Foreign Policy Essays (Examples)

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

...Foreign policy Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage,……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf 

National Counterintelligence and Security Center. “Foreign Economic Espionage in Cyberspace.” Office of the Director of National Intelligence, 2018.  https://www.dni.gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf 

Rubenstein, D. “Nation State Cyber Espionage and its Impacts.” Washington University in St. Louis, December 2014.  https://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/ 

Weissbrodt, D. “Cyber-Conflict, Cyber-Crime, and Cyber-Espionage.” Minnesota Journal of International Law 22, no. 2 (2013).

Studyspark

Study Document Study Document

Nike S Colin Kaepernick Ad Campaign

Pages: 7 (2187 words) Sources: 6 Document Type:Research Paper Document #:13776078

… eyes of consumers who were affronted by its latest ad campaign strategy.
Changes in Organizational Structure
Nike’s organizational structure relies too heavily on foreign-based labor. Offshoring labor has decimated communities here in the US as they have lost jobs to overseas. Nike could be a Made in ……

References

References

About Nike. (2020). Retrieved from  https://about.nike.com/ 

Bartash, J. (2020). Apple’s Covid-19 warning. Retrieved from  https://www.marketwatch.com/story/how-much-will-covid-19-hurt-the-us-economy-its-anyones-guess-right-now-2020-02-12 

Delventhal, S. (2019). Nike facing challenging dynamics. Retrieved from  https://www.investopedia.com/news/nike-facing-challenging-dynamics-goldman-sachs/ 

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Neikirk, T. (2019). Nike sales are again way up. Retrieved from  https://hillreporter.com/nike-sales-are-again-way-up-following-conservative-boycott-40033 

Nusser, S., Mahle, I., & Pätzmann, J. U. (2015). How Social Commerce Communication can support Brand Loyalty: An Analysis of Nike‘s Efforts in Facebook Community Management. Markenbrand, (4/2015), 48-57.

Oyedele, A. (2018). Nike surges. Retrieved from  https://markets.businessinsider.com/news/stocks/nike-earnings-q4-2018-2018-6-1027328545 

Storey, G. (2019). Nike and the importance of meaningful brand values. Retrieved from  https://polpeo.com/nike-and-the-importance-of-meaningful-brand-values/

Studyspark

Study Document Study Document

Digital Era And Taxation

Pages: 4 (1249 words) Sources: 5 Document Type:Research Paper Document #:83562315

… face when taxing digital profits.
The above topic is relevant when examined from the technological perspective because of two main reasons. First, taxation policy should promote fairness. Both traditional and digital businesses should bear the same tax burden. It will be unfair for citizens and traditional businesses … tax treaties. Second, the levy results in equity versus efficiency dilemma. This tax was meant to solve the unequal treatment of domestic and foreign companies. However, domestic recipients are negatively affected by the levy if analyzed from the efficiency point of view. Third, it is not clear ……

References

References

Committee of Experts on International Cooperation in Tax Matters. (2019). Tax Issues related to the Digitalization of the Economy: Report (E/C.18/2019/CRP.12).  https://www.un.org/esa/ffd/wp-content/uploads/2019/04/18STM_CRP12-Work-on-taxation-issues-digitalization.pdf 

Katz, R. (2015). THE IMPACT OF TAXATION ON THE DIGITAL ECONOMY.  https://www.itu.int/en/ITU-D/Conferences/GSR/Documents/GSR2015/Discussion_papers_and_Presentations/GSR16_Discussion-Paper_Taxation_Latest_web.pdf 

Pemerathna, A. (2016). Economic impact of digital taxation: A case on information communication technology industry Sri Lanka. SSRN Electronic Journal.  https://doi.org/10.2139/ssrn.2910328 

Sand-Zantman, W. (2018). Taxation in the Digital Economy. https://www.orange.com/fr/content/download/47110/1371114/version/1/file/Rapport%20TAXATION-VF-Mai2018.pdf

Sestakova, M. (2018, February). Tax Challenges of the Digital Economy [Paper presentation]. Management Challenges in the 21st Century, Bratislava, Slovakia.

Studyspark

Study Document Study Document

US Customs And Border Protection And Defense Intelligence Agency

Pages: 4 (1149 words) Sources: 6 Document Type:question answer Document #:85676019

… element that I selected in this particular case is the Defense Intelligence Agency (DIA). The stated mission of DIA is “provide intelligence on foreign militaries to prevent and decisively win wars” (DIA, 2020). Thus, it is important to note, from the onset, that this particular agency largely … with not only the gathering, but also the production of military intelligence. As DIA further points out, it provides key intelligence (foundational) on foreign militaries as well as the operating environment to acquisition leaders, policy makers, and warfighters. DIA is alive to the fact that today, the role that it plays is of greater relevance than it has ……

References

References

Customs and Border Protection – CBP (2020). About CBP. Retrieved from  https://www.cbp.gov/about 

Department of Homeland Security – DHD (2016). Section 559 Pilot Program Donations Acceptance. Retrieved from  https://www.dhs.gov/sites/default/files/publications/Customs%20and%20Border%20Protection%20-%20Section%20559%20Pilot%20Program%20Donations%20Acceptance%20-%20FY%202016.pdf 

Defense Intelligence Agency – DIA (2020). Strategy. Retrieved from  https://www.dia.mil/About/Strategy/ 

Keating, T.J. (2011). Joint and National Intelligence Support to Military Operations. Washington, DC: DIANE Publishing.

Office of the Director of National Intelligence (2020). Defense Intelligence Agency. Retrieved from  https://www.intelligence.gov/index.php/how-the-ic-works/our-organizations/412-dia 

U.S. Government Accountability Office – GAO (2020). U.S. Ports of Entry: Update on CBP Public-Private Partnership Programs. Retrieved from  https://www.gao.gov/assets/710/704191.pdf 

Studyspark

Study Document Study Document

Counterintelligence

Pages: 12 (3490 words) Sources: 6 Document Type:question answer Document #:11133529

… whole-person, whole-of-career concept that so as to analyze data and to identify anomalies that present themselves. Anomalies are reviewed to see if any foreign intelligence entity (FIE) nexuses are present. FIE activities are analyzed as well for the purpose of identifying patterns of behavior that correspond with ……

References

Bibliography

Counter intelligence for National Security, CIA, 1993. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol2no4/html/v02i4a10p_0001.htm

Johnston, David and James Risen, “U.S.had evidence of espionage,” New York Times, 2001. https://www.nytimes.com/2001/02/23/us/us-had-evidence-of-espionage-but-fbi-failed-to-inspect-itself.html

National Counterintelligence Strategy of the United States of America 2016 (Strategy).  https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf 

Prunckun, Hank. 2012. Counterintelligence Theory and Practice, Lanham: Rowman&Littlefield Publishers Inc. Read the following: Chapters 8 to 14, pages 131 to 217. Appendices A to D, pages 219 to 231.

Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September 17). National Security Archive. Accessed January 19, 2017.  http://nsarchive.gwu.edu/NSAEBB/NSAEBB230/ .

Van Cleave, Michelle. “Strategic Counterintelligence: What Is It and What Should We Do About It ?” 2007. CIA Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html

Studyspark

Study Document Study Document

Born In The USA By Bruce Springsteen

Pages: 4 (1170 words) Sources: 3 Document Type:Essay Document #:72228440

...Foreign policy Political Songs and Government
Born in the USA was written by Bruce Springsteen in 1981 after being inspired by a movie script sent to him called “Born in the USA” (Konow & Mercurio, 2015). Springsteen’s song was written with the Vietnam war in mind and the plight of the Vietnam Veteran and average working class kid being sent off to war. The song starts off talking about being “born in a dead man’s town”—a line that could symbolize two things, a town named after a long-dead person or a town that is literally a dead end for hopes and dreams. The song proceeds to describe how hard life is for someone growing up in a dead town—everyone goes around like a beat dog, just trying to survive. Yet the country is so cruel that when one gets into a little trouble the punishment does not fit the crime: the singer……

References

References

Ames, D., Erickson, Z., Youssef, N. A., Arnold, I., Adamson, C. S., Sones, A. C., ... & Oliver, J. P. (2018). Moral injury, religiosity, and suicide risk in US veterans and active duty military with PTSD symptoms. Military medicine, 184(3-4), e271-e278.

Konow, D. & Mercurio, J. (2015). Transformation in Art: The Films of Paul Schrader. Retrieved from  https://creativescreenwriting.com/transformation-in-art-the-films-of-paul-schrader/ 

Lyrics to Born in the USA

Studyspark

Study Document Study Document

Principles Of American Democracy

Pages: 11 (3277 words) Sources: 5 Document Type:Essay Document #:49458393

...Foreign policy Why American Democracy Has Failed and Why the Anti Federalists were Right
Introduction
The Declaration of Independence, written in 1776, asserted that “all men are created equal.”[endnoteRef:2] It was an Enlightenment notion: Thomas Paine, an avid follower of the Enlightenment Movement in Europe, had written the Rights of Man to support and promote the ideas of the philosophical revolution that had gotten underway decades prior with Rousseau’s Social Contract and the latter’s pursuit of naturalism in opposition to the Old World values, virtues and order.[endnoteRef:3] The problem that occurred in America was that the Founding Fathers were not of the same mind as Thomas Paine, though they readily used his words and ideas in their Declaration of Independence. Paine truly believed in the equality of all men and he was whole-heartedly opposed to the institution of slavery. The Founding Fathers were not, and the equality they expressed in the Declaration……

References

References

Declaration of Independence.  (1776).  Retrieved from  https://www.archives.gov/founding-docs/declaration-transcript 

Rousseau, J.  (2018). Retrieved from  https://plato.stanford.edu/entries/rousseau/ 

Van Voris, J. (1996). Carrie Chapman Catt: A Public Life. New York City: Feminist Press at CUNY.

Hunt, L. (2016). "Introduction: The Revolutionary Origins of Human Rights." In The French Revolution and Human Rights: A Brief History with Documents, 2nd Edition, edited by Lynn Hunt, 1-31 (Boston: Bedford), 1.

Hunt, L. (2016). "Introduction: The Revolutionary Origins of Human Rights." In The French Revolution and Human Rights: A Brief History with Documents, 2nd Edition, edited by Lynn Hunt, 1-31 (Boston: Bedford), 5.

National Assembly. “Declaration of the Rights of Man and Citizen, 26 August 1789.” Liberte, Egalite, Fraternite. http://chnm.gmu.edu/revolution/exhibits/show/liberty--equality--fraternity/item/3216

Foote, S.  (1958).  The Civil War:  Ft. Sumter to Perryville.  NY:  Random House.

Brutus No. 1. (1787).  http://www.constitution.org/afp/brutus01.htm

Studyspark

Study Document Study Document

Understanding The Factors Affecting The Success Of Credit Risk In

Pages: 11 (3237 words) Sources: 15 Document Type:Research Paper Document #:41178734

… financial establishment holding bonds and other financial securities. Imperatively, all banking institutions have their personal credit philosophy instituted in an official written loan policy that must be backed and conveyed with a suitable credit philosophy. A credit philosophy is deemed to be effective when all employees within … responsibility play a pivotal role in ascertaining the risk appetite of a financial establishment. Furthermore, the author points out that poor credit management policy give rise to poor lending practices, which bring about a ballooned portfolio of defaulted and unpaid loans. Furthermore, a study conducted by Bashir … the argument that the ownership structure of a financial institution is a key determining factor of credit risk. The study outcomes demonstrated that foreign-owned banking institutions are profitable and effective in managing credit risk as compared to their domestic rivals amongst Islamic banks.
Problem Definition
In the ……

References

References

Bhattarai, Y. R. (2016). Effect of credit risk on the performance of Nepalese commercial banks. NRB Economic Review, 28(1), 41-64.

Das, A. and Ghosh, S. (2007). Determinants of Credit Risk in Indian State-owned Banks: An Empirical Investigation. Economic Issues, 12(2): 48-66.

Derelio?lu, G., & Gürgen, F. (2011). Knowledge discovery using neural approach for SME’s credit risk analysis problem in Turkey. Expert Systems with Applications, 38(8), 9313-9318

Garr, D. K. (2013). Determinants of credit risk in the banking industry of Ghana. Developing Country Studies, 3(11), 64-77.

Gizaw, M., Kebede, M., & Selvaraj, S. (2015). The impact of credit risk on profitability performance of commercial banks in Ethiopia. African Journal of Business Management, 9(2), 59-66.

Johnson, B., & Christensen, L. (2008). Educational research: Quantitative, qualitative, and mixed approaches. New York: Sage.

Kithinji, A. M. (2010). Credit risk management and profitability of commercial banks in Kenya. (Doctoral dissertation, University of Nairobi).

Limam, I. (2001). Measuring technical efficiency of Kuwaiti banks. Kuwait: Arab Planning Institute.

Studyspark

Study Document Study Document

John Lewis Gaddis

Pages: 8 (2280 words) Sources: 9 Document Type:Essay Document #:77530466

… He rose above the propaganda of the times to see the wizards in both the East and the West, pulling the levers of policy and making the public dance in response. [5: National Endowment for the Humanities. “John Lewis Gaddis.” https://www.neh.gov/about/awards/national-humanities-medals/john-lewis-gaddis]
It has meant a great deal ……

References

Bibliography

Alpha History, “Cold War Historiography.”  https://alphahistory.com/coldwar/cold-war-historiography/ 

Branch, Mark Alden. “Days of Duck and Cover,” Yale Alumni Magazine, 2000.  http://archives.yalealumnimagazine.com/issues/00_03/gaddis.html 

Encyclopedia. “John Lewis Gaddis,” 2020.  https://www.encyclopedia.com/arts/educational-magazines/gaddis-john-lewis-1941 

Gaddis, John Lewis. We Now Know: Rethinking Cold War History. Oxford University Press, 1997.

Kaplan, Fred. “America’s Cold War Sage and His Discontents,” NYTimes, 2007. https://www.nytimes.com/2011/11/23/books/george-f-kennan-by-john-lewis-gaddis-review.html

Lundestad, Geir. "The Cold War According to John Gaddis." Cold War History 6, no. 4 (2006): 535-542.

National Endowment for the Humanities. “John Lewis Gaddis,” 2005.  https://www.neh.gov/about/awards/national-humanities-medals/john-lewis-gaddis 

Paxton, Robert. Anatomy of Fascism. New York: Vintage, 2012.

Studyspark

Study Document Study Document

Nelson Mandela

Pages: 5 (1632 words) Sources: 7 Document Type:Essay Document #:40746883

...Foreign policy Life of a historical leader: Nelson Mandela
Introduction
Efficient leadership constitutes the main force resulting in ethical culture formation and bolstered ethicality in making decisions (Ferrell & Fraedrich, 2015). The term leadership denotes intrinsic capability of commanding and leading other people towards any specified goal. The process of leadership entails formulation of a vision and ideas, adopting and sticking to values which support the aforementioned visions, engaging in tricky decision-making whenever needed, and utilizing one's innate charisma for inspiring followers to also stick to those values. Sound leadership aids companies with vision creation that serves as the basis for corporate values. Ethical decisions form an important component of efficient leaders, in addition to their capability of driving others towards goal attainment.
The term ethics, or moral philosophy as it is otherwise referred to, entails systematization, defense and recommendation of the concepts of correct and incorrect conduct (Fisher & Lovell, 2006).……

References

References

Daft, R. L. (2010). Organization theory and design, 10th Edition. Mason, OH: South-Western Cengage Learning.

Ferrell, O. C., & Fraedrich, J. (2015). Business ethics: Ethical decision making & cases. Nelson Education.

Fisher, C., & Lovell, A. (2006). Business Ethics and Values: Individual, Corporate and International Perspectives. FT Prentice Hall.

Glad, B., & Blanton, R. (1997). FW de Klerk and Nelson Mandela: A study in cooperative transformational leadership. Presidential Studies Quarterly, 27(3), 565-590.

Masbagusdanta, K. (2013). Everyone Can Be a Moral Leader. Global ethics network. Retrieved from https://www.globalethicsnetwork.org/profiles/blogs/everyone-can-be-a-moral-leader

Schoemaker, P.J.H. & Krupp, S. (2014). 6 principles that made Nelson Mandela a renowned leader. Fortune. Retrieved from  https://fortune.com/2014/12/05/6-principles-that-made-nelson-mandela-a-renowned-leader/ 

Tutu, D. (2013). Nelson Mandela: A colossus of unimpeachable moral character. The Washington Post. Retrieved from  https://www.washingtonpost.com/local/nelson-mandela-a-colossus-of-unimpeachable-moral-character/2013/12/06/0a2cd28a-5ec9-11e3-be07-006c776266ed_story.html 

Join thousands of other students and

"spark your studies".