Economy Essays (Examples)

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

...Economy What is Cybercrime?
Definition of Cybercrime
Cybercrime is any criminal activity that is conducted using computers or the Internet. As today’s digital natives have the most experience with computers, cybercriminals tend to be of the Millennial generation—i.e., born after 1980. They are young, digitally sophisticated, and able to operate with a degree of professionalism and discipline that allows them to hide their crimes beneath legitimate-looking facades. Spearphishing is one example of a type of cybercrime used by professional criminals to lure victims into traps or sites that have the appearance of legitimacy.
Cybercrime is committed by people who know computer code, understand computer systems and networks, know how to navigate databases, access data storage, get past firewalls, exploit cloud computing services, control the Internet of Things and more. They
How Cybercrime Has Evolved over Time
Computers and the rise of the Internet ushered in the era of cybercrime. IBM’s first……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

Toyota Motor Corporation Lean Operations

Pages: 1 (326 words) Sources: 1 Document Type:Essay Document #:40925770

… through such continual improvement and monitoring, the easier it becomes to enhance this efficacy over time.
Reference
Harris, L. (2007). Investing in our economy. Capacity Magazine. Retrieved from: http://www.rcbi.org/index.php/viewarticle/130-capacity-magazine/spring-2007/features/336-lean-manufacturing-made-toyota-the-success-story-it-is-todayinvesting-in-our-economy

References

Reference

Harris, L. (2007). Investing in our economy. Capacity Magazine. Retrieved from:

http://www.rcbi.org/index.php/viewarticle/130-capacity-magazine/spring- 2007/features/336-lean-manufacturing-made-toyota-the-success-story-it-is- todayinvesting-in-our-economy

 

Studyspark

Study Document Study Document

Strategy For National Defense

Pages: 7 (2014 words) Sources: 7 Document Type:Essay Document #:59270793

...Economy Part I – Regional Security Issue within the Indo-Asia-Pacific Region
The National Security Strategy (NSS) focuses on promoting the security of the United States on the premise that a safe environment is critical toward enhancing the prosperity of the nation. This strategy goes beyond promoting the interests of America and includes safeguarding the interests of partners/allies around the world. Through the strategy, the United States responds to the increasing military, political and economic competitions encountered worldwide. As part of ensuring suitable response to these competitions, NSS includes a regional context strategy through which the United States tailors it approaches to various regions worldwide to protect her national interests.[footnoteRef:1] The United States requires integrated regional strategies that acknowledge the nature and extent of threats, intensity of rivalry, and potential opportunities across all regions. Such strategies become the premise of International Relations and U.S. foreign policy. [1: The White House, “National Security……

References

Bibliography

Davidson, P.S. “Statement of Admiral Philip S. Davidson, U.S. Navy Commander, U.S. Indo-Pacific Command Before the House Armed Services Committee on U.S. Indo-Pacific Command Posture.” United States Senate, March 27, 2019,  https://www.armed-services.senate.gov/imo/media/doc/Davidson_02-12-19.pdf 

Department of Defense. “Summary of the 2018 National Defense Strategy of the United States of America.” National Defense Strategy, 2018,  https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf 

Muller, K. “The Essence of Coercive Air Power: A Primer for Military Strategies.” Air University,  https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/mueller.pdf 

Pape, R.A. Bombing to Win: Air Power and Coercion in War, 1st ed. Ithaca, NY: Cornell University Press, 1996.

Tammen, R.L., Kugler, J. & Lemke, D. “Power Transition Theory.” International Relations, June 27, 2017, DOI: 10.1093/OBO/9780199743292-0038

The White House. “National Security Strategy of the United States of America.” The White House, December 2017, https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf

Withers, P. “Integrating Cyber with Air Power in the Second Century of the Royal Air Force.” Medium, March 4, 2019,  https://medium.com/raf-caps/integrating-cyber-with-air-power-in-the-second-century-of-the-royal-air-force-bca74b8d42ed 

 

Studyspark

Study Document Study Document

External Environment Of Salesforce

Pages: 3 (1049 words) Sources: 4 Document Type:Essay Document #:20905623

...Economy Threats
There are several challenges and threats that Salesforce is confronting due to external factors. Politically, the environment of catering to political factors is growing and due to uncertainties, it is affecting all the businesses especially the international business (Pratap, 2019). Salesforce and other software companies face political threats from countries which puts their companies (domestic business) over international services which makes it difficult and complex for the companies to enter into various countries because of these barriers (Pratap, 2019). It constricts the scope of the business. Also, as the technology is increasing, the governments are moving towards more private data conservation due to which there are frameworks and laws protecting their countries’ data (Salesforce.com SWOT and Pestle Anlaysis, 2018) threatening the growth of the company.
There are some socio-economic threats and challenges as well as the people are changing and the trends and the buying patterns keep changing because……

References

References

Pratap, A. (2019, November 18). PESTEL ANALYSIS OF CRM BRAND SALESFORCE. Notesmatic. Retrieved from  https://notesmatic.com/2019/10/pestel-analysis-of-crm-brand-salesforce/ 

Pratap, A. (2019, March 2). SALESFORCE.COM SWOT ANALYSIS. Notesmatic. Retrieved from  https://notesmatic.com/2018/09/salesforce-com-swot-analysis/ 

Salesforce.com SWOT Analysis, Competitors & USP. (n.d.). MBA Skool. Retrieved from  https://www.mbaskool.com/brandguide/it-technology/2609-salesforcecom.html 

Salesforce.com SWOT and Pestle Anlaysis. (2018, December). S & P Swot and Pestle.com. Retrieved from  https://www.swotandpestle.com/salesforce/ 

Studyspark

Study Document Study Document

Drug Abuse

Pages: 8 (2545 words) Sources: 21 Document Type:literature review Document #:24528043

… or civic duty, and a decline in mental and physical health. The impacts extend beyond the individual and affect society, the family, the economy and eventually governments, which are tasked with addressing the issues.
The strong relationship between social inequality and drug abuse as well as peer ……

References

References

Baggio, S., Spilka, S., Studer, J., Iglesias, K., & Gmel, G. (2016). Trajectories of drug use among French young people: Prototypical stages of involvement in illicit drug use. Journal of Substance Use, 21(5), 485-490.

Bonyani, A., Safaeian, L., Chehrazi, M., Etedali, A., Zaghian, M., & Mashhadian, F. (2018). A high school-based education concerning drug abuse prevention. Journal of education and health promotion, 7.

Chu, Y. W. L. (2015). Do medical marijuana laws increase hard-drug use?. The Journal of Law and Economics, 58(2), 481-517.

Downes, D. (2017). The drug addict as a folk devil. In Drugs and politics (pp. 89-97). Routledge.

Goodchild, M., Nargis, N., & d\\'Espaignet, E. T. (2018). Global economic cost of smoking-attributable diseases. Tobacco control, 27(1), 58-64.

Grant, C. N., & Bélanger, R. E. (2017). Cannabis and Canada’s children and youth.  Paediatrics & child health, 22(2), 98-102.

Herbert, A., Gonzalez-Izquierdo, A., McGhee, J., Li, L., & Gilbert, R. (2016). Time-trends in rates of hospital admission of adolescents for violent, self-inflicted or drug/alcohol-related injury in England and Scotland, 2005–11: population-based analysis. Journal of Public Health, 39(1), 65-73.

Henkel, D., & Zemlin, U. (2016). Social inequality and substance use and problematic gambling among adolescents and young adults: a review of epidemiological surveys in Germany. Current drug abuse reviews, 9(1), 26-48.

Studyspark

Study Document Study Document

The Modern World Of Autonomy Vs Heteronomy

Pages: 5 (1560 words) Sources: 8 Document Type:Essay Document #:86232532

… technology, and high-tech organizations like Microsoft, RIM, and Apple are its version of steel and railroad production companies. Given that the information societies’ economy is steered by knowledge, great power lies among those in control of the production, storage, and distribution of information (Steiner and Stewart, 527). ……

References

Works cited

Gerth, H. H., and C. Wright Mills. \\\\\\\\\\\\"Politics as a Vocation.\\\\\\\\\\\\" From Max Weber: Essays in Sociology (1946): 77-128.

Little, William. “Chapter 4. Society and Modern Life.” Introduction to Sociology – 2nd Canadian Edition. (n.d.). Web.

Lumen Learning. “Theoretical Perspectives on Society.” Society and Social Interaction. (n.d.). Web.

Marx, Karl, and Friedrich Engels. \\\\\\\\\\\\"The Communist Manifesto.\\\\\\\\\\\\" Selected Works bu Karl Marx and Frederick Engels. Neu York: International Publishers 1363 (1848). 108-127.

Marx, Karl. \\\\\\\\\\\\"Economic and philosophical manuscripts.\\\\\\\\\\\\" Early writings 333 (1844) 75–112.

Marx, Karl. Grundrisse: Foundations of the critique of political economy. Penguin UK, 2005. 82-111.

Steiner, Pierre, and John Stewart. \\\\\\\\\\\\"From autonomy to heteronomy (and back): The enaction of social life.\\\\\\\\\\\\" Phenomenology and the Cognitive Sciences 8.4 (2009): 527.

Weber, Max. The protestant ethic and the spirit of capitalism. New Introduction and Translation by Stephen Kalberg. ROXBURY PUBLISHING COMPANY, 2001. 13-37

Studyspark

Study Document Study Document

Risk Management And Insurance

Pages: 4 (1093 words) Sources: 1 Document Type:Questionnaire Document #:95274016

… a dollar will change over time, a diversified investment portfolio will adjust to reflect the prevailing prices of commodities and services in the economy with inflation factored in. Common stocks represent the value of companies offering goods and services in the economy and their value will generally move in the direction of the general prices. Variable annuities have been consistent with this theory. The number ……

References

References

Vaughan, E. J., & Vaughan, T. (2007). Fundamentals of risk and insurance. John Wiley & Sons.

 

Studyspark

Study Document Study Document

Code Of Ethics For Managers In Acquisition

Pages: 11 (3162 words) Sources: 5 Document Type:Research Paper Document #:25977313

… as well. In essence, corruption represents the trade-off between the personal gain for the government officials in question versus the overall government or economy.
Combatting
corruption is a complex task, but one of the elements of this task is to develop an effective code of ethics to ……

References

References

Adelstein, J. & Clegg, S. (2016) Code of ethics: A stratified vehicle for compliance. Journal of Business Ethics. Vol. 138 (1) 53-66.

Lazeros, M. (2008) Leaders can learn from Druyun’s ethical lapses and their consequences. USAWC Research Project. Retrieved October 25, 2019 from  https://apps.dtic.mil/dtic/tr/fulltext/u2/a479019.pdf 

McConnnell, A. & Rood, T. (1997) Ethics in government: A survey of misuse of position for personal gain and its implications for developing acquisition strategy. Journal of Business Ethics. Vol. 16 (1997) 1107-1116.

McConnell, T. (2018). Moral dilemmas. Stanford Encyclopedia of Philosophy Retrieved October 25, 2019 from  https://plato.stanford.edu/entries/moral-dilemmas/ 

Neu, D., Everett, J. & Rahaman, A. (2015) Preventing corruption within government procurement: Constructing the disciplined and ethical subject. Critical Perspectives on Accounting. Vol. 28 (2015) 49-61.

Studyspark

Study Document Study Document

Valiant

Pages: 8 (2450 words) Sources: 3 Document Type:Marketing Plan Document #:95871630

… are valued to be worth approximately $700 billion in the United States and roughly £80 billion in Britain. Statistics indicate that the LGBT economy in America comprises of LGBT businesses that bring in $1.7 trillion to the entire economy and generate tens of thousands of jobs on an annual basis (NGLCC, 2019). However, one of the key trends within this industry is ……

References

References

NGLCC. (2019). About NGLCC. Retrieved from:  https://www.nglcc.org/ 

Hill, C., & Jones, G. (2011). Essentials of strategic management. Nelson Education.

Hill, C. W., Jones, G. R., & Schilling, M. A. (2014). Strategic management: theory: an integrated approach. Cengage Learning.

 

Studyspark

Study Document Study Document

Counterintelligence Issues Within The United States

Pages: 18 (5457 words) Sources: 29 Document Type:Research Paper Document #:72238996

...Economy Why Ethical Egoism is a Problematic Framework for Intelligence
CI Literature Review
Introduction
The aim of this examination of the literature is to fill the wide gap that remains in counterintelligence research regarding an appropriate ethical standard that can guide and foster an ethical culture, as called for by Bellaby (2012) and Valentine (2016). The purpose of this review is to identify the lessons that have been learned and presented by researchers on this topic, and to identify an appropriate theoretical framework for assessing the way forward. The research question for this study is: How can the US counterintelligence enterprise support collaboration among the various USIC members and the private sector in an ethical and productive manner? The ultimate purpose of this study is to propose a standardized ethical framework for guiding the counterintelligence program as it works to collaborate with the private sector in the 21st century. Therefore, the……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. "The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles." Bachelor's thesis, Università Ca'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Cohen, Shlomo. 2016. "Are There Moral Limits to Military Deception?." Philosophia 44 (4): 1305-1318.

Coyne, John, Peter Bell, and Shannon Merrington. 2013. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2 (10): 27-37.

Erskine, Toni. 2004. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. "Strategic denial and deception." International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".