Example Essays (Examples)

Studyspark

Study Document Study Document

US Army Human Resource Doctrine

Pages: 5 (1545 words) Sources: 5 Document Type:Essay Document #:56267713

Introduction
Senior leaders and Sergeant Major have to develop the leadership skills of soldiers for organizational success. Human Resources Support (FM 1-0) and Army Training and Leader Development outline the best approach for developing future Army leaders. Furthermore, Army Training and Leader Development describe an organizational framework for developing the next generation of Noncommissioned Officers (NCOs) based on three learning domains: Namely, self-development, operational, and institutional (United States Department of the Army, 2017). Senior leaders / Sergeant Major should also read the following publications: Theater-Level Human Resources Support (ATP) 1-0.2, Army Command Policy (AR) 600-20, and Legal Support to the Operational Army (FM) 1-04, and Soldier for Life – Transition Assistance Program (AR) 600-81. The above reading are useful when developing leadership programs in the Army. This paper will convey my strategy for developing future US Army leaders based on the above readings and my experiences from operational assignments.
Human……

References

References

United States Department of the Army. (2014). Field Manual FM 1-0 Human Resources Support April 2014. Retrieved from website:  https://armypubs.us.army.mil/doctrine/index.html 

United States Department of the Army. (2013). Field Manual FM 1-04 Legal Support to the Operational Army March 2013. Retrieved from website:

Studyspark

Study Document Study Document

How Does Philosophy Relate To Biblical Studies

Pages: 9 (2773 words) Sources: 13 Document Type:Research Paper Document #:60991740

Introduction
Historically, Biblical theology and philosophy had so many things in common and thus complemented each other. Philosophers and theologians even considered themselves mortal enemies in certain cases. Most Christianity doctrines have critical implications or pre-suppositions on philosophy. The discussion begins with the relationship between philosophy and Christianity. It then defined Biblical Theology based on three Christian doctrines that influence philosophy. They include the trinity, the atonement and the incarnation. The paper excludes other doctrines such as those about God’s attributes and providence because they are not unique to Christianity. Also, unlike the doctrine of Christ’s Real Presence in the Eucharist and the origin of sin, the three doctrines have long been discussed and used in relation to philosophy over many decades ago (Amanze, 2012).
The debate on Christian traditions and the relationship between philosophy and Biblical theology continues to rage. An influential apologist and Christian theologian in the early……

References

References

Addinall, P. (1991). Philosophy and biblical interpretation: A study in nineteenth-century conflict. Cambridge: Cambridge University Press.

Amanze, N. (2012). Biblical Studies, Theology, Religion and Philosophy: An Introduction for African Universities.

Carson, D. A. (2012). Christ and culture revisited. Grand Rapids, MI ; Cambridge: Eerdmans.

DeWeese, G. J. (2011). Doing Philosophy as a Christian. Westmont: InterVarsity Press.

Hamilton, J. M. (2010). God\\'s glory in salvation through judgment: A biblical theology. Wheaton, Ill: Crossway.

Hamilton, J. M. (2014). What is biblical theology?: A guide to the Bible\\'s story, symbolism, and patterns.

In Bartholomew, C. G. (2011). \\"Behind\\" the text: History and Biblical Interpretation.

Johnson, D. (2014). Biblical knowing: A scriptural epistemology of error. Havertown: James Clarke & Co.

Studyspark

Study Document Study Document

Comparison Of Leadership Model And Styles

Pages: 5 (1542 words) Sources: 5 Document Type:Essay Document #:47234629

Part One
My Personal Model: Transformational Leadership
My own personal model of leadership is transformational leadership. This model focuses on giving following a vision of what they should work to become. The transformational leader identifies and explains the goal that the organization is trying to reach and how workers can help the organization to achieve that goal. It typically requires a change in the behavior and approaches of the workers, so logic and reason are used to show why this change is needed, which is a way of helping to break down resistance to the change (Nawaz & Khan, 2016). Communication is a key skill used in this model, and transformational leaders have to be able to relate well with followers, provide support along the way, and keep them focused on the vision and the mission. When it comes to organizational development, transformational leaders can be a very valuable asset……

References

References

Maslow, A. H. (1943). A theory of human motivation. Psychological Review, 50(4), 370.

Nawaz, Z. A. K. D. A., & Khan_ PhD, I. (2016). Leadership theories and styles: A literature review. Leadership, 16, 1-7.

Northouse, P. G. (2016). Leadership: Theory and practice (7th ed.). Thousand Oaks: CA: Sage Publications.

Reivich, K. J., Seligman, M. E., & McBride, S. (2011). Master resilience training in the US Army. American Psychologist, 66(1), 25.

Warrick, D. D. (2011). The urgent need for skilled transformational leaders: Integrating transformational leadership and organization development. Journal of Leadership, Accountability and Ethics, 8(5), 11-26

Studyspark

Study Document Study Document

Best Buy Purchasing And Supply Management

Pages: 10 (2932 words) Sources: 4 Document Type:Term Paper Document #:84472318

Purchasing and Supply Management at Best Buy Today
Headquartered in Richfield, Minnesota and founded in 1966, Best Buy Co., Inc. (hereinafter alternatively “the company” or “Best Buy”) is a leading retailer in electronics and other consumer products that competes throughout North America and Mexico today. As of early 2019, Best Buy operated nearly 1,200 large format as well as 51 small-format retail stores (Company profile, 2019). Despite its success in growing its market share in its existing market, the company is faced with the same existential threats as other major retailers, including most especially e-commerce operators such as Amazon (Wack, 2017). The purpose of this paper is to provide a review of the relevant literature to develop an informed and timely discussion and explanation concerning Best Buy’s new competitive environment and an analysis concerning how Best Buy's purchasing and supply management strategies contribute to their competitive advantage. In addition, an……

References

References

Chan, R. (2011, June 29). Best Buy. Marketing, 20.

Corporate responsibility and sustainability. (2019). Best Buy Co., Inc. Retrieved from  https://corporate.bestbuy.com/sustainability/ .

Best Buy supply chain. (2019). Best Buy Co., Inc. Retrieved from https://www.bestbuy. com/site/help-topics/ca-transparency-act/pcmcat263000050003.c?id=pcmcat 263000050003.

Company profile. (2019). Yahoo! Finance. Retrieved from  https://finance.yahoo.com/quote/  BBY/profile?p=BBY.

Mitchell, S. (2009, September-October). The big box swindle: The true cost of the mega-retailers. Multinational Monitor, 27(5), 34-39.

Ong, T. (2018, May 1). Best Buy is closing all 250 of its mobile stores in the U.S. The Verge. Retrieved from  https://www.theverge.com/2018/3/1/17066232/best-buy-close-all-mobile-stores-may-us .

Thomas, L. (2019, August 28). Best Buy revs up supply chain ahead of the holiday season. CNBC. Retrieved from  https://www.cnbc.com/2019/08/28/best-buy-revs-up-supply-chain-ahead-of-the-holiday-season.html .

Wack, K. (2017, June 29). Credit card issuers face peril from rise in store closures: American Banker, 182(124), 37-39.

Studyspark

Study Document Study Document

Fiscal Health Of Public Administration

Pages: 8 (2386 words) Sources: 4 Document Type:response paper Document #:45658914

1
Five future trends in Public Administration are 1) global interconnectedness and self-sufficiency; 2) changes to public health policy; 3) incorporation of advanced technology into administration; 4) more grassroots advocacy; and 5) emphasis on sustainability (Florida Tech, 2019). The first trend—the global interconnectedness of public administrations and a focus at the same time on self-sufficiency—may seem like two diametrically opposed trends going in opposite directions, but the reality is that global interconnectedness and self-sufficiency are compatible and public administrators in the future will need to realize how. First off, globalization is a fact of life in the modern world. The China-U.S. trade war is a perfect example of how what is happening on one side of the world can have a tremendous impact on the entire rest of the planet: the reason is that we live in a global economy, and every country’s economic output is integrated with every other……

References

RReferences

Abiad, A. & Khatiwada, S. (2019). 5 ways technology is improving governance, public service delivery in developing Asia. Retrieved from  https://blogs.adb.org/blog/5-ways-technology-improving-governance-public-service-delivery-developing-asia 

Florida Tech. (2019). Five global trends in public administration. Retrieved from  https://www.fit.edu/your-college-decision/trends-in-public-administration/ 

McDonald, B. (2017). Measuring the fiscal health of municipalities. Retrieved from  https://www.lincolninst.edu/sites/default/files/pubfiles/mcdonald_wp17bm1.pdf 

VCU. (2019). Public personnel administration. Retrieved from  https://commed.vcu.edu/IntroPH/Management/management/personnel.html 

Studyspark

Study Document Study Document

Code Of Ethics For Managers In Acquisition

Pages: 11 (3162 words) Sources: 5 Document Type:Research Paper Document #:25977313

Introduction
Corruption takes many forms, and can have a devastating impact on economies, and on the effectiveness of government. For that reason, it is best practice to have a code of ethics for managers who are involved in acquisitions, purchasing and contracts. Ethical lapses contribute to a wide array of issues, including waste, a decline in confidence in the institution of government, and underperformance because the wrong vendors were selected. Larezos (2008) notes that when evidence of corruption arises, governments may need to recompete contracts, projects can be delayed or go way over budget, and there can be increased cost to taxpayers as well. If chronic weak governance leaves a populace disenchanted with government, then the political fallout can be severe as well. In essence, corruption represents the trade-off between the personal gain for the government officials in question versus the overall government or economy.
Combatting corruption is a complex……

References

References

Adelstein, J. & Clegg, S. (2016) Code of ethics: A stratified vehicle for compliance. Journal of Business Ethics. Vol. 138 (1) 53-66.

Lazeros, M. (2008) Leaders can learn from Druyun’s ethical lapses and their consequences. USAWC Research Project. Retrieved October 25, 2019 from  https://apps.dtic.mil/dtic/tr/fulltext/u2/a479019.pdf 

McConnnell, A. & Rood, T. (1997) Ethics in government: A survey of misuse of position for personal gain and its implications for developing acquisition strategy. Journal of Business Ethics. Vol. 16 (1997) 1107-1116.

McConnell, T. (2018). Moral dilemmas. Stanford Encyclopedia of Philosophy Retrieved October 25, 2019 from  https://plato.stanford.edu/entries/moral-dilemmas/ 

Neu, D., Everett, J. & Rahaman, A. (2015) Preventing corruption within government procurement: Constructing the disciplined and ethical subject. Critical Perspectives on Accounting. Vol. 28 (2015) 49-61.

Studyspark

Study Document Study Document

Intelligence Oversight Ethics

Pages: 11 (3311 words) Sources: 15 Document Type:Research Paper Document #:23829007



This literature review first looks at the history if intelligence oversight (IO) and then explains the current problem it faces in terms of ethics and the arrival of the Digital Age, which has complicated the matter. It next synthesizes the literature on what the various ethical theories are and how this further complicates the issue of IO. Finally, it discusses research on the fundamentals of ethics and gives recommendations for future research.
History of IO
The history of IO begins with the purpose for which it was established, which was to safeguard the privacy and rights of U.S. persons while enabling the Department of Defense to carry out its intelligence functions most effectively (Ford 2006, 721). The question that has always been at the forefront of IO, however, is the question of ethics. As Goldman (2013) notes, as far back as 1929 this question of ethics and its role in……

References

References

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Brown, William F., and Americo R. Cinquegrana. \\\\\\\\\\\\"Warrantless Physical Searches for Foreign Intelligence Purposes: Executive Order 12,333 and the Fourth Amendment.\\\\\\\\\\\\" Cath. UL Rev. 35 (1985): 97.

Cantarella, Michele. \\\\\\\\\\\\"Intelligence ethics in the digital age.\\\\\\\\\\\\" (2016).

Congressional Research Service, “CIA Ethics Education: Background and Perspectives” (2018).

Ferrari, Rachel. \\\\\\\\\\\\"Moral Relativism and Dangerous Ethical Dilemmas in the US Intelligence Community.\\\\\\\\\\\\" (2018).

Ford, Christopher M. \\\\\\\\\\\\"Intelligence Demands in a Democratic State: Congressional Intelligence Oversight.\\\\\\\\\\\\" Tul. L. Rev. 81 (2006): 721.

Goldman, Jan. \\\\\\\\\\\\"Teaching About Intelligjence and Ethics.\\\\\\\\\\\\" Journal of US Intelligence Studies 20, no. 2 (2013): 79.

Hayes, Jonathan. \\\\\\\\\\\\"The Cinema of Oliver Stone: Art, Authorship and Activism by Ian

Studyspark

Study Document Study Document

The Ethics Of Clandestine Operations

Pages: 11 (3151 words) Sources: 14 Document Type:literature review Document #:69864024

Ethics of Clandestine Intelligence Operations
Introduction
One of the most common yet least understood methods of operations in the art of statecraft is the clandestine operation (Sheldon 1997). Though popularized in pulp fiction and film, such as the James Bond series franchise and numerous other spy thrillers, clandestine operations remain relatively unknown in the public consciousness—and when they are discussed it is generally with distaste, distrust and vilification (Sheldon 1997). Yet as Sheldon (1997) shows, clandestine operations are not new or unique to the modern world and in fact ancient Rome used them whenever military operations were impractical. Thus, “political influence operations, seeding, propaganda, political patronage, safe havens, political assassination, and paramilitary operations” can all be traced back more or less to similar operations implemented by the ancient Romans (Sheldon 1997, 299). Today, there are many different facets to clandestine operations, and many agencies that use them—from the CIA to……

References

Bibliography

Arnold, A. and D. Salisbury. The Long Arm, 2019. Retrieved from https://www.belfercenter.org/publication/long-arm

Barker, Michael J. \\\\\\"Democracy or polyarchy? US-funded media developments in Afghanistan and Iraq post 9/11.\\\\\\" Media, Culture & Society 30, no. 1 (2008): 109-130.

Best, Richard A. Intelligence to Counter Terrorism: Issues for Congress. Congressional Research Service: CRS Report for Congress, 2002.

Carter, Ashton B. \\\\\\"Overhauling counterproliferation.\\\\\\" Technology in Society 26, no. 2-3

(2004): 257-269.

Crumpton, Henry A. The art of intelligence: lessons from a life in the CIA\\\\\\'s clandestine service. Penguin, 2013.

Hersh, Seymour. Selective Intelligence. The New Yorker, 2003.  http://www.newyorker.com/magazine/2003/05/12/selective-intelligence 

McCormick, G. H., & Owen, G. “Security and coordination in a clandestine organization.” Mathematical and Computer Modelling, 31, no. 6-7 (2000), 175-192.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber warfare, helps to establish appropriate countermeasures against cyberattacks and potential threats in cyberspace, and enhances intelligence gathering. While the study provides significant insights on this topic, future studies should examine the……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

Executive Summary
The purpose of this study is to develop timely and informed answers to a series of guiding research questions and subquestions to identify the risks and barriers that are associated with Internet of Things implementations. These types of studies are important today because the Internet of Things is changing the manner in which companies of all sizes and types operate their businesses, and current trends indicate that these implementations are increasing exponentially. The Internet of Things allows conventional computer-based networks to incorporate data collected from everyday objects to provide real-time analyses and new applications for these technologies are being developed every day. Indeed, there are already more mobile devices in use around the world than there are people, and most authorities agree that the Internet of Things deployments will continue to increase well into the foreseeable future. Chapter one of the study provides the rationale in support of……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".