Ethical Systems Essays (Examples)

Studyspark

Study Document Study Document

The Ethics Of Clandestine Operations

Pages: 11 (3151 words) Sources: 14 Document Type:literature review Document #:69864024

… thus far has been adequate and sufficient in explaining the rationale for clandestine operations, particularly that by Sheldon (1997). However, a philosophical and ethical/moral perspective on the rationale for clandestine operations could be beneficial in this field, and there are many investigators, academics and researchers, from Peter … Douglas Valentine, who have published extensive works that venture into this subject to some degree. However, a genuine focus on the philosophical and ethical/moral principles that justify clandestine operations could be beneficial in terms of establishing a set of guidelines or parameters that Congress could use for … the radar like OSP in the Pentagon, the oversight and regulation of clandestine operations is limited to say the least. The moral and ethical risk of this situation is something that needs to be better understood, as too many groups engaging in this type of activity could ……

References

Bibliography

Arnold, A. and D. Salisbury. The Long Arm, 2019. Retrieved from https://www.belfercenter.org/publication/long-arm

Barker, Michael J. \\\\\\"Democracy or polyarchy? US-funded media developments in Afghanistan and Iraq post 9/11.\\\\\\" Media, Culture & Society 30, no. 1 (2008): 109-130.

Best, Richard A. Intelligence to Counter Terrorism: Issues for Congress. Congressional Research Service: CRS Report for Congress, 2002.

Carter, Ashton B. \\\\\\"Overhauling counterproliferation.\\\\\\" Technology in Society 26, no. 2-3

(2004): 257-269.

Crumpton, Henry A. The art of intelligence: lessons from a life in the CIA\\\\\\'s clandestine service. Penguin, 2013.

Hersh, Seymour. Selective Intelligence. The New Yorker, 2003.  http://www.newyorker.com/magazine/2003/05/12/selective-intelligence 

McCormick, G. H., & Owen, G. “Security and coordination in a clandestine organization.” Mathematical and Computer Modelling, 31, no. 6-7 (2000), 175-192.

Studyspark

Study Document Study Document

Shareholder Vs Stakeholder Theory

Pages: 11 (3224 words) Sources: 6 Document Type:Research Paper Document #:76323348

… answer that question by looking at the nature and essence of business social responsibility from the standpoint of the four major sources of ethical values in business: Law, Culture, Philosophy, and Religion. It will show that in today’s business environment, stakeholder theory needs to be pursued instead … what was right. They had virtue, and they knew what virtue was. They practiced a system of virtue ethics back when having an ethical framework meant something more than simply justifying whatever choices one wanted to make regardless of how it impacted others. Today, businesses are not … approve of what goes on today? It is highly doubtful, for he understood precisely the problems of what happens when corporations stop acting ethical. They become destroyers rather than supporters of communities. When they engage in fraud and deception they undermine their own sustainability, which is exactly ……

References

References

Augustine. (n.d.). Commentaries on Sermon on the Mount.  http://www.newadvent.org/fathers/16011.htm 

Chen, J. (2019). Market Milestones as the Bull Market Turns 10. Retrieved from  https://www.investopedia.com/market-milestones-as-the-bull-market-turns-10-4588903 

Egan, M. (2018). Tax cut triggers $437 billion explosion of stock buybacks. Retrieved from  https://money.cnn.com/2018/07/10/investing/stock-buybacks-record-tax-cuts/index.html 

Henrich, S. (2019). Unholy alliance. Retrieved from  https://northmantrader.com/2019/11/30/unholy-alliance/ 

Laux, C., & Leuz, C. (2010). Did fair-value accounting contribute to the financial crisis?. Journal of economic perspectives, 24(1), 93-118.

Light, L. (2019). More than Half of All Stock Buybacks are Now Financed by Debt. Here’s Why That’s a Problem. Retrieved from  https://fortune.com/2019/08/20/stock-buybacks-debt-financed/ 

Mullen, C. (2019). People want to buy \\\\\\'local\\\\\\' food, but they\\\\\\'re not sure what it means. Retrieved from  https://www.bizjournals.com/bizwomen/news/latest-news/2019/05/people-want-to-buy-local-food-but-theyre-not-sure.html?page=all 

Putka, G. (2019). Insiders are selling. Retrieved from https://www.washingtonpost.com/business/economy/company-insiders-are-selling-stock-during-buyback-programs-and-making-additional-profits-when-stock-prices-jump-and-its-legal/2019/11/06/fc592f58-e493-11e9-a331-2df12d56a80b_story.html

Studyspark

Study Document Study Document

Enhancing Communication Migration From 4G To 5G

Pages: 6 (1692 words) Document Type:Essay Document #:96575438

… far, some of the constraints attached to migration from 4G to 5G include multi-mode user terminals, security, the choice among the various wireless systems available, jamming and spoofing, and network infrastructure and Quality of service (QoS) support (Alkhazaali 2017).
3. To establish strategies to maximize the effectiveness … to address the challenges that face migration from 4G to 5G. The strategies will include possible technological adjustments to improve 5G performance, support systems, and possible improvements that can be included in the next generation of network improvements.
The objectives of the dissertation are;
i. To determine … and better QoS and improved experience.
Scientific analysis
One of the risks in migrating from 4G to 5G is the choice of wireless systems. Evert wireless has specific roles and features. To determine the best wireless system can only be done for a specific technology at a ……

References

References

Alkhazaali, N.H., 2017. Mobile Communication through 5G Technology (Challenges and Requirements). International Journal of Communications, Network and System Sciences, 10(05), p.202.

Gandotra, P., and Jha, R.K., 2016. Device-to-device communication in cellular networks: A survey. Journal of Network and Computer Applications, 71, pp.99-117.

Penttinen, Jyrki T. J., et al. 2019. "Deployment," in 5G Explained: Security and Deployment of Advanced Mobile Communications, Wiley, pp.271-291

Shen, Xuemin. "Device-to-device communication in 5G cellular networks." IEEE Network 29, no. 2 (2015): 2-3.

Tehrani, M.N., Uysal, M., and Yanikomeroglu, H., 2014. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), pp.86-92.

Zhang, A., and Lin, X., 2017. Security-aware and privacy-preserving D2D communications in 5G. IEEE Network, 31(4), pp.70-77.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

… use of malicious software and computer viruses like Trojan horses and spyware. This practice basically entails intentional activities to infiltrate or penetrate computer systems or networks used by a rival to obtain information within or transmitted through these networks or systems.[footnoteRef:3] Cyber espionage has emerged as an international problem because of increased reliance on cyberspace by state and non-state actors. Nations across the globe … contacted and approached to participate in the study based on their knowledge and expertise on the phenomenon being studied. Some of the potential ethical issues that could emerge include privacy of research participants and confidentiality. These issues will be addressed through ensuring participation is voluntary and participants ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… use of malicious software and computer viruses like Trojan horses and spyware. This practice basically entails intentional activities to infiltrate or penetrate computer systems or networks used by a rival to obtain information within or transmitted through these networks or systems.[footnoteRef:3] Cyber espionage has emerged as an international problem because of increased reliance on cyberspace by state and non-state actors. Nations across the globe … a new intelligence gathering approach and strategy for national security decisions. However, cyber espionage remains a form of cyberattack, which is legally and ethical unacceptable.
Research Question
Is cyber espionage a method used by state for intelligence gathering a form of unacceptable cyberattack?
How is cyber espionage … contacted and approached to participate in the study based on their knowledge and expertise on the phenomenon being studied. Some of the potential ethical issues that could emerge include privacy of research participants and confidentiality. These……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Children S Viewpoint Of Their Stepparents

Pages: 5 (1707 words) Document Type:Essay Document #:382730

… studies on children's views on their stepparents. Conducting such studies can prove highly complicated. Some of the hurdles one can run into include ethical considerations regarding the collection of data from such vulnerable persons. Nevertheless, the situation in the family will influence whether children accept their stepparents … on their stepparents. The situation can be understood easily, given the level of complexity regarding researching such a topic. There are social and ethical limitations that abound. It is not easy to collect authentic data from such vulnerable populations. Since the research has to be confirmed by ……

References

References

Cartwright, C., Farnsworth, V., & Mobley, V. (2009). Relationships with stepparents in the life stories of young adults of divorce. Family Matters, (82), 30.

Jensen, T. M., & Harris, K. M. (2017). Stepfamily relationship quality and stepchildren's depression in adolescence and adulthood. Emerging Adulthood, 5(3), 191-203.

Jensen, T. M., & Howard, M. O. (2015). Perceived stepparent–child relationship quality: A systematic review of stepchildren's perspectives. Marriage & Family Review, 51(2), 99-153.

King, V., Boyd, L. M., &Thorsen, M. L. (2015). Adolescents' perceptions of family belonging in stepfamilies. Journal of Marriage and Family, 77(3), 761-774.

Lardier Jr, D. T., Van Eeden-Moorefield, B., Nacer, C., Hull, R., & Browning, S. (2017). Relationships between (step) parents and adult (step) children: Explaining influences on life satisfaction and marital quality. Journal of Divorce & Remarriage, 58(6), 430-446.

Payton, S. R. (2018). An exploration of the quality of the relationship between stepchildren and stepparents based on address term usage. (Master's Thesis; Rowan University).

Studyspark

Study Document Study Document

Hand Hygiene And Infection In Hospitals

Pages: 7 (2096 words) Sources: 2 Document Type:Article Critique Document #:82779888

… A.
One of the key ways in which the protection of human subjects were addressed in the study is through the seeking of ethical approval and sanction from the Infection Control and Prevention Committee of the hospital. Notably, research permit and consent was sought from the main ……

References

References

Joshi, S. C., Diwan, V., Tamhankar, A. J., Joshi, R., Shah, H., Sharma, M., ... & Lundborg, C. S. (2012). Qualitative study on perceptions of hand hygiene among hospital staff in a rural teaching hospital in India. Journal of Hospital Infection, 80(4), 340-344.

Tan Jr, A. K., & Jeffrey Olivo, B. S. (2015). Assessing healthcare associated infections and hand hygiene perceptions amongst healthcare professionals. International Journal of Caring Sciences, 8(1), 108.

Studyspark

Study Document Study Document

The Karen Ann Quinlan Case Legal Aspects Of Healthcare

Pages: 6 (1922 words) Sources: 6 Document Type:Research Paper Document #:87626234

… court, to be more specific, “held a new interpretation of the right of privacy, and that Miss Quinlan’s interest in having her life-support systems disconnected exceeded the state’s interest in preserving life, so long as medical authorities saw ”no reasonable possibility” that she would recover” (Karen Ann … course of action adopted by the doctors would not be homicide and,…[break]…happens to be in a permanent vegetative state, a physician or an ethical committee could be the designated decision maker. This could be the case pending the appointment of a guardian. As a matter of fact, ……

References

References

Drane, J.F. (1994). Clinical Bioethics: Theory and Practice in Medical Ethical Decision-making. New York, NY: Rowman & Littlefield.

Holland, S., Kitzinger, C. & Kitzinger, J. (2014). Death, treatment decisions and the permanent vegetative state: evidence from families and experts. Med Health Care Philos., 17(3), 413-423.

Karen Ann Quinlan Hospice (2019). The Story of Karen Ann Quinlan Made Headlines! Retrieved from  https://www.karenannquinlanhospice.org/about/history/ 

Mizzoni, J. (2011). Ethics: The Basics. Hoboken, NJ: John Wiley & Sons.

Rosenthal, M.S. (2018). Clinical Ethics on Film: A Guide for Medical Educators. New York, NY: Springer.

Singer, P. (2013). A Companion to Ethics. Hoboken, NJ: John Wiley & Sons.

Studyspark

Study Document Study Document

Adolescent Psychosocial Assessment

Pages: 10 (2865 words) Sources: 8 Document Type:Case Study Document #:54875989

...Ethical systems Adolescent Psychosocial Assessment
SECTION I – SOCIAL HISTORY
Personal
In list format, cover the following:
1. Name: John Mathew
2. Age: 18
3. Sex: Male
4. Race/Ethnic: Black, African-American
5. Education/Occupation: Student
6. Health: Okay
Social
John's family lives in an apartment situated in the middle of a range of complexes. The residence is right in the middle of communities in Washington, DC. The household is always abuzz with activity. There are two boys named Zebulon and David. The boys still call for their mother's attention. Ervin, my father, does not have a job. He is grounded in a wheelchair, following health challenges he has faced in the past couple of years. My mother is a part-time writer. Her name is Monique. The main poverty indicator about my family is the challenge we face in paying bills and lack of money to travel around (Sherman, 2012). Several aspects of culture……

References

References

Alexander Jr, R. (2010). The Impact of Poverty on African American Children in the Child Welfare and Juvenile Justice Systems. In Forum on Public Policy Online (Vol. 2010, No. 4). Oxford Round Table. 406 West Florida Avenue, Urbana, IL 61801.

Belgrave, F. Z., & Allison, K. W. (2009). African American psychology: From Africa to America. Los Angeles: Sage.

Brittian A. S. (2012). Understanding African American Adolescents\\\\\\' Identity Development: A Relational Developmental Systems Perspective. The Journal of black psychology, 38(2), 172–200.  https://doi.org/10.1177/0095798411414570 

Chávez, R. (2016). Psychosocial development factors associated with occupational and vocational identity between infancy and adolescence. Adolescent Research Review, 1(4), 307-327.

Crain, W. C. (2014). Theories of development: Concepts and applications. Harlow, Essex: Pearson.

Fernandes-Alcantara, A. L. (2018). Vulnerable Youth: Background and policies.Congressional Research Service

Newman, B. M., & Newman, P. R. (2015). Theories of human development. Psychology Press.

Reubins, B. M., &Reubins, M. S. (2014). Pioneers of child psychoanalysis: Influential theories and practices in healthy child development. London: Karnac.

Studyspark

Study Document Study Document

Agency Theory And The Limitations Of Representative Government

Pages: 11 (3159 words) Sources: 5 Document Type:Essay Document #:26643855

...Ethical systems The Political Nature of the Federal Budget Process
Introduction
The federal budget process is overseen by US Congressmen, who are fundamentally immersed in the political nature of government. As Elwood (2008) notes, members of Congress are influenced in three ways: 1) by money that is used to finance their political campaigns; 2) by obtaining the votes necessary for reelection; and 3) by obtaining expert advice on topics that are of personal importance to them. The federal budget process is particularly impactful on the first two and vice versa. For example, “the ability to funnel money into a congressional district or state provides an excellent opportunity for a legislator to remain in office” (Elwood, 2008, p. 3). This ability creates a conflict of interest among the politicians overseeing the budget process. On the one hand they are tasked with producing a budget resolution and allocating funds based on the duty to……

References

References

Eisenhardt, K. M. (1989). Agency theory: An assessment and review. Academy of management review, 14(1), 57-74.

Elwood, T. W. (2008). Politics of the US Federal Budget Process. International quarterly of community health education, 28(1), 3-12.

Jennings, M. (2008). Business Ethics: Case Studies and Selected Readings. Cengage.

Machold, S., Ahmed, P.K., & Farquhar, S.S. (2007). Corporate Governance and Ethics: A Feminist Perspective. Journal of Business Ethics (2008) 81:665-678.

ProActive Solutions. (2020). Agency theory. Retrieved from http://knowledgegrab.com/learners-zone/study-support/performance-management-review/framework-introduction-to-hrm/agency-theory/

Join thousands of other students and

"spark your studies".