Imperative Essays(Examples)

Studyspark

Study Document Study Document

Lincoln S Leadership Abilities Comparison And Contrast

Pages: 5 (1424 words) Sources: 4 Document Type:Essay Document #:25535218

… the conventional idea of leadership at his time, Lincoln…[break]…expected result, but he gave him a chance to prove himself anyway. It is also imperative to give credit when its due. As an innovator, Lincoln also fostered ideas in his followers. This is great for morale and improving ……

References

References

Maxwell, J.C. (2005). Ethics 101: What Every Leader Needs to Know. Center Street Publishing. ISBN: 9780446578097. Retrieved from: http://lasacoassurance.com/wp-content/uploads/2015/04/John_C._MaxwelEthics-101_-What-Every-Leader-Needs-to-K-1.pdf

Maxwell, J.C. (1998). The 21 Irrefutable Laws of Leadership. Thomas Nelson Publishing. ISBN: 9780785288374. Retrieved from: https://www.speakersbase.com/uploads/3567e22e8083ad294bab525f9c0b631c57f40f2b1478780702.pdf

Northouse, P.G. (2012). Leadership: Theory and Practice. California, USA: publications Inc. ISBN: 9781483317533.

Phillips, D.T. (1992). Lincoln on Leadership. New York, NY: Warner Books. ISBN: 9780446394598

Studyspark

Study Document Study Document

Suicide Prevention Intervention In The Emergency Department

Pages: 11 (3348 words) Sources: 7 Document Type:Essay Document #:74237246

...Imperative Lack of Mental Treatment and Support
Introduction and Overview
Emergency departments (EDs) can play a major role in reducing the risk and occurrence of suicide, self-harm and harm caused to others by taking steps to create a safety plan for the patient (Stanley et al., 2018). However, many EDs do very little to actually assist patients in this regard. My own experience at Legacy Treatment Center, where I interned, allowed me to see as much. Legacy is in Lee County’s Screening Center for Mental Health Crisis and is located inside Main St Hospital, and patients from all over the county are processed through the Emergency Room. At Legacy, patients will be screened using the Columbia Assessment to see whether they are currently suicidal, homicidal or a danger to others. However, these patients are not offered counseling services. Instead, they are referred or voluntarily or involuntarily committed. The lack of any……

References

References

Appleby, L., Morriss, R., Gask, L., Roland, M., Lewis, B., Perry, A., ... & Davies, L. (2000). An educational intervention for front-line health professionals in the assessment and management of suicidal patients (The STORM Project). Psychological medicine, 30(4), 805-812.

Belmont Report. (1979). Ethical Principles and Guidelines for the Protection of Human

Subjects of Research The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. Department of Health, Education, and Welfare. Retrieved from  https://www.hhs.gov/ohrp/regulations-and-policy/belmont-report/index.html 

Browne, V., Knott, J., Dakis, J., Fielding, J., Lyle, D., Daniel, C., ... & Virtue, E. (2011). Improving the care of mentally ill patients in a tertiary emergency department: development of a psychiatric assessment and planning unit. Australasian Psychiatry, 19(4), 350-353.

Burnette, C., Ramchand, R., & Ayer, L. (2015). Gatekeeper training for suicide prevention: A theoretical model and review of the empirical literature. Rand health quarterly, 5(1).

Callaghan, P., Eales, S., Coates, T., & Bowers, L. (2003). A review of research on the structure, process and outcome of liaison mental health services. Journal of Psychiatric and Mental Health Nursing, 10(2), 155-165.

Chatterjee, R. (2018). A Simple Emergency Room Intervention Can Help Cut Suicide Risk. Retrieved from  https://www.npr.org/sections/health-shots/2018/07/11/628029412/a-simple-emergency-room-intervention-can-help-cut-future-suicide-risk 

Cooper, J., Kapur, N., Webb, R., Lawlor, M., Guthrie, E., Mackway-Jones, K., & Appleby, L. (2005). Suicide after deliberate self-harm: a 4-year cohort study. American Journal of Psychiatry, 162(2), 297-303.

Studyspark

Study Document Study Document

Impact Of Culture On Domestic Violence

Pages: 12 (3547 words) Sources: 21 Document Type:Research Paper Document #:31105337

...Imperative Representations of Black Culture in the Media
Introduction
Culture theory is one theory that can be used to explain domestic violence. As Serrat (2017) notes, culture is the set of “distinctive ideas, beliefs, values, and knowledge” that define the way people behave and think (p. 31). This theory suggests that the way people act is based on the inputs they receive from their environment; and peers, groups, and media all go into shaping their perception of themselves and those around them (Bandura, 2018). If the culture in which they grow up signals to them that treating people in an inhumane way is acceptable, then those individuals are likely to engage in domestic violence acts as they feel or believe that it is an acceptable mode of behavior, sanctioned by the culture in which they live. The culture of media, friends, family, schools, churches and other organizations may all play a……

References

References

Adorno, T. & Horkheimer, M. (2007). The culture industry: Enlightenment as mass deception. Stardom and celebrity: A reader, 34, 2007.

Bandura, A. (2018). Toward a psychology of human agency: Pathways and reflections.  Perspectives on Psychological Science, 13(2), 130-136.  https://doi.org/10.1177/1745691617699280 

Breger, M. L. (2017). Reforming by re-norming: How the legal system has the potential to change a toxic culture of domestic violence. J. Legis., 44, 170.

Cashmore, E. (2006). The Black culture industry. Routledge.

Coleman, L. (1974). Carl Van Vechten Presents the New Negro. Studies in the Literary Imagination, 7(2), 85.

Cramer, E. P., Choi, Y. J., & Ross, A. I. (2017). Race, Culture, and Abuse of Persons with Disabilities. In Religion, Disability, and Interpersonal Violence (pp. 89-110). Champaign, IL: Springer.

Davis, A. (2012). The Meaning of Freedom. San Francisco, CA: City Light Books.

Decker, J. L. (1993). The state of rap: Time and place in hip hop nationalism. Social Text, (34), 53-84.

Studyspark

Study Document Study Document

Ethical Issues Conflicts Of Interest

Pages: 4 (1232 words) Sources: 10 Document Type:Essay Document #:89213693

...Imperative Ethical Issues
Conflicts of Interest
Conflict of interest emerges when an inividual in power uses their position to exploit situations to their advantage. For instance, if a law firm attempted representing the same couple in a divorce case (Legal Dictionary, 2018). Conflict of interest is a manifestation of structural failures of any society. The practice touches on a wide range of societal elements, including legal, political, and administrative aspects. Once public officers engage in acts of conflict of interest, they lose public trust (Pathranarakul, 2005).
Prosecutors often find themselves in the tight sport of conflict of interest. It is easy to be diverted from the mission to deliver justice when one is a prosecutor because of the ever-conflicting interests, and motivations one is exposed to (Green &Roiphe, 2017). In the case of lawyers, incidents in which personal interest comes into conflict with that of the client amount to a conflict……

References

References

Alterio, E. (2011). From judicial comity to legal comity: A judicial solution to global disorder?I-CON, 9(2), 394-424. doi: 10.1093/icon/mor036

BrainMass. (2019). Correctional officer subculture: Ethics. Retrieved from  https://brainmass.com/law/familylaw/correctional-officer-subculture-ethics-165895 

Filgueiras, F. (2011).Transparência e controle da corrupção no Brasil. In: Corrupção e sistemapolítico no Brasil, edited by Leonardo Avritzer and Fernando Filgueiras. Rio de Janeiro: CivilizaçãoBrasileira.

Kindregan, C. (1975).Conflict of interest and the lawyer in civil practice. Retrieved from  https://scholar.valpo.edu/vulr/vol10/iss3/2 

Legal Dictionary. (2018). Conflict of interest. Retrieved from  https://legaldictionary.net/conflict-of-interest/ 

Lilles, H. (2002). Circle sentencing: Part of the restorative justice continuum. IIRP. Retrieved from  https://www.iirp.edu/news/circle-sentencing-part-of-the-restorative-justice-continuum 

Montes, A., Mears, D., &Conchran, J. (2016). The privatization debate: A conceptual framework for improving (public and private) corrections. Journal of Contemporary Criminal Justice. 32(4). Retrieved from https://www.researchgate.net/publication/305418634_The_Privatization_Debate_A_Conceptual_Framework_for_Improving_Public_and_Private_Corrections

Off, C. (1999). How can we trust our fellow citizens? In: Democracy and trust, edited by Mark Warren. Cambridge: Cambridge University Press.

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… internal IT security auditing in all companies.
According to a Security Administrator and System Auditor having nearly two decades of experience, it is imperative to routinely monitor the following computer activity domains: user access control, audit trail, and system activity monitoring (Davis & Yen, 2019; Suduc et ……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Healthcare Scientific Merit

Pages: 11 (3267 words) Sources: 8 Document Type:Paper Document #:78470537

… experience of these entities, which proves critical to the comparison and improvement of medication, medical device, diagnostics, and vaccine usage. Lastly, it is imperative to document and evaluate clinical practice experiences for developing best practice guidelines and guaranteeing superior quality healthcare delivery for patients.
Health sector policies ……

References

References

Brook, R. H., & Vaiana, M. E. (2015). Using the knowledge base of health services research to redefine health care systems. Journal of general internal medicine, 30(10), 1547-1556.

Cutcliffe, J. R., & McKenna, H. P. (1999). Establishing the credibility of qualitative research findings: the plot thickens. Journal of advanced nursing, 30(2), 374-380.

Doekhie, K. D., Strating, M. M., Buljac?Samardzic, M., van de Bovenkamp, H. M., & Paauwe, J. (2018). The different perspectives of patients, informal caregivers, and professionals on patient involvement in primary care teams. A qualitative study. Health Expectations, 21(6), 1171-1182.

Eccles, M., Grimshaw, J., Walker, A., Johnston, M., & Pitts, N. (2005). Changing the behavior of healthcare professionals: the use of theory in promoting the uptake of research findings. Journal of clinical epidemiology, 58(2), 107-112.

Leedy, P.D. & Ormrod, J. E. (2019). Practical research: Planning and design, 12th edition. Pearson Education, Hudson Street, NY.

Sanjari, M., Bahramnezhad, F., Fomani, F. K., Shoghi, M., & Cheraghi, M. A. (2014). Ethical challenges of researchers in qualitative studies: The necessity to develop a specific guideline. Journal of medical ethics and history of medicine, 7.

Swan, J., Clarke, A., Nicolini, D., Powell, J., Scarbrough, H., Roginski, C., ... & Taylor-Phillips, S. (2012). Evidence in Management Decisions (EMD): advancing knowledge utilization in healthcare management.

Thomas, D. R. (2017). Feedback from research participants: are member checks useful in qualitative research?. Qualitative Research in Psychology, 14(1), 23-41.

Studyspark

Study Document Study Document

Raising Families In The 1950s After World War II

Pages: 6 (1711 words) Sources: 9 Document Type:Research Paper Document #:94465868

...Imperative Usual Roles for Men and Women Raising Families in the 1950s after World War II
Background of researched generation or individual, historical and present
The 1950s epoch is often perceived as an era of conformity, during which both genders adhered to their stringent roles and acted following the society's expectations. After the damage and devastation caused by the Great Depression and the Second World War, numerous people in the society chose to build a society that is both peaceful and successful. Even though it was expected that women would identify themselves fundamentally as wives and mothers and to steer clear of work outside the home setting, women continued to constitute a substantial percentage of the post-World War II labor force. The culmination of the war instigated significant changes. Notably, working women were supplanted by the soldiers who were returning home after the war. The communications relayed in popular culture, as……

References

References

Baernholdt, M., Yan, G., Hinton, I., Rose, K., & Mattos, M. (2012). Quality of life in rural and urban adults 65 years and older: findings from the National Health and Nutrition Examination survey. The Journal of Rural Health, 28(4), 339-347.

Canizares, M., Gignac, M., Hogg-Johnson, S., Glazier, R. H., & Badley, E. M. (2016). Do baby boomers use more healthcare services than other generations? Longitudinal trajectories of physician service use across five birth cohorts. BMJ Open, 6(9), e013276.

Cleary, K. K., & Howell, D. M. (2006). Using the SF-36 to determine perceived health-related quality of life in rural Idaho seniors. Journal of allied health, 35(3), 156-161.

Hall, R. C., Hall, R. C., & Chapman, M. J. (2003). Identifying geriatric patients at risk for suicide and depression. Clinical Geriatrics, 11, 36-44.

Khan Academy. (2020). Women in the 1950s: Learn about the myths and realities of women\\\\\\\\\\\\'s lives during the 1950s. Retrieved 8 March 2020 from  https://www.khanacademy.org/humanities/us-history/postwarera/1950s-america/a/women-in-the-1950s 

Oguzturk, O. (2008). Differences in quality of life in rural and urban populations. Clinical and investigative medicine, E346-E350.

Phillipson, C., Leach, R., Money, A., & Biggs, S. (2008). Social and cultural constructions of aging: the case of the baby boomers. Sociological Research Online, 13(3), 1-14.

Rinfrette, E. S. (2009). Treatment of anxiety, depression, and alcohol disorders in the elderly: Social work collaboration in primary care. Journal of evidence-based social work, 6(1), 79-91.

Studyspark

Study Document Study Document

Health Care Institutional Organization And Management

Pages: 4 (1341 words) Sources: 6 Document Type:question answer Document #:71375338

...Imperative Health Care Institutional Organization and Management
Question 1: Critical Thinking and Blooms Taxonomy Revised
1. What are the pros and cons of this approach to learning about healthcare?
Bloom’s Taxonomy revised comprises of the following six dimensions as illustrated below:
There are advantages to Revised Bloom’s Taxonomy as an approach to learning about health care. One of the benefits is that it is purposed to enable the educators to ascertain the logical and knowledgeable level at which the individual learners are capable of working. There is also the advantage that it assists the learners to scrutinize further to ask questions that are exceedingly challenging in addition to forming instructions that are purposed at enhancing critical thinking as they endeavor to reach the three highest levels of analysis, synthesis, and evaluation as the learners get prepared to attain such levels. Bloom’s taxonomy is a significantly potent tool that can be effortlessly……

References

References

Booker, M. J. (2007). A roof without walls: Benjamin Bloom’s taxonomy and the misdirection of American education. Academic Questions, 20(4), 347-355.

Jensen, M. C., & Heckling, W. H. (1995). Specific and general knowledge and organizational structure. Journal of applied corporate finance, 8(2), 4-18.

Katzenbach, J. R., & Smith, D. K. (2003). The Wisdom of Teams (lst ed.). New York: First Harper Business.

McGrath, R. G. (2013). The end of competitive advantage: How to keep your strategy moving as fast as your business. Harvard Business Review Press.

Taylor, N., Clay-Williams, R., Hogden, E., Braithwaite, J., & Groene, O. (2015). High performing hospitals: a qualitative systematic review of associated factors and practical strategies for improvement. BMC health services research, 15(1), 244.

Verenna, A. M. A., Noble, K. A., Pearson, H. E., & Miller, S. M. (2018). Role of comprehension on performance at higher levels of Bloom\\\\\\'s taxonomy: Findings from assessments of healthcare professional students. Anatomical sciences education, 11(5), 433-444.

Zelman, W. N., Pink, G. H., & Matthias, C. B. (2003). Use of the balanced scorecard in health care. Journal of health care finance, 29(4), 1-16

Source Link: https://www.researchgate.net/figure/Organizational-Chart-of-Leadership-at-the-Mayo-Clinic-the-parent-organization-changed_fig2_234069825

Studyspark

Study Document Study Document

Digital Forensics Importance Of Hash Values

Pages: 5 (1350 words) Sources: 5 Document Type:Essay Document #:47872866

...Imperative Hash Values in Digital Forensics
Introduction
Hash values denote condensed representations of digitized or binary content within digital material; however, they offer no additional information pertaining to the contents of any material interpretable by an individual. Moreover, the hash function is algorithms that convert variable-sized text quantities into hash values (which are fixed-sized outputs). Also called “cryptographic hash functions,” they facilitate the development of digital signatures, short textual condensations, and hash tables for the purpose of analysis (Fang et al., 2011; Kumar et al., 2012). In this paper, hash functions and their significance will be addressed.
Description
H (hash function) represents a transformation taking variable-sized input „m? and returning fixed-sized strings (h or hash value; i.e., h = H (m)) (Kumar et al., 2012). The hash functions possessing only the above property can be put to various broad computational uses; however, when applied to cryptography, they normally possess a few……

References

References

Fang, J., Jiang, Z. L., Yiu, S. M., & Hui, L. C. (2011). An efficient scheme for hard disk integrity check-in digital forensics by hashing with combinatorial group testing. International Journal of Digital Content Technology and its Applications.

Kaya, M., & Eris, M. (2017). Hash-based block matching for digital evidence image files from forensic software tools. World Academy of Science, Engineering, and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 11(10), 1068-1071.

Kumar, K., Sofat, S., Jain, S. K., & Aggarwal, N. (2012). SIGNIFICANCE of hash value generation in digital forensic: A case study. International Journal of Engineering Research and Development, 2(5), 64-70.

Netherlands Forensic Institute, (2018a). Technical Supplement Forensic Use of Hash Values and Associated Hash Algorithms. Ministry of Justice and security.

Rasjid, Z. E., Soewito, B., Witjaksono, G., & Abdurachman, E. (2017). A review of collisions in cryptographic hash function used in digital forensic tools. Procedia computer science, 116, 381-392.

Studyspark

Study Document Study Document

Veteran Benefits Administration

Pages: 8 (2465 words) Sources: 3 Document Type:Implementation Paper Document #:56829115

… security at VBA. Some of the records that the agency handles happen to be extremely sensitive – effectively meaning that it would be imperative to ensure that the data/information contained therein is not accessed by unauthorized third parties. This is more so the case when it comes ……

References

References

Aziz, A.A., Mohammad Y., Mokhtar, U.A. & Ambari, D.I. (2017). Establishing Policy for the Implementation of Electronic Document and Records Management System in Public Sector in Malaysia: The Influencing Factors. Advanced Science Letters, 23(11), 10732-10736.

National Archives and Records Administration (2016). Department of Veterans Affairs Records Management Program: Records Management Inspection Report. Retrieved from  https://www.archives.gov/files/records-mgmt/pdf/va-2016-inspection.pdf 

U.S. Department of Veteran Affairs (2020). About VBA. Retrieved from  https://www.benefits.va.gov/BENEFITS/about.a sp

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".