Human Resource Management Essays (Examples)

Studyspark

Study Document Study Document

Equine Viral Arteritis

Pages: 3 (889 words) Sources: 5 Document Type:Essay Document #:40409672

… will carry the virus in their sex glands for years (Timoney, 2019). Currently no evidence exists that the disease can be contracted by human, and it is hypothesized that it may also infect alpacas and llamas. Transmission between equines occurs via respiration, venereal contact or congenitally (Timoney, ……

References

References

Center for Food Security and Public Health. (2009). Equine viral arteritis. Retrieved from  http://www.cfsph.iastate.edu/Factsheets/pdfs/equine_viral_arteritis.pdf 

Price, S. D., Rentsch, G., Burn, B., & Spector, D. A. (1998). The Whole Horse Catalog: The Complete Guide to Buying, Stabling and Stable Management, Equine Health, Tack, Rider Apparel, Equestrian Activities and Organizations... and Everything Else a Horse Owner and Rider Will Ever Need. Simon and Schuster.

Timoney, P. (2019). Overview of Equine Viral Arteritis. Retrieved from  https://www.merckvetmanual.com/generalized-conditions/equine-viral-arteritis/overview-of-equine-viral-arteritis?query=Equine%20Viral%20Arteritis 

Timoney, P. J., Creekmore, L., Meade, B., Fly, D., Rogers, E., & King, B. (2008). 2006 Multi-State Occurrence of EVA. https://www.animalagriculture.org/resources/Documents/Conf%20-%20Symp/Symposiums/2016%20Equine/EDF%20Resources/EVA/USDA%20EVA_2006_Multistate_USAHA.pdf

Virginia Department of Health. (2016). One health notes, 1(1). Retrieved from

 http://www.vdh.virginia.gov/content/uploads/sites/123/2016/12/OneHealthJan2016.pdf 

Studyspark

Study Document Study Document

Maritime Safety And Security SOP For Homeland Security Perspectives

Pages: 4 (1341 words) Sources: 11 Document Type:literature review Document #:28623347

… critical systems in the industry.
Investigatory Procedures to Be Used
To investigate cybersecurity threats to the maritime industry, the project will review various resource on the subject matter. The researcher will access these documents from websites, public libraries, books, and data from already filled in surveys. In ……

References

References

Bowen, B.M. (2011). Measuring the Human Factor of Cyber Security. Rerieved from  http://www.cs.columbia.edu/~bmbowen/papers/metrics_hst.pdf 

Bueger, C. (2015). What is Maritime Security? Maritime Policy, 53, 159-164.

Fitton, O. P. (2015). The Future of Maritime Cyber Security. Retrieved from  https://eprints.lancs.ac.uk/id/eprint/72696/1/Cyber_Operations_in_the_Maritime_Environment_v2.0.pdf 

Hadlington, L. (2018). The \\\\\\"Human Factor\\\\\\" in cybersecurity: Exploring the accidental insider. Psychological and Behavioral Examinations in Cyber Security, 4(6), 46-63.

Hareide, O. S. (2018). Enhancing Navigator Competence By Demonstrating Maritime Cyber Security. The Journal of Navigation, 71(5), 1025-1039.

Hayes, C. R. (2016). Maritime Cybersecurity: The Future of National Security. Monterey, California: Naval Post Graduate School.

Herzog, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), 49-60.

Hoffmann, J. (2018). Review of Maritime Transport. New York: UNCTAD.

Studyspark

Study Document Study Document

US Healthcare Reimbursement And Insurance Issues

Pages: 6 (1653 words) Sources: 8 Document Type:Essay Document #:69275488

… Right from drugs to clinical instruments, healthcare sector improvements have the potential to change, improve, and save lives worldwide. With the expansion in human knowledge of such matters is a simultaneous expansion of inpatient care. Ultimately, better patient results are the aim of all healthcare organizations and ……

References

References

Araujo, M. (2020). Health and medical insurance differences: HMO, PPO, POS, EPO. Retrieved from  https://www.thebalance.com/health-and-medical-insurance-2645378 

Bertram, M. Y., Lauer, J. A., De Joncheere, K. D., Edejer, T., Hutubessy, R., Kieny, M. P., & Hill, S. R. (2016). Cost-effectiveness thresholds: pros and cons. Bull World Health Organ, 94, 925–930. http://dx.doi.org/10.2471/BLT.15.164418926

Dey, P., & Bach, P. B. (2019). The 6 functions of health insurance. The JAMA Forum, 321(13), 1242-1243.  DOI:10.1001/jama.2019.2320

Ho, A. (2015). Health insurance. Encyclopedia of Global Bioethics. Retrieved from https://www.researchgate.net/publication/298022702_Health_Insurance

IMedPub. (2020). Health insurance. Retrieved from https://www.imedpub.com/scholarly/health-insurance-journals-articles-ppts-list.php

Maruthappu, M., Hasan, A., & Zeltner, T. (2016). Enablers and barriers in implementing integrated care. Health System & Reform, 1(4), 250-256.  https://doi.org/10.1080/23288604.2015.1077301 

Sekhri, N. (2000). Managed care: The US experience. Bulletin of the World Health Organization, 78(6), 830-844. Retrieved from  https://www.who.int/bulletin/archives/78(6)830.pdf 

Strata Decision Technology. (2020). Healthcare and hospital capital budget. Retrieved from  https://www.stratadecision.com/healthcare-and-hospital-capital-budget/

Studyspark

Study Document Study Document

The Transformation Of The US Into Oceania

Pages: 9 (2807 words) Sources: 7 Document Type:Essay Document #:33502677

… caves can be regarded as enjoying this ability completely. Nevertheless, the universal right to privacy is enshrined in the United Nations Declaration of human Rights (UDHR) 1948, Article 12 which clearly states that: “No one shall be subjected to arbitrary interference with his privacy, family, home or … (Karn, 2019). For instance, Karn (2019) notes that, “Today, with massive digitization of medical information, mobile data usage and massive system integration, everyday human errors can cause breaches that expose millions of people to potential harm” (para. 5). Of course, while it is impossible to entirely prevent … errors can cause breaches that expose millions of people to potential harm” (para. 5). Of course, while it is impossible to entirely prevent human errors, it is possible to ensure that business practices are in place that can help mitigate these errors and preclude their recurrence. In ……

References

References

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Cantor, M. D. (2006, Summer). No information about me without me: Technology, privacy, and home monitoring. Generations, 30(2), 49-55.

Ethical issues facing businesses. (2020). Florida Tech. Retrieved from https://www.floridatech online.com/blog/business/the-5-biggest-ethical-issues-facing-businesses/.

Haslag, C. (2018, Fall). Technology or privacy: Should you really have to choose only one? Missouri Law Review, 83(4), 1027-1033.

Karn, R. (2019). The biggest threat to data security? Humans, of course. The Privacy Advisor. Retrieved from  https://iapp.org/news/a/the-biggest-threat-to-data-security-humans-of-course/ .

Sharma, P. (2017, June). Organizational culture as a predictor of job satisfaction: The role of age and gender. Journal of Contemporary Management Issues, 22(1), 35-40.

Taslitz, A. E. (2009, Spring). The Fourth Amendment in the twenty-first century: Technology, privacy, and human emotions. Law and Contemporary Problems, 65(2), 125-131.

Studyspark

Study Document Study Document

CFOs Big Data Opportunities In Firms

Pages: 7 (2057 words) Sources: 6 Document Type:Research Paper Document #:26742092

… data has had significant transformative effects on several industries including technology, agriculture, health, education, and finance. Over the past decade, the number of human using smartphones has increased tremendously and this has created a big pool of user data as smartphone users stamp their digital footprint all … some challenges in capturing, storage, analysis, and interpretation of huge volumes of data (Chen, Chiang & Storey, 2012).
Big Data Opportunities
Traditional data management tools and models have posed several challenges to the finance industry in the past in terms of security and inefficiencies. One of the … to know what their customers want in a timely manner, they need to collect and analyze a lot of customer data. Traditional data management tools and models do not provide the tools and techniques necessary to collect or analyze lots of data quickly. Also, the traditional tools … areas that Big Data…[break]…make huge……

References

References

Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and analytics: From big data to big impact. MIS quarterly, 36(4).

Jin, X., Wah, B. W., Cheng, X., & Wang, Y. (2015). Significance and challenges of big data research. Big Data Research, 2(2), 59-64.

Joshi, N. (2018). How Big Data Can Transform the Finance Industry. Retrieved October 7, 2019, from  https://www.bbntimes.com/en/technology/big-data-is-transforming-the-finance-industry .

Nath, T. I. (2019). How Big Data Has Changed Finance. Retrieved October 7, 2019, from  https://www.investopedia.com/articles/active-trading/040915/how-big-data-has-changed-finance.asp .

Turner, D., Schroeck, M., & Shockley, R. (2013). Analytics: The real-world use of big data in financial services. IBM Global Business Services, 27.

Yin, S., & Kaynak, O. (2015). Big data for modern industry: challenges and trends [point of view]. Proceedings of the IEEE, 103(2), 143-146.

Zhou, K., Fu, C., & Yang, S. (2016). Big data driven smart energy management: From big data to big insights. Renewable and Sustainable Energy Reviews, 56, 215-225.

Studyspark

Study Document Study Document

Reflected Best Self Report RBS

Pages: 10 (3015 words) Sources: 6 Document Type:Essay Document #:23365837

… to them. It sometimes sounds false. A strengths-based approach can prove constructive and lead to improved performance. As Drucker (1999) points out, “energy, resource, and time should go instead to making a competent person into a star performer,” rather than stress how an individual falls short (p. ……

References

References

Cooley, C.H. (1902). Human nature and the social order. New York: Scribners.

Drucker, P.F. (1999). Managing oneself. Harvard Business Review. 83(1), 100-10.

Northouse, P. (2018). Leadership: Theory and practice (8th ed.). Melbourne. SAGE Publications.

Oysermann, D., Bybee, D., & Terry, K. (2006). Possible selves and academic outcomes: How and when possible selves impel action. Journal of Personality and Social Psychology, 91, 188-204.

Roberts, L., Dutton, J., Spreitzer, G., Heaphy, E., & Quinn, R. (2005). Composing the reflected best-self portrait: Building pathways for becoming extraordinary in work organizations. Academy of Management Review, 30(4), 712-736.

Tice, D.M. & Wallace, H. 2003. The reflected self: Creating yourself as (you think) others see you. In M. R. Leary and J. P. Tangney (Eds.), Handbook of self and identity: 91-105. New York: The Guilford Press.

Studyspark

Study Document Study Document

Using Tactical Empathy And Effective Silence To Negotiate An Outcome

Pages: 8 (2314 words) Sources: 7 Document Type:Essay Document #:57733718

… notion that society is engaged in a continuous struggle that comes about as a result of there only being a finite supply of resource. From this seed, conflict theory emerged in sociology in response to structural functionalism, which posits that society functions as a result of various ……

References

References

Brown, M. E., & Treviño, L. K. (2014). Do role models matter? An investigation of role modeling as an antecedent of perceived ethical leadership. Journal of Business Ethics, 122(4), 587-598.

Combs, J. P., Harris, S., & Edmonson, S. (2015). Four Essential Practices for Building Trust. Educational Leadership, 72(7), 18-22.

Fisher, R. & Ury, W. (1991). Getting to Yes. NY: Penguin.

Lunenburg, F. C. (2012). Power and leadership: An influence process. International Journal of Management, Business, and Administration, 15(1), 1-9.

Maslow, A. H. (1943). A theory of human motivation. Psychological Review, 50(4), 370.

Ritzer, G. & Stepnisky, J. (2017). Modern sociological theory. Thousand Oaks, CA: SAGE.

Singh-Sengupta, S. (1997). Leadership: A Style or an Influence Process. Indian Journal of Industrial Relations, 265-286.

Studyspark

Study Document Study Document

Mission Command

Pages: 5 (1619 words) Sources: 4 Document Type:Essay Document #:63809769

… the leader (House, 1996).
By working with my teams, I intend to help them solve problems. I intend to provide them with the resource they require so that they themselves have all the tools their job will demand of them. Managing human and budgetary capital is but one part of this process. Promoting self-management and making sure the teams have the knowledge to do their jobs and make good decisions is another part of the process. Staying ……

References

References

Fredrickson, B. L. (2001). The role of positive emotions in positive psychology: The broaden-and-build theory of positive emotions. American psychologist, 56(3), 218.

House, R. J. (1996). Path-goal theory of leadership: Lessons, legacy, and a reformulated theory. The Leadership Quarterly, 7(3), 323-352.

Hutchings, P. (2018). The Philosophy of Mission Command and the NCO Corps. Retrieved from  https://www.armyupress.army.mil/Journals/NCO-Journal/Archives/2018/February/Philosophy-of-Mission-Command/ 

McBride, D. & Snell, R. (2017). Applying mission command to overcome challenges. Retrieved from  https://www.army.mil/article/179942/applying_mission_command_to_overcome_challenges 

Studyspark

Study Document Study Document

Higher Education Labor Rights Faculty Tenure

Pages: 5 (1587 words) Sources: 6 Document Type:Essay Document #:61972797

… circumstances would be financial exigency: an unavoidable and unfortunate situation in which the institution experiences severe budget shortfalls and must completely reconsider reallocating resource in order to remain viable at all. A similar extenuating circumstance that may legally permit the termination of a tenured faculty member would … contingent faculty. Institutions of higher learning are fundamental features of any democracy. The advancement of research does depend on strong and fiscally wise management, but decisions made by administrators should never place profitability over the values inherent in higher education. Faced with financial exigency, universities and colleges ……

References

References

Alleman, N.F. & Haviland, D. (2017). “I expect to be engaged as an equal”: collegiality expectations of full-time, non-tenure-track faculty members. High Educ (2017) 74: 527.  https://doi.org/10.1007/s10734-016-0062-4 

American Association of University Professors (AAUP 2019). Tenure. Retrieved from:  https://www.aaup.org/issues/tenure 

Curnalia, R. M. L., & Mermer, D. (2018). Renewing our commitment to tenure, academic freedom, and shared governance to navigate challenges in higher education. Review of Communication, 18(2), 129–139.doi:10.1080/15358593.2018.1438645

Eastman, N. J., & Boyles, D. (2015). In defense of academic freedom and faculty governance: John Dewey, the 100th anniversary of the AAUP, and  the Threat of Corporatization

Mitchell, M., Palacios, V. & Leachman, M. (2015). States are still funding higher education below pre-recession levels. Journal of Collective Bargaining in the Academy, April 2015, Article 71. Retrieved from:  https://thekeep.eiu.edu/cgi/viewcontent.cgi?article=1524&context=jcba 

Studyspark

Study Document Study Document

Comparison Of Leadership Model And Styles

Pages: 5 (1542 words) Sources: 5 Document Type:Essay Document #:47234629

… are identified, the leader should strive to see that the needs are met—which is basically what Maslow (1943) recommends with his theory of human motivation and the hierarchy of needs model. Servant leadership in my model is used to help the workers achieve a level of self-actualization … are effective because they get out of the way and let workers work to their full potential: they give them the space and resource they require to be as successful as they possibly can. Workers who are self-motivated and self-directing typically like servant leaders because they are ……

References

References

Maslow, A. H. (1943). A theory of human motivation. Psychological Review, 50(4), 370.

Nawaz, Z. A. K. D. A., & Khan_ PhD, I. (2016). Leadership theories and styles: A literature review. Leadership, 16, 1-7.

Northouse, P. G. (2016). Leadership: Theory and practice (7th ed.). Thousand Oaks: CA: Sage Publications.

Reivich, K. J., Seligman, M. E., & McBride, S. (2011). Master resilience training in the US Army. American Psychologist, 66(1), 25.

Warrick, D. D. (2011). The urgent need for skilled transformational leaders: Integrating transformational leadership and organization development. Journal of Leadership, Accountability and Ethics, 8(5), 11-26

Join thousands of other students and

"spark your studies".