Economic Theory Essays (Examples)

Studyspark

Study Document Study Document

Violence Prevention Programs

Pages: 9 (2805 words) Sources: 6 Document Type:Essay Document #:52417572

… in respectful rather than abusive communication (Alternative Paths, 2020). This paper will discuss this topic, explain it from the theoretical perspective of strain theory, describe the present literature, and make recommendations based on the problems with violence prevention programs from a strain theory perspective and what can be done to solve those issues.
Violence Prevention Programs
Violence prevention programs are programs designed to address the needs … the community? To understand the actual impact of the programs, one has to examine them from suitable theoretical perspective. This is where strain theory can be applied.
Strain theory
Strain theory is used in the field of sociology and criminology to explain why conflict occurs. Merton’s strain theory posits that people are pressured to commit crime by society: they may be unaccepted by others, or they may face severe economic or financial pressures; they may face pressures from family, or from school……

References

References

Altafim, E. R. P., & Linhares, M. B. M. (2016). Universal violence and childmaltreatment prevention programs for parents: A systematic review. Psychosocial Intervention, 25(1), 27-38.

Alternative Paths. (2020). Violence prevention. Retrieved from  https://www.alternativepaths.org/services/diversion-programs/violence-prevention-program 

Farrell, A. D., Meyer, A. L., Kung, E. M., & Sullivan, T. N. (2001). Development and evaluation of school-based violence prevention programs. Journal of clinical child psychology, 30(2), 207-220.

Johnson, D. W., & Johnson, R. T. (1995). Why violence prevention programs don't work--and what does. Educational Leadership, 52(5), 63-68.

Lee, C., & Wong, J. S. (2020). Examining the effects of teen dating violence prevention programs: a systematic review and meta-analysis. Journal of Experimental Criminology, 1-40.

Siegel, L. (2018). Criminology, 7th Ed. Cengage Learning.

Stagg, S. J., & Sheridan, D. (2010). Effectiveness of bullying and violence prevention programs: A systematic review. Aaohn Journal, 58(10), 419-424.

Studyspark

Study Document Study Document

COVID 19 In South Africa Nigeria And Swaziland

Pages: 7 (2030 words) Sources: 6 Document Type:literature review Document #:53851517

Literature Review on Coping Through The Use Of Informal Institutions during COVID 19 in South Africa, Nigeria, and Swaziland
The institutional theory deals with the outlines, regulations, standards, and procedures that are formulated in the institutions as commanding instructions for social behavior. This theory gives an understanding of how institutions are shaped, and the societal norms and frameworks are informed to all people of an organization. Communication … but is still followed as acceptable social behavior.
Studies have been conducted to see what drives change in an organization and how institutional theory comes into play. There are certain actions carried out in an organization when change happens, and that is evident on all levels and … Goodstein & Scott, 2002). The character of the organization changes over time with a change in its potency, and this is where institutional theory highlights the richness and diversity inside the processes. The same……

References

References

Coelho, A. (2019). The role of informal institutions in the enforcement of rules and how to improve corporate and public governance in Brazil: Studies based on a set of corporate governance cases involving state-owned companies (Working Paper). Retrieved from SSRN website  https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3434037 

Dacin, M.T., Goodstein, J. & Scott, W.R. (2002). Institutional theory and institutional change: Introduction to the special research forum. Academy of Management Journal, 45(1), 45- 47. DOI: 10.2307/3069284

Escandon-Barbosa, D.M., Urbano, D., Hurtado-Ayala, A., Paramo, J.S. & Dominguez, A.Z. (2019). Formal institutions, informal institutions, and entrepreneurial activity: A comparative relationship between rural and urban areas in Colombia. Journal of Urban Management, 8(3), 458-471.  https://doi.org/10.1016/j.jum.2019.06.002 

Estrin, S. & Prevezer, M. (2010). The role of informal institutions in corporate governance: Brazil, Russia, India, and China compared. Asia Pacific Journal of Management, 28, 41- 67.  https://doi.org/10.1007/s10490-010-9229-1 

Kaufmann, W., Hooghiemstra, R. & Feeney, M.K. (2018). Formal institutions, informal institutions, and red tape: A comparative study. Public Administration, 96(2), 386-403. https://doi.org/10.1111/padm.12397

Meluch, A.L. (2016, August). Understanding the organizational and institutional origins of social support in a cancer support center. (Unpublished doctoral dissertation). Retrieved from https://etd.ohiolink.edu/!etd.send_file?accession=kent1466944822&disposition=inline

Torniainen, T.J. & Sasstamoinen, O.J. (2007). Formal and informal institutions and their hierarchy in the regulation of the forest lease in Russia. Forestry: An International Journal of Forest Research, 80(5), 489-501.  https://doi.org/10.1093/forestry/cpm033 

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… proliferation is attributable to the transformation of conventional surveillance and espionage, there are additional contributing factors. According to Lotrionte (2015), cyber espionage, particularly economic espionage is brought by the failure by international law to provide public order.[footnoteRef:5] Prescriptive norms of international law are not strong enough to … to provide public order.[footnoteRef:5] Prescriptive norms of international law are not strong enough to provide public order that would deter cyber espionage, especially economic espionage. Similarly, Libicki (2017) contends that despite objections to certain types of cyber espionage by the United States, such practices are rampant due … policies contribute to the widespread use of cyber espionage to promote cyberattacks on a nation’s critical infrastructure. [5: Catherine Lotrionte, “Countering State-Sponsored Cyber economic Espionage Under International Law”, North Carolina Journal of International Law and Commercial Regulation 40, (2015):445] [6: Martin Libicki, “The Coming of Cyber Espionage ……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing … is a practice that involves obtaining secrets without the permission of the owner/possessor of the information. The information is obtained for personal, political, economic or military advantage. Since this practice results in illegitimate possession of personal, sensitive, classified or proprietary information, it can generate numerous risks or ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Why Ageism Needs To Be Stopped In Society

Pages: 9 (2613 words) Sources: 7 Document Type:Essay Prompts Document #:38322228

… As Albom (2019) notes, “jabs at Joe Biden mask our growing ageism issue.” This paper will discuss the cultural factors regarding age, developmental theory models, relevant laws, other diversity issues, resources available for special services, and my own personal characteristics towards complementing age and concerns for my … their elders as “boomers” and have no problem mocking the elderly for what appears to them to be cognitive decline.
Historical, Political, Social, economic and Cultural Factors Regarding Age
In older societies age was revered and one was taught to respect one’s elders. This was the customary … should mind their manners. The cultural barriers for place and respect were disintegrated all over the world (David, 2018).
However, with 2008 global economic crisis, many older persons who ordinarily would have retired continued on working in the workplace, fearing that their economic futures were not secure. Thus, the workforce is aging in……

References

References

Albom, M. (2019). Jabs at Joe Biden mask our growing ageism issue. Retrieved from  https://www.chicagotribune.com/lifestyles/sns-201909161301--tms--tuemitchctntm-a20190916-20190916-story.html 

David, K. E. (2018). The Poster Child of the “Second” Cultural Revolution: Huang Shuai and Shifts in Age Consciousness, 1973–1979. Modern China, 44(5), 497-524.

Heggeness, M. L., Carter-Johnson, F., Schaffer, W. T., & Rockey, S. J. (2016). Policy implications of aging in the NIH-funded workforce. Cell Stem Cell, 19(1), 15-18.

Landeiro, F., Barrows, P., Musson, E. N., Gray, A. M., & Leal, J. (2017). Reducing social isolation and loneliness in older people: a systematic review protocol. BMJ Open, 7(5), e013778.

Lassila, S. (2019). Managing Risks of an Aging Workforce. Construction Executive, 2020. Retrieved from  https://constructionexec.com/article/managing-risks-of-an-aging-workforce 

Liu, S. J., Lin, C. J., Chen, Y. M., & Huang, X. Y. (2007). The effects of reminiscence group therapy on self-esteem, depression, loneliness and life satisfaction of elderly people living alone. Mid-Taiwan Journal of Medicine, 12(3), 133-142.

Lumen. (2019). Theoretical perspectives on deviance. Retrieved from  https://courses.lumenlearning.com/sociology/chapter/theoretical-perspectives-on-deviance/ 

McLeod, S. (2018). Erik Erikson's Stages of Psychosocial Development. Retrieved from  https://www.simplypsychology.org/Erik-Erikson.html

Studyspark

Study Document Study Document

Integrated Waveguide Technologies Preparing For A Public Offering

Pages: 7 (1963 words) Sources: 6 Document Type:Essay Document #:71352857

… 2015). According to Mohanasundari & Vidhya (2016), the founding theories are premised on the correlation between dividend payment and firm value.
Dividend irrelevance theory
The Modigliani- Miller (MM) dividend irrelevance theory contends that a firm's value is independent of the dividend policy; hence a company's declaration of dividends has no adverse effect on the … value is determined by the basic earning power and its business risk instead of the pattern of income distribution between retained earnings and dividends. The theory is premised on the assumption that firms operate on the perfect capital market of the absence of transaction costs and capital gain taxes … capital gain taxes (Al-Malkawi et al., 2010). Systematic analysis of the literature by Mohanasundari & Vidhya (2016) identifies that the MM dividend irrelevance theory is founded on a perfect capital market concept while, in reality, markets are imperfect. Empirical analysis by Black & Scholes (2010) of……

References

References

Al-Malkawi, H.-A. N., Rafferty, M., & Pillai, R. (2010). Dividend Policy?: A Review of Literatures and Empirical Evidence. International Bulletin of Business Administration, 5(9), 38–45.  https://doi.org/10.12816/0037572 

Baker, H. K., & Weigand, R. (2015). Corporate dividend policy revisited. In Managerial Finance (Vol. 41, Issue 2, pp. 126–144).  https://doi.org/10.1108/MF-03-2014-0077 

Black, F., & Scholes, M. (2010). The effects of dividend yield and dividend policy on common stock prices and returns. In Journal of Financial Economics (Vol. 1, Issue 1, pp. 1–22).  https://doi.org/10.1016/0304-405X(74)90006-3 

Farre-Mensa, J., Michaely, R., & Schmalz, M. (2014). Payout Policy. Annual Review of Financial Economics, 6, 75–134.

Mohanasundari, M., & Vidhya, P. (2016). Dividend Policy and Its Impact on Firm Value: A Review of Theories and Empirical Evidence. Journal of Management Sciences and Technology, 3(3), 59–69.

Travlos, Trigeorgis, & Vafeas. (2001). No Title. Multinational Finance Journal, 5(2), 87–112.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

… discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing … is a practice that involves obtaining secrets without the permission of the owner/possessor of the information. The information is obtained for personal, political, economic or military advantage. Since this practice results in illegitimate possession of personal, sensitive, classified or proprietary information, it can generate numerous risks or ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Traditional Medicine Usage In African Nations

Pages: 12 (3615 words) Sources: 30 Document Type:Essay Document #:38085332

… Africa has emerged to battle health problems. However, there are many informal health institutions in Africa that have developed as a result of economic disparities that prevent poorer and impoverished populations from seeking care at formal institutions like this one in Nigeria (Nelissen et al., 2020).
Evolution ……

References

References

Afro-centric Alliance, A. (2001). Indigenisingorganizational change: Localisation in Tanzania and Malawi. Journal of Managerial Psychology, 16(1), 59-78.

Asiseh, F., Owusu, A., & Quaicoe, O. (2017). An analysis of family dynamics on high school adolescent risky behaviors in Ghana. Journal of Child & Adolescent Substance Abuse, 26(5), 425-431.

Austin, G. (2010). African economic development and colonial legacies (Vol. 1, No. 1, pp. 11-32). Institut de hautes études internationales et du développement.

Brager, G., Specht, H., Torczyner, J. L., &Torczyner, J. (1987). Community organizing. Columbia University Press.

Bratton, M., & Van de Walle, N. (1997). Democratic experiments in Africa: Regime transitions in comparative perspective. Cambridge university press.

Burnham, G. M., Pariyo, G., Galiwango, E., & Wabwire-Mangen, F. (2004). Discontinuation of cost sharing in Uganda. Bulletin of the World Health Organization, 82, 187-195.

Dillard, C., Duncan, K. L., & Johnson, L. (2017). Black History Full Circle: Lessons from a Ghana Study Abroad in Education Program. Social Education, 81(1), 50-53.

Ehui, S. (2020). Protecting food security in Africa. Retrieved from https://www.brookings.edu/blog/africa-in-focus/2020/05/14/protecting-food-security-in-africa-during-covid-19/

Studyspark

Study Document Study Document

The Modern World Of Autonomy Vs Heteronomy

Pages: 5 (1560 words) Sources: 8 Document Type:Essay Document #:86232532

… same society get to share similar values and norms. With regard to the modern society, Weber’s and Marx’s analytical concentrate on another sociological theory; Social structure (Lumen Learning; Little).
Social structures are simply general social behavior patterns and organization which carry on through time. The analysis of … form, and conflicts will be.
Figure 1. For Marx, each of the elements of the structure of a society depend on the society’s economic/financial structure (adopted from, Little)
According to Marx, financial conflict is the main means of change in a society. The base of all kinds … to Marx, financial conflict is the main means of change in a society. The base of all kinds of societies in history (their economic production mode) had their own characteristic type of financial challenges. This was simply because a production mode is basically composed of two things:…[break]…to ……

References

Works cited

Gerth, H. H., and C. Wright Mills. \\\\\\\\\\\\"Politics as a Vocation.\\\\\\\\\\\\" From Max Weber: Essays in Sociology (1946): 77-128.

Little, William. “Chapter 4. Society and Modern Life.” Introduction to Sociology – 2nd Canadian Edition. (n.d.). Web.

Lumen Learning. “Theoretical Perspectives on Society.” Society and Social Interaction. (n.d.). Web.

Marx, Karl, and Friedrich Engels. \\\\\\\\\\\\"The Communist Manifesto.\\\\\\\\\\\\" Selected Works bu Karl Marx and Frederick Engels. Neu York: International Publishers 1363 (1848). 108-127.

Marx, Karl. \\\\\\\\\\\\"Economic and philosophical manuscripts.\\\\\\\\\\\\" Early writings 333 (1844) 75–112.

Marx, Karl. Grundrisse: Foundations of the critique of political economy. Penguin UK, 2005. 82-111.

Steiner, Pierre, and John Stewart. \\\\\\\\\\\\"From autonomy to heteronomy (and back): The enaction of social life.\\\\\\\\\\\\" Phenomenology and the Cognitive Sciences 8.4 (2009): 527.

Weber, Max. The protestant ethic and the spirit of capitalism. New Introduction and Translation by Stephen Kalberg. ROXBURY PUBLISHING COMPANY, 2001. 13-37

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… well as its potential for expansion, especially into use by SMEs. To this end, this chapter describes more fully the study’s guiding Unified theory of Acceptance and Use of Technology theoretical/conceptual framework followed by an overview of the Internet of Things (IoT) and an analysis of current … fresh applicable insights that can be applied to similar situations involving the uptake of new technologies. This comprehensive model was termed the Unified theory of Acceptance and Use of Technology (UTAUT) which was regarded as highly relevant for the purposes of this study as well. As noted ……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Join thousands of other students and

"spark your studies".