Federal Government Essays (Examples)

Studyspark

Study Document Study Document

Virtual Learning Solutions For English As Second Language Students

Pages: 11 (3230 words) Sources: 10 Document Type:Research Paper Document #:70086670

… opportunities for enhancing the ESL educative experience can be found that were not present before. Schools should be supportive of this endeavor and federal money should be available as districts re-think how to approach education in the coming years.
Conclusion
ESL learners are in a position to … able to afford all these tools, so schools may need to be the ones to provide them. Schools should receive funding from the federal budget, and the COVID-19 era has literally reshaped the way teachers and students think about learning. The trend towards using digital technology to ……

References

References

Alvarez-Marinelli, H., Blanco, M., Lara-Alecio, R., Irby, B. J., Tong, F., Stanley, K., & Fan, Y. (2016). Computer assisted English language learning in Costa Rican elementary schools: an experimental study. Computer Assisted Language Learning, 29(1), 103-126.

Beetham, H., & Sharpe, R. (Eds.). (2013). Rethinking pedagogy for a digital age: Designing for 21st century learning. NY: Routledge.

Cassady, J. C., Smith, L. L., & Thomas, C. L. (2017). Supporting emergent literacy for English language learners with computer?assisted instruction. Journal of Research in Reading.

Jiang, H., Tang, M., Peng, X., & Liu, X. (2018). Learning design and technology through social networks for high school students in China. International Journal of Technology and Design Education, 28(1), 189-206.

Kahai, S. S., Carroll, E., & Jestice, R. (2007). Team collaboration in virtual worlds. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 38(4), 61-68.

Kasapo?lu-Akyol, P. (2010). Using educational technology tools to improve language and communication skills of ESL students. Novitas-Royal, 4(2).

Meskill, G., & Mossop, J. (2003). Technologies use with learners of ESL in New Your State: Preliminary report. Retrieved from  https://www.albany.edu/lap/Papers/technology%20use.htm 

Park, J. Y. (2011). Design education online: Learning delivery and evaluation. International Journal of Art & Design Education, 30(2), 176-187.

Studyspark

Study Document Study Document

Enterprise Risk Management In Wells Fargo During The Pandemic

Pages: 15 (4587 words) Sources: 15 Document Type:Essay Document #:32848070

...Federal government Enterprise Risk Management in Wells Fargo during the Pandemic
Introduction
As Beasley (2020) points out, enterprise risk management (ERM) is especially needed during the COVID 19 pandemic because of the “number of different, but interrelated risks spread all across most organization” (p. 2). COVID 19 is not just a factor that has impacted one business or industry. It has impacted all businesses and all industries in different ways. Grocery chains like Kroger, for instance, have seen increased demand. Restaurants on the other hand have seen business dry up due to mandated quarantine orders. Small business owners and large corporations have filed for bankruptcy. All of this impacts the banking sector and Wells Fargo specifically because of its role in managing loan products, using interest rates to attract savers, and offering investment advice. “No single risk associated with the COVID-19 pandemic crisis can be managed in isolation,” as Beasley (2020) points……

References

References

Beasley, M. (2020). How to Leverage ERM Principles to Better Respond to COVID-19-Related Risks. ERM Professional Insights.

Derysh, I. (2020). Watchdog questions why Wells Fargo reported giving only one large PPP loan to a Black-owned business. Retrieved from  https://www.salon.com/2020/07/22/watchdog-questions-why-wells-fargo-reported-giving-only-one-large-ppp-loan-to-a-black-owned-business/ 

English, C. (2020). Wells Fargo Forced to Cut Its Dividend After Fed Stress Test. Here’s What Other Banks Did. Retrieved from  https://www.barrons.com/articles/wells-fargo-forced-to-cut-its-dividend-after-fed-stress-test-51593467664 

Hall, J. (2007). Internal Auditing and ERM: Fitting in and Adding Value. Retrieved from  https://global.theiia.org/about/about-the-iia/Public  Documents/Sawyer_Award_2007.pdf

Kaplan, R. & Mikes, A. (2012). Managing risks: A new framework. Harvard Business Review, 3.

Lewis, M. (2010). The Big Short. NY: W. W. Norton.

Lundqvist, S. (2014). Abandoning Silos for Integration: Implementing Enterprise Risk Management and Risk Governance. Lund University.

Morgenson, G. (2020). More Wells Fargo customers say the bank decided to pause their mortgage payments without asking. Retrieved from https://www.nbcnews.com/business/personal-finance/more-wells-fargo-customers-say-bank-decided-pause-their-mortgage-n1234610

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

… it. Criminals have to be very tech savvy and must know the latest technology in order to get away with white collar crime. government and businesses are now outsourcing security to third parties who specialize in providing digital security, and so white collar…[break]…one. Proving that a particular … Yet, attackers can often mask their footprints and make it appear as though the crime was conducted by another person or country.
State, federal and International Laws Related to Cybercrime
The federal Computer Fraud and Abuse Act is the main law that allows for the prosecution of cybercrime. It prohibits unauthorized access to a computer … allows for the prosecution of cybercrime. It prohibits unauthorized access to a computer or security information. The Electronic Communications Protection Act is another federal law that along with the Stored Communications Act makes it a criminal offense to access information with authorization. Hacking, phishing and……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

Indian Removal Act 1830

Pages: 13 (4034 words) Sources: 13 Document Type:Research Paper Document #:92871385

… to give the Native Americans their own territory where they could practice their own activities, traditions and culture without interference from the American government. However, the Act resulted in the forced migration of thousands of Native Americans from their traditional homelands to a region of the U.S. … was just one example of an exercise in human rights abuses in a long history of human rights abuses committed by the American government—from the time of slavery even into the 21st century. This paper will describe the history of the Indian Removal Act of 1830 and … hundred more Cherokee were allowed to live in the Qualla Boundary of North Carolina in exchange for their assistance in helping the U.S. government to catch a wanted Cherokee leader named Tsali.[footnoteRef:19] [19: Kutsche, Paul. "The Tsali legend: culture heroes and historiography." Ethnohistory 10, no. 4 (1963), 329.]
The … the land. Men like Thomas……

References

Works Cited

Primary Sources

Crockett, Davy, “On the removal of the Cherokees, 1834,” Gilder Lehrman Institute of American History. https://www.gilderlehrman.org/history-now/spotlight-primary-source/davy-crockett-removal-cherokees-1834

“The Magnetic Telegraph.” Ladies’ Repository 10(1850): 61-62. O’Sullivan, John. “Annexation.” United States Magazine and Democratic Review, vol.17, no. 1 (July-August 1845): 5-10.

Sevier, John. Letter to the Cherokee. DPLA.  https://dp.la/primary-source-sets/cherokee-removal-and-the-trail-of-tears/sources/1500 

Secondary Sources

Brown-Rice, Kathleen. "Examining the Theory of Historical Trauma Among Native Americans." Professional Counselor 3, no. 3 (2013).

Cave, Alfred A. "Abuse of power: Andrew Jackson and the Indian removal act of 1830." The Historian 65, no. 6 (2003): 1330-1353.

Cherokee Preservation Foundation. “About the Eastern Band.” Cherokee Preservation, 2010.  http://cherokeepreservation.org/who-we-are/about-the-ebci/

Studyspark

Study Document Study Document

Deregulation Under The Trump Administration And Its Impact On The

Pages: 7 (2006 words) Sources: 5 Document Type:Essay Document #:81227752

… non-profit sector in various beneficial ways, such as
by allowing nonprofits to keep anonymous the names of donors; and by capping the amount federal agencies can force nonprofits to spend—the idea being that this will prohibit agencies from shifting costs for regulatory ambitions onto nonprofits and other … anonymous and organizations do not have to disclose who is giving financial support to them unless they are directly compelled to by the government. They must keep this information in their records, but they are not longer required to report these records annually. That is a big … every donation they make will be made public, which is good for nonprofits because it allows them to act more independently from the government. In a free market system, independence from the state is one of the most important factors. Big donors can help nonprofits to have … Graham, 2019, p. 15). Belton……

References

References

Belton, K. & Graham, J. (2019). Trump’s Deregulatory Record: An Assessment at the Two-Year Mark. Retrieved from  http://accf.org/wp-content/uploads/2019/03/ACCF-Report_Trump-Deregulatory-Record-FINAL.pdf 

Benson, M. L., Stadler, W. A., & Pontell, H. N. (2019). Harming America: Corporate Crime in a Context of Deregulation. Victims & Offenders, 14(8), 1063-1083.

Brookings Institute. (2020). Tracking deregulation in the Trump era. Retrieved from  https://www.brookings.edu/interactives/tracking-deregulation-in-the-trump-era/ 

Morrow, D. (2017). Deregulation in the Trump Administration will likely impact nonprofits. Retrieved from  http://blog.abila.com/deregulation-trump-administration-impacting-nonprofits/ 

Weaver, H. L. (2018). One for the price of two: the hidden costs of regulatory reform under executive order 13,771. Administrative Law Review, 70(2), 491-512.

Studyspark

Study Document Study Document

Clinical Informatics

Pages: 11 (3264 words) Sources: 12 Document Type:Essay Document #:78574553

… to be careful, however, with respect to how information is shared. The Privacy Act of 1974 regulates how information is collected by the federal government, which means that nurses working in Veterans Affairs have to follow these regulations. Then there is also the Conditions for Coverage of Specialized … Services the ability to regulate the use of Health IT and clinical informatics. Safety, security and quality issues are all overseen by the federal government under HITECH.
Privacy, Confidentiality and Security Issues
One of the challenges facing the field of nursing is how to keep information private in ……

References

References

Cho, O. M., Kim, H., Lee, Y. W., & Cho, I. (2016). Clinical alarms in intensive care units: Perceived obstacles of alarm management and alarm fatigue in nurses. Healthcare informatics research, 22(1), 46-53.

Effken, J., Weaver, C., Cochran, K., Androwich, I., & O’Brien, A. (2016). Toward a central repository for sharing nursing informatics’ best practices. CIN: Computers, Informatics, Nursing, 34(6), 245-246.

Elsayed, W. A., Hussein, F. M., & Othman, W. N. (2017). Relation between nursing informatics competency and nurses’ attitude toward evidence-based practice among qualified nurses at Mansoura Oncology Center. International Journal of Nursing Didactics, 7(6), 26-33.

Drolet, B. C., Marwaha, J. S., Hyatt, B., Blazar, P. E., & Lifchez, S. D. (2017). Electronic communication of protected health information: privacy, security, and HIPAA compliance. The Journal of hand surgery, 42(6), 411-416.

Haupeltshofer, A., Egerer, V., & Seeling, S. (2020). Promoting health literacy: What potential does nursing informatics offer to support older adults in the use of technology? A scoping review. Health Informatics Journal, 1460458220933417.

Kharbanda, E. O., Asche, S. E., Sinaiko, A. R., Ekstrom, H. L., Nordin, J. D., Sherwood, N. E., & O’Connor, P. (2018). Clinical decision support for recognition and management of hypertension: a randomized trial. Pediatrics, 141(2).

Khezri, H., & Abdekhoda, M. (2019). Assessing nurses’ informatics competency and identifying its related factors. Journal of Research in Nursing, 24(7), 529-538.

Kleib, M., & Nagle, L. (2018). Factors associated with Canadian nurses\\\\\\\\\\\\' informatics competency. CIN: Computers, Informatics, Nursing, 36(8), 406-415.

Studyspark

Study Document Study Document

Blacks And The Reconstruction

Pages: 3 (982 words) Sources: 8 Document Type:Term Paper Document #:31905866

… could be re-established. Frederick Douglass, writing in The Atlantic in 1866, stated that enfranchisement of the free black would only come if the federal government passed laws to protect the newly freed former slaves and brought the law of the North into the South. What happened, however, was … persisted. This paper will show how the goals of Reconstruction regarding African-Americans were not achieved by 1900 because of a failure of the federal government to oversee effectively the Era of Reconstruction and to eradicate the racist doctrines and organizations of the South.
President Johnson essentially gave the … enfranchised. Johnson stated in his 1865 pardon: “I hereby grant and assure to all persons of color who have, directly or by…[break]…from the government. It was as though they had been dropped in their own same land as yesterday but now without any titles, any lodgings or … its goals because……

References

Works Cited

A&E. “Carpetbaggers and Scalawags.” History, 2018. https://www.history.com/topics/american-civil-war/carpetbaggers-and-scalawags

Douglass, Frederick. “Reconstruction.” The Atlantic, 1866.  https://www.theatlantic.com/magazine/archive/1866/12/reconstruction/304561/ 

Guelzo, Allen. Reconstruction Didn\\\\'t Fail. It Was Overthrown. Time, 2018.  http://time.com/5256940/reconstruction-failure-excerpt/ 

McBride, Alex. “Plessy v. Ferguson.” Thirteen, 2007.  https://www.thirteen.org/wnet/supremecourt/antebellum/landmark_plessy.html 

Johnson, Andrew. “A Proclamation.” Digital History, 1865.  http://www.digitalhistory.uh.edu/exhibits/reconstruction/section4/section4_pardon1.html 

Lincoln, Abraham. Second Inaugural Address, 1865. http://avalon.law.yale.edu/19th_century/lincoln2.asp

Studyspark

Study Document Study Document

Medicare Access And CHIP Reauthorization Act

Pages: 4 (1285 words) Sources: 3 Document Type:Essay Document #:23116886

… health care providers could focus exclusively on prevention and Medicare could offer support, such as subsidies, tax credits and other incentives—just as the federal government offered subsidies and tax credits for electric vehicle manufacturers in order to get people interested in buying them. To provide quality care means … necessarily going to be about padding the pockets of doctors, which is why many do not want to embrace preventive care. If the government subsidized preventive care and health literacy initiatives and allowed these approaches to health care to be seen as revenue streams by doctors, they … approaches to health care to be seen as revenue streams by doctors, they would become more attractive in their own right and the government could achieve the health outcomes it is interested in achieving. The more that doctors can feel supported financially in their approach to improving ……

References

References

Glasziou, P., Moynihan, R., Richards, T., & Godlee, F. (2013). Too much medicine; too little care. BMJ, 347, f4247.

Lichtenfeld, L. (2011). Overdiagnosed: Making people sick in the pursuit of health. The Journal of Clinical Investigation, 121(8), 2954-2954.

Moynihan, R. (2015). Preventing overdiagnosis: the myth, the music, and the medical meeting. BMJ: British Medical Journal (Online), 350.

Welch, H., Schwartz, L. & Woloshin, S. (2011). Overdiagnosed. Beacon Hill.

Studyspark

Study Document Study Document

Weapons Of Mass Destruction

Pages: 9 (2563 words) Sources: 10 Document Type:Research Paper Document #:76982977

...Federal government Countering the Threat of Weapons of Mass Destruction (WMDs)
Purpose Statement
Chemical, biological, radiological, and nuclear (CBRN) weapons of mass destruction (WMD) area a threat that can completely disrupt an entire nation’s way of life. The current situation in China is a perfect illustration of what can happen when a biological weapon is used to destabilize a nation’s economy. China is currently grinding to a halt as the Covin-19 virus spreads like wildfire through China. The example shows how devastating a WMD can be when used in an attack. The purpose of this study is to examine ways to prevent or reduce the risk of a CBRN WMD attack. By looking at the use of international treaties, the rise of terrorism, and counter-proliferation strategies, this paper will assess the measures available for achieving the aim.
Research Question
What can nations do to prevent or reduce the risk of CBRN WMD……

References

References

Asada, M. (2008). Security Council Resolution 1540 to combat WMD terrorism: effectiveness and legitimacy in international legislation. Journal of Conflict & Security Law, 13(3), 303-332.

Carter, A. B. (2004). Overhauling counterproliferation. Technology in Society 26(2-3), 257-269.

CBS. (2011). Clinton on Qaddafi: We came, we saw, he died. Retrieved from  https://www.youtube.com/watch?v=mlz3-OzcExI 

The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. (1999). Combating Proliferation of Weapons of Mass Destruction. Washington, D.C.

Forest, J.J.F. (2012, Winter). Framework for Analyzing the Future Threat of WMD Terrorism. Journal of Strategic Security 5, 4. Retrieved from  http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1193&context=jss 

Hochman, D. (2006). Rehabilitating a rogue: Libya's WMD reversal and lessons for US policy. Parameters, 36(1), 63.

Lang, C. G. (1937). Archbishop's Appeal: Individual Will and Action; Guarding Personality. London Times, 28.

Stone, O., & Kuznick, P. (2013). The untold history of the United States. Simon and Schuster.

Studyspark

Study Document Study Document

Homeland Defense And Private Security After September 11 Attacks

Pages: 6 (1861 words) Sources: 5 Document Type:Essay Document #:15174853

… to happen on their soil resulted in many people being very surprised and mentally traumatized by the attacks. There was pressure on the government to attack in a significant way to prevent such attacks from reoccurring. This is what resulted in major changes in the United States … to attack in a significant way to prevent such attacks from reoccurring. This is what resulted in major changes in the United States government’s foreign and domestic security policies. It also led to the government getting into several wars and supporting various government and militias across the world to fight its enemies. This paper reviews some of the key government reactions to the September 11 attacks and the role of the private sector in the country’s security policy after the attacks.
Public Opinion …
In the weeks that followed the September 11 attacks in New York and on Pentagon, polling showed……

References

References

Chanley, V. (2002). Trust in Government in the Aftermath of 9/11: Determinants and Consequences. Political Psychology, 23(3), 469-483. Retrieved May 11, 2020, from https://www.jstor.org/stable/3792588

Dugulin, R., & Niglia, A. (2015, May 17). The private sector in the protection of critical infrastructure - GRI. Global Risk Insights. https://globalriskinsights.com/2015/05/the-private-sectors-vital-role-in-the-protection-of-critical-infrastructure/

Gramlich, J. (2018, September 11). Since 9/11, Americans have seen anti-terrorism policy as a top priority. Pew Research Center.  https://www.pewresearch.org/fact-tank/2018/09/11/defending-against-terrorism-has-remained-a-top-policy-priority-for-americans-since-9-11/ 

Morgan, D. (2019). Homeland Security Research and Development: Homeland Security Issues in the 116th Congress. Current Politics and Economics of the United States, Canada, and Mexico, 21(1), 43-46.

Moteff, J., Copeland, C., & Fischer, J. (2003, January). Critical infrastructures: What makes an infrastructure critical?. Library of Congress Washington DC Congressional Research Service.

Join thousands of other students and

"spark your studies".