Framework Essays (Examples)

Studyspark

Study Document Study Document

Irregular Warfare And United States

Pages: 5 (1609 words) Sources: 4 Document Type:Case Study Document #:48593751

...Framework Introduction
Irregular warfare refers to the violent process through which various non-state and state actors fight for influence and legitimacy over populations. While the full might of military power may be employed, irregular warfare generally uses asymmetric and indirect approaches to reduce the power, will, and influence of the adversary. Because of the irregular approaches, such a process is usually very “messy” and the actions during such a war cannot be distilled into a clear definite and repeatable process. The process is usually characterized by terrorism, counterterrorism, insurgency, and counterinsurgency (Department of Defense Washington DC, 2017).
Just like in any organization, the execution of war takes place at various levels from the tactical level to the top strategic level. One can understand irregular warfare by breaking it down into various levels. At the top strategic level, influence and control over the target population determine irregular warfare. At the operational level,……

References

References

Davis, R. G. (Ed.). (2010). US Army and Irregular Warfare 1775-2007: Selected Papers From the 2007 Conference of Army Historians: Selected Papers From the 2007 Conference of Army Historians. Government Printing Office.

Department of Defense Washington DC, (2017). Irregular Warfare (IW) Joint Operating Concept (JOC). Washington: 2007. 100 p. Cit, 03-02

Lundberg, K. (2006). The Accidental Statesman: General Petraeus and the City of Mosul, Iraq. Kennedy School of Government, Case Program.

White, J. B. (1996). A different kind of threat: Some thoughts on irregular warfare.

Studyspark

Study Document Study Document

Test1

Pages: 8 (2254 words) Sources: 7 Document Type: Document #:19731108

...Framework Strengths Perspective Theory
Provide some data specific points on the trends associated with the two oppressed/marginalized population (LGBTC Youth and Homeless Youth). B. Indicate the reason behind your interest in the population, and its direct connection to social work practice.
LGBTC youths are overrepresented amongst the homeless population. In spite of the fact that it is challenging to obtain accurate figures, it is approximated that LGBTC youths constitute 20 percent to 40 percent of the entire homeless youth population but make up solely 4 percent to 10 percent of the overall youth population. It is suggested that LGBTC youths are at greater risk of facing homelessness as compared to other youths (Cray et al., 2013). The inference of this is that they are almost 7 times over represented amongst the homeless community. Research indicates that LGBTC youth have a greater likelihood of running away from their homes as compared to……

References

References

Bilodeau, B. L., & Renn, K. A. (2005). Analysis of LGBT identity development models and implications for practice. New directions for student services, 2005(111), 25-39.

Cray, A., Miller, K., & Durso, L. E. (2013). Seeking shelter: The experiences and unmet needs of LGBT homeless youth. Washington, DC: Center for American Progress.

Cunningham, M., Pergamit, M., Astone, N., & Luna, J. (2014). Homeless LGBTQ youth. Washington, DC: Urban Institute.

Dank, M., Yahner, J., Madden, K., Bañuelos, I., Yu, L., Ritchie, A., ... & Conner, B. (2015). Surviving the Streets of New York: Experiences of LGBTQ Youth, YMSM and YWSW Engaged in Survival Sex. Washington, DC: Urban Institute.

D'augelli, A. R. (2006). Developmental and contextual factors and mental health among lesbian, gay, and bisexual youths. American Psychological Association.

Durso, L. E., & Gates, G. J. (2012). Serving our youth: Findings from a national survey of services providers working with lesbian, gay, bisexual and transgender youth who are homeless or at risk of becoming homeless. Los Angeles: The Williams Institute with True Colors and the Palatte Fund.

Foss, S. (2017). A Guide to Social Work Advocacy for Transgender Adolescents and Young Adults. Texas State University.

Higa, D., Hoppe, M. J., Lindhorst, T., Mincer, S., Beadnell, B., Morrison, D. M., ... & Mountz, S. (2014). Negative and positive factors associated with the well-being of lesbian, gay, bisexual, transgender, queer, and questioning (LGBTQ) youth. Youth & Society, 46(5), 663-687.

Studyspark

Study Document Study Document

Customer Service In The Telecoms Industry

Pages: 8 (2268 words) Sources: 10 Document Type:Research Paper Document #:62761595

...Framework The Telecoms Industry
In the study by Lai, Griffin and Babin (2009) entitled “How quality, value, image, and satisfaction create loyalty at a Chinese telecom,” the researchers used an integrative model to assess the relationship between multiple variables related to consumers’ experience of telecoms in China. The researchers conducted a survey of 118 Chinese telecommunications customers and found that service quality has a direct impact on value perception. Value and customer satisfaction, moreover, were found to determine the extent to which the customer would be loyal to the firm. Corporate image perceptions were also found to impact customer satisfaction. The researchers were able to conclude that customer satisfaction and service quality do make a substantial difference in determining whether customers will be retained or not.
Kim, Park and Jeong (2004) examined how a Korean telecommunications company focused on retaining customers in their article entitled “The effects of customer satisfaction and……

References

References

Angelova, B., & Zekiri, J. (2011). Measuring customer satisfaction with service quality using American Customer Satisfaction Model (ACSI Model). International journal of academic research in business and social sciences, 1(3), 232. Retrieved from http://hrmars.com/admin/pics/381.pdf

Boohene, R., & Agyapong, G. K. (2011). Analysis of the antecedents of customer loyalty of telecommunication industry in Ghana: The case of Vodafone (Ghana). International Business Research, 4(1), 229-240. Retrieved from  http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.662.3208&rep=rep1&type=pdf 

Chu, P. Y., Lee, G. Y., & Chao, Y. (2012). Service quality, customer satisfaction, customer trust, and loyalty in an e-banking context. Social Behavior and Personality: an international journal, 40(8), 1271-1283.

Lai, F., Griffin, M., & Babin, B. J. (2009). How quality, value, image, and satisfaction create loyalty at a Chinese telecom. Journal of business research, 62(10), 980-986. Retrieved from shorturl.at/BMTY7

Lee, H. S. (2013). Major moderators influencing the relationships of service quality, customer satisfaction and customer loyalty. Asian Social Science, 9(2), 1. Retrieved from  http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.428.6730&rep=rep1&type=pdf 

Liu, C. T., Guo, Y. M., & Lee, C. H. (2011). The effects of relationship quality and switching barriers on customer loyalty. International Journal of Information Management, 31(1), 71-79.

Khatibi, A. A., Ismail, H., & Thyagarajan, V. (2002). What drives customer loyalty: An analysis from the telecommunications industry. Journal of Targeting, Measurement and Analysis for Marketing, 11(1), 34-44. Retrieved from  https://link.springer.com/content/pdf/10.1057/palgrave.jt.5740065.pdf 

Kim, M. K., Park, M. C., & Jeong, D. H. (2004). The effects of customer satisfaction and switching barrier on customer loyalty in Korean mobile telecommunication services. Telecommunications policy, 28(2), 145-159. Retrieved from shorturl.at/imDEX

Studyspark

Study Document Study Document

Agency Theory

Pages: 8 (2457 words) Sources: 10 Document Type:Essay Document #:56977009

...Framework Introduction
Agency theory is a theory explicating the relationship between the shareholders, who act as the principals, and the managers, who act as the agents. Within this relationship, the principal either employs or delegates an agent to carry out work and take actions in the best interests of the principal (Scott and O’Brien, 2003).
Imperatively, when the decision-making power and authority is delegated to another party, this can result in a loss of efficiency and subsequently increased costs. For instance, if the owner of a company partakes in the delegating of decision-making power to a manager, the agent in this case, it is conceivable that the manager will not work or operate as hard and with determination as the owner would, bearing in mind that the manager does not have any direct shares in the financial results of the company (Tearney and Dodd, 2009).
As a result, this could give……

References

References

Ballwieser, W., Bamberg, G., Beckmann, M. J., Bester, H., Blickle, M., Ewert, R., ... & Gaynor, M. (2012). Agency theory, information, and incentives. Springer Science & Business Media.

Bou?ková, M. (2015). Management accounting and agency theory. Procedia Economics and Finance, 25, 5-13.

Eisenhardt, K. M. (1989). Agency theory: An assessment and review. Academy of management review, 14(1), 57-74.

Healy, P. M. (2005). Financial Reporting Problems at Molex, Inc.(A). Harvard Business School.

Larcker, D. F., & Tayan, B. (2007). Executive Compensation at Nabors Industries: Too Much, Too Little, or Just Right?. Rock Center for Corporate Governance at Stanford University Case Teaching No. CG-05.

Mitnick, B. M. (2015). Agency theory. Wiley encyclopedia of management, 1-6.

Scott, W. R., & O\\\\\\'Brien, P. C. (2003). Financial accounting theory (Vol. 3). Toronto: Prentice Hall.

Tearney, M. G., & Dodd, J. (2009). Accounting theory. H. I. Wolk (Ed.). New York: Sage.

Studyspark

Study Document Study Document

Government Politics And Political Corruption Values

Pages: 4 (1102 words) Sources: 5 Document Type:Annotated Bibliography Document #:94706420

...Framework Introduction
Corruption weakens the strength of a democracy, undermining public trust, and leading to a downward spiral of apathy and discontent. Low voter participation itself becomes a major factor perpetuating the possibility of corruption. A feeling of powerlessness pervades even the most robust of the world’s democracies. If democratic governments are to be responsive to the people they serve, corruption needs to be uprooted whenever it manifests. Reforming corruption and reducing the likelihood of corrupt individuals maintaining their positions of power requires a multifaceted approach taking into account variables like ethical culture and political climate. Public perceptions of the reliability and accountability of government are also important factors, influenced in part by the media but also by social norms, ethics, and values. The importance of exposing corruption and uprooting it through effective dialogue and awareness cannot be underestimated because of the fact that democratic governments depend on transparency, openness, and……

Studyspark

Study Document Study Document

Immigration Terms And Analysis Of Interview

Pages: 7 (2224 words) Sources: 6 Document Type:Term Paper Document #:15654754

… community. Yet he completely understands…[break]…his family’s experience. Finally, segmented assimilation takes socioeconomic class into account. Yet even the social network or social organization framework Massey (1986) puts forth could qualify as a form of segmented assimilation because of paisanaje (Massey, n.d., p. 105).
Finally, Juan talks about ……

References

References

Fox, C. & Guglielmo, T.A. (2012). Defining America’s racial boundaries: Blacks, Mexicans, and European Immigrants, 1890–1945. American Journal of Sociology 118(2) (September 2012): 327-379.

Gonzales, R. G. (2011). Learning to be illegal: Undocumented youth and shifting legal contexts in the transition to adulthood. American Sociological Review 76(4) (AUGUST 2011): 602-619

Huntington, S.P. (2009). The Hispanic challenge. Foreign Policy, 28 Oct, 2009.

Jones-Correa, M. (2012). Contested ground. Transatlantic Council on Migration. July 2012.

Massey, D. S. (1986). The social organization of Mexican Migration to the United States.” The Annals of the American Academy of Political and Social Science 48(7):, Vol. 487, Immigration and American Public Policy (Sep., 1986): 102-113?

Massey, D. S. (n.d.). What were the paradoxical consequences of militarizing the border with Mexico?

Studyspark

Study Document Study Document

Privacy In Social Networks Regarding Machine Learning

Pages: 8 (2537 words) Sources: 10 Document Type:Research Paper Document #:98311751

...Framework Abstract
This paper discusses the issue of privacy in social networks with respect to advances in machine learning. It shows how machine learning protocols have been developed both to enhance and secure privacy as well as to invade privacy and collect, analyze, predict data based on users’ information and experience online. The conflict between these two directions in machine learning is likely to lead to a system wherein machine learning algorithms are actively engaged in the subversion of one another, with one attempting to conceal data and the other attempting to uncover it. This paper concludes with recommendations for social networks and the issue of privacy regarding machine learning.
Introduction
Social networks have allowed an ocean of personal data to form that is now sitting there waiting for machine learning algorithms to collect it, analyze it, and recognize individuals on social media (Oh, Benenson, Fritz & Schiele, 2016). Machine learning……

References

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

Studyspark

Study Document Study Document

Culture And Nursing

Pages: 11 (3252 words) Sources: 14 Document Type:Research Paper Document #:16877652

… restraint (Hofstede, 2011). Hofstede’s model teaches what values to look for when interacting with people of other cultures and provides nurses with a framework for discerning these values. As Orr and Hauser (2008) note, “Hofstede’s seminal work has been the benchmark for cultural analysis for the last ……

References

References

Bassert, J. M. (2017). McCurnin\\\\\\\\\\\\'s Clinical Textbook for Veterinary Technicians-E-Book. Elsevier Health Sciences.

Bovee, C.L., & Thill, J.V. (1992). Business Communication Today. NY, NY: McGraw- Hill.

Burnett, M.J., & Dollar, A. (1989). Business Communication: Strategies for Success. Houston, Texas: Dane.

Davidson, L., Tondora, J., Miller, R., O’Connell, M. (2015). Person-Centered Care. Person-Centered Care for Mental Illness. WA: American Psychological Association.

Hambrick, D.C., Davison, S.C., Snell, S.A. & Snow, C.C. (1998). When groups consist of multiple nationalities: Towards a new understanding of the implications. Organization studies, 19(2), 181-205.

Hofstede, G. (2011). Dimensionalizing cultures: The Hofstede model in context. Online Readings in Psychology and Culture, 2(1), 8.

Hofstede, G. (1980). Motivation, leadership, and organization: do American theories apply abroad?. Organizational Dynamics, 9(1), 42-63.

Hofstede Insights. (2019). Retrieved from  https://www.hofstede-insights.com/country-comparison/china,the-usa/

Studyspark

Study Document Study Document

Physical And Mental Disabilities In The Workplace

Pages: 9 (2585 words) Sources: 15 Document Type:Research Paper Document #:74915062

… disabilities that can help them to contribute meaningfully in a workplace environment. And the social sciences can provide employers with the right theoretical framework for viewing this issue in a positive manner.
The Impact of Social Practices
Social practices have been shaped by issues and events in ……

References

References

Baruch, Y. (2000). Teleworking: benefits and pitfalls as perceived by professionals and managers. New technology, work and employment, 15(1), 34-49.

Bortz, D. (2018). Can Blind Hiring Improve Workplace Diversity? Retrieved from  https://www.shrm.org/hr-today/news/hr-magazine/0418/pages/can-blind-hiring-improve-workplace-diversity.aspx 

Center for Disability Rights. (2019). Ableism. Retrieved from  http://cdrnys.org/blog/uncategorized/ableism/ 

Corrigan, P. W. (2016). Lessons learned from unintended consequences about erasing the stigma of mental illness. World Psychiatry, 15(1), 67-73.

Fabian, R. (2019). New Marvel Film \\\\\\\\\\\\'The Eternals\\\\\\\\\\\\' Will Feature First Deaf Superhero. Retrieved from https://finance.yahoo.com/news/marvel-film-eternals-feature-first-211402332.html

Faurer, J., Rogers-Brodersen, A., & Bailie, P. (2014). Managing the re-employment of military veterans through the Transition Assistance Program (TAP). Journal of Business & Economics Research (Online), 12(1), 55.

Guruge, S., Wang, A. Z. Y., Jayasuriya-Illesinghe, V., & Sidani, S. (2017). Knowing so much, yet knowing so little: a scoping review of interventions that address the stigma of mental illness in the Canadian context. Psychology, Health & Medicine, 22(5), 507-523.

Marquis, J.P., Lim, N., Kavanagh, J., Harrell, M.C. & Scott, L.M. (2007). Managing Diversity in Corporate America: An Exploratory Analysis. Pittsburgh, PA: Rand Corporation.

Studyspark

Study Document Study Document

Baseline Tectonics Of The Arabian Plate

Pages: 6 (1813 words) Sources: 6 Document Type:Term Paper Document #:38137867

...Framework Pan-African Cratonization (about 800 to 680 Ma)
Nehlig et al. (2002) conducted a study to review the Pan-African evolution of the Arabian Shield on the premise that new perspectives on the geologic history and structural evolution on the Arabian Shield had emerged. These new perspectives were brought by the extensive fieldwork as well as synthesis and review of structural, aeromagnetic, geochemical, geologic, and geochronological data. The geologic evolution of the Arabian Shield took place between 900 to 550 Ma. This period was also characterized by the “formation, amalgamation, and final Pan-African cratonization of several tectonostratigraphic terranes” (Nehlig et al., 2002, p.103). These terranes were separated by key NW-trending faults and various oriented suture zones covered by ophiolites i.e. serpentinized ultramafic rocks.
Pan-African cratonization between 800 and 680 Ma incorporated the final cratonization of the terranes. The final cratonization of the terranes, which took place between 680 and 610 Ma, generated……

References

Reference

Caby, R. (2003, May 27). Terrane Assembly and Geodynamic Evolution of Central-Western Hoggar: A Synthesis. Journal of African Earth Sciences, 37, 133-159.

Kroner, A., Roobol, M.J., Ramsay, C.R. & Jackson, N.J. (2013, February 28). Pan African Ages of Some Gneissic Rocks in the Saudi Arabian Shield. Journal of the Geological Society, London, 136, 455-461.

Black, R. & Liegeois, J.P. (1993). Cratons, Mobile Belts, Alkaline Rocks and Continential Lithospheric Mantle: The Pan-African Testimony. Journal of the Geological Society, London, 150, 89-98.

Heikal et al. (2013, May). Lithostratigraphy, Deformation History, and Tectonic Evolution of the Basement Rocks, Republic of Yemen: An Overview. Arabian Journal of Geosciences, 7(5), 1-12.

Kroner, A. (2000). Pan African Plate Tectonics and It’s Repercussions on the Crust of Northeast Africa. Geologische Rundschau, 68(2), 565-583.

Nehlig et al. (2002). A Review of the Pan-African Evolution of the Arabian Shield. GeoArabia, 7(1), 103-124.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".