Federal Law Essays (Examples)

Studyspark

Study Document Study Document

Globalization Of Insurance

Pages: 8 (2325 words) Sources: 8 Document Type:Term Paper Document #:88593479

… showed what can happen when oversight is insufficient.

However, governments act in fits and starts and inevitably drift back towards deregulation. The 1982 law to allow public companies to purchase their own shares on the open market is one example. Rule 10b-18 was the SEC rule that … legal process for companies to conduct share repurchases (Reda, 2018). Prior to that rule, share buybacks were illegal. When the SEC changed the law regarding buybacks it changed the nature of the business and its duties. Businesses no longer had to be profitable or successful or even … long-term plan to succeed—now all they had to do was have access to cheap credit (which they all have now thanks to the federal Reserve keeping the Fed Funds rate so low) and they could support their share price no matter the valuation. Companies from Apple to … share price no matter the……

References

References

Egan, M. (2018). Tax cut triggers $437 billion explosion of stock buybacks. Retrieved from  https://money.cnn.com/2018/07/10/investing/stock-buybacks-record-tax-cuts/index.html 

Flegm, E. H. (2008). The Need for Reliability in Accounting. Why historical cost is more reliable than fair value. Journal of Accountancy, 205(5), 34.

Healy, P. M., Palepu, K., & Serafeim, G. (2009). Subprime Crisis and Fair-Value Accounting. HBS Case, (109-031).

Laux, C., & Leuz, C. (2010). Did fair-value accounting contribute to the financial crisis?. Journal of economic perspectives, 24(1), 93-118.

Light, L. (2019). More than Half of All Stock Buybacks are Now Financed by Debt. Here’s Why That’s a Problem. Retrieved from  https://fortune.com/2019/08/20/stock-buybacks-debt-financed/ 

Reda, J. (2018). How Stock Buybacks Can Affect Executive Compensation. Retrieved from  http://clsbluesky.law.columbia.edu/2018/08/03/how-stock-buybacks-can-affect-executive-compensation/ 

Young, M. R., (2008). Both sides make good points. Journal of Accountancy, 205(5), 34.

Vaughan, E. J., & Vaughan T. M., (2013). Fundamentals of Risk and Insurance, 11th Edition.

Studyspark

Study Document Study Document

Weapons Of Mass Destruction WMD Antifa

Pages: 13 (3787 words) Sources: 12 Document Type:Research Paper Document #:67320498

… survivors of the attack back to the surface where they can be treated.
The resources the National…[break]…operations can be conducted and intelligence and law enforcement shared and coordinated (Pate et al., 2007). Interagency operation centers are crucial to the provision of real-time security. This can be seen … its monitoring and tracking capabilities with projects like Project Hawkeye implemented at the Port of Miami. It also coordinates between local, state and federal agencies to bring about a robust application of surveillance and oversight to ports and seaways. However, as technological advancements increase and more and ……

References

References

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Christenson, G. (2015). CBRN response. National Guard Bureau.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from  https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat 

Jennings, P. (2006). Miami port poses serious risks. Retrieved from  https://abcnews.go.com/WNT/story?id=131634&page=1 

Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from  http://www.johnstonsarchive.net/terrorism/chembioattacks.html 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Maras, M-H. (2014). Transnational Security. Florida: CRC Press.

Studyspark

Study Document Study Document

Elder Abuse

Pages: 7 (2239 words) Sources: 4 Document Type:Term Paper Document #:22335640

… legislation, policy, and protocol. Concerns should be raised immediately to administrators, who may need to be reminded of their responsibilities and obligations under federal or state law. Nurses also need to become more sensitive to what constitutes elder abuse, as many of their actions could be misconstrued as abusive when … by whistleblowing on a colleague. To reduce the severity and prevalence of elder abuse, all nurses can arm themselves with information about the law that protect them and their patients. Likewise, nurses can empower patients with information about how to recognize abuse, helping patients understand and exercise ……

References

References

Falk, N. L., Baigis, J., Kopac, C., (August 14, 2012) \\\\\\\\\\\\"Elder Mistreatment and the Elder Justice Act\\\\\\\\\\\\" OJIN: The Online Journal of Issues in Nursing 17(3).

Forum on Global Violence Prevention; Board on Global Health; Institute of Medicine; National Research Council (2014). Ethical considerations. Washington (DC): National Academies Press (US); 2014 Mar 18.

Lacher, S., Wettstein, A., Senn, O., et al. (2016). Types of abuse and risk factors associated with elder abuse. Swiss Medical Weekly 2016(146): 1-10.

Lachs, M.S., Teresi, J.A., Ramirez, M., et al. (2016). The prevalence of ersident-to-resident elder mistreatment in nursing homes. Annals of Internal Medicine 165(4):229-236.

Malmedal, W., Iversen, M.H. & Kilvik, A. (2014). Sexual abuse of older nursing home residents: A literature review. Nursing Research and Practice 2015(Article 902515):  http://dx.doi.org/10.1155/2015/902515 

Roberto, K.A. (2016). The complexities of elder abuse. American Psychologist 71(4): 302-311.

Saghafi, A., Bahramnezhad, F., Poormollamirza, A., et al. (2019). Examining the ethical challenges in managing elder abuse: a systematic review. Journal of Medical Ethics and History of Medicine 2019(12):  https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6642445/ 

Wangmo, T., Nordstrom, K. & Kressig, R.W. (2017). Preventing elder abuse and neglect in geriatric institutions: Solutions from nursing care providers. Geriatric Nursing 38(5): 385-392.

Studyspark

Study Document Study Document

Why Uber Refuses To Hire Drivers As Full Time Employees

Pages: 11 (3298 words) Sources: 10 Document Type:Research Paper Document #:74911361

… that Uber has is that it does not consider its drivers as actual employees even though this categorization has been challenged at the federal level. Regulators have argued in the past that the company should count its drivers as employees rather than as freelancers or contractors. Drivers … status issue, the company has certainly exploited its contractors and undermined the traditional driver for hire industry with its app. The fact that federal…[break]…issue of driver employment status.
Reflection from a Christian Perspective
Christian leadership focuses on servant leadership. It puts the needs of others first—i.e., it ……

References

References

Bhuiyan, J. (2018). Uber’s sleek new product? Your safety. Retrieved from  https://www.vox.com/2018/9/6/17824294/uber-safety-product-feature s

Bond, S. (2019). Uber Received Nearly 6,000 U.S. Sexual Assault Claims In Past 2 Years. Retrieved from  https://www.npr.org/2019/12/05/785037245/uber-received-nearly-6-000-u-s-sexual-assault-claims-in-past-2-year s

Kaltner, J. (2018). Employment status of uber and lyft drivers: Unsettlingly settled.  Hastings Women's LJ, 29, 29.

Malos, S., Lester, G. V., & Virick, M. (2018). Uber drivers and employment status in the gig economy: Should corporate social responsibility tip the scales?. Employee Responsibilities and Rights Journal, 30(4), 239-251.

North, A. (2019). It’s not just passengers being assaulted in Ubers. Drivers are at risk, too. Retrieved from  https://www.vox.com/2019/12/7/20998646/uber-safety-report-sexual-assault-lyft-case s

Rapier, G. (2019). Uber scored a major victory when the US government ruled drivers aren't employees, but not everyone is happy. Retrieved from  https://www.businessinsider.com/uber-drivers-disappointed-ruling-not-employees-2019-5 

Reingold, J. (2013). Southwest’s Herb Kelleher: Still crazy after all these years. Retrieved from  http://fortune.com/2013/01/14/southwests-herb-kelleher-still-crazy-after-all-these-years/ 

Rogers, B. (2016). Employment rights in the platform economy: Getting back to basics. Harv. L. & Pol'y Rev., 10, 479.

Studyspark

Study Document Study Document

Policy On Shift Swapping

Pages: 6 (1887 words) Sources: 2 Document Type:Essay Document #:36684700

Policy on Shift Swapping
Shift swapping is a common practice in modern workplaces both in the public and private sectors. Organizations including federal agencies have established shift swapping policies through which employees engage in shift swap. This practice has positive impacts as it enhances employee retention … such as family responsibilities (Disselkamp, 2013). In addition to enhancing employee retention and performance, shift swapping also contributes to workplace flexibility. For this federal agency, shift swapping is a common practice for part- and full-time employees. However, some full-time employees have abused the policy, which has resulted … the timecard scandal and abuse of the agency’s shift swapping policy by workers, particularly full-time employees.
Problem Statement
The agency is facing a law from Matt Glynne, a part-time employee who was injured on the job after his claim for workman’s compensation was rejected. Glynne’s claim was … work. In addition, the employee’s benefits will……

References

References

Bowen, G.A. (2009). Document Analysis as a Qualitative Research Method. Qualitative Research Journal, 9(2), 27-40. DOI: 10.3316/QRJ0902027

Disselkamp, L. (Ed.). (2013). Workforce Asset Management Book of Knowledge. Hoboken, NJ: John Wiley & Sons.

Golden, L. (2015, April 9). Irregular Work Scheduling and Its Consequences. Retrieved May 20, 2020, from  https://www.epi.org/publication/irregular-work-scheduling-and-its-consequences/ 

Paychex. (2019, November 13). How to Manage and Minimize Trading Shifts at Work. Retrieved May 12, 2020, from  https://www.paychex.com/articles/payroll-taxes/how-to-manage-and-minimize-trading-shifts-at-work 

Studyspark

Study Document Study Document

Weapons Of Mass Destruction

Pages: 9 (2563 words) Sources: 10 Document Type:Research Paper Document #:76982977

...Federal law Countering the Threat of Weapons of Mass Destruction (WMDs)
Purpose Statement
Chemical, biological, radiological, and nuclear (CBRN) weapons of mass destruction (WMD) area a threat that can completely disrupt an entire nation’s way of life. The current situation in China is a perfect illustration of what can happen when a biological weapon is used to destabilize a nation’s economy. China is currently grinding to a halt as the Covin-19 virus spreads like wildfire through China. The example shows how devastating a WMD can be when used in an attack. The purpose of this study is to examine ways to prevent or reduce the risk of a CBRN WMD attack. By looking at the use of international treaties, the rise of terrorism, and counter-proliferation strategies, this paper will assess the measures available for achieving the aim.
Research Question
What can nations do to prevent or reduce the risk of CBRN WMD……

References

References

Asada, M. (2008). Security Council Resolution 1540 to combat WMD terrorism: effectiveness and legitimacy in international legislation. Journal of Conflict & Security Law, 13(3), 303-332.

Carter, A. B. (2004). Overhauling counterproliferation. Technology in Society 26(2-3), 257-269.

CBS. (2011). Clinton on Qaddafi: We came, we saw, he died. Retrieved from  https://www.youtube.com/watch?v=mlz3-OzcExI 

The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. (1999). Combating Proliferation of Weapons of Mass Destruction. Washington, D.C.

Forest, J.J.F. (2012, Winter). Framework for Analyzing the Future Threat of WMD Terrorism. Journal of Strategic Security 5, 4. Retrieved from  http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1193&context=jss 

Hochman, D. (2006). Rehabilitating a rogue: Libya's WMD reversal and lessons for US policy. Parameters, 36(1), 63.

Lang, C. G. (1937). Archbishop's Appeal: Individual Will and Action; Guarding Personality. London Times, 28.

Stone, O., & Kuznick, P. (2013). The untold history of the United States. Simon and Schuster.

Studyspark

Study Document Study Document

Security Of Computers Data

Pages: 2 (729 words) Sources: 3 Document Type:Essay Document #:20542054

… judgment.
Types of cases in which the RCFL’s focus
The RCFL mainly focuses on providing forensic services and expertise aimed at supporting the law enforcement agencies in the collection and examination of digital evidence. The cases handled by the RCFL include Child pornography, fraud, terrorism,…[break]…Bureau of Investigation … would be directed to one of the corrupt doctors and there they will be prescribed numerous medical tests that are not necessary. The law would take over and the goal would be the same, bill the worker as much as possible. The medical providers would bill insurance ……

References

References

Federal Bureau of Investigation. (July 2, 2019). Workers’ Compensation Fraud.  https://www.fbi.gov/news/stories/workers-compensation-fraud-conspirators-sentenced-070219 

Kentucky RCFL. (June 6, 2013 ). Louisville Man Guilty of Harboring 20,000 Images of Child Pornography.  https://www.rcfl.gov/kentucky/news 

Regional Computer Forensic Laboratory. (n.d.). About the RCFL. Retrieved from  https://www.rcfl.gov/about 

Studyspark

Study Document Study Document

Healthcare Advocacy For The Elderly

Pages: 8 (2541 words) Sources: 6 Document Type:Essay Document #:36286528

… the unmet needs and delays in care of vulnerable populations is often the result of the complex arrangement of health care policies, the federal government through the legislative branch could create an easier way for the elderly to gain equity in healthcare. For example, Congress could pass … through the legislative branch could create an easier way for the elderly to gain equity in healthcare. For example, Congress could pass a law that eliminates the out of pocket expenses that elderly persons must pay for care. This paper will discuss how healthcare advocates can aid ……

References

References

Brojeni, S. A., Ilali, E. S., Taraghi, Z., & Mousavinasab, N. (2019). Lifestyle and its related factors in elderly. Journal of Nursing and Midwifery Sciences, 6(1), 32.

Community Health Advocates. (2015). Helping New Yorkers get, keep, and use health coverage. Retrieved from:  http://www.cssny.org/programs/entry/community-health-advocates 

Davoodvand, S., Abbaszadeh, A., & Ahmadi, F. (2016). Patient advocacy from the clinical nurses' viewpoint: A qualitative study. Journal of Medical Ethics & History of Medicine, 9(5), 1-8.

Maryland, M. A., & Gonzalez, R. I. (2012). Patient advocacy in the community and legislative arena. Online Journal of Issues in Nursing, 17(1), 2.

Stainton, H. (2016). Horizon to fund new NJ healthcare advocacy organization. News, Issues, andIinsight for New Jersey. Retrieved from:  http://www.njspotlight.com/stories/16/11/21/horizon-to-fund-new-nj-healthcare-advocacy-organization/ 

Yamada, T., Chen, C. C., Murata, C., Hirai, H., Ojima, T., & Kondo, K. (2015). Access disparity and health inequality of the elderly: unmet needs and delayed healthcare. International journal of environmental research and public health, 12(2), 1745-1772.

Studyspark

Study Document Study Document

Counterintelligence

Pages: 12 (3490 words) Sources: 6 Document Type:question answer Document #:11133529

… to harbor FIE within the nation’s borders. Fighting against this kind of corruption is difficult because state legislators are often at odds with federal legislators who are even at odds with themselves. The Trump Administration, for example, has been fighting to get the U.S.-Mexico border the kind … The Trump Administration, for example, has been fighting to get the U.S.-Mexico border the kind of defense needed to reduce illegal penetration, but law on both sides of the political aisle at both the federal and state levels have pushed back. For political purposes, the safety and security of the nation is jeopardized.
Thus, the effectiveness of national … the safety of the nation has to come first. Monitoring all digital activity should be the responsibility of counter-intelligence, and legislators at the federal level need to be made aware of that. Lobbying should be conducted to raise awareness on this issue,……

References

Bibliography

Counter intelligence for National Security, CIA, 1993. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol2no4/html/v02i4a10p_0001.htm

Johnston, David and James Risen, “U.S.had evidence of espionage,” New York Times, 2001. https://www.nytimes.com/2001/02/23/us/us-had-evidence-of-espionage-but-fbi-failed-to-inspect-itself.html

National Counterintelligence Strategy of the United States of America 2016 (Strategy).  https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf 

Prunckun, Hank. 2012. Counterintelligence Theory and Practice, Lanham: Rowman&Littlefield Publishers Inc. Read the following: Chapters 8 to 14, pages 131 to 217. Appendices A to D, pages 219 to 231.

Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September 17). National Security Archive. Accessed January 19, 2017.  http://nsarchive.gwu.edu/NSAEBB/NSAEBB230/ .

Van Cleave, Michelle. “Strategic Counterintelligence: What Is It and What Should We Do About It ?” 2007. CIA Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html

Studyspark

Study Document Study Document

Risk Management And Insurance

Pages: 4 (1093 words) Sources: 1 Document Type:Questionnaire Document #:95274016


Q1
Annuities account for a great part of the protection one affords self against death. They do not follow the application of the law of large numbers as the law is traditionally utilized in life insurance. It has, therefore, been referred to as “upside-down life insurance.” When an annuitant passes away during the ……

References

References

Vaughan, E. J., & Vaughan, T. (2007). Fundamentals of risk and insurance. John Wiley & Sons.

 

Join thousands of other students and

"spark your studies".