbelly of the U.S.—or what she calls the US Organization.[footnoteRef:1] Her experience growing up as a minority in a world where segregation was accepted by the majority of the population, and the education she received from her parents, helped her to realize that just because society was ordered in a certain way did not mean that that way was necessarily right. This paper will analyze the speeches of Angela Y. Davis and discuss some of the themes that emerge in them so as to better understand the role that minorities have played in the history of the U.S., and how the “organizers” of US society have continuously used underhanded methods to marginalize and oppress these minorities. The perspectives of Alan Gomez, Vijay Prashad and Julia……

References

Bibliography

Davis, Angela. The Meaning of Freedom. San Francisco, CA: City Light Books, 2012.

Gomez, Alan. “Resisting Living Death at Marion Federal Penitentiary, 1972,” Radical History Review 96 (2006): 58–86.

Prashad, Vijay. “Second-Hand Dreams,” Social Analysis 49: 2 (Summer 2005): 191-198.

Sudbury, Julia. “A World Without Prisons: Resisting Militarism, Globalized Punishment, and Empire,” Social Justice 31.2 (2004): 9-28.

Studyspark

Study Document Study Document

Cultural Identity Development

Pages: 8 (2411 words) Sources: 14 Document Type:Research Paper Document #:12452469

...Doctrine Abstract
This paper addresses the significance of ethnic or cultural identity. It deals with the identity of socially advantaged as well as disadvantaged groups and my relation to them. Additionally, it highlights the significance of the self-identity concept. The Multidimensional Model of Racial Identity (MMRI), put forward by Smith, Sellers, Shelton and colleagues (1998), has been utilized to address all of the above aspects. The paper further explains the model, applying its dimensions to various self-identity aspects. Finally, the paper delves into the way such identity-related aspects intersect with one another.
Introduction
Identity is multifaceted in nature: it may be relational and circumstantial, as well as concurrently permanent, changing and dynamic. Identity development occurs via a process of socialization. It may or may not be self-established. It is, rather frequently, employed in the labeling and categorization of persons believed to possess oppositional or dual differences. Additionally, identity represents a construct applied in creating social……

References

References

Allport, G. (1954). The nature of prejudice. Cambridge, MA: Addison-Wesley.

Babbitt, N. (2013). Identities: Markers of power and privilege. Retrieved from  https://justdessertsblog.wordpress.com/2013/09/15/identities-markers-of-power-and-privilege/ 

Baldwin, J. A. (1984). African self-consciousness and the mental health of African-Americans. Journal of Black Studies, 15, 177-194.

Clark, K. B. (1965). Dark ghetto. New York: Harper & Row.

Cross, W. E. (1991). Shades of black: Diversity in African-American identity. Philadelphia: Temple University Press.

Horowitz, R. (1939). Racial aspects of self-identification in nursery school children. Journal of Psychology, 7, 91-99.

Kambon, K. (I 992). The African personality in America: An Aitricancentered framework. Tallahassee, FL: Nubian Nation Publications

Kardiner, A., & Ovesey, L. (1951). The mark of oppression. New York: Norton.

Studyspark

Study Document Study Document

Theism And The Moral Argument

Pages: 11 (3193 words) Sources: 3 Document Type:Research Paper Document #:32872904

...Doctrine Introduction
The moral argument consists of four components—moral facts, moral knowledge, moral transformation and moral rationality. As Baggett and Walls point out, the most pertinent moral facts are concerned with moral duties and values, particularly what is known as intrinsic human value.[footnoteRef:2] The question raised, of course, is where does intrinsic human value come from if not from God? Nature itself seems incapable of instilling in the human shell this universal sense of value. This is a particular fact that has to be dealt with in order to understand why the moral argument is necessarily a theistic argument, which is what this paper will argue. Moral knowledge, transformation and rationality all support the argument as well. Moral knowledge itself is a sense of the universality of morality—the the absolute validity of the platitudes of Practical Reason, as Baggett and Walls define it.[footnoteRef:3] Moral transformation refers to what Evans identifies as……

References

Bibliography

Baggett, David and Jerry Walls. God and Cosmos. Oxford University Press, 2016.

Baggett, David and Jerry Walls. Good God: The Theistic Foundations of Morality. Oxford University Press, 2011.

Evans, Stephen. God and Moral Obligation. Oxford University Press, 2013.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

...Doctrine Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber warfare, helps to establish appropriate countermeasures against cyberattacks and potential threats in cyberspace, and enhances intelligence gathering. While the study provides significant insights on this topic, future studies should examine the……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Studyspark

Study Document Study Document

Shareholder Vs Stakeholder Theory

Pages: 11 (3224 words) Sources: 6 Document Type:Research Paper Document #:76323348

...Doctrine Introduction
Milton Friedman’s quote gets to the heart of the conflict between shareholder theory vs. stakeholder theory. Shareholder theory posits that a corporation’s sole responsibility is to maximize the return on investment (ROI) for shareholders. Stakeholder theory posits, on the other hand, that a company owes a duty to all stakeholders (not just shareholders)—members of the community, workers, consumers; in short, anyone who is part of or who is impacted in some way by the company. The question is: Do corporations exist only to serve the interests of shareholders or do they also have a responsibility to serve stakeholders as well? This paper will answer that question by looking at the nature and essence of business social responsibility from the standpoint of the four major sources of ethical values in business: Law, Culture, Philosophy, and Religion. It will show that in today’s business environment, stakeholder theory needs to be pursued……

References

References

Augustine. (n.d.). Commentaries on Sermon on the Mount.  http://www.newadvent.org/fathers/16011.htm 

Chen, J. (2019). Market Milestones as the Bull Market Turns 10. Retrieved from  https://www.investopedia.com/market-milestones-as-the-bull-market-turns-10-4588903 

Egan, M. (2018). Tax cut triggers $437 billion explosion of stock buybacks. Retrieved from  https://money.cnn.com/2018/07/10/investing/stock-buybacks-record-tax-cuts/index.html 

Henrich, S. (2019). Unholy alliance. Retrieved from  https://northmantrader.com/2019/11/30/unholy-alliance/ 

Laux, C., & Leuz, C. (2010). Did fair-value accounting contribute to the financial crisis?. Journal of economic perspectives, 24(1), 93-118.

Light, L. (2019). More than Half of All Stock Buybacks are Now Financed by Debt. Here’s Why That’s a Problem. Retrieved from  https://fortune.com/2019/08/20/stock-buybacks-debt-financed/ 

Mullen, C. (2019). People want to buy \\\\\\'local\\\\\\' food, but they\\\\\\'re not sure what it means. Retrieved from  https://www.bizjournals.com/bizwomen/news/latest-news/2019/05/people-want-to-buy-local-food-but-theyre-not-sure.html?page=all 

Putka, G. (2019). Insiders are selling. Retrieved from https://www.washingtonpost.com/business/economy/company-insiders-are-selling-stock-during-buyback-programs-and-making-additional-profits-when-stock-prices-jump-and-its-legal/2019/11/06/fc592f58-e493-11e9-a331-2df12d56a80b_story.html

Studyspark

Study Document Study Document

Biblical Mysteries

Pages: 8 (2451 words) Sources: 15 Document Type:Essay Document #:22562699

...Doctrine Introduction
Western scholars came up with the term mysticism to describe a special religious phenomenological concept. The term is general utilized today based on a very broad assumption that things found in every religion e.g. the rituals, the practices, the goals, and the experiences are also found in other religions and outside the domain of religion (Keller, 1978; Katz, 1978). The concept of mysticism has fascinated generations. It is a concept that has gathered a lot of attention especially in the modern day world with the increasing influence of eastern religions and the New Age Movement. It has blurred the lines between general mystical experiences and experiences with the true Living God. Nowadays, some experiences of consciousness are regarded as authentic spiritual experiences (Florovsky, 1972). This research proposal is thus an investigation of biblical mysticism and major biblical mysteries found in the Christian bible and how the mysteries found in the……

References

References

Addington, J. E. (1969). The Hidden Mystery of the Bible. DeVorss & Company.

Ahn, E., & Kang, H. (2018). Introduction to systematic review and meta-analysis. Korean journal of anesthesiology, 71(2), 103.

Beale, G. K., & Gladd, B. L. (2014). Hidden but now revealed: A Biblical theology of mystery. InterVarsity Press.

Catholic Church. (1997). Catechism of the Catholic Church: Revised in accordance with the official Latin text.  Promulgated by Pope John Paul II (2nd edition). Washington, D.C.: United States Catholic Conference.

Cook, D. J., Mulrow, C. D., & Haynes, R. B. (1997). Systematic reviews: synthesis of best evidence for clinical decisions. Annals of internal medicine, 126(5), 376-380.

Florovsky, G. (1972). Bible, church, tradition: an Eastern Orthodox view (Vol. 1). Nordland Publishing Company.

Jeffrey, G. R. (2013). Unveiling Mysteries of the Bible. WaterBrook.

Katz, S.T. (1978). Language, Epistemology, and Mysticism. New York, Oxford University Press.

Studyspark

Study Document Study Document

Counterintelligence Issues Within The United States

Pages: 18 (5457 words) Sources: 29 Document Type:Research Paper Document #:72238996

… goal (Jones 2008). Other cultures, both Western and Eastern, have tended to promote a position of statecraft that is in line with the doctrine of mutual beneficence put forward by Adam Smith in Wealth of Nations. Both Western and Eastern cultures developed the first and most fundamental ……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. "The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles." Bachelor's thesis, Università Ca'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Cohen, Shlomo. 2016. "Are There Moral Limits to Military Deception?." Philosophia 44 (4): 1305-1318.

Coyne, John, Peter Bell, and Shannon Merrington. 2013. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2 (10): 27-37.

Erskine, Toni. 2004. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. "Strategic denial and deception." International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Studyspark

Study Document Study Document

Iron Contra The Covert Action Operation In Iran

Pages: 9 (2708 words) Sources: 8 Document Type:Essay Document #:25726659

...Doctrine Operation Ajax
The war was triggered by the Anglo-Iranian crisis of 1951 to 1953. The Anglo-Iranian Oil Company was largely viewed as a colonial influence bent on controlling the host government and enjoying benefits from the hierarchies that resulted from a society that was divided. However, in 1951, led by campaigns championed by Prime Minister then, Mohammad Mossadeq, Iran managed to nationalize its oil resources. Slightly over two years down the line after the nationalization of its oil, the Iranian Premier was deposed (De Seve, 2020).
When the foreign powers failed to destabilize and abdicate, the British tried to dislocate the premier one more time. Following mass protests and a three-day uprising and bloodshed – the Siyer-Tir on July 21, Mohammad Mossadeq, was granted powers to appoint the chiefs of staff and the minister for war. The British noticed a chance to depose the premier from the differences between the……

References

References

Contini, C. (2013). A Realistic View on Iran: International relations and Global Politics. GRIN Verlag.

De Seve, M. (2020). Operation Ajax: The Story of the CIA Coup that Remade the Middle East. Verso Books.

Fowler, R. (2018). More Than a Doctrine: The Eisenhower Era in the Middle East. U of Nebraska Press.

Lee, C. T. (2013). A Cold War Narrative: The Covert Coup of Mohammad Mossadeq, Role of the U.S. Press and Its Haunting Legacies. Senior Theses, Trinity College, Hartford, CT.  http://digitalrepository.trincoll.edu/theses/300 

Levin, Y. A. (2018). Operation Ajax in the CIA analytics: colonial knowledge in postcolonial age. Samara Journal of Science, 7(2), 200-203.

Luce, D. D. (2017, September 20). The specter of operation AJAX. The Guardian. https://www.theguardian.com/politics/2003/aug/20/foreignpolicy.iran

Merica, D., & Hanna, J. (2013). In declassified document, CIA acknowledges role in\\\\\\'53 Iran Coup. CNN News. Retrieved June 15, 2020.

Roosevelt, K. (1979). Countercoup, the Struggle for the Control of Iran. McGraw-Hill Companies.

Studyspark

Study Document Study Document

Death Penalty In Canada

Pages: 10 (3008 words) Sources: 5 Document Type:Essay Document #:67727921

...Doctrine Should Canada reinstate the death penalty for planned and premeditated murder What is your position and why
Why are people punished for their crimes? What is the driving idea behind punitive sentencing in criminal justice? Is life behind bars somehow to be considered more humane of a sentence for a person who commits premeditated murder? Or is knowing that one will never again have his freedom a worse punishment than death? Obviously these are all subjective questions and people will have different views on the matter, so it is important to define one’s own approach to the question. If one is talking about preferences and whether it is better to give up one’s life than to live the rest of one’s days in prison, one might go either way. But if one is talking about the issue of capital punishment from an ethical point of view, it is an approach……

References

Works Cited

Capote, Truman. In Cold Blood. NY: Vintage, 1994.

Holmes, A. Ethics: Approaching moral decisions. Downers Grove, IL: InterVarsity Press, 2007.

Hursthouse, Rosalind. “Virtue Ethics.” Stanford Encyclopedia of Philosophy, 2016. https://plato.stanford.edu/entries/ethics-virtue/

Kronenwetter, M. Capital Punishment: A Reference Handbook. CA: ABC-CLIO, 2001.

Robbins, Tim, dir. Dead Man Walking. Gramercy Pictures, 1995. Film.

Studyspark

Study Document Study Document

Trust And Relationships In Negotiation

Pages: 7 (1997 words) Sources: 5 Document Type:Essay Document #:98491775

...Doctrine Trust and Relationships in Negotiation
Introduction
Successful negotiations rely heavily upon the ability of those involved to develop trust and build solid relationships. If parties to a negotiation cannot trust one another and do not develop the kind of relationships required, it is highly unlikely that they will arrive at the kind of satisfactory, win-win outcome that all sides desire. But how does one define trust? What steps can be taken to best support a working relationship? How can one tell if one is moving towards a successful negotiation or working against one’s own best interests? This paper will review the topic of trust and relationship development in negotiations to show how one can approach the problem of trust and relationship building while working on negotiating an outcome that satisfies all parties.
What is Trust?
Trust is a concept that has different meanings depending on how one thinks of its……

References

References

Butler Jr, J. K. (1999). Trust expectations, information sharing, climate of trust, and negotiation effectiveness and efficiency. Group & Organization Management, 24(2), 217-238.

Lewicki, R. J., & Stevenson, M. A. (1997). Trust development in negotiation: Proposed actions and a research agenda. Business & Professional Ethics Journal, 16(1/3), 99-132.

Olekalns, M., & Smith, P. L. (2009). Mutually dependent: Power, trust, affect and the use of deception in negotiation. Journal of Business Ethics, 85(3), 347-365.

Ross, W., & LaCroix, J. (1996). Multiple meanings of trust in negotiation theory and research: A literature review and integrative model. International Journal of Conflict Management. 7(4), 314–360.

Shell, G. R. (1991). Opportunism and trust in the negotiation of commercial contracts:Toward a new cause of action. Vand. L. Rev., 44, 221.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".