Goal Statement Essays (Examples)

Studyspark

Study Document Study Document

Cognitive Theory Clinical Social Work Practice

Pages: 7 (2210 words) Sources: 11 Document Type:question answer Document #:73366521

… reinforce human connection/relationships, and is actually reinforced in every individual phase of the helping process (Gonzalez-Prendes, 2012).
2. Provide a theory driven problem statement and assessment of the client system in the environment.
Problem statement: If the client (Mr. Jackson) lacks personal strength (as shown by his physical weakness, chronic depression, and cognitive impairment) as well as environmental ……

References

Bibliography

Adefolalu, A. O. (2018). Cognitive-behavioural theories and adherence: Application and relevance in antiretroviral therapy. South Afr J HIV Med., 762.

Bandura A. Organizational applications of social cognitive theory. Aust J Manage. 1988;13(2):275–302. https://doi.org/10.1177/031289628801300210 [Google Scholar]

Berlin, S. B. (1987). Cognitive behavioral interventions for social work practice. National Association of Social Workers, Inc.

Gitterman, A., & Heller, N. (2011). Integrating Social Work Perspectives and Models with Concepts, Methods and Skills with Other Professions’ Specialized Approaches. Clinical Social Work Journal, 204-211.

Gonzalez-Prendes, A. (2012). Cognitive-behavioral practice and social work values: A critical analysis. Journal of Social Work Values and Ethics.

National Association of Social Workers. (1996). Code of Ethics. Retrieved from http://www.naswdc.org/pubs/code/code.asp.

Nevill, D. (2014). Positive Interventions: Developing a Theoretical Model to Guide Their Development and Use. Master of Applied Positive Psychology (MAPP) Capstone Projects.

Parks, A. C., & Biswas-Diener, R. (2013). Positive interventions: Past, present, and future. In T. Kashdan & J. Ciarrochi (Eds.), Mindfulness, acceptance, and positive psychology: The seven foundations of well-being (pp.140-165). Oakland, CA: New Harbinger Publications

Studyspark

Study Document Study Document

COVID 19 And The Lockdown S Effect On Mental Health

Pages: 11 (3360 words) Document Type:Assessment Document #:41730231

Verbatim Transcript counseling session analyst
Counseling Session Transcription and Analysis
Instructions: Place the counselors and clients verbatim statement in each row (Part I). Then identify the counseling skills that the counselor used and explain why that skill was used in the … I). Then identify the counseling skills that the counselor used and explain why that skill was used in the session. Note: each counselor statement or encourager must be identified (Part II.1). Next provide a alternative skill that could have been used and write the actual words you … (Part II.1). Next provide a alternative skill that could have been used and write the actual words you would use. Note: every counselor statement or encourager must have an alternative statement (Part II.2). Next, examine the transference (what the client reaction to the counselor) and the countertransference (counselor’s reaction to the client) reactions. Lastly, … and theory used in the……

Studyspark

Study Document Study Document

Strategic Marketing Plan For Lemon Thirst Energy Drink

Pages: 11 (3288 words) Sources: 10 Document Type:Research Paper Document #:54106401

… sense that it is healthier. This paper outlines the strategic marketing plan for the drink in the United States energy drinks market.
Mission statement
The mission statement of the Lemon Thirst Beverage Company is to produce products that satisfy the needs of the consumer and enhance the community and the … product philosophy is to energize both the brain and the body so that people can do more, be more active, and accomplish their goal. And the product provides an energy boost without any accompanying negative health consequences.
Total Market Opportunity
As per industry analysts, the United States …
The Lemon Thirst Beverage Company aims to capture just 0.01 percent of the U.S. market in its first year of operation. If this goal is achieved, the Company will have a market value of $0.53 billion. After capturing this market percentage, the Company hopes to work up ……

References

References

Ahmed, R. R., Vveinhardt, J., Streimikiene, D., & Awais, M. (2016). Mediating and Marketing factors influence the prescription behavior of Physicians: An Empirical Investigation. Amfiteatru Economic Journal, 18(41), 153-167.

Al-Shaar, L., Vercammen, K., Lu, C., Richardson, S., Tamez, M., & Mattei, J. (2017). Health effects and public health concerns of energy drink consumption in the United States: a mini-review. Frontiers in public health, 5, 225.

Barney, J. B., & Hesterly, W. S. (2010). Strategic management and competitive advantage: Concepts and cases (pp. 4-25). Upper Saddle River, NJ: Prentice-Hall.

Freeman, B., Kelly, B., Vandevijvere, S., & Baur, L. (2016). Young adults: beloved by food and drink marketers and forgotten by public health?. Health promotion international, 31(4), 954-961.

Hitt, M. A., Ireland, R. D., & Hoskisson, R. E. (2012). Strategic management cases: competitiveness and globalization. Cengage Learning.

Kotler, P., & Armstrong, G. (2010). Principles of marketing. Pearson education.

Kunst, A. (2019). Energy drinks consumption: consumers of energy drinks in the United States in 2018. Statista.

Mahajan, S. (2020). Sports And Energy Drinks Market Size & Share Analysis Report, 2019-2026.

Studyspark

Study Document Study Document

The FBI Counterproliferation And Weapons Of Mass Destruction

Pages: 6 (1839 words) Sources: 8 Document Type:Research Paper Document #:33590628

… aimed at lowering the number of deployable US and Russian weapons. Representatives drawn from all over the world met in May with a goal of renewing the Nuclear Nonproliferation Treaty. The goal of the treaty is a progressive reduction and eventual elimination of the number of states with nuclear weapons (Mauroni 2010, 58).
The race … from various academic fields including military science, political science, history, and security policy. Also, data will be sourced from official testimony and public statement that have been made by credible government and security officials. Instead of using a quantitative analysis, a qualitative analysis will be done to … the subject of WMD terrorism partly because there are limited data sets that can be subject to a quantitative analysis. As is the goal with most qualitative analyses, the goal of the exercise will be to identify synergies and patterns that can lead to results……

References

References

Busch, Nathan, and Joyner, Daniel (ed). 2009. “Introduction: Nonproliferation at a Crossroads.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Athens, GA: The University of Georgia Press.

Reiss, Mitchell. 2009. “Foreword.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Edited by Nathan Busch, and Daniel Joyner. Athens, GA: The University of Georgia Press.

Cameron, Gavin, Pate, Jason & Vogel, Kathleen. (2001). “Planting Fear: How Real is the Threat of Agricultural Terrorism?” Bulletin of Atomic Scientists, 57(5), 38-44.

Jennings, Elain. 2013. U. S. proliferation policy and the campaign against transnational terror: Linking the U.S. non-proliferation regime to homeland security efforts. Master’s Thesis. Naval Postgraduate School.

Levi, Michael. 2009. “On Nuclear Terrorism.” Cambridge, MA: Cambridge University Press.

Mauroni, Albert. J. 2010. “A Counter-WMD Strategy for the Future.” Parameters, 58-73.

Ogilvie-White, Tanya. 2008. “Facilitating Implementation of Resolution 1540 in South- East Asia, and the South Pacific.” In Implementing Resolution 1540: The Role of Regional Organizations. Edited by Lawrence Scheinman. New York: United Nations Institute for Disarmament Research.

Pilat Joseph F. 2009. “Dealing with Proliferation and Terrorism.” In Combating Weapons of Mass Destruction: The Future of International Nonproliferation Policy, edited by Nathan E. Busch and Daniel H. Joyner. Athens, GA: University of Georgia Press.

Studyspark

Study Document Study Document

Quality And Sustainability In Health Care

Pages: 7 (2140 words) Sources: 7 Document Type:Research Paper Document #:49381937

… \"engaging and enabling the whole organization\" phase (Campbell, 2008). The design of the quality program is presented in phase. It includes the vision statement of Kenneth health care facility as well as strategies to be used to……

References

References

Alenius-Smeds, L., Tishelman, C., Lindqvist, R. Runesdotter, S. & McHugh, M.D. (2016). RN assessments of excellent quality of care and patient safety are associated with significantly lower odds of 30-day inpatient mortality: A national cross-sectional study of acute-care hospitals. International Journal of Nursing Studies. Retrieved from http://dx.doi.org/10.1016/j.ijnurstu.2016 (06)005

Brasait?, I., Kaunonen, M., Martink?nas, A., Mockien?, V., & Suominen, T. (2016). Health care professionals’ skills regarding patient safety. Medicina, 52(4), 250-256. doi:10.1016/j.medici.2016.05.004

Campbell, R. J. (2008). Change Management in Health Care. The Health Care Manager, 27(1), 23-39. Retrieved from  https://www.ncbi.nlm.nih.gov/pubmed/18510142 

Hughes, R.G. (2007). "3 Barriers to quality improvement and quality improvement research." Institute of Medicine (IOM). Advancing quality improvement research: Challenges and opportunities: Workshop summary. doi:10.17226/11884.x

Lennox, L., Maher, L., & Reed, J. (2018). Navigating the sustainability landscape: a systematic review of sustainability approaches in healthcare. Implementation science: IS, 13(1), 27. doi:10.1186/s13012-017-0707-4

Stetler C.B., Ritchie J.A., Rycroft-Malone J. & Charns M.P. (2014) Leadership for evidence-based practice: strategic and functional behaviors for institutionalizing EBP. Worldviews on Evidence Based Nursing 11(4), 219–226.

Twigg, D. E., Pugh, J. D., Gelder, L., & Myers, H. (2016). Foundations of a nursing-sensitive outcome indicator suite for monitoring public patient safety in Western Australia. Collegian, 23(2), 167-181. doi:10.1016/j.colegn.2015.03.007

Studyspark

Study Document Study Document

What Followers Can Learn From Their Leaders During Crisis

Pages: 10 (2861 words) Sources: 5 Document Type:Research Paper Document #:13609293

… state and the Constitution (Int-1) strictly. Considering that the interviewee is a police officer, this is somewhat expected. But beyond this detail, the statement shows that followers expect their leaders to be competent or to continue following established rules during crises. This argument is emphasized by the … crisis and its effects and that they are doing their best to find solutions that will be beneficial for everyone. Since such a statement will make them feel compassion and compassion and empathy are not the only things that followers need from their leaders, they also need ……

References

References

Birnbaum, T., & Friedman, H. H. (2014). Ezra and Nehemiah: Lessons in Moral and Spiritual Leadership. Available at SSRN 2390230.

Carrington, D. J., Combe, I. A., & Mumford, M. D. (2019). Cognitive shifts within leader and follower teams: Where consensus develops in mental models during an organizational crisis. The Leadership Quarterly, 30(3), 335-350.

Harter, J. (2019). Why Some Leaders Have Their Employees\\\\\\' Trust, and Some Don\\\\\\'t. Workplace. Gallup.

Hofmeyr, K., Cook, J., & Richardson, A. (2011). How leaders generate hope in their followers. South African Journal of Labour Relations, 35(2), 47-66.

Kranke, D., Gin, J., Der-Martirosian, C., Weiss, E. L., & Dobalian, A. (2020). VA social work leadership and compassion fatigue during the 2017 hurricane season. Social Work in Mental Health, 18(2), 188-199.

Patton, C. (2017). What made Nehemiah an effective leader?. Journal of Applied Christian Leadership, 1(1), 8-14.

Rogers, A. P., & Barber, L. K. (2019). Workplace intrusions and employee strain: the interactive effects of extraversion and emotional stability. Anxiety, Stress, & Coping, 32(3), 312-328.

Skeet, A. (2020, April 4). Ethical Followership in Times of Crisis. Markkula Center for Applied Ethics, Santa Clara University.

Studyspark

Study Document Study Document

Counterintelligence Issues Within The United States

Pages: 18 (5457 words) Sources: 29 Document Type:Research Paper Document #:72238996

… Cohen’s (2016) problematic position is cultural: Cohen (2016) comes from a Jewish traditional of revolutionary behavior in which dominance is always the end goal (Jones 2008). Other cultures, both Western and Eastern, have tended to promote a position of statecraft that is in line with the doctrine ……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. "The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles." Bachelor's thesis, Università Ca'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Cohen, Shlomo. 2016. "Are There Moral Limits to Military Deception?." Philosophia 44 (4): 1305-1318.

Coyne, John, Peter Bell, and Shannon Merrington. 2013. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2 (10): 27-37.

Erskine, Toni. 2004. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. "Strategic denial and deception." International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Studyspark

Study Document Study Document

Process Of Writing An Academic

Pages: 3 (1016 words) Sources: 3 Document Type:Essay Document #:94821952

… school, college or university courses. While academic writing assignments have different names, they have the same objective in the learning process. The main goal of academic essay writing is for the student to demonstrate what he/she understands and can think critically regarding the specific topic (Whitaker, p.2). … like research and critical thinking. However, academic essay writing has several steps that the student must take into consideration to achieve the desired goal relating to the topic. The first step in the process of writing an academic essay is choosing a topic, which implies thinking about ……

References

Works Cited

Murray, Rowena. “Writing for an Academic Journal: 10 Tips.” The Guardian, Guardian News and Media, 6 Sept. 2013, https://www.theguardian.com/higher-education-network/blog/2013/sep/06/academic-journal-writing-top-tips

Steenbergen, Candis, and Robyn Diner. “A 12-Step Guide to Research and Writing for Students: One Essay at a Time.” Third Space, vol. 4, no. 1, Nov. 2004,  https://journals.sfu.ca/thirdspace/index.php/journal/article/view/resources_12stepguide/153 

Whitaker, Anne. “Academic Writing Guide.” City University of Seattle, City University of Seattle, Sept. 2009, http://www.vsm.sk/Curriculum/academicsupport/academicwritingguide.pdf

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… to carry out what operations on a given object?") and decision auditing ("what occurred and what was the reason for its occurrence").
The goal of user access control security is the optimization of productive computing time, guaranteeing data confidentiality, mitigating fraud and error risks, and preventing unauthorized ……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Acquisition Process In Action At The Department Of Energy

Pages: 10 (2943 words) Sources: 8 Document Type:Research Paper Document #:56403146

… basic elements: (1) identifying requirements; (2) acquisition of requisite supplies and commercial vendor contracts; and (3) obtaining needed funding to achieve a project’s goal. These steps were closely followed in the demolition and disposal operations conducted by the U.S. Department of Defense (DOE) in its Alpha 5 ……

References

References

About DOE. (2020). U.S. Department of Energy. Retrieved from  https://www.energy.gov/about-us ,

About Y-12. (2020). U.S. Department of Energy. Retrieved from  https://www.y12.doe.gov/  about.

Birchfield, J. W. & Albrecht, L. (2012). Successful characterization strategies for the active high risk Y-12 National Security Complex 9201-5 (Alpha-5) Facility, Oak Ridge, TN - 12164. United States.

Recovery cleanup project at Y-12. (2010). U.S. Department of Energy. Retrieved from  https://www.energy.gov/orem/articles/recovery-cleanup-project-y-12-leaves-alpha-5-empty-feeling .

Standard review plan: Acquisition strategy review module. (2010, March). Washington, DC: Office of Environmental Management.

Supplement analysis for the site-wide environmental impact statement for the Y-12 National Security Complex (DOE/EIS-0387-SA-02). (2018, May). U.S. Department of Energy. Retrieved from  https://www.energy.gov/sites/prod/files/2018/05/f51/EIS-0387-SA02-2018_0.pdf .

Teamwork successfully brings down the Alpha 5 Annex. (2018). U.S. Department of Energy. Retrieved from

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".