Study Document
… long-term plan to succeed—now all they had to do was have access to cheap credit (which they all have now thanks to the federal Reserve keeping the Fed Funds rate so low) and they could support their share price no matter the valuation. Companies from Apple to ……
References
Egan, M. (2018). Tax cut triggers $437 billion explosion of stock buybacks. Retrieved from https://money.cnn.com/2018/07/10/investing/stock-buybacks-record-tax-cuts/index.html
Flegm, E. H. (2008). The Need for Reliability in Accounting. Why historical cost is more reliable than fair value. Journal of Accountancy, 205(5), 34.
Healy, P. M., Palepu, K., & Serafeim, G. (2009). Subprime Crisis and Fair-Value Accounting. HBS Case, (109-031).
Laux, C., & Leuz, C. (2010). Did fair-value accounting contribute to the financial crisis?. Journal of economic perspectives, 24(1), 93-118.
Light, L. (2019). More than Half of All Stock Buybacks are Now Financed by Debt. Here’s Why That’s a Problem. Retrieved from https://fortune.com/2019/08/20/stock-buybacks-debt-financed/
Reda, J. (2018). How Stock Buybacks Can Affect Executive Compensation. Retrieved from http://clsbluesky.law.columbia.edu/2018/08/03/how-stock-buybacks-can-affect-executive-compensation/
Young, M. R., (2008). Both sides make good points. Journal of Accountancy, 205(5), 34.
Vaughan, E. J., & Vaughan T. M., (2013). Fundamentals of Risk and Insurance, 11th Edition.
Study Document
… its monitoring and tracking capabilities with projects like Project Hawkeye implemented at the Port of Miami. It also coordinates between local, state and federal agencies to bring about a robust application of surveillance and oversight to ports and seaways. However, as technological advancements increase and more and ……
References
Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).
Christenson, G. (2015). CBRN response. National Guard Bureau.
Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.
Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat
Jennings, P. (2006). Miami port poses serious risks. Retrieved from https://abcnews.go.com/WNT/story?id=131634&page=1
Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from http://www.johnstonsarchive.net/terrorism/chembioattacks.html
Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.
Maras, M-H. (2014). Transnational Security. Florida: CRC Press.
Study Document
… legislation, policy, and protocol. Concerns should be raised immediately to administrators, who may need to be reminded of their responsibilities and obligations under federal or state laws. Nurses also need to become more sensitive to what constitutes elder abuse, as many of their actions could be misconstrued as abusive when … by whistleblowing on a colleague. To reduce the severity and prevalence of elder abuse, all nurses can arm themselves with information about the laws that protect them and their patients. Likewise, nurses can empower patients with information about how to recognize abuse, helping patients understand and exercise ……
References
Falk, N. L., Baigis, J., Kopac, C., (August 14, 2012) \\\\\\\\\\\\"Elder Mistreatment and the Elder Justice Act\\\\\\\\\\\\" OJIN: The Online Journal of Issues in Nursing 17(3).
Forum on Global Violence Prevention; Board on Global Health; Institute of Medicine; National Research Council (2014). Ethical considerations. Washington (DC): National Academies Press (US); 2014 Mar 18.
Lacher, S., Wettstein, A., Senn, O., et al. (2016). Types of abuse and risk factors associated with elder abuse. Swiss Medical Weekly 2016(146): 1-10.
Lachs, M.S., Teresi, J.A., Ramirez, M., et al. (2016). The prevalence of ersident-to-resident elder mistreatment in nursing homes. Annals of Internal Medicine 165(4):229-236.
Malmedal, W., Iversen, M.H. & Kilvik, A. (2014). Sexual abuse of older nursing home residents: A literature review. Nursing Research and Practice 2015(Article 902515): http://dx.doi.org/10.1155/2015/902515
Roberto, K.A. (2016). The complexities of elder abuse. American Psychologist 71(4): 302-311.
Saghafi, A., Bahramnezhad, F., Poormollamirza, A., et al. (2019). Examining the ethical challenges in managing elder abuse: a systematic review. Journal of Medical Ethics and History of Medicine 2019(12): https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6642445/
Wangmo, T., Nordstrom, K. & Kressig, R.W. (2017). Preventing elder abuse and neglect in geriatric institutions: Solutions from nursing care providers. Geriatric Nursing 38(5): 385-392.
Study Document
… that Uber has is that it does not consider its drivers as actual employees even though this categorization has been challenged at the federal level. Regulators have argued in the past that the company should count its drivers as employees rather than as freelancers or contractors. Drivers … status issue, the company has certainly exploited its contractors and undermined the traditional driver for hire industry with its app. The fact that federal…[break]…issue of driver employment status.
Reflection from a Christian Perspective
Christian leadership focuses on servant leadership. It puts the needs of others first—i.e., it ……
References
Bhuiyan, J. (2018). Uber’s sleek new product? Your safety. Retrieved from https://www.vox.com/2018/9/6/17824294/uber-safety-product-feature s
Bond, S. (2019). Uber Received Nearly 6,000 U.S. Sexual Assault Claims In Past 2 Years. Retrieved from https://www.npr.org/2019/12/05/785037245/uber-received-nearly-6-000-u-s-sexual-assault-claims-in-past-2-year s
Kaltner, J. (2018). Employment status of uber and lyft drivers: Unsettlingly settled. Hastings Women's LJ, 29, 29.
Malos, S., Lester, G. V., & Virick, M. (2018). Uber drivers and employment status in the gig economy: Should corporate social responsibility tip the scales?. Employee Responsibilities and Rights Journal, 30(4), 239-251.
North, A. (2019). It’s not just passengers being assaulted in Ubers. Drivers are at risk, too. Retrieved from https://www.vox.com/2019/12/7/20998646/uber-safety-report-sexual-assault-lyft-case s
Rapier, G. (2019). Uber scored a major victory when the US government ruled drivers aren't employees, but not everyone is happy. Retrieved from https://www.businessinsider.com/uber-drivers-disappointed-ruling-not-employees-2019-5
Reingold, J. (2013). Southwest’s Herb Kelleher: Still crazy after all these years. Retrieved from http://fortune.com/2013/01/14/southwests-herb-kelleher-still-crazy-after-all-these-years/
Rogers, B. (2016). Employment rights in the platform economy: Getting back to basics. Harv. L. & Pol'y Rev., 10, 479.
Study Document
Policy on Shift Swapping
Shift swapping is a common practice in modern workplaces both in the public and private sectors. Organizations including federal agencies have established shift swapping policies through which employees engage in shift swap. This practice has positive impacts as it enhances employee retention … such as family responsibilities (Disselkamp, 2013). In addition to enhancing employee retention and performance, shift swapping also contributes to workplace flexibility. For this federal agency, shift swapping is a common practice for part- and full-time employees. However, some full-time employees have abused the policy, which has resulted … the timecard scandal and abuse of the agency’s shift swapping policy by workers, particularly full-time employees.
Problem Statement
The agency is facing a laws from Matt Glynne, a part-time employee who was injured on the job after his claim for workman’s compensation was rejected. Glynne’s claim was … financial losses on the part of the……
References
Bowen, G.A. (2009). Document Analysis as a Qualitative Research Method. Qualitative Research Journal, 9(2), 27-40. DOI: 10.3316/QRJ0902027
Disselkamp, L. (Ed.). (2013). Workforce Asset Management Book of Knowledge. Hoboken, NJ: John Wiley & Sons.
Golden, L. (2015, April 9). Irregular Work Scheduling and Its Consequences. Retrieved May 20, 2020, from https://www.epi.org/publication/irregular-work-scheduling-and-its-consequences/
Paychex. (2019, November 13). How to Manage and Minimize Trading Shifts at Work. Retrieved May 12, 2020, from https://www.paychex.com/articles/payroll-taxes/how-to-manage-and-minimize-trading-shifts-at-work
Study Document
...Federal laws Countering the Threat of Weapons of Mass Destruction (WMDs)
Purpose Statement
Chemical, biological, radiological, and nuclear (CBRN) weapons of mass destruction (WMD) area a threat that can completely disrupt an entire nation’s way of life. The current situation in China is a perfect illustration of what can happen when a biological weapon is used to destabilize a nation’s economy. China is currently grinding to a halt as the Covin-19 virus spreads like wildfire through China. The example shows how devastating a WMD can be when used in an attack. The purpose of this study is to examine ways to prevent or reduce the risk of a CBRN WMD attack. By looking at the use of international treaties, the rise of terrorism, and counter-proliferation strategies, this paper will assess the measures available for achieving the aim.
Research Question
What can nations do to prevent or reduce the risk of CBRN WMD……
References
Asada, M. (2008). Security Council Resolution 1540 to combat WMD terrorism: effectiveness and legitimacy in international legislation. Journal of Conflict & Security Law, 13(3), 303-332.
Carter, A. B. (2004). Overhauling counterproliferation. Technology in Society 26(2-3), 257-269.
CBS. (2011). Clinton on Qaddafi: We came, we saw, he died. Retrieved from https://www.youtube.com/watch?v=mlz3-OzcExI
The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. (1999). Combating Proliferation of Weapons of Mass Destruction. Washington, D.C.
Forest, J.J.F. (2012, Winter). Framework for Analyzing the Future Threat of WMD Terrorism. Journal of Strategic Security 5, 4. Retrieved from http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1193&context=jss
Hochman, D. (2006). Rehabilitating a rogue: Libya's WMD reversal and lessons for US policy. Parameters, 36(1), 63.
Lang, C. G. (1937). Archbishop's Appeal: Individual Will and Action; Guarding Personality. London Times, 28.
Stone, O., & Kuznick, P. (2013). The untold history of the United States. Simon and Schuster.
Study Document
...Federal laws FBI Digital Forensic Services
Requirements for employment as a member of an FBI CART
In order for one to become a member of the FBI CART team they need to have exceptional problem solving and analytical skills, thorough understanding of computers and computer systems and cyber and computer crime investigation. This is because CART offers assistance to the FBI field offices when it comes to the search and seizure of computer evidence. This team is charged with the performance of forensic examinations for all FBI seizures that are related to technology and computers. Therefore, computer forensics is a mandatory requirement for this position. The potential candidate should have a bachelor’s degree in an IT-related field. However, they should have a major in computer forensics. A candidate is required to have good communication skills since they will be required to communicate effectively their findings to other non-technical individuals or officers. Detail-oriented……
References
Federal Bureau of Investigation. (July 2, 2019). Workers’ Compensation Fraud. https://www.fbi.gov/news/stories/workers-compensation-fraud-conspirators-sentenced-070219
Kentucky RCFL. (June 6, 2013 ). Louisville Man Guilty of Harboring 20,000 Images of Child Pornography. https://www.rcfl.gov/kentucky/news
Regional Computer Forensic Laboratory. (n.d.). About the RCFL. Retrieved from https://www.rcfl.gov/about
Study Document
… the unmet needs and delays in care of vulnerable populations is often the result of the complex arrangement of health care policies, the federal government through the legislative branch could create an easier way for the elderly to gain equity in healthcare. For example, Congress could pass ……
References
Brojeni, S. A., Ilali, E. S., Taraghi, Z., & Mousavinasab, N. (2019). Lifestyle and its related factors in elderly. Journal of Nursing and Midwifery Sciences, 6(1), 32.
Community Health Advocates. (2015). Helping New Yorkers get, keep, and use health coverage. Retrieved from: http://www.cssny.org/programs/entry/community-health-advocates
Davoodvand, S., Abbaszadeh, A., & Ahmadi, F. (2016). Patient advocacy from the clinical nurses' viewpoint: A qualitative study. Journal of Medical Ethics & History of Medicine, 9(5), 1-8.
Maryland, M. A., & Gonzalez, R. I. (2012). Patient advocacy in the community and legislative arena. Online Journal of Issues in Nursing, 17(1), 2.
Stainton, H. (2016). Horizon to fund new NJ healthcare advocacy organization. News, Issues, andIinsight for New Jersey. Retrieved from: http://www.njspotlight.com/stories/16/11/21/horizon-to-fund-new-nj-healthcare-advocacy-organization/
Yamada, T., Chen, C. C., Murata, C., Hirai, H., Ojima, T., & Kondo, K. (2015). Access disparity and health inequality of the elderly: unmet needs and delayed healthcare. International journal of environmental research and public health, 12(2), 1745-1772.
Study Document
… to harbor FIE within the nation’s borders. Fighting against this kind of corruption is difficult because state legislators are often at odds with federal legislators who are even at odds with themselves. The Trump Administration, for example, has been fighting to get the U.S.-Mexico border the kind … U.S.-Mexico border the kind of defense needed to reduce illegal penetration, but lawmakers on both sides of the political aisle at both the federal and state levels have pushed back. For political purposes, the safety and security of the nation is jeopardized.
Thus, the effectiveness of national … the safety of the nation has to come first. Monitoring all digital activity should be the responsibility of counter-intelligence, and legislators at the federal level need to be made aware of that. Lobbying should be conducted to raise awareness on this issue, and lawmakers who understand the … heart and soul of liaison,……
Bibliography
Counter intelligence for National Security, CIA, 1993. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol2no4/html/v02i4a10p_0001.htm
Johnston, David and James Risen, “U.S.had evidence of espionage,” New York Times, 2001. https://www.nytimes.com/2001/02/23/us/us-had-evidence-of-espionage-but-fbi-failed-to-inspect-itself.html
National Counterintelligence Strategy of the United States of America 2016 (Strategy). https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf
Prunckun, Hank. 2012. Counterintelligence Theory and Practice, Lanham: Rowman&Littlefield Publishers Inc. Read the following: Chapters 8 to 14, pages 131 to 217. Appendices A to D, pages 219 to 231.
Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September 17). National Security Archive. Accessed January 19, 2017. http://nsarchive.gwu.edu/NSAEBB/NSAEBB230/ .
Van Cleave, Michelle. “Strategic Counterintelligence: What Is It and What Should We Do About It ?” 2007. CIA Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html
Study Document
...Federal laws
Q1
Annuities account for a great part of the protection one affords self against death. They do not follow the application of the law of large numbers as the law is traditionally utilized in life insurance. It has, therefore, been referred to as “upside-down life insurance.” When an annuitant passes away during the period of accumulation, their beneficiaries are paid a death benefit. The common treatment of annuities is to account for gross premium returns excluding interest or to account for the cash value, whichever is greater. The principle is for the principal sum to be liquidated over the annuitant’s lifetime regardless of the means of accumulation.
Q2
Annuities can fall under various classes. Traditionally, the following classifications have been used to differentiate annuities:
i. Individual vs. group annuity
ii. Fixed-dollar vs. variable annuity
iii. Deferred annuity vs. immediate annuity
iv. Installment annuity vs. single-premium annuity
v. Single life vs.……
References
Vaughan, E. J., & Vaughan, T. (2007). Fundamentals of risk and insurance. John Wiley & Sons.
We have over 150,000+ study documents to help you.
Sign Up for FREE