Study Document
… showed what can happen when oversight is insufficient.
However, governments act in fits and starts and inevitably drift back towards deregulation. The 1982 law to allow public companies to purchase their own shares on the open market is one example. Rule 10b-18 was the SEC rule that … legal process for companies to conduct share repurchases (Reda, 2018). Prior to that rule, share buybacks were illegal. When the SEC changed the law regarding buybacks it changed the nature of the business and its duties. Businesses no longer had to be profitable or successful or even … long-term plan to succeed—now all they had to do was have access to cheap credit (which they all have now thanks to the federal Reserve keeping the Fed Funds rate so low) and they could support their share price no matter the valuation. Companies from Apple to … share price no matter the……
References
Egan, M. (2018). Tax cut triggers $437 billion explosion of stock buybacks. Retrieved from https://money.cnn.com/2018/07/10/investing/stock-buybacks-record-tax-cuts/index.html
Flegm, E. H. (2008). The Need for Reliability in Accounting. Why historical cost is more reliable than fair value. Journal of Accountancy, 205(5), 34.
Healy, P. M., Palepu, K., & Serafeim, G. (2009). Subprime Crisis and Fair-Value Accounting. HBS Case, (109-031).
Laux, C., & Leuz, C. (2010). Did fair-value accounting contribute to the financial crisis?. Journal of economic perspectives, 24(1), 93-118.
Light, L. (2019). More than Half of All Stock Buybacks are Now Financed by Debt. Here’s Why That’s a Problem. Retrieved from https://fortune.com/2019/08/20/stock-buybacks-debt-financed/
Reda, J. (2018). How Stock Buybacks Can Affect Executive Compensation. Retrieved from http://clsbluesky.law.columbia.edu/2018/08/03/how-stock-buybacks-can-affect-executive-compensation/
Young, M. R., (2008). Both sides make good points. Journal of Accountancy, 205(5), 34.
Vaughan, E. J., & Vaughan T. M., (2013). Fundamentals of Risk and Insurance, 11th Edition.
Study Document
… survivors of the attack back to the surface where they can be treated.
The resources the National…[break]…operations can be conducted and intelligence and law enforcement shared and coordinated (Pate et al., 2007). Interagency operation centers are crucial to the provision of real-time security. This can be seen … its monitoring and tracking capabilities with projects like Project Hawkeye implemented at the Port of Miami. It also coordinates between local, state and federal agencies to bring about a robust application of surveillance and oversight to ports and seaways. However, as technological advancements increase and more and ……
References
Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).
Christenson, G. (2015). CBRN response. National Guard Bureau.
Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.
Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat
Jennings, P. (2006). Miami port poses serious risks. Retrieved from https://abcnews.go.com/WNT/story?id=131634&page=1
Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from http://www.johnstonsarchive.net/terrorism/chembioattacks.html
Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.
Maras, M-H. (2014). Transnational Security. Florida: CRC Press.
Study Document
… legislation, policy, and protocol. Concerns should be raised immediately to administrators, who may need to be reminded of their responsibilities and obligations under federal or state law. Nurses also need to become more sensitive to what constitutes elder abuse, as many of their actions could be misconstrued as abusive when … by whistleblowing on a colleague. To reduce the severity and prevalence of elder abuse, all nurses can arm themselves with information about the law that protect them and their patients. Likewise, nurses can empower patients with information about how to recognize abuse, helping patients understand and exercise ……
References
Falk, N. L., Baigis, J., Kopac, C., (August 14, 2012) \\\\\\\\\\\\"Elder Mistreatment and the Elder Justice Act\\\\\\\\\\\\" OJIN: The Online Journal of Issues in Nursing 17(3).
Forum on Global Violence Prevention; Board on Global Health; Institute of Medicine; National Research Council (2014). Ethical considerations. Washington (DC): National Academies Press (US); 2014 Mar 18.
Lacher, S., Wettstein, A., Senn, O., et al. (2016). Types of abuse and risk factors associated with elder abuse. Swiss Medical Weekly 2016(146): 1-10.
Lachs, M.S., Teresi, J.A., Ramirez, M., et al. (2016). The prevalence of ersident-to-resident elder mistreatment in nursing homes. Annals of Internal Medicine 165(4):229-236.
Malmedal, W., Iversen, M.H. & Kilvik, A. (2014). Sexual abuse of older nursing home residents: A literature review. Nursing Research and Practice 2015(Article 902515): http://dx.doi.org/10.1155/2015/902515
Roberto, K.A. (2016). The complexities of elder abuse. American Psychologist 71(4): 302-311.
Saghafi, A., Bahramnezhad, F., Poormollamirza, A., et al. (2019). Examining the ethical challenges in managing elder abuse: a systematic review. Journal of Medical Ethics and History of Medicine 2019(12): https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6642445/
Wangmo, T., Nordstrom, K. & Kressig, R.W. (2017). Preventing elder abuse and neglect in geriatric institutions: Solutions from nursing care providers. Geriatric Nursing 38(5): 385-392.
Study Document
… that Uber has is that it does not consider its drivers as actual employees even though this categorization has been challenged at the federal level. Regulators have argued in the past that the company should count its drivers as employees rather than as freelancers or contractors. Drivers … status issue, the company has certainly exploited its contractors and undermined the traditional driver for hire industry with its app. The fact that federal…[break]…issue of driver employment status.
Reflection from a Christian Perspective
Christian leadership focuses on servant leadership. It puts the needs of others first—i.e., it ……
References
Bhuiyan, J. (2018). Uber’s sleek new product? Your safety. Retrieved from https://www.vox.com/2018/9/6/17824294/uber-safety-product-feature s
Bond, S. (2019). Uber Received Nearly 6,000 U.S. Sexual Assault Claims In Past 2 Years. Retrieved from https://www.npr.org/2019/12/05/785037245/uber-received-nearly-6-000-u-s-sexual-assault-claims-in-past-2-year s
Kaltner, J. (2018). Employment status of uber and lyft drivers: Unsettlingly settled. Hastings Women's LJ, 29, 29.
Malos, S., Lester, G. V., & Virick, M. (2018). Uber drivers and employment status in the gig economy: Should corporate social responsibility tip the scales?. Employee Responsibilities and Rights Journal, 30(4), 239-251.
North, A. (2019). It’s not just passengers being assaulted in Ubers. Drivers are at risk, too. Retrieved from https://www.vox.com/2019/12/7/20998646/uber-safety-report-sexual-assault-lyft-case s
Rapier, G. (2019). Uber scored a major victory when the US government ruled drivers aren't employees, but not everyone is happy. Retrieved from https://www.businessinsider.com/uber-drivers-disappointed-ruling-not-employees-2019-5
Reingold, J. (2013). Southwest’s Herb Kelleher: Still crazy after all these years. Retrieved from http://fortune.com/2013/01/14/southwests-herb-kelleher-still-crazy-after-all-these-years/
Rogers, B. (2016). Employment rights in the platform economy: Getting back to basics. Harv. L. & Pol'y Rev., 10, 479.
Study Document
Policy on Shift Swapping
Shift swapping is a common practice in modern workplaces both in the public and private sectors. Organizations including federal agencies have established shift swapping policies through which employees engage in shift swap. This practice has positive impacts as it enhances employee retention … such as family responsibilities (Disselkamp, 2013). In addition to enhancing employee retention and performance, shift swapping also contributes to workplace flexibility. For this federal agency, shift swapping is a common practice for part- and full-time employees. However, some full-time employees have abused the policy, which has resulted … the timecard scandal and abuse of the agency’s shift swapping policy by workers, particularly full-time employees.
Problem Statement
The agency is facing a law from Matt Glynne, a part-time employee who was injured on the job after his claim for workman’s compensation was rejected. Glynne’s claim was … work. In addition, the employee’s benefits will……
References
Bowen, G.A. (2009). Document Analysis as a Qualitative Research Method. Qualitative Research Journal, 9(2), 27-40. DOI: 10.3316/QRJ0902027
Disselkamp, L. (Ed.). (2013). Workforce Asset Management Book of Knowledge. Hoboken, NJ: John Wiley & Sons.
Golden, L. (2015, April 9). Irregular Work Scheduling and Its Consequences. Retrieved May 20, 2020, from https://www.epi.org/publication/irregular-work-scheduling-and-its-consequences/
Paychex. (2019, November 13). How to Manage and Minimize Trading Shifts at Work. Retrieved May 12, 2020, from https://www.paychex.com/articles/payroll-taxes/how-to-manage-and-minimize-trading-shifts-at-work
Study Document
...Federal law Countering the Threat of Weapons of Mass Destruction (WMDs)
Purpose Statement
Chemical, biological, radiological, and nuclear (CBRN) weapons of mass destruction (WMD) area a threat that can completely disrupt an entire nation’s way of life. The current situation in China is a perfect illustration of what can happen when a biological weapon is used to destabilize a nation’s economy. China is currently grinding to a halt as the Covin-19 virus spreads like wildfire through China. The example shows how devastating a WMD can be when used in an attack. The purpose of this study is to examine ways to prevent or reduce the risk of a CBRN WMD attack. By looking at the use of international treaties, the rise of terrorism, and counter-proliferation strategies, this paper will assess the measures available for achieving the aim.
Research Question
What can nations do to prevent or reduce the risk of CBRN WMD……
References
Asada, M. (2008). Security Council Resolution 1540 to combat WMD terrorism: effectiveness and legitimacy in international legislation. Journal of Conflict & Security Law, 13(3), 303-332.
Carter, A. B. (2004). Overhauling counterproliferation. Technology in Society 26(2-3), 257-269.
CBS. (2011). Clinton on Qaddafi: We came, we saw, he died. Retrieved from https://www.youtube.com/watch?v=mlz3-OzcExI
The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. (1999). Combating Proliferation of Weapons of Mass Destruction. Washington, D.C.
Forest, J.J.F. (2012, Winter). Framework for Analyzing the Future Threat of WMD Terrorism. Journal of Strategic Security 5, 4. Retrieved from http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1193&context=jss
Hochman, D. (2006). Rehabilitating a rogue: Libya's WMD reversal and lessons for US policy. Parameters, 36(1), 63.
Lang, C. G. (1937). Archbishop's Appeal: Individual Will and Action; Guarding Personality. London Times, 28.
Stone, O., & Kuznick, P. (2013). The untold history of the United States. Simon and Schuster.
Study Document
… judgment.
Types of cases in which the RCFL’s focus
The RCFL mainly focuses on providing forensic services and expertise aimed at supporting the law enforcement agencies in the collection and examination of digital evidence. The cases handled by the RCFL include Child pornography, fraud, terrorism,…[break]…Bureau of Investigation … would be directed to one of the corrupt doctors and there they will be prescribed numerous medical tests that are not necessary. The law would take over and the goal would be the same, bill the worker as much as possible. The medical providers would bill insurance ……
References
Federal Bureau of Investigation. (July 2, 2019). Workers’ Compensation Fraud. https://www.fbi.gov/news/stories/workers-compensation-fraud-conspirators-sentenced-070219
Kentucky RCFL. (June 6, 2013 ). Louisville Man Guilty of Harboring 20,000 Images of Child Pornography. https://www.rcfl.gov/kentucky/news
Regional Computer Forensic Laboratory. (n.d.). About the RCFL. Retrieved from https://www.rcfl.gov/about
Study Document
… the unmet needs and delays in care of vulnerable populations is often the result of the complex arrangement of health care policies, the federal government through the legislative branch could create an easier way for the elderly to gain equity in healthcare. For example, Congress could pass … through the legislative branch could create an easier way for the elderly to gain equity in healthcare. For example, Congress could pass a law that eliminates the out of pocket expenses that elderly persons must pay for care. This paper will discuss how healthcare advocates can aid ……
References
Brojeni, S. A., Ilali, E. S., Taraghi, Z., & Mousavinasab, N. (2019). Lifestyle and its related factors in elderly. Journal of Nursing and Midwifery Sciences, 6(1), 32.
Community Health Advocates. (2015). Helping New Yorkers get, keep, and use health coverage. Retrieved from: http://www.cssny.org/programs/entry/community-health-advocates
Davoodvand, S., Abbaszadeh, A., & Ahmadi, F. (2016). Patient advocacy from the clinical nurses' viewpoint: A qualitative study. Journal of Medical Ethics & History of Medicine, 9(5), 1-8.
Maryland, M. A., & Gonzalez, R. I. (2012). Patient advocacy in the community and legislative arena. Online Journal of Issues in Nursing, 17(1), 2.
Stainton, H. (2016). Horizon to fund new NJ healthcare advocacy organization. News, Issues, andIinsight for New Jersey. Retrieved from: http://www.njspotlight.com/stories/16/11/21/horizon-to-fund-new-nj-healthcare-advocacy-organization/
Yamada, T., Chen, C. C., Murata, C., Hirai, H., Ojima, T., & Kondo, K. (2015). Access disparity and health inequality of the elderly: unmet needs and delayed healthcare. International journal of environmental research and public health, 12(2), 1745-1772.
Study Document
… to harbor FIE within the nation’s borders. Fighting against this kind of corruption is difficult because state legislators are often at odds with federal legislators who are even at odds with themselves. The Trump Administration, for example, has been fighting to get the U.S.-Mexico border the kind … The Trump Administration, for example, has been fighting to get the U.S.-Mexico border the kind of defense needed to reduce illegal penetration, but law on both sides of the political aisle at both the federal and state levels have pushed back. For political purposes, the safety and security of the nation is jeopardized.
Thus, the effectiveness of national … the safety of the nation has to come first. Monitoring all digital activity should be the responsibility of counter-intelligence, and legislators at the federal level need to be made aware of that. Lobbying should be conducted to raise awareness on this issue,……
Bibliography
Counter intelligence for National Security, CIA, 1993. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol2no4/html/v02i4a10p_0001.htm
Johnston, David and James Risen, “U.S.had evidence of espionage,” New York Times, 2001. https://www.nytimes.com/2001/02/23/us/us-had-evidence-of-espionage-but-fbi-failed-to-inspect-itself.html
National Counterintelligence Strategy of the United States of America 2016 (Strategy). https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf
Prunckun, Hank. 2012. Counterintelligence Theory and Practice, Lanham: Rowman&Littlefield Publishers Inc. Read the following: Chapters 8 to 14, pages 131 to 217. Appendices A to D, pages 219 to 231.
Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September 17). National Security Archive. Accessed January 19, 2017. http://nsarchive.gwu.edu/NSAEBB/NSAEBB230/ .
Van Cleave, Michelle. “Strategic Counterintelligence: What Is It and What Should We Do About It ?” 2007. CIA Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html
Study Document
…
Q1
Annuities account for a great part of the protection one affords self against death. They do not follow the application of the law of large numbers as the law is traditionally utilized in life insurance. It has, therefore, been referred to as “upside-down life insurance.” When an annuitant passes away during the ……
References
Vaughan, E. J., & Vaughan, T. (2007). Fundamentals of risk and insurance. John Wiley & Sons.
We have over 150,000+ study documents to help you.
Sign Up for FREE