Human Resource Development Essays (Examples)

Studyspark

Study Document Study Document

A Focus On Florida Coast Geography Of Soils And Vegetation In Coastal

Pages: 11 (3221 words) Sources: 8 Document Type:Essay Document #:72447094

… table, depositional-erosional events, organic and carbonate matter, and spatial texture variability. Leaching, gleyzation, decarbonation, and brunification are identified as being the significant soil-forming developments that occur within temperate-climate coasts (Bini et al., 31). Additionally, anthropic intervention facilitates soil development modification: water and sand extraction, tourism enhancement, terrain leveling, and land use modification all play a role in different environmental conditions, potentially influencing … tree isles chiefly exist as either storm-deposited marl or sand outcrops or Indian midden hammocks that rise above the nearby mangrove forests (through human action). 
Not much groundwork exists for presuming that the above areas can retain their position given the current rise in sea levels. A … supports coastline flooding, mangrove peat submergence, and coastal vegetation loss/retreat, which likely includes hardwood stands on storm depositions. The likelihood of new community development on interior-displaced storm outcrops is not clear. However, while substantial uncertainty exists in this……

References

Works cited

Araujo, D. S. D., and M. C. A. Pereira. " INTERNATIONAL COMMISSION ON TROPICAL BIOLOGY AND NATURAL RESOURCES - Sandy coastal vegetation." Encyclopedia of Life Support Systems (EOLSS), (2012).

Armentano, Thomas V., et al. "Vegetation pattern and process in tree islands of the southern Everglades and adjacent areas." Tree islands of the Everglades. Springer, Dordrecht, 2002. 225-281.

Bakker, Jan P., et al. "Environmental impacts—coastal ecosystems." North Sea region climate change assessment. Springer, Cham, 2016. 275-314.

Benedet, L., C. W. Finkl, and A. H. F. Klein. "Morphodynamic classification of beaches on the Atlantic coast of Florida: geographical variability of beach types, beach safety, and coastal hazards." Journal of Coastal Research (2006): 360-365.

Bini, C., et al. "Soils and vegetation of coastal and wetland areas in Northern Adriatic (NE Italy)." 7. International Meeting on Soils with Mediterranean Type of Climate, Valenzano (Italy), 23-28 Sep 2001. CIHEAM-IAMB, 2002.

Eni, D. D., A. I. Iwara, and R. A. Offiong. "Analysis of soil-vegetation interrelationships in a south-southern secondary forest of Nigeria." International Journal of Forestry Research 2012 (2012).

Psuty, Norbert P., Philip E. Steinberg, and Dawn J. Wright. "Coastal and marine geography." Geography in America at the Dawn of the 21st Century (2004): 314-25.

Wright, Lynn D., and Andrew D. Short. "Morphodynamic variability of surf zones and beaches: a synthesis." Marine Geology 56.1-4 (1984): 93-118

Studyspark

Study Document Study Document

The Transformation Of The US Into Oceania

Pages: 9 (2807 words) Sources: 7 Document Type:Essay Document #:33502677

… caves can be regarded as enjoying this ability completely. Nevertheless, the universal right to privacy is enshrined in the United Nations Declaration of human Rights (UDHR) 1948, Article 12 which clearly states that: “No one shall be subjected to arbitrary interference with his privacy, family, home or … just one realm where technological innovations have introduced new and novel threats to personal privacy. For instance, one industry analyst emphasizes that, “With developments in technological security capability, employers can now monitor their employees’ activity on their computers and other company-provided electronic devices” (Ethical issues facing businesses, … (Karn, 2019). For instance, Karn (2019) notes that, “Today, with massive digitization of medical information, mobile data usage and massive system integration, everyday human errors can cause breaches that expose millions of people to potential harm” (para. 5). Of course, while it is impossible to entirely prevent … errors can cause breaches that……

References

References

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Cantor, M. D. (2006, Summer). No information about me without me: Technology, privacy, and home monitoring. Generations, 30(2), 49-55.

Ethical issues facing businesses. (2020). Florida Tech. Retrieved from https://www.floridatech online.com/blog/business/the-5-biggest-ethical-issues-facing-businesses/.

Haslag, C. (2018, Fall). Technology or privacy: Should you really have to choose only one? Missouri Law Review, 83(4), 1027-1033.

Karn, R. (2019). The biggest threat to data security? Humans, of course. The Privacy Advisor. Retrieved from  https://iapp.org/news/a/the-biggest-threat-to-data-security-humans-of-course/ .

Sharma, P. (2017, June). Organizational culture as a predictor of job satisfaction: The role of age and gender. Journal of Contemporary Management Issues, 22(1), 35-40.

Taslitz, A. E. (2009, Spring). The Fourth Amendment in the twenty-first century: Technology, privacy, and human emotions. Law and Contemporary Problems, 65(2), 125-131.

Studyspark

Study Document Study Document

How Does Philosophy Relate To Biblical Studies

Pages: 9 (2773 words) Sources: 13 Document Type:Research Paper Document #:60991740

… working together, interacting and discussing similar or overlapping challenges, philosophy and Biblical theology have always been intertwined. Philosophy has been attributed to the development of Western theology (Addinall, 1991).
Another influential theologian and philosopher in history, Thomas Aquinas, for example, obtained most of his concepts from Aristotle. … the Holy Spirit that gives the correct interpretation or meaning of revelation. However, it is also clear that cultural grids also influence theology development. Based on Christian view, many traditional philosophers or those in the early centuries, use concepts in Christianity to write and discuss their philosophical … view are bound to make contradictions. People…[break]…a fundamental attribute of the study is that it focuses on historical organization. It emphasizes on the development, continuity and discontinuity of biblical occurrences (Vos, 2003).
On the other hand, D.A. Carson defines biblical theology as a study aimed at unearthing … Divine mind based on one……

References

References

Addinall, P. (1991). Philosophy and biblical interpretation: A study in nineteenth-century conflict. Cambridge: Cambridge University Press.

Amanze, N. (2012). Biblical Studies, Theology, Religion and Philosophy: An Introduction for African Universities.

Carson, D. A. (2012). Christ and culture revisited. Grand Rapids, MI ; Cambridge: Eerdmans.

DeWeese, G. J. (2011). Doing Philosophy as a Christian. Westmont: InterVarsity Press.

Hamilton, J. M. (2010). God\\'s glory in salvation through judgment: A biblical theology. Wheaton, Ill: Crossway.

Hamilton, J. M. (2014). What is biblical theology?: A guide to the Bible\\'s story, symbolism, and patterns.

In Bartholomew, C. G. (2011). \\"Behind\\" the text: History and Biblical Interpretation.

Johnson, D. (2014). Biblical knowing: A scriptural epistemology of error. Havertown: James Clarke & Co.

Studyspark

Study Document Study Document

COVID 19 In South Africa Nigeria And Swaziland

Pages: 7 (2030 words) Sources: 6 Document Type:literature review Document #:53851517

...Human resource development Literature Review on Coping Through The Use Of Informal Institutions during COVID 19 in South Africa, Nigeria, and Swaziland
The institutional theory deals with the outlines, regulations, standards, and procedures that are formulated in the institutions as commanding instructions for social behavior. This theory gives an understanding of how institutions are shaped, and the societal norms and frameworks are informed to all people of an organization. Communication is the sole indicator of how organizations are formulated with the help of formal rules and regulations, as that would reflect how they are conversed across all levels of the firm and in what way people are obeying them. This would ultimately build an organizational culture for coping with social and political issues. The informal institutions are socially shared instructions, typically unwritten, that are formed, transferred and imposed outside the official boundaries (Torniainen & Sasstamoinen, 2007), for example, giving tips to the food……

References

References

Coelho, A. (2019). The role of informal institutions in the enforcement of rules and how to improve corporate and public governance in Brazil: Studies based on a set of corporate governance cases involving state-owned companies (Working Paper). Retrieved from SSRN website  https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3434037 

Dacin, M.T., Goodstein, J. & Scott, W.R. (2002). Institutional theory and institutional change: Introduction to the special research forum. Academy of Management Journal, 45(1), 45- 47. DOI: 10.2307/3069284

Escandon-Barbosa, D.M., Urbano, D., Hurtado-Ayala, A., Paramo, J.S. & Dominguez, A.Z. (2019). Formal institutions, informal institutions, and entrepreneurial activity: A comparative relationship between rural and urban areas in Colombia. Journal of Urban Management, 8(3), 458-471.  https://doi.org/10.1016/j.jum.2019.06.002 

Estrin, S. & Prevezer, M. (2010). The role of informal institutions in corporate governance: Brazil, Russia, India, and China compared. Asia Pacific Journal of Management, 28, 41- 67.  https://doi.org/10.1007/s10490-010-9229-1 

Kaufmann, W., Hooghiemstra, R. & Feeney, M.K. (2018). Formal institutions, informal institutions, and red tape: A comparative study. Public Administration, 96(2), 386-403. https://doi.org/10.1111/padm.12397

Meluch, A.L. (2016, August). Understanding the organizational and institutional origins of social support in a cancer support center. (Unpublished doctoral dissertation). Retrieved from https://etd.ohiolink.edu/!etd.send_file?accession=kent1466944822&disposition=inline

Torniainen, T.J. & Sasstamoinen, O.J. (2007). Formal and informal institutions and their hierarchy in the regulation of the forest lease in Russia. Forestry: An International Journal of Forest Research, 80(5), 489-501.  https://doi.org/10.1093/forestry/cpm033 

Studyspark

Study Document Study Document

Angleton S Counterintelligence Program And What Went Wrong

Pages: 9 (2657 words) Sources: 8 Document Type:Essay Document #:36485484

… topic. Nonetheless, it is hypothesized here that an analysis of the past transgressions of counterintelligence can be prevented in the future through the development and application of a standardized ethical approach to counterintelligence.
Research Design and Methods
The research design is qualitative because the subject is exploratory … be addressed by bracketing them out at the beginning, as recommended by Johnston, Wallis, Oprescu,and Gray (2017).
Conclusion
Just as Erikson’s model of human development enables psychologists to understand the adult by examining the age-related conflicts that must be overcome before the child can proceed successfully to later … to understand the adult by examining the age-related conflicts that must be overcome before the child can proceed successfully to later stages of development, one could potentially gain insight in understanding the policies and issues of counterintelligence today by examining the early days of the counterintelligence program ……

References

Reference List

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Bartos, C. and P. Wehr. 2002. Using conflict theory. UK: University of Cambridge.

Bellaby, Ross. "What's the Harm? The Ethics of Intelligence Collection." Intelligence and National Security 27, no. 1 (2012): 93-117.

Church Committee. “Final report of the Select committee to study governmental operations With respect to Intelligence activities United states senate Together with Additional, supplemental, and separate Views.” Intelligence.senate.gov, 1976. https://www.intelligence.senate.gov/sites/default/files/94755_I.pdf

Coyne, John, Peter Bell, and Shannon Merrington. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2, no. 10 (2013): 27-37.

Erskine, Toni. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19, no. 2 (2004): 359-381.

Nakashima, Ellen. “Top counterintelligence official challenges the private sector to step up defenses against foreign spying.” Washington Post, 2020.  https://www.washingtonpost.com/national-security/top-counterintelligence-official-challenges-the-private-sector-to-step-up-defenses-against-foreign-spying/2020/02/10/d842d83c-4c15-11ea-9b5c-eac5b16dafaa_story.html 

Pfaff, T., & Tiel, J. R. (2004). The ethics of espionage. Journal of Military Ethics, 3(1), 1-15.

Study Document Study Document

Suicide Prevention Intervention In The Emergency Department

Pages: 11 (3348 words) Sources: 7 Document Type:Essay Document #:74237246

… follow up, and some clients return once a week and still need to be evaluated. By not providing them with treatment other than resource for them to access on their own, it leaves a huge gap in mental health services for the community. Clients are brought to … explains the issue is that provided by Burnette, Ramchand and Ayer (2015) who state that people on the front lines of health and human services can be seen as gatekeepers who can prevent suicide, self-harm or harm to others by having knowledge of the mental health issue, … the intervention, its rationale and evidence base are described; and
4. conducting role-plays to practice implementing the intervention (Safety Planning Intervention, 2019).
The resource needed for this training are the safety plan manual, which can be obtained from http://www.suicidesafetyplan.com/Training.html. A training room and practice intervention session will ……

References

References

Appleby, L., Morriss, R., Gask, L., Roland, M., Lewis, B., Perry, A., ... & Davies, L. (2000). An educational intervention for front-line health professionals in the assessment and management of suicidal patients (The STORM Project). Psychological medicine, 30(4), 805-812.

Belmont Report. (1979). Ethical Principles and Guidelines for the Protection of Human

Subjects of Research The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. Department of Health, Education, and Welfare. Retrieved from  https://www.hhs.gov/ohrp/regulations-and-policy/belmont-report/index.html 

Browne, V., Knott, J., Dakis, J., Fielding, J., Lyle, D., Daniel, C., ... & Virtue, E. (2011). Improving the care of mentally ill patients in a tertiary emergency department: development of a psychiatric assessment and planning unit. Australasian Psychiatry, 19(4), 350-353.

Burnette, C., Ramchand, R., & Ayer, L. (2015). Gatekeeper training for suicide prevention: A theoretical model and review of the empirical literature. Rand health quarterly, 5(1).

Callaghan, P., Eales, S., Coates, T., & Bowers, L. (2003). A review of research on the structure, process and outcome of liaison mental health services. Journal of Psychiatric and Mental Health Nursing, 10(2), 155-165.

Chatterjee, R. (2018). A Simple Emergency Room Intervention Can Help Cut Suicide Risk. Retrieved from  https://www.npr.org/sections/health-shots/2018/07/11/628029412/a-simple-emergency-room-intervention-can-help-cut-future-suicide-risk 

Cooper, J., Kapur, N., Webb, R., Lawlor, M., Guthrie, E., Mackway-Jones, K., & Appleby, L. (2005). Suicide after deliberate self-harm: a 4-year cohort study. American Journal of Psychiatry, 162(2), 297-303.

Studyspark

Study Document Study Document

Acquisition Process In Action At The Department Of Energy

Pages: 10 (2943 words) Sources: 8 Document Type:Research Paper Document #:56403146

How the DOE Used the Acquisition Process to Demolish a Contaminated Building
Today, many organizations lack the resource to engage in a formal acquisition process while others rely on acquisitions processes that are specially designed for a specific project. In either … the terrorist attacks of September 11, 2001. Maintaining the DOE’s far-flung network of facilities demands ongoing attention, though, including one its most important resource, the Y-12 National Security Complex. According to the description provided by the DOE, “The Y?12 National Security Complex is a premier manufacturing facility … strategy review pre-visit;
· Leads the review team in completing the Review Criteria for the various areas to be reviewed;
· Coordinates the development of the data call and forwards to the Federal Project Director, a list of documents, briefings, interviews, and presentations needed to support the … in showing that the Alpha 5 building was a critically important asset……

References

References

About DOE. (2020). U.S. Department of Energy. Retrieved from  https://www.energy.gov/about-us ,

About Y-12. (2020). U.S. Department of Energy. Retrieved from  https://www.y12.doe.gov/  about.

Birchfield, J. W. & Albrecht, L. (2012). Successful characterization strategies for the active high risk Y-12 National Security Complex 9201-5 (Alpha-5) Facility, Oak Ridge, TN - 12164. United States.

Recovery cleanup project at Y-12. (2010). U.S. Department of Energy. Retrieved from  https://www.energy.gov/orem/articles/recovery-cleanup-project-y-12-leaves-alpha-5-empty-feeling .

Standard review plan: Acquisition strategy review module. (2010, March). Washington, DC: Office of Environmental Management.

Supplement analysis for the site-wide environmental impact statement for the Y-12 National Security Complex (DOE/EIS-0387-SA-02). (2018, May). U.S. Department of Energy. Retrieved from  https://www.energy.gov/sites/prod/files/2018/05/f51/EIS-0387-SA02-2018_0.pdf .

Teamwork successfully brings down the Alpha 5 Annex. (2018). U.S. Department of Energy. Retrieved from

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

… have taken steps to pass cybercrime bills and the majority of them already have laws on the books regarding cybercrime. International laws regarding human rights typically are applied in cybercrime cases (Taylor et al., 2019).
How to Deter and Prevent Cybercrime
One of the best ways to … better than to click on suspicious links or give away passwords—but they do not. This is partly a training problem and partly a human nature problem. Most workers in firms do not spend their time thinking that there are hackers looking to find ways to illegally access ……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

Emergency Managers And Climate Risk

Pages: 7 (2056 words) Sources: 6 Document Type:Essay Document #:49338362

… all of the different types of climate-related risks that are involved.
In recent decades, changes in climate have caused impacts on natural and human systems on all continents and across the oceans. Consequently, the types of risks that are associated with climate change depend in large part … by the IPCC Working Group II (2014), “In many regions, changing precipitation or melting snow and ice are altering hydrological systems, affecting water resource in terms of quantity and quality” (p. 1).
Beyond the foregoing considerations, emergency managers across the country are also faced with the potential … Working Group II also emphasizes that, “Differences in vulnerability and exposure arise from non-climatic factors and from multidimensional inequalities often produced by uneven development processes. These differences shape differential risks from climate change” (p. 1). Yet another issue facing emergency managers today is the fact that there ……

References

References

Edwards, F. L. (2011, Spring). Symposium: Preparing for climate change. The Public Manager, 40(1), 20-25.

IPCC Working Group II. (2014). Assessing and managing the risks of climate change. Retrieved from https://www.ipcc.ch/site/assets/uploads/2018/03/WGIIAR5_SPM_Top_Level_ Findings-1.pdf.

Labadie, J. R. (2011). Emergency managers confront climate change. Sustainability, 3, 1250-1264.

Leven, R. & Goldstein, Z. (2019). Kentucky is among the states blocking climate action. As weather gets more extreme, its residents — and U.S. taxpayers — are paying a price. Public Integrity. Retrieved from  https://publicintegrity.org/environment/one-disaster-away/a-dangerous-disconnect-disaster-prone-states/ .

Mickus, J. (2017, June 1). A Sugar Creek chronicle: Observing climate change from a Midwestern woodland. Perspectives on Science and Christian Faith, 69(2), 110-114.

The Nature Conservancy. (2020). Pennsylvania climate solutions. Retrieved from https://www. nature.org/en-us/about-us/where-we-work/united-states/pennsylvania/stories-in-pennsylvania/pennsylvania-climate-solutions/.

Studyspark

Study Document Study Document

Operations Management And Business Strategy

Pages: 11 (3437 words) Sources: 4 Document Type:Reaction Paper Document #:30139516

… target consumer is not particularly price sensitive. For these reasons, a supply chain that is designed around quality is the optimal choice.
Materials resource Planning (MRP)
Overview
An MRP (materials resource planning) system is one tool for helping to manage the supply chain. An MRP system can help provide dashboards and metrics for evaluating … it is integral to have a sophisticated supplier relationship management system. Some key elements of an SRM are purchasing strategy, supplier selection and development, and collaboration with suppliers (Park et al, 2010).
SRM Strategy
The purchasing strategy is to purchase at the harvest for each target nation, … supply chain without disruptions,
Conclusion
Fiyeli Coffee, named after the Amharic word for goat, an homage to the alleged origin story of how human came to discover the energy-giving properties of coffee, is a high end coffee company in a mid-sized city. With an eye to……

References

References

Aburto, L. & Weber, R. (2005) Improved supply chain management based on hybrid demand forecasts. Applied Soft Computing. Retrieved June 13, 2019 from https://s3.amazonaws.com/academia.edu.documents/30284637/demand_forecast_in_a_supermarket_using_a_hybrid_intelligent_system.pdf

CT Magazine (2012) Coffee packaging freshness. Coffee Talk Magazine. Retrieved June 13, 2019 from  https://coffeetalk.com/ctmagazine/10-2012/3926/ 

Del Valle, G. (2019) Wholesale coffee is cheaper than it has been in years. That’s not good news. Vox. Retrieved June 13, 2019 from  https://www.vox.com/the-goods/2019/4/25/18512680/coffee-futures-price-dropping-brazil-currency 

Garza, E. & Hoffman, M. (2019) How climate change is killing coffee. Knowledge @ Wharton. Retrieved June 13, 2019 from  https://knowledge.wharton.upenn.edu/article/coffee-climate-change/ 

Khan, O. & Creazza, A. (2005) The impact of product design on the supply chain. Chartered Institute of Logistics and Transport Retrieved June 13, 2019 from https://www.researchgate.net/publication/265492088_The_Impact_of_Product_Design_on_the_Supply_Chain_The_Impact_of_Product_Design_on_the_Supply_Chain

Manetti, G. & Becatti, L. (2009). Assurance services for sustainability reports: Standards and empirical evidence. Journal of Business Ethics. Vol. 87 (2009) 289-298.

Mersie, A. (2019) Coffee prices seen rising 25% by year end. Reuters Retrieved June 13, 2019 from  https://www.reuters.com/article/us-global-coffee-poll/coffee-prices-seen-rising-nearly-25-percent-by-year-end-reuters-poll-idUSKCN1Q11JD 

Mordor Intelligence (2017) United States coffee market – growth, trends and forecasts. Mordor Intelligence Retrieved June 13, 2019 from  https://www.mordorintelligence.com/industry-reports/united-states-coffee-market

Join thousands of other students and

"spark your studies".