International Essays (Examples)

Studyspark

Study Document Study Document

The Assassination Of Qassem Soleimani The Iranian General

Pages: 11 (3286 words) Sources: 13 Document Type:Research Paper Document #:89148612

The assassination of Major General Qassem Soleimani
Introduction
In early 2020, January 3, the U.S. launched airstrike attacks around Baghdad International Airport and killed two of the most influential leaders in Iran, Iraq, and the surrounding regions. The strike killed Qassem Soleimani, the Islamic … killing of General Soleiman amounted to inhibiting the U.S. interest in the region or promoted it, 3) whether the act constituted what the International Law refers to state-sponsored terrorism.
Soleiman was considered the brainchild and facilitator of the extensive reach of Iran in the region. He, indeed, … a united government. Thus, Trump failed in his executive leadership role.
Diplomatic leadership
It seems that the world view of President Trump of International Relations is limited. He is not tactical in decision making. He sacks key military and political figures in an unorthodox fashion and thus … indicate that they have no confidence in Trump and……

References

References

Jahanbani, N. (2020). Beyond Soleimani: Implications for Iran\\\\\\\\\\\\'s Proxy Network in Iraq and Syria. CTC Perspectives.

Vladeck, S. I. (2004). Emergency Power and the Militia Acts. Yale LJ, 114, 149.

Brands, H. (2019). Why America Can\\\\\\\\\\\\" t Quit the Middle East. Hoover Institution, 21.

Tillman, S. P. (1982). The United States in the Middle East: Interests and Obstacles (Vol. 82). Bloomington: Indiana University Press.

Terry, J. P. (1986). Countering State-Sponsored Terrorism: A Law-Policy Analysis. Naval L. Rev., 36, 159.

Maogoto, J. N. (2003). War on the enemy: self-defense and state-sponsored terrorism. Melb. J. Int\\\\\\\\\\\\'l L., 4, 406.

Lillich, R. B., & Paxman, J. M. (1976). State Responsibility for Injuries to Aliens Occasioned by Terrorist Activities. Am. U.L. Rev., 26, 217.

Parker, C. & Noack, R. (2020, January 2). Iran has invested in allies and proxies across the Middle East. Here\\\\\\\\\\\\'s where they stand after Soleimani\\\\\\\\\\\\'s death. Washington Post. Retrieved from https://www.washingtonpost.com/world/2020/01/03/iran-has-invested-allies-proxies-across-middle-east-heres-where-they-stand-after-soleimanis-death/

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

… study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage, acceptability, proposition, … use of cyberspace in modern warfare has also been characterized by the emergence of cyber espionage, which is one of the most complex international problems in today’s world. Cyber espionage refers to the practice of obtaining secrets with the permission of the owner/possessor of the information.[footnoteRef:2] While … and Combating Techniques”, Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf]
Background Information
Cyber espionage has become one of the most important and complex international problem in today’s world. It is a practice that involves obtaining secrets without the permission of the owner/possessor of the information. The information … or networks used by a……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage, acceptability, proposition, … use of cyberspace in modern warfare has also been characterized by the emergence of cyber espionage, which is one of the most complex international problems in today’s world. Cyber espionage refers to the practice of obtaining secrets without the permission of the owner/possessor of the information.[footnoteRef:2] While … and Combating Techniques”, Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf]
Background Information
Cyber espionage has become one of the most important and complex international problem in today’s world. It is a practice that involves obtaining secrets without the permission of the owner/possessor of the information. The information … or networks used by a……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Advantages And Disadvantages Of Interrelationships Between Organizational

Pages: 16 (4728 words) Sources: 28 Document Type:Essay Document #:81594345

...International 1. Advantages and Disadvantages of Interrelationships between Organizational Functions and Impact on Organisational Structure
Organizational Functions
The functions of an organization take into account the different aspects undertaken by the business including production or manufacturing, marketing, sales, accounting as well as research and development. In accordance to Sherman and Thompson (2019), the organizational structure delineates the relationship and interrelations between the functions of a business and ascertains the manner in which the chain of command operates through the various levels. The interrelationship between organizational functions and organizational structure is akin to a flow chart. This is in the sense that an entity can set up its business structure around the organizational functions. However, even if the entity fails to do so, the organizational functions and structure will have an impact on one another (Sherman and Thompson, 2019).
Functional Organizational Structure
A functional organizational structure creates distinct and separate departments. Plenty……

References

References

Air India. (2019). Board of Directors. Retrieved from:  http://www.airindia.in/board-of-directors.htm 

Aquinas, P. G. (2008). Organization structure and design. India: Excel Books India.

Burns, T., & Stalker, G. M. (2005). Mechanistic and organic systems. Organizational Behavior, 2, 214-25.

Choo, S., & Bowley, C. (2007). Emerald Article: Using training and development to affect job satisfaction. Journal of Small Business and Enterprise Development, 14(2),339 - 352.

Cichocki, P., & Irwin, C. (2014). Organization design: A guide to building effective organizations. Kogan Page Publishers.

Civil Aviation. (2019). About Us: Organizational Setup. Retrieved from:  http://www.civilaviation.gov.in/en/aboutus/orgsetup 

Cunliffe, A. L. (2008). Organization theory. New York: Sage.

Cunliffe, A. L., & Luhman, J. T. (2012). Key concepts in organization theory. New York: Sage.

Studyspark

Study Document Study Document

The FBI Counterproliferation And Weapons Of Mass Destruction

Pages: 6 (1839 words) Sources: 8 Document Type:Research Paper Document #:33590628

… created. These attacks have the potential to cause a lot of social and economic disruption and lead to the infection of humans…[break]…domestic and international security. Going forward, there is need for a more collaborative effort between all concerned agencies that stresses on consistency in both policy and … posed by non-state actors (Jennings 2013, 6).
Methods of Evaluation
There is need to put in place frameworks that can integrate domestic and international security efforts more effectively. To this end, there will be a policy analysis to identify the alternatives and options available. The data for … knowledge and will not seek any classified documents. Among the open source knowledge that this analysis will have access to is diplomatic agreements, international protocols, and national and international policy. Generally, law enforcement agencies do……

References

References

Busch, Nathan, and Joyner, Daniel (ed). 2009. “Introduction: Nonproliferation at a Crossroads.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Athens, GA: The University of Georgia Press.

Reiss, Mitchell. 2009. “Foreword.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Edited by Nathan Busch, and Daniel Joyner. Athens, GA: The University of Georgia Press.

Cameron, Gavin, Pate, Jason & Vogel, Kathleen. (2001). “Planting Fear: How Real is the Threat of Agricultural Terrorism?” Bulletin of Atomic Scientists, 57(5), 38-44.

Jennings, Elain. 2013. U. S. proliferation policy and the campaign against transnational terror: Linking the U.S. non-proliferation regime to homeland security efforts. Master’s Thesis. Naval Postgraduate School.

Levi, Michael. 2009. “On Nuclear Terrorism.” Cambridge, MA: Cambridge University Press.

Mauroni, Albert. J. 2010. “A Counter-WMD Strategy for the Future.” Parameters, 58-73.

Ogilvie-White, Tanya. 2008. “Facilitating Implementation of Resolution 1540 in South- East Asia, and the South Pacific.” In Implementing Resolution 1540: The Role of Regional Organizations. Edited by Lawrence Scheinman. New York: United Nations Institute for Disarmament Research.

Pilat Joseph F. 2009. “Dealing with Proliferation and Terrorism.” In Combating Weapons of Mass Destruction: The Future of International Nonproliferation Policy, edited by Nathan E. Busch and Daniel H. Joyner. Athens, GA: University of Georgia Press.

Studyspark

Study Document Study Document

Strategy For National Defense

Pages: 7 (2014 words) Sources: 7 Document Type:Essay Document #:59270793

… that acknowledge the nature and extent of threats, intensity of rivalry, and potential opportunities across all regions. Such strategies become the premise of International Relations and U.S. foreign policy. [1: The White House, “National Security Strategy of the United States of America”, The White House, December 2017, … establishes political, economic, and military and security priority actions to help safeguard her national interests in the Indo-Asia-Pacific region. This process entails developing international relations approaches and foreign policies that seek to protect the interests of the United States in this region. China and Russia are principal … prosperity. In line with the goals and objectives of the National Security Strategy, the United States can address the issue using concepts in international relations. International relations concepts would inform and…[break]…Chinese population in China’s territory and seek to inflict pain on the general population unless and until China makes ……

References

Bibliography

Davidson, P.S. “Statement of Admiral Philip S. Davidson, U.S. Navy Commander, U.S. Indo-Pacific Command Before the House Armed Services Committee on U.S. Indo-Pacific Command Posture.” United States Senate, March 27, 2019,  https://www.armed-services.senate.gov/imo/media/doc/Davidson_02-12-19.pdf 

Department of Defense. “Summary of the 2018 National Defense Strategy of the United States of America.” National Defense Strategy, 2018,  https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf 

Muller, K. “The Essence of Coercive Air Power: A Primer for Military Strategies.” Air University,  https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/mueller.pdf 

Pape, R.A. Bombing to Win: Air Power and Coercion in War, 1st ed. Ithaca, NY: Cornell University Press, 1996.

Tammen, R.L., Kugler, J. & Lemke, D. “Power Transition Theory.” International Relations, June 27, 2017, DOI: 10.1093/OBO/9780199743292-0038

The White House. “National Security Strategy of the United States of America.” The White House, December 2017, https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf

Withers, P. “Integrating Cyber with Air Power in the Second Century of the Royal Air Force.” Medium, March 4, 2019,  https://medium.com/raf-caps/integrating-cyber-with-air-power-in-the-second-century-of-the-royal-air-force-bca74b8d42ed 

 

Studyspark

Study Document Study Document

How Amazon Hedges Its Forex Risk

Pages: 8 (2549 words) Sources: 5 Document Type:Essay Document #:96070504

Abstract
Amazon operates in 58 countries, and while its international operations tend to be offsetting in terms of costs and revenues, there still foreign currency profits that end up being translated back to … company. The operating offsets mean that Amazon doesn’t need to utilize hedging strategies, but tactics like offsetting costs and revenues, and diversification of international operations, help Amazon reduce the translational risk that it faces. This paper will examine what foreign currency exchange rate risks Amazon faces, and … uses third party resellers to help with the provision of the goods that are on each national-level site. This paper will discuss the international aspect of Amazon’s business, in terms of foreign currency pricing and in terms of how the foreign currency policies Amazon utilizes impact on … of the euro – and those transactions will ultimately have implications for Amazon’s bottom line. Amazon notes in its latest……

References

References

Amazon 2019 Annual Report. Retrieved April 29, 2020 from  https://s2.q4cdn.com/299287126/files/doc_financials/2020/ar/2019-Annual-Report.pdf 

HowMuch.net (2019) Charting the most powerful reserve currencies in the world. HowMuch.net. Retrieved April 29, 2020 from  https://howmuch.net/articles/worlds-top-reserve-currencies-2019 

Mehta, N., Detroja, P. & Agashe, A. (2018) Amazon changes prices on its products about every 10 minutes – here’s how and why they do it. Business Insider. Retrieved April 29, 2020 from  https://www.businessinsider.com/amazon-price-changes-2018-8 

Reiff, N. (2020) Hedge. Investopedia. Retrieved April 29, 2020 from  https://www.investopedia.com/terms/h/hedge.asp 

Roamy (2019) The consequences of Amazon’s pricing power. Medium.com. Retrieved April 29, 2020 from  https://medium.com/goods-services/https-medium-com-goods-services-amazons-pricing-power-797e28b63fbd 

Statista (2019) Annual net sales of Amazon in selected leading markets from 2014 to 2019. Statista. Retrieved April 29, 2020 from  https://www.statista.com/statistics/672782/net-sales-of-amazon-leading-markets/ 

Studyspark

Study Document Study Document

Weapons Of Mass Destruction

Pages: 9 (2563 words) Sources: 10 Document Type:Research Paper Document #:76982977

… this study is to examine ways to prevent or reduce the risk of a CBRN WMD attack. By looking at the use of international treaties, the rise of terrorism, and counter-proliferation strategies, this paper will assess the measures available for achieving the aim.
Research Question
What can … available for achieving the aim.
Research Question
What can nations do to prevent or reduce the risk of CBRN WMD attacks?
Literature Review
International Strategies
While international treaties may seem like an effective approach to reducing the risk of a CBRN WMD attack, treaties are not a full-proof plan as … not renewed. The current Security Council Resolution 1540 is a new approach to reducing the risk of WMD proliferation. This new approach of international legislation has been passed through Council resolutions with the goal being to implement new regulations that “legally bind all UN members immediately and … an attempt……

References

References

Asada, M. (2008). Security Council Resolution 1540 to combat WMD terrorism: effectiveness and legitimacy in international legislation. Journal of Conflict & Security Law, 13(3), 303-332.

Carter, A. B. (2004). Overhauling counterproliferation. Technology in Society 26(2-3), 257-269.

CBS. (2011). Clinton on Qaddafi: We came, we saw, he died. Retrieved from  https://www.youtube.com/watch?v=mlz3-OzcExI 

The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. (1999). Combating Proliferation of Weapons of Mass Destruction. Washington, D.C.

Forest, J.J.F. (2012, Winter). Framework for Analyzing the Future Threat of WMD Terrorism. Journal of Strategic Security 5, 4. Retrieved from  http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1193&context=jss 

Hochman, D. (2006). Rehabilitating a rogue: Libya's WMD reversal and lessons for US policy. Parameters, 36(1), 63.

Lang, C. G. (1937). Archbishop's Appeal: Individual Will and Action; Guarding Personality. London Times, 28.

Stone, O., & Kuznick, P. (2013). The untold history of the United States. Simon and Schuster.

Studyspark

Study Document Study Document

The Rise Of The Opium Trade In Afghanistan Following The US Invasion

Pages: 14 (4271 words) Sources: 15 Document Type:Research Paper Document #:85024812

… directly apply to or even really fit the Taliban, which was a small, regional militia-like group, more involved in domestic governance than in international terrorist acts like that which occurred on 9/11. Al-Qaeda was identified by the US as the international terrorist group behind the attacks on the World Trade Center. The Taliban rather more appropriately fit the definition of an insurgent group in … misdirected.
President Bush had called upon the Taliban to stop protecting agents of al-Qaeda in Afghanistan and to deliver the leaders of the international terrorist organization to US forces. The war on terror that Bush called for, though, was like calling a war on coronavirus or even … far off: the strategy combined military action with the application of law enforcement, the seizure and freezing of financial assets, and calls for international support (Pavlova, 2004). The US built a coalition that soon installed a……

References

References

Almukhtar, S. & Nordland, R. (2019). What Did the U.S. Get for $2 Trillion in Afghanistan? Retrieved from  https://www.nytimes.com/interactive/2019/12/09/world/middleeast/afghanistan-war-cost.html 

Barno, D. (2007). The Other War: Counterinsurgency Strategy in Afghanistan 2003– 20. Military Review, 87(5), 32–44.

Barton, G. (2016). Out of the ashes of Afghanistan and Iraq: the rise and rise of Islamic State. Retrieved from  https://theconversation.com/out-of-the-ashes-of-afghanistan-and-iraq-the-rise-and-rise-of-islamic-state-55437 

Felbab-Brown, V. (2017). Afghanistan’s opium production is through the roof—why Washington shouldn’t overreact. Retrieved from  https://www.brookings.edu/blog/order-from-chaos/2017/11/21/afghanistans-opium-production-is-through-the-roof-why-washington-shouldnt-overreact/ 

FM 3-24. (2014). Retrieved from  https://fas.org/irp/doddir/army/fm3-24.pdf 

Hitz, F. P. (1999). Obscuring Propriety: The CIA and Drugs. International Journal of Intelligence and CounterIntelligence, 12(4), 448-462.

IrishTimes. (2001). Britain freezes £61m of suspected Taliban assets. Retrieved from  https://www.irishtimes.com/news/britain-freezes-61m-of-suspected-taliban-assets-1.398565 

Kiras, J. D. (2002). Terrorism and Irregular Warfare, in John Baylis, James Wirtz, Eliot Cohen and Colin Gray eds., Strategy in the Contemporary World (Oxford: Oxford University Press, 2002), 208–232.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".