Emergency Department Essays (Examples)

Studyspark

Study Document Study Document

Public Private Partnerships And Critical Infrastructure

Pages: 1 (331 words) Sources: 1 Document Type:Essay Document #:35083794

… and critical infrastructure across the country.
An example of public-private partnerships toward protection of U.S. critical infrastructure is evident in the field of emergency management. emergency management is a critical infrastructure that affects nearly all aspects of homeland security. Private sector organizations have increasingly partnered with the government in … critical infrastructure that affects nearly all aspects of homeland security. Private sector organizations have increasingly partnered with the government in various aspects of emergency management as part of public-private partnerships. Such partnerships are geared toward improving efforts in emergency response and recovery in the aftermath of a disaster. Moreover, they focus on enhancing the nation’s emergency prevention and mitigation capabilities. In the aftermath of the 9/11 attacks, the department of Homeland Security entered into a partnership with the private sector to help in recovery efforts. For example, this department partnered with Verizon to help in rebuilding network infrastructure, which……

References

Works Cited

Brooks, Chuck. “Public Private Partnerships And The Cybersecurity Challenge Of Protecting Critical Infrastructure.” Forbes, Forbes Magazine, 6 May 2019,  https://www.forbes.com/sites/cognitiveworld/2019/05/06/public-private-partnerships-and-the-cybersecurity-challenge-of-protecting-critical-infrastructure/#764fd8255a57 .

Busch, Nathan E, and Austen D Givens. “Public-Private Partnerships in Homeland Security: Opportunities and Challenges.” Homeland Security Affairs, vol. 8, no. 18, Oct. 2012,  https://www.hsaj.org/articles/233 .

Studyspark

Study Document Study Document

Homeland Defense And Private Security After September 11 Attacks

Pages: 6 (1861 words) Sources: 5 Document Type:Essay Document #:15174853

...Emergency department Introduction
The most significant terrorist attack on American soil was the September 11 attacks by Al Qaeda terrorists. The attacks changed the perception that America cannot suffer such attacks, considering how far away it is from where terrorist organizations such as Al Qaeda are based. The attacks also initiated America’s war against terrorism, which continues to date. Before the September 11 attacks, Americans had never experienced a large scale terrorist incident within their country’s borders. Moreover, most local and state security agencies had no experience with such attacks and were, therefore, very ill-prepared to respond to them. The only historic attacks or incidents that compare to the September 11 attacks were the airplane hijackings of the seventies and the eighties. The fact that Americans were not prepared and for the attacks and never expected such attacks to happen on their soil resulted in many people being very surprised and mentally……

References

References

Chanley, V. (2002). Trust in Government in the Aftermath of 9/11: Determinants and Consequences. Political Psychology, 23(3), 469-483. Retrieved May 11, 2020, from https://www.jstor.org/stable/3792588

Dugulin, R., & Niglia, A. (2015, May 17). The private sector in the protection of critical infrastructure - GRI. Global Risk Insights. https://globalriskinsights.com/2015/05/the-private-sectors-vital-role-in-the-protection-of-critical-infrastructure/

Gramlich, J. (2018, September 11). Since 9/11, Americans have seen anti-terrorism policy as a top priority. Pew Research Center.  https://www.pewresearch.org/fact-tank/2018/09/11/defending-against-terrorism-has-remained-a-top-policy-priority-for-americans-since-9-11/ 

Morgan, D. (2019). Homeland Security Research and Development: Homeland Security Issues in the 116th Congress. Current Politics and Economics of the United States, Canada, and Mexico, 21(1), 43-46.

Moteff, J., Copeland, C., & Fischer, J. (2003, January). Critical infrastructures: What makes an infrastructure critical?. Library of Congress Washington DC Congressional Research Service.

Studyspark

Study Document Study Document

COVID 19 In South Africa Nigeria And Swaziland

Pages: 7 (2030 words) Sources: 6 Document Type:literature review Document #:53851517

...Emergency department Literature Review on Coping Through The Use Of Informal Institutions during COVID 19 in South Africa, Nigeria, and Swaziland
The institutional theory deals with the outlines, regulations, standards, and procedures that are formulated in the institutions as commanding instructions for social behavior. This theory gives an understanding of how institutions are shaped, and the societal norms and frameworks are informed to all people of an organization. Communication is the sole indicator of how organizations are formulated with the help of formal rules and regulations, as that would reflect how they are conversed across all levels of the firm and in what way people are obeying them. This would ultimately build an organizational culture for coping with social and political issues. The informal institutions are socially shared instructions, typically unwritten, that are formed, transferred and imposed outside the official boundaries (Torniainen & Sasstamoinen, 2007), for example, giving tips to the food……

References

References

Coelho, A. (2019). The role of informal institutions in the enforcement of rules and how to improve corporate and public governance in Brazil: Studies based on a set of corporate governance cases involving state-owned companies (Working Paper). Retrieved from SSRN website  https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3434037 

Dacin, M.T., Goodstein, J. & Scott, W.R. (2002). Institutional theory and institutional change: Introduction to the special research forum. Academy of Management Journal, 45(1), 45- 47. DOI: 10.2307/3069284

Escandon-Barbosa, D.M., Urbano, D., Hurtado-Ayala, A., Paramo, J.S. & Dominguez, A.Z. (2019). Formal institutions, informal institutions, and entrepreneurial activity: A comparative relationship between rural and urban areas in Colombia. Journal of Urban Management, 8(3), 458-471.  https://doi.org/10.1016/j.jum.2019.06.002 

Estrin, S. & Prevezer, M. (2010). The role of informal institutions in corporate governance: Brazil, Russia, India, and China compared. Asia Pacific Journal of Management, 28, 41- 67.  https://doi.org/10.1007/s10490-010-9229-1 

Kaufmann, W., Hooghiemstra, R. & Feeney, M.K. (2018). Formal institutions, informal institutions, and red tape: A comparative study. Public Administration, 96(2), 386-403. https://doi.org/10.1111/padm.12397

Meluch, A.L. (2016, August). Understanding the organizational and institutional origins of social support in a cancer support center. (Unpublished doctoral dissertation). Retrieved from https://etd.ohiolink.edu/!etd.send_file?accession=kent1466944822&disposition=inline

Torniainen, T.J. & Sasstamoinen, O.J. (2007). Formal and informal institutions and their hierarchy in the regulation of the forest lease in Russia. Forestry: An International Journal of Forest Research, 80(5), 489-501.  https://doi.org/10.1093/forestry/cpm033 

Studyspark

Study Document Study Document

Weapons Of Mass Destruction WMD Antifa

Pages: 13 (3787 words) Sources: 12 Document Type:Research Paper Document #:67320498

...Emergency department Weapons of Mass Destruction
1
An electro-magnetic pulse (EMP) attack could crash the American economy and bring virtually every industry to a standstill—such is the reliance of modern business upon the digital infrastructure. Thus, considering an EMP attack is something that government should take very seriously. As more and more of the world becomes dependent upon cyber infrastructure for the maintenance of other systems, the complexity of the security services of a country grows and intensifies. Is it possible therefore that there is an overreliance upon technology and that this overreliance can actually compromise a country’s progress and increase its risk of falling into ruin should a sudden attack like an EMP attack hit where it hurts most? Absolutely—and both state and non-state actors know that, which is why either one could conduct a high altitude EMP attack upon the US. The consequences would be devastating.
Non-state actors are just……

References

References

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Christenson, G. (2015). CBRN response. National Guard Bureau.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from  https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat 

Jennings, P. (2006). Miami port poses serious risks. Retrieved from  https://abcnews.go.com/WNT/story?id=131634&page=1 

Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from  http://www.johnstonsarchive.net/terrorism/chembioattacks.html 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Maras, M-H. (2014). Transnational Security. Florida: CRC Press.

Studyspark

Study Document Study Document

Quality Improvement Plan

Pages: 8 (2259 words) Sources: 3 Document Type:Essay Document #:15328013

Justification
The department would want to reduce customer complaints from the current 7% to at least 1%. For the department to achieve this goal, there is a need to have a quality improvement plan that will analyze the services offered by the department from the viewpoint of the customer. The service department must establish the root cause of the customer complaints and institute measures that are aimed at reducing complaints. By focusing on what is … the customer complaints and institute measures that are aimed at reducing complaints. By focusing on what is truly value-add to the customer, the department can manage to come up with meaningful and innovative outputs that will be suitable to the customer. Using the COPIS model, the department can transform the process by focusing on what the customer would be delighted with (Brown, 2019). This way the department will then consider the new outputs that……

References

References

Brown, C. (2019). Why and how to employ the SIPOC model. Journal of business continuity & emergency planning, 12(3), 198-210.

Carvalho, M. S., Magalhaes, D. S., Varela, M. L., Sa, J. O., & Gonçalves, I. (2016). Definition of a collaborative working model to the logistics area using design for Six Sigma. International Journal of Quality & Reliability Management, 33(4), 465-475.

Shojaie, A. A., Raissi, S., & Dogahe, R. A. (2016). Impact analysis of TQM\\\\\\'s hard aspects on sigma level in electronics and telecommunication production process. International Journal of Productivity and Quality Management, 18(4), 425-439.

 

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

...Emergency department Executive Summary
The purpose of this study is to develop timely and informed answers to a series of guiding research questions and subquestions to identify the risks and barriers that are associated with Internet of Things implementations. These types of studies are important today because the Internet of Things is changing the manner in which companies of all sizes and types operate their businesses, and current trends indicate that these implementations are increasing exponentially. The Internet of Things allows conventional computer-based networks to incorporate data collected from everyday objects to provide real-time analyses and new applications for these technologies are being developed every day. Indeed, there are already more mobile devices in use around the world than there are people, and most authorities agree that the Internet of Things deployments will continue to increase well into the foreseeable future. Chapter one of the study provides the rationale in support of……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

What Followers Can Learn From Their Leaders During Crisis

Pages: 10 (2861 words) Sources: 5 Document Type:Research Paper Document #:13609293

… needed to answer the research question. The population from whom the data was gathered was only made up of followers/ subordinates from the department of Justice. The data was gathered through interviewing the subordinates. The questions for the interviews were designed to find out what the subordinates … find out what the subordinates wanted from their leaders in times of crisis. A total of 3 followers working in the United States department of Justice participated in the study. The three included two Sheriff Deputies and a Marshall. The principal investigator conducted the interviews by sending … interview data gathered was then coded to eliminate identifying information and then analyzed via thematic analysis.
Table 1. Interviewees
Interviewee code
Profession
Position
Region/department of work
Int – 1
Sheriff Officer
Deputy
Miami-Dade
Int – 2
Sheriff Officer
Deputy
Brevard County
Int – 3
Soldier
Marshall
U.S. … of work
Int – 1……

References

References

Birnbaum, T., & Friedman, H. H. (2014). Ezra and Nehemiah: Lessons in Moral and Spiritual Leadership. Available at SSRN 2390230.

Carrington, D. J., Combe, I. A., & Mumford, M. D. (2019). Cognitive shifts within leader and follower teams: Where consensus develops in mental models during an organizational crisis. The Leadership Quarterly, 30(3), 335-350.

Harter, J. (2019). Why Some Leaders Have Their Employees\\\\\\' Trust, and Some Don\\\\\\'t. Workplace. Gallup.

Hofmeyr, K., Cook, J., & Richardson, A. (2011). How leaders generate hope in their followers. South African Journal of Labour Relations, 35(2), 47-66.

Kranke, D., Gin, J., Der-Martirosian, C., Weiss, E. L., & Dobalian, A. (2020). VA social work leadership and compassion fatigue during the 2017 hurricane season. Social Work in Mental Health, 18(2), 188-199.

Patton, C. (2017). What made Nehemiah an effective leader?. Journal of Applied Christian Leadership, 1(1), 8-14.

Rogers, A. P., & Barber, L. K. (2019). Workplace intrusions and employee strain: the interactive effects of extraversion and emotional stability. Anxiety, Stress, & Coping, 32(3), 312-328.

Skeet, A. (2020, April 4). Ethical Followership in Times of Crisis. Markkula Center for Applied Ethics, Santa Clara University.

Studyspark

Study Document Study Document

Social Work Policy For Sex Trafficking

Pages: 8 (2423 words) Sources: 6 Document Type:Essay Document #:78918009

… of 2013, as a social policy, institutes, and reinforces programs to facilitate the prevention of child marriage. Also, it positions provisions of immediate emergency response within the department of State to offer a fast-pace response in regions experience disasters and crises where individuals are especially vulnerable to being trafficked. Furthermore, this … Arab Nations making up the remaining 4 percent and 1 percent respectively (International Labour Organization, 2017).
Specifically, in the United States, the State department has not yet provided a formal approximation of sex trafficking victims. However, based on their report presented in 2019, it was established that ……

References

References

Alliance to End Slavery and Trafficking. (2017). Summary of the Trafficking Victims Protection Act (TVPA) and Reauthorizations FY 2017. Retrieved from:  https://endslaveryandtrafficking.org/summary-trafficking-victims-protection-act-tvpa-reauthorizations-fy-2017-2/ 

Benoit, C., Smith, M., Jansson, M., Healey, P., & Magnuson, D. (2019). “The prostitution problem”: Claims, evidence, and policy outcomes. Archives of Sexual Behavior, 48(7), 1905-1923.

Brooks, A., & Heaslip, V. (2019). Sex trafficking and sex tourism in a globalized world. Tourism Review of AIEST - International Association of Scientific Experts in Tourism, 74(5), 1104-1115. doi:http://dx.doi.org/10.1108/TR-02-2017-001

Bruckert, C., & Parent, C. (2002). Trafficking in human beings and organized crime: A literature review (pp. 1-35).

Clawson, H. J., Dutch, N., Solomon, A., & Grace, L. G. (2009). Human trafficking into and within the United States: A review of the literature. Washington, DC: Office of the Assistant Secretary for Planning and Evaluation, US Department of Human and Health Services. Retrieved December 25, 2009.

Greenbaum, V. J. (2017). Child sex trafficking in the United States: Challenges for the healthcare provider. PLoS medicine, 14(11).

International Labour Organization. (2017). Global Estimates of Modern Slavery. Retrieved from:  https://www.ilo.org/wcmsp5/groups/public/---dgreports/---dcomm/documents/publication/wcms_575479.pdf 

Kelly, C. (July 30, 2019). 13 sex trafficking statistics that explain the enormity of the global sex trade. USA Today. Retrieved from:  https://www.usatoday.com/story/news/investigations/2019/07/29/12-trafficking-statistics-enormity-global-sex-trade/1755192001/

Studyspark

Study Document Study Document

Higher Education Labor Rights Faculty Tenure

Pages: 5 (1587 words) Sources: 6 Document Type:Essay Document #:61972797

… that may legally permit the termination of a tenured faculty member would be the restructuring of the institution to the degree that whole department were eliminated, thus eliminating all associated faculty within that department. Other extenuating circumstances that would legally permit the institution to terminate tenured faculty would be serious legal or ethical violations. Otherwise, though, tenured ……

References

References

Alleman, N.F. & Haviland, D. (2017). “I expect to be engaged as an equal”: collegiality expectations of full-time, non-tenure-track faculty members. High Educ (2017) 74: 527.  https://doi.org/10.1007/s10734-016-0062-4 

American Association of University Professors (AAUP 2019). Tenure. Retrieved from:  https://www.aaup.org/issues/tenure 

Curnalia, R. M. L., & Mermer, D. (2018). Renewing our commitment to tenure, academic freedom, and shared governance to navigate challenges in higher education. Review of Communication, 18(2), 129–139.doi:10.1080/15358593.2018.1438645

Eastman, N. J., & Boyles, D. (2015). In defense of academic freedom and faculty governance: John Dewey, the 100th anniversary of the AAUP, and  the Threat of Corporatization

Mitchell, M., Palacios, V. & Leachman, M. (2015). States are still funding higher education below pre-recession levels. Journal of Collective Bargaining in the Academy, April 2015, Article 71. Retrieved from:  https://thekeep.eiu.edu/cgi/viewcontent.cgi?article=1524&context=jcba 

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… Strategic Deterrence”, Journal of Strategic Security 4, no. 2 (2011):1] [2: Atul Agarwal & CERT-IN, “Cyber Espionage, Infiltration and Combating Techniques”, Indian Computer emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf]
Background Information
Cyber espionage has become one of the most important and complex international problem in today’s world. It ……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".