Federal Laws Essays (Examples)

Studyspark

Study Document Study Document

Globalization Of Insurance

Pages: 8 (2325 words) Sources: 8 Document Type:Term Paper Document #:88593479

… long-term plan to succeed—now all they had to do was have access to cheap credit (which they all have now thanks to the federal Reserve keeping the Fed Funds rate so low) and they could support their share price no matter the valuation. Companies from Apple to ……

References

References

Egan, M. (2018). Tax cut triggers $437 billion explosion of stock buybacks. Retrieved from  https://money.cnn.com/2018/07/10/investing/stock-buybacks-record-tax-cuts/index.html 

Flegm, E. H. (2008). The Need for Reliability in Accounting. Why historical cost is more reliable than fair value. Journal of Accountancy, 205(5), 34.

Healy, P. M., Palepu, K., & Serafeim, G. (2009). Subprime Crisis and Fair-Value Accounting. HBS Case, (109-031).

Laux, C., & Leuz, C. (2010). Did fair-value accounting contribute to the financial crisis?. Journal of economic perspectives, 24(1), 93-118.

Light, L. (2019). More than Half of All Stock Buybacks are Now Financed by Debt. Here’s Why That’s a Problem. Retrieved from  https://fortune.com/2019/08/20/stock-buybacks-debt-financed/ 

Reda, J. (2018). How Stock Buybacks Can Affect Executive Compensation. Retrieved from  http://clsbluesky.law.columbia.edu/2018/08/03/how-stock-buybacks-can-affect-executive-compensation/ 

Young, M. R., (2008). Both sides make good points. Journal of Accountancy, 205(5), 34.

Vaughan, E. J., & Vaughan T. M., (2013). Fundamentals of Risk and Insurance, 11th Edition.

Studyspark

Study Document Study Document

Weapons Of Mass Destruction WMD Antifa

Pages: 13 (3787 words) Sources: 12 Document Type:Research Paper Document #:67320498

… its monitoring and tracking capabilities with projects like Project Hawkeye implemented at the Port of Miami. It also coordinates between local, state and federal agencies to bring about a robust application of surveillance and oversight to ports and seaways. However, as technological advancements increase and more and ……

References

References

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Christenson, G. (2015). CBRN response. National Guard Bureau.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from  https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat 

Jennings, P. (2006). Miami port poses serious risks. Retrieved from  https://abcnews.go.com/WNT/story?id=131634&page=1 

Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from  http://www.johnstonsarchive.net/terrorism/chembioattacks.html 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Maras, M-H. (2014). Transnational Security. Florida: CRC Press.

Studyspark

Study Document Study Document

Elder Abuse

Pages: 7 (2239 words) Sources: 4 Document Type:Term Paper Document #:22335640

… legislation, policy, and protocol. Concerns should be raised immediately to administrators, who may need to be reminded of their responsibilities and obligations under federal or state laws. Nurses also need to become more sensitive to what constitutes elder abuse, as many of their actions could be misconstrued as abusive when … by whistleblowing on a colleague. To reduce the severity and prevalence of elder abuse, all nurses can arm themselves with information about the laws that protect them and their patients. Likewise, nurses can empower patients with information about how to recognize abuse, helping patients understand and exercise ……

References

References

Falk, N. L., Baigis, J., Kopac, C., (August 14, 2012) \\\\\\\\\\\\"Elder Mistreatment and the Elder Justice Act\\\\\\\\\\\\" OJIN: The Online Journal of Issues in Nursing 17(3).

Forum on Global Violence Prevention; Board on Global Health; Institute of Medicine; National Research Council (2014). Ethical considerations. Washington (DC): National Academies Press (US); 2014 Mar 18.

Lacher, S., Wettstein, A., Senn, O., et al. (2016). Types of abuse and risk factors associated with elder abuse. Swiss Medical Weekly 2016(146): 1-10.

Lachs, M.S., Teresi, J.A., Ramirez, M., et al. (2016). The prevalence of ersident-to-resident elder mistreatment in nursing homes. Annals of Internal Medicine 165(4):229-236.

Malmedal, W., Iversen, M.H. & Kilvik, A. (2014). Sexual abuse of older nursing home residents: A literature review. Nursing Research and Practice 2015(Article 902515):  http://dx.doi.org/10.1155/2015/902515 

Roberto, K.A. (2016). The complexities of elder abuse. American Psychologist 71(4): 302-311.

Saghafi, A., Bahramnezhad, F., Poormollamirza, A., et al. (2019). Examining the ethical challenges in managing elder abuse: a systematic review. Journal of Medical Ethics and History of Medicine 2019(12):  https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6642445/ 

Wangmo, T., Nordstrom, K. & Kressig, R.W. (2017). Preventing elder abuse and neglect in geriatric institutions: Solutions from nursing care providers. Geriatric Nursing 38(5): 385-392.

Studyspark

Study Document Study Document

Why Uber Refuses To Hire Drivers As Full Time Employees

Pages: 11 (3298 words) Sources: 10 Document Type:Research Paper Document #:74911361

… that Uber has is that it does not consider its drivers as actual employees even though this categorization has been challenged at the federal level. Regulators have argued in the past that the company should count its drivers as employees rather than as freelancers or contractors. Drivers … status issue, the company has certainly exploited its contractors and undermined the traditional driver for hire industry with its app. The fact that federal…[break]…issue of driver employment status.
Reflection from a Christian Perspective
Christian leadership focuses on servant leadership. It puts the needs of others first—i.e., it ……

References

References

Bhuiyan, J. (2018). Uber’s sleek new product? Your safety. Retrieved from  https://www.vox.com/2018/9/6/17824294/uber-safety-product-feature s

Bond, S. (2019). Uber Received Nearly 6,000 U.S. Sexual Assault Claims In Past 2 Years. Retrieved from  https://www.npr.org/2019/12/05/785037245/uber-received-nearly-6-000-u-s-sexual-assault-claims-in-past-2-year s

Kaltner, J. (2018). Employment status of uber and lyft drivers: Unsettlingly settled.  Hastings Women's LJ, 29, 29.

Malos, S., Lester, G. V., & Virick, M. (2018). Uber drivers and employment status in the gig economy: Should corporate social responsibility tip the scales?. Employee Responsibilities and Rights Journal, 30(4), 239-251.

North, A. (2019). It’s not just passengers being assaulted in Ubers. Drivers are at risk, too. Retrieved from  https://www.vox.com/2019/12/7/20998646/uber-safety-report-sexual-assault-lyft-case s

Rapier, G. (2019). Uber scored a major victory when the US government ruled drivers aren't employees, but not everyone is happy. Retrieved from  https://www.businessinsider.com/uber-drivers-disappointed-ruling-not-employees-2019-5 

Reingold, J. (2013). Southwest’s Herb Kelleher: Still crazy after all these years. Retrieved from  http://fortune.com/2013/01/14/southwests-herb-kelleher-still-crazy-after-all-these-years/ 

Rogers, B. (2016). Employment rights in the platform economy: Getting back to basics. Harv. L. & Pol'y Rev., 10, 479.

Studyspark

Study Document Study Document

Policy On Shift Swapping

Pages: 6 (1887 words) Sources: 2 Document Type:Essay Document #:36684700

Policy on Shift Swapping
Shift swapping is a common practice in modern workplaces both in the public and private sectors. Organizations including federal agencies have established shift swapping policies through which employees engage in shift swap. This practice has positive impacts as it enhances employee retention … such as family responsibilities (Disselkamp, 2013). In addition to enhancing employee retention and performance, shift swapping also contributes to workplace flexibility. For this federal agency, shift swapping is a common practice for part- and full-time employees. However, some full-time employees have abused the policy, which has resulted … the timecard scandal and abuse of the agency’s shift swapping policy by workers, particularly full-time employees.
Problem Statement
The agency is facing a laws from Matt Glynne, a part-time employee who was injured on the job after his claim for workman’s compensation was rejected. Glynne’s claim was … financial losses on the part of the……

References

References

Bowen, G.A. (2009). Document Analysis as a Qualitative Research Method. Qualitative Research Journal, 9(2), 27-40. DOI: 10.3316/QRJ0902027

Disselkamp, L. (Ed.). (2013). Workforce Asset Management Book of Knowledge. Hoboken, NJ: John Wiley & Sons.

Golden, L. (2015, April 9). Irregular Work Scheduling and Its Consequences. Retrieved May 20, 2020, from  https://www.epi.org/publication/irregular-work-scheduling-and-its-consequences/ 

Paychex. (2019, November 13). How to Manage and Minimize Trading Shifts at Work. Retrieved May 12, 2020, from  https://www.paychex.com/articles/payroll-taxes/how-to-manage-and-minimize-trading-shifts-at-work 

Studyspark

Study Document Study Document

Weapons Of Mass Destruction

Pages: 9 (2563 words) Sources: 10 Document Type:Research Paper Document #:76982977

...Federal laws Countering the Threat of Weapons of Mass Destruction (WMDs)
Purpose Statement
Chemical, biological, radiological, and nuclear (CBRN) weapons of mass destruction (WMD) area a threat that can completely disrupt an entire nation’s way of life. The current situation in China is a perfect illustration of what can happen when a biological weapon is used to destabilize a nation’s economy. China is currently grinding to a halt as the Covin-19 virus spreads like wildfire through China. The example shows how devastating a WMD can be when used in an attack. The purpose of this study is to examine ways to prevent or reduce the risk of a CBRN WMD attack. By looking at the use of international treaties, the rise of terrorism, and counter-proliferation strategies, this paper will assess the measures available for achieving the aim.
Research Question
What can nations do to prevent or reduce the risk of CBRN WMD……

References

References

Asada, M. (2008). Security Council Resolution 1540 to combat WMD terrorism: effectiveness and legitimacy in international legislation. Journal of Conflict & Security Law, 13(3), 303-332.

Carter, A. B. (2004). Overhauling counterproliferation. Technology in Society 26(2-3), 257-269.

CBS. (2011). Clinton on Qaddafi: We came, we saw, he died. Retrieved from  https://www.youtube.com/watch?v=mlz3-OzcExI 

The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. (1999). Combating Proliferation of Weapons of Mass Destruction. Washington, D.C.

Forest, J.J.F. (2012, Winter). Framework for Analyzing the Future Threat of WMD Terrorism. Journal of Strategic Security 5, 4. Retrieved from  http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1193&context=jss 

Hochman, D. (2006). Rehabilitating a rogue: Libya's WMD reversal and lessons for US policy. Parameters, 36(1), 63.

Lang, C. G. (1937). Archbishop's Appeal: Individual Will and Action; Guarding Personality. London Times, 28.

Stone, O., & Kuznick, P. (2013). The untold history of the United States. Simon and Schuster.

Studyspark

Study Document Study Document

Security Of Computers Data

Pages: 2 (729 words) Sources: 3 Document Type:Essay Document #:20542054

...Federal laws FBI Digital Forensic Services
Requirements for employment as a member of an FBI CART
In order for one to become a member of the FBI CART team they need to have exceptional problem solving and analytical skills, thorough understanding of computers and computer systems and cyber and computer crime investigation. This is because CART offers assistance to the FBI field offices when it comes to the search and seizure of computer evidence. This team is charged with the performance of forensic examinations for all FBI seizures that are related to technology and computers. Therefore, computer forensics is a mandatory requirement for this position. The potential candidate should have a bachelor’s degree in an IT-related field. However, they should have a major in computer forensics. A candidate is required to have good communication skills since they will be required to communicate effectively their findings to other non-technical individuals or officers. Detail-oriented……

References

References

Federal Bureau of Investigation. (July 2, 2019). Workers’ Compensation Fraud.  https://www.fbi.gov/news/stories/workers-compensation-fraud-conspirators-sentenced-070219 

Kentucky RCFL. (June 6, 2013 ). Louisville Man Guilty of Harboring 20,000 Images of Child Pornography.  https://www.rcfl.gov/kentucky/news 

Regional Computer Forensic Laboratory. (n.d.). About the RCFL. Retrieved from  https://www.rcfl.gov/about 

Studyspark

Study Document Study Document

Healthcare Advocacy For The Elderly

Pages: 8 (2541 words) Sources: 6 Document Type:Essay Document #:36286528

… the unmet needs and delays in care of vulnerable populations is often the result of the complex arrangement of health care policies, the federal government through the legislative branch could create an easier way for the elderly to gain equity in healthcare. For example, Congress could pass ……

References

References

Brojeni, S. A., Ilali, E. S., Taraghi, Z., & Mousavinasab, N. (2019). Lifestyle and its related factors in elderly. Journal of Nursing and Midwifery Sciences, 6(1), 32.

Community Health Advocates. (2015). Helping New Yorkers get, keep, and use health coverage. Retrieved from:  http://www.cssny.org/programs/entry/community-health-advocates 

Davoodvand, S., Abbaszadeh, A., & Ahmadi, F. (2016). Patient advocacy from the clinical nurses' viewpoint: A qualitative study. Journal of Medical Ethics & History of Medicine, 9(5), 1-8.

Maryland, M. A., & Gonzalez, R. I. (2012). Patient advocacy in the community and legislative arena. Online Journal of Issues in Nursing, 17(1), 2.

Stainton, H. (2016). Horizon to fund new NJ healthcare advocacy organization. News, Issues, andIinsight for New Jersey. Retrieved from:  http://www.njspotlight.com/stories/16/11/21/horizon-to-fund-new-nj-healthcare-advocacy-organization/ 

Yamada, T., Chen, C. C., Murata, C., Hirai, H., Ojima, T., & Kondo, K. (2015). Access disparity and health inequality of the elderly: unmet needs and delayed healthcare. International journal of environmental research and public health, 12(2), 1745-1772.

Studyspark

Study Document Study Document

Counterintelligence

Pages: 12 (3490 words) Sources: 6 Document Type:question answer Document #:11133529

… to harbor FIE within the nation’s borders. Fighting against this kind of corruption is difficult because state legislators are often at odds with federal legislators who are even at odds with themselves. The Trump Administration, for example, has been fighting to get the U.S.-Mexico border the kind … U.S.-Mexico border the kind of defense needed to reduce illegal penetration, but lawmakers on both sides of the political aisle at both the federal and state levels have pushed back. For political purposes, the safety and security of the nation is jeopardized.
Thus, the effectiveness of national … the safety of the nation has to come first. Monitoring all digital activity should be the responsibility of counter-intelligence, and legislators at the federal level need to be made aware of that. Lobbying should be conducted to raise awareness on this issue, and lawmakers who understand the … heart and soul of liaison,……

References

Bibliography

Counter intelligence for National Security, CIA, 1993. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol2no4/html/v02i4a10p_0001.htm

Johnston, David and James Risen, “U.S.had evidence of espionage,” New York Times, 2001. https://www.nytimes.com/2001/02/23/us/us-had-evidence-of-espionage-but-fbi-failed-to-inspect-itself.html

National Counterintelligence Strategy of the United States of America 2016 (Strategy).  https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf 

Prunckun, Hank. 2012. Counterintelligence Theory and Practice, Lanham: Rowman&Littlefield Publishers Inc. Read the following: Chapters 8 to 14, pages 131 to 217. Appendices A to D, pages 219 to 231.

Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September 17). National Security Archive. Accessed January 19, 2017.  http://nsarchive.gwu.edu/NSAEBB/NSAEBB230/ .

Van Cleave, Michelle. “Strategic Counterintelligence: What Is It and What Should We Do About It ?” 2007. CIA Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html

Studyspark

Study Document Study Document

Risk Management And Insurance

Pages: 4 (1093 words) Sources: 1 Document Type:Questionnaire Document #:95274016

...Federal laws
Q1
Annuities account for a great part of the protection one affords self against death. They do not follow the application of the law of large numbers as the law is traditionally utilized in life insurance. It has, therefore, been referred to as “upside-down life insurance.” When an annuitant passes away during the period of accumulation, their beneficiaries are paid a death benefit. The common treatment of annuities is to account for gross premium returns excluding interest or to account for the cash value, whichever is greater. The principle is for the principal sum to be liquidated over the annuitant’s lifetime regardless of the means of accumulation.
Q2
Annuities can fall under various classes. Traditionally, the following classifications have been used to differentiate annuities:
i. Individual vs. group annuity
ii. Fixed-dollar vs. variable annuity
iii. Deferred annuity vs. immediate annuity
iv. Installment annuity vs. single-premium annuity
v. Single life vs.……

References

References

Vaughan, E. J., & Vaughan, T. (2007). Fundamentals of risk and insurance. John Wiley & Sons.

 

Join thousands of other students and

"spark your studies".