Ethical Behavior Essays (Examples)

Studyspark

Study Document Study Document

Elder Abuse

Pages: 7 (2239 words) Sources: 4 Document Type:Term Paper Document #:22335640

… shows that men are by far more likely to be the perpetrators of the sexual abuse of elders (Malmedal, Iversen & Kilvik, 2015).
ethical Dimensions
Why Is Elder Abuse An ethical Issue?
On the surface, elder abuse appears to be a cut-and-dry ethical issue. However, the different phenomena comprising elder abuse are far more complex than it would seem. Not all cases of elder abuse involve … verbal abuse and aggression. Financial abuse and psychological abuse vary in their severity; moreover, cultural differences may impact perceptions of abuse. Competency creates ethical dilemmas, particularly when it comes to the decision-making capacity of elders due to cognitive decline and the legal role that family members play … those whose work does not otherwise focus on the geriatric population. An aging population and the growing numbers of seniors in…[break]…elders—particularly women—have tolerated behavior that could be considered abusive by some cultural frames of……

References

References

Falk, N. L., Baigis, J., Kopac, C., (August 14, 2012) \\\\\\\\\\\\"Elder Mistreatment and the Elder Justice Act\\\\\\\\\\\\" OJIN: The Online Journal of Issues in Nursing 17(3).

Forum on Global Violence Prevention; Board on Global Health; Institute of Medicine; National Research Council (2014). Ethical considerations. Washington (DC): National Academies Press (US); 2014 Mar 18.

Lacher, S., Wettstein, A., Senn, O., et al. (2016). Types of abuse and risk factors associated with elder abuse. Swiss Medical Weekly 2016(146): 1-10.

Lachs, M.S., Teresi, J.A., Ramirez, M., et al. (2016). The prevalence of ersident-to-resident elder mistreatment in nursing homes. Annals of Internal Medicine 165(4):229-236.

Malmedal, W., Iversen, M.H. & Kilvik, A. (2014). Sexual abuse of older nursing home residents: A literature review. Nursing Research and Practice 2015(Article 902515):  http://dx.doi.org/10.1155/2015/902515 

Roberto, K.A. (2016). The complexities of elder abuse. American Psychologist 71(4): 302-311.

Saghafi, A., Bahramnezhad, F., Poormollamirza, A., et al. (2019). Examining the ethical challenges in managing elder abuse: a systematic review. Journal of Medical Ethics and History of Medicine 2019(12):  https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6642445/ 

Wangmo, T., Nordstrom, K. & Kressig, R.W. (2017). Preventing elder abuse and neglect in geriatric institutions: Solutions from nursing care providers. Geriatric Nursing 38(5): 385-392.

Studyspark

Study Document Study Document

Self Regulation Proposal

Pages: 6 (1825 words) Sources: 6 Document Type:Essay Document #:60406308

… self-regulation—on the one condition that certain standards and concepts are applied to ensure that self-regulation does not turn into a license to act ethical.
For Self-Regulation
One of the best reasons for self-regulation is that existing regulation regime is simply not an effective option (Greene & Odorski, … regulation of the regulators—which, of course, is the crux of the problem. Regulation can be piled upon regulation, but unless personal accountability and ethical leadership is demonstrated, the entire issue of regulation can never truly be saved. Thus, regulation is ultimately a culture issue. A company’s culture … saved. Thus, regulation is ultimately a culture issue. A company’s culture must be firmly planted on standards and concepts that promote accountability and ethical leadership. Only in this way can self-regulation be effective.
In the light of existing regulatory systems failing to produce the desired outcomes, it … level staff must be held……

References

References

Arner, D. W., Barberis, J., & Buckey, R. P. (2016). FinTech, RegTech, and the reconceptualization of financial regulation. Nw. J. Int'l L. & Bus., 37, 371.

Arnone, M., & Padoan, P. C. (2008). Anti-money laundering by international institutions: a preliminary assessment. European Journal of Law and Economics, 26(3), 361-386.

Greene, E., & Odorski, C. (2015). SEC enforcement in the financial sector: addressing

Omarova, S. T. (2010). Rethinking the future of self-regulation in the financial industry. Brook. J. Int'l L., 35, 665.post-crisis criticism. Bus. L. Int'l, 16, 5.

Omarova, S. T. (2011). Wall street as community of fate: Toward financial industry self-regulation. University of Pennsylvania Law Review, 159(2), 411-492.

Pritchard, A. C. (2003). Self-regulation and securities markets. Regulation, 26, 32.

Studyspark

Study Document Study Document

Healthcare Scientific Merit

Pages: 11 (3267 words) Sources: 8 Document Type:Paper Document #:78470537

… an evaluation of how the research work contributes to scientific knowledge and research theory, its dependability and credibility, approaches to deal with any ethical concerns relating to the research, and how the researchers applied different techniques of inquiry.
Advancement of the scientific knowledge base
The research work … worldwide (Eccles et al., 2005; Vahdat…[break]…section. Given the above information, the data and resulting findings, as described, are consistent.
Strategies for Addressing the ethical Concerns in the Design
In any research study, participants’ and researchers’ interactions throughout the study pose ethical challenges for the researcher. The researcher is involved at various points in the study, and this makes it necessary to formulate strategies to … the researcher. The researcher is involved at various points in the study, and this makes it necessary to formulate strategies to address such ethical concerns. In this study, there was no existing personal relationship between the……

References

References

Brook, R. H., & Vaiana, M. E. (2015). Using the knowledge base of health services research to redefine health care systems. Journal of general internal medicine, 30(10), 1547-1556.

Cutcliffe, J. R., & McKenna, H. P. (1999). Establishing the credibility of qualitative research findings: the plot thickens. Journal of advanced nursing, 30(2), 374-380.

Doekhie, K. D., Strating, M. M., Buljac?Samardzic, M., van de Bovenkamp, H. M., & Paauwe, J. (2018). The different perspectives of patients, informal caregivers, and professionals on patient involvement in primary care teams. A qualitative study. Health Expectations, 21(6), 1171-1182.

Eccles, M., Grimshaw, J., Walker, A., Johnston, M., & Pitts, N. (2005). Changing the behavior of healthcare professionals: the use of theory in promoting the uptake of research findings. Journal of clinical epidemiology, 58(2), 107-112.

Leedy, P.D. & Ormrod, J. E. (2019). Practical research: Planning and design, 12th edition. Pearson Education, Hudson Street, NY.

Sanjari, M., Bahramnezhad, F., Fomani, F. K., Shoghi, M., & Cheraghi, M. A. (2014). Ethical challenges of researchers in qualitative studies: The necessity to develop a specific guideline. Journal of medical ethics and history of medicine, 7.

Swan, J., Clarke, A., Nicolini, D., Powell, J., Scarbrough, H., Roginski, C., ... & Taylor-Phillips, S. (2012). Evidence in Management Decisions (EMD): advancing knowledge utilization in healthcare management.

Thomas, D. R. (2017). Feedback from research participants: are member checks useful in qualitative research?. Qualitative Research in Psychology, 14(1), 23-41.

Studyspark

Study Document Study Document

Importance Of Ethics Within The Criminal Justice

Pages: 6 (1652 words) Sources: 5 Document Type:Essay Document #:18050591

… accused fair justice application (Kramer, 2018). In this essay, the significance of ethics within the criminal justice system is discussed. Also, instances of ethical behavior, as well as the legal responsibilities suffered by the doers of such action, are presented.
Importance of ethics within the criminal justice
Ethics … action, are presented.
Importance of ethics within the criminal justice
Ethics offers answers to several questions within the system. What is considered bad behavior or conduct? What is the most suitable compensation for victims of crime, and what is the befitting punishment for lawbreakers? These are few … rights allows them to act in their very own best interest (Kramer, 2018). Lawyers are expected to stick to the guidelines of professional behavior in all criminal cases; the jury should fairly take into consideration all of the provided facts to establish if the defendant of innocent … when ethics are not……

References

References

Braswell, M. C., McCarthy, B. R., & McCarthy, B. J. (2017). Justice, crime, and ethics. Taylor & Francis.

Kramer, L. (2018). Why Is Ethics Important in Criminal Justice? Legal Beagle. Retrieved from  https://legalbeagle.com/6386561-ethics-important-criminal-justice.html 

News Services (2008, June 13). Woman gets $7.7M in false arrest case, Chicago Tribune. Retrieved from  https://www.chicagotribune.com/news/ct-xpm-2008-06-13-0806130382-story.html 

Sahakian, W. S., & Sahakian, M. L. (1966). Ideas of the great philosophers (No. 218). Barnes & Noble Publishing.

Souryal, S. S., & Whitehead, J. T. (2019). Ethics in criminal justice: In search of the truth. Routledge. Case law

Indiana Supreme Court Disciplinary Commission vs. Dana E. F. DANIELS, Supreme Court Cause No. 49S00-1402-DI-133, (2015).

Jackson v. City of Chicago, No. 03 C 8289, (July 31, 2006).

Studyspark

Study Document Study Document

Army Organization Analysis Equal Opportunity Program

Pages: 5 (1483 words) Sources: 5 Document Type:Research Paper Document #:96709465

… includes several components, such as training, classes, materials, the establishment of a special harassment hotline, and procedures for reporting and prosecuting violations of ethical or behavior codes related to equal opportunity comportment.
The reasons behind the Equal Opportunity Program are expressly stated on the Army’s website and include an … at risk for victimization.
What the Equal Opportunity Program provides is a set of overarching values and ethics that permeates all interactions and behavior within every single unit, team, or department. Yet the act of constructing those shared values requires the participation of all personnel. Any time … basic underlying assumptions. Artifacts include the “visible and feelable structures and processes,” which are fairly easy to discuss, as well as the “observed behavior” that is being called into question (Schein, 1992, p. 24). Unfortunately, some behavior are difficult to recognize or “decipher,” making it challenging to have discussions that can……

References

References

“The Army Values,” (n.d.). Retrieved from:  https://www.army.mil/values/ 

Daft, R. L. (2016). Organization Theory & Design (12th ed.). Boston, MA: Cengage Learning.

Morgan, G. (2006). Images of organization. Sage Publications, Inc

Schein, E. H. (1992). Organizational Culture and Leadership. 2nd ed. San Francisco: Jossey-Bass Publishers.

United States Army (2014). Army equal opportunity program. Retrieved from:  https://www.army.mil/standto/archive_2014-03-21/ 

Studyspark

Study Document Study Document

Walmart And Starbucks Sustainability

Pages: 10 (2956 words) Sources: 15 Document Type:Essay Document #:82035570

… on several fronts. These are complex issues, and they receive some complexity in their treatment. Starbucks has four main areas of focus: community, ethical sourcing, environment, and diversity. Roughly, community and diversity would fall into the category of social responsibility, as these cover community service, youth action, … a valuable marketing tool. This might inform the efforts of Starbucks, especially since when the company started there was little in the way ethical consideration from the major industrial coffee producers; this is one of many points of differentiation for the company. Even Walmart might be using ……

References

References

Aguilera, R, Rupp, D., Williams, C. & Ganapathi, J. (2005) Putting the S back in corporate social responsibility: A multi-level theory of social change in organizations. Academy of Management Review. (2005). Retrieved November 4, 2017 from  https://www.ideals.illinois.edu/bitstream/handle/2142/1768/TS_Aguilera.pdf?sequence=2&isAllowed=y 

Banerjee, S. (2008) Corporate social responsibility: the good, bad and the ugly. Critical Sociology. Vol. 34 (1)

Blowfield, M., Frynas, J. (2005) Editorial setting new agendas: Critical perspectives on corporate social responsibility in the developing world. International Affairs. Vol. 81 (3) 499-513.

Brammer, S., Jackson, G. & Matten, D. (2012). Corporate social responsibility and institutional theory: New perspectives on private governance. Socio-Economic Review. Vol. 10 (2012) 3-28.

Campbell, J. (2007) Why would corporations behave in socially responsible ways? An institutional theory of corporate social responsibility The Academy of Management Review. Vol. 32 (3) 946-967.

Epstein, E. (1987) The corporate social policy process: Beyond business ethics, corporate social responsibility, and corporate social responsiveness. California Management Review. Vol. 29 (3) 99.

Friedman, M. (1970) The social responsibility of business is to increase its profits. New York Times Magazine. Retrieved November 4, 2017 from https://www.colorado.edu/studentgroups/libertarians/issues/friedman-soc-resp-business.html

Heningway, C. & Maclagan, P. (2004) Managers' personal values as drivers of corporate social responsibility. Journal of Business Ethics. Vol. 50 (1) 33-44.

Studyspark

Study Document Study Document

How Media Coverage Of Operation Desert Storm Was Influenced By The

Pages: 11 (3336 words) Sources: 8 Document Type:Essay Document #:61111774

The Effects of Operation Desert Storm on Human behavior, Human Expression and Ethics
Introduction
In early 1991, the United States launched Operation Desert Storm in response to Saddam Hussein’s invasion and occupation … United States, the 300 or so casualties (see Appendix A) that resulted from this “100-hour war” were incredibly minimal, but the corresponding human behavior that resulted from this war were not. As noted in the introduction, some of the behavior responses to this conflict included an initial “rally ‘round the flag” reaction that swept the nation which is commonplace during times of perceived ……

References

References

Curtis, J. (2015, November). Reflecting on strategic results of Operation Desert Storm. Army, 65(11), 24-27.

Khan, H. (2011, July 1). An unbiased estimate of present American competitiveness from deontological and teleological perspectives of utilitarianism. Competition Forum, 9(2), 348-352.

Klotzer, C. L. (2002, October). A lesson for Americans: Desert Storm operation reports were full of lies and distortions. St. Louis Journalism Review, 32(250), 34-39.

Lindsey, J. M. & Smith, C. (2003, Summer). Rally 'round the flag: Opinion in the United States before and after the Iraq War. Brookings Review, 21(3), 20-24.

Operation Desert Storm. (2020). U.S. History. Retrieved from  https://www.ushistory.org/  us/60a.asp.

Stilwell, B. (2015, September 12). 21 facts about the first Gulf War. Military.com. Retrieved from  https://www.military.com/undertheradar/2015/09/21-facts-about-the-first-gulf-war .

Taylor, A. (2016, January 14). Operation Desert Storm: 25 years since the first Gulf War. The Atlantic. Retrieved from  https://www.theatlantic.com/photo/2016/01/operation-desert-storm-25-years-since-the-first-gulf-war/424191/ .

Tilford, K. H., Jr. (1993, Summer). Review: The meaning of victory in Operation Desert Storm: A review essay. Political Science Quarterly, 108(2), 327-331.

Studyspark

Study Document Study Document

The Juvenile Justice System And Status Offenses

Pages: 2 (663 words) Sources: 2 Document Type:Case Study Document #:87079566

ethical Issues in Criminal Justice
The juvenile justice system has a unique position in the American justice system as a whole. Its function should … crimes which would not be considered crimes at all if committed by adults (“Status Offenses,” 2020).
Status offenses are controversial and raise uncomfortable ethical questions from the perspective of the justice system. On one hand, the juvenile system is supposed to engage in greater leniency toward young … face that cognitively they are not fully mature. Status offenses place an additional burden upon young people. “Children and adolescents commonly experiment with behavior that are not considered positive or prosocial, such as lying, being truant, or defying parents. Such experimentation allows youths to discover the negative … considered positive or prosocial, such as lying, being truant, or defying parents. Such experimentation allows youths to discover the negative consequences of their behavior and learn from their mistakes”……

References

References

Rovner, J. (2014). Disproportionate minority contact in the juvenile justice system. The Sentencing Project. Retrieved from:  https://www.sentencingproject.org/publications/disproportionate-minority-contact-in-the - juvenile-justice-system/

Status offenders. (2015). Development Services Group, Inc. Office of Juvenile Justice and Delinquency Prevention. Retrieved from:  https://www.ojjdp.gov/mpg/litreviews/Status_Offenders.pdf 

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

… its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as … and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage, acceptability, proposition, state behavior, cyberattack, relationship, intelligence gathering, national security.
Introduction
Cyberspace has become an important element is the operations of any given country because of today’s … of the owner/possessor of the information.[footnoteRef:2] While it is a form of cyberattack, there is a proposition cyber espionage is an acceptable state behavior. [1: Magnus Hjortdal, “China’s Use of Cyber Warfare: Espionage……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as … and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage, acceptability, proposition, state behavior, cyberattack, relationship, intelligence gathering, national security.
Introduction
Cyberspace has become an important element ins the operations of any given country because of today’s … the owner/possessor of the information.[footnoteRef:2] While it is a form of cyberattack, there is a proposition that cyber espionage is an acceptable state behavior. [1: Magnus Hjortdal, “China’s Use of Cyber Warfare: Espionage……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Join thousands of other students and

"spark your studies".