International Security Essays (Examples)

Studyspark

Study Document Study Document

Theory Practice Of Business Psychology In Johnson & Johnson Company

Pages: 12 (3695 words) Sources: 10 Document Type:Research Paper Document #:41420615

… to obtain better job performance and make a contribution to more substantial efforts (Asim, 2013). For an organization to compete efficaciously in the international market, it is essential to design jobs, and duties in a way that stress id diminished, and the levels of employee satisfaction and … Rees, & Rumbles, 2011)
Hygiene factors consist of salary, remuneration, wages, and work benefits, working conditions, company policies, work supervision, and also job security. These are concerning the workplace context, which is indicative of a person’s workplace setting, and they are categorized as extrinsic factors. Imperatively, these ……

References

References

Asim, M., 2013. Impact of Motivation on Employee Performance with effect of training: Specific to Education Sector of Pakistan. International Journal of Scientific and Research Publications, 3(9), 1-9.

Heneman, H. G., & Schwab, D. P., 1972. Evaluation of research on expectancy theory predictions of employee performance. Psychological Bulletin, 78(1), 1.

Herzberg, F., 1987. One More Time: How Do You Motivate Employees? Harvard Business Review, 65, 5.

Herzberg, F., Mausner, B. & Snyderman, B. 1959. The motivation to work. New York. John Wiley.

Hilgert, R. L., Leonard, E. C., 2001. Supervision: Concepts and practices of management. New York: South-Western College Publication.

Johnson & Johnson., 2020. Wellness 360: 9 Innovative Johnson & Johnson Employee Benefits for Mind, Body, and Budget. Retrieved 25 February 2020 from  https://www.jnj.com/health-and-wellness/innovative-employee-benefits-and-wellness-programs-from-johnson-johnson 

Johnson & Johnson., 2020. Careers: Healthiest Finances. Retrieved 25 February 2020 from  https://www.careers.jnj.com/employee-benefits/financial-benefits .

Johnson & Johnson. , 2018. 2018 Health for Humanity Report: Creating Unique Career Opportunities. Retrieved 25 February 2020 from https://healthforhumanityreport.jnj.com/our-people/creating-unique-career-opportunities

Studyspark

Study Document Study Document

Advantages And Disadvantages Of Interrelationships Between Organizational

Pages: 16 (4728 words) Sources: 28 Document Type:Essay Document #:81594345

… carries out directorial and executive control over involved and self-governing establishments such as the Directorate General of Civil Aviation, Bureau of Civil Aviation security and conglomerated Public Sector activities (Civil Aviation, 2019).
The complexities of Air India’s business structure significantly impact the company’s organizational functions. It is ……

References

References

Air India. (2019). Board of Directors. Retrieved from:  http://www.airindia.in/board-of-directors.htm 

Aquinas, P. G. (2008). Organization structure and design. India: Excel Books India.

Burns, T., & Stalker, G. M. (2005). Mechanistic and organic systems. Organizational Behavior, 2, 214-25.

Choo, S., & Bowley, C. (2007). Emerald Article: Using training and development to affect job satisfaction. Journal of Small Business and Enterprise Development, 14(2),339 - 352.

Cichocki, P., & Irwin, C. (2014). Organization design: A guide to building effective organizations. Kogan Page Publishers.

Civil Aviation. (2019). About Us: Organizational Setup. Retrieved from:  http://www.civilaviation.gov.in/en/aboutus/orgsetup 

Cunliffe, A. L. (2008). Organization theory. New York: Sage.

Cunliffe, A. L., & Luhman, J. T. (2012). Key concepts in organization theory. New York: Sage.

Studyspark

Study Document Study Document

Firewalls And Filtering

Pages: 4 (1317 words) Sources: 4 Document Type:Research Paper Document #:22384393

Cyber security tendencies have evolved into systems that are used for data security, mostly for big corporations which can afford the service. System vulnerability is one of the major concerns of organizations getting web servers, firewalls … for big corporations which can afford the service. System vulnerability is one of the major concerns of organizations getting web servers, firewalls and security measures for their data. Technology companies burn the midnight oil trying to provide the highest level of security to databases, and a breach of security can be deemed a lapse by the technology company or that their security measures being ineffective. Hackers might send unauthorized packets of data including network inhibitors that might stall the ABC servers which contain online payment … servers which contain online payment processing and customer data.
The best firewall recommended for this system is the next-generation system equipped with sophisticated security protocols for the……

References

References

Anderson, R. O. (1997). EMERGING CHALLENGE: SECURITY AND SAFETY IN CYBERSPACE. In R. O. Anderson, In Athena's Camp: Preparing for Conflict in the Information Age (pp. 231–252). RAND corporation.

Martin C. Libicki, L. A. (2015). The Efficacy of Security Systems. In L. A. Martin C. Libicki, The Defender’s Dilemma: Charting a Course Toward Cybersecurity (pp. 23-40). Santa Monica: RAND Corporation.

Mays, J. (2018, September 24). Understanding Load Balancing for Web Servers. Retrieved from Liquid Web:  https://www.liquidweb.com/kb/understanding-load-balancing/ 

Thu, A. A. (2013). Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment. International Journal of Computer Applications, 9-13.

Studyspark

Study Document Study Document

Traditional Medicine Usage In African Nations

Pages: 12 (3615 words) Sources: 30 Document Type:Essay Document #:38085332

… extended family is a crucial part of his or her life. Many people in such societies depend on their extended family for social, security, and financial support if they lose their jobs, fall sick, in case of unforeseen circumstances, and when old. It is normally regarded as ……

References

References

Afro-centric Alliance, A. (2001). Indigenisingorganizational change: Localisation in Tanzania and Malawi. Journal of Managerial Psychology, 16(1), 59-78.

Asiseh, F., Owusu, A., & Quaicoe, O. (2017). An analysis of family dynamics on high school adolescent risky behaviors in Ghana. Journal of Child & Adolescent Substance Abuse, 26(5), 425-431.

Austin, G. (2010). African economic development and colonial legacies (Vol. 1, No. 1, pp. 11-32). Institut de hautes études internationales et du développement.

Brager, G., Specht, H., Torczyner, J. L., &Torczyner, J. (1987). Community organizing. Columbia University Press.

Bratton, M., & Van de Walle, N. (1997). Democratic experiments in Africa: Regime transitions in comparative perspective. Cambridge university press.

Burnham, G. M., Pariyo, G., Galiwango, E., & Wabwire-Mangen, F. (2004). Discontinuation of cost sharing in Uganda. Bulletin of the World Health Organization, 82, 187-195.

Dillard, C., Duncan, K. L., & Johnson, L. (2017). Black History Full Circle: Lessons from a Ghana Study Abroad in Education Program. Social Education, 81(1), 50-53.

Ehui, S. (2020). Protecting food security in Africa. Retrieved from https://www.brookings.edu/blog/africa-in-focus/2020/05/14/protecting-food-security-in-africa-during-covid-19/

Studyspark

Study Document Study Document

The Ethics Of Clandestine Operations

Pages: 11 (3151 words) Sources: 14 Document Type:literature review Document #:69864024

...International security Ethics of Clandestine Intelligence Operations
Introduction
One of the most common yet least understood methods of operations in the art of statecraft is the clandestine operation (Sheldon 1997). Though popularized in pulp fiction and film, such as the James Bond series franchise and numerous other spy thrillers, clandestine operations remain relatively unknown in the public consciousness—and when they are discussed it is generally with distaste, distrust and vilification (Sheldon 1997). Yet as Sheldon (1997) shows, clandestine operations are not new or unique to the modern world and in fact ancient Rome used them whenever military operations were impractical. Thus, “political influence operations, seeding, propaganda, political patronage, safe havens, political assassination, and paramilitary operations” can all be traced back more or less to similar operations implemented by the ancient Romans (Sheldon 1997, 299). Today, there are many different facets to clandestine operations, and many agencies that use them—from the CIA to……

References

Bibliography

Arnold, A. and D. Salisbury. The Long Arm, 2019. Retrieved from https://www.belfercenter.org/publication/long-arm

Barker, Michael J. \\\\\\"Democracy or polyarchy? US-funded media developments in Afghanistan and Iraq post 9/11.\\\\\\" Media, Culture & Society 30, no. 1 (2008): 109-130.

Best, Richard A. Intelligence to Counter Terrorism: Issues for Congress. Congressional Research Service: CRS Report for Congress, 2002.

Carter, Ashton B. \\\\\\"Overhauling counterproliferation.\\\\\\" Technology in Society 26, no. 2-3

(2004): 257-269.

Crumpton, Henry A. The art of intelligence: lessons from a life in the CIA\\\\\\'s clandestine service. Penguin, 2013.

Hersh, Seymour. Selective Intelligence. The New Yorker, 2003.  http://www.newyorker.com/magazine/2003/05/12/selective-intelligence 

McCormick, G. H., & Owen, G. “Security and coordination in a clandestine organization.” Mathematical and Computer Modelling, 31, no. 6-7 (2000), 175-192.

Studyspark

Study Document Study Document

Clinical Informatics

Pages: 11 (3264 words) Sources: 12 Document Type:Essay Document #:78574553

… what evidence-based practice (EBP) shows with respect to clinical informatics, how the law figures into this issue with respect to HIPAA, privacy/confidentiality and security issues; and how patient safety, the nursing role and electronic medical records are impacted.
Clinical Informatics Concepts in the 21st Century
Controlling the … nursing role and electronic medical records are impacted.
Clinical Informatics Concepts in the 21st Century
Controlling the flow of information to promote efficiency, security, and safety is the number one priority of clinical informatics. 21st century concepts for how this can be accomplished include training in how … 2009 likewise gives the Department of Health and Human Services the ability to regulate the use of Health IT and clinical informatics. Safety, security and quality issues are all overseen by the federal government under HITECH.
Privacy, Confidentiality and security Issues
One of the challenges facing the field of nursing is how to……

References

References

Cho, O. M., Kim, H., Lee, Y. W., & Cho, I. (2016). Clinical alarms in intensive care units: Perceived obstacles of alarm management and alarm fatigue in nurses. Healthcare informatics research, 22(1), 46-53.

Effken, J., Weaver, C., Cochran, K., Androwich, I., & O’Brien, A. (2016). Toward a central repository for sharing nursing informatics’ best practices. CIN: Computers, Informatics, Nursing, 34(6), 245-246.

Elsayed, W. A., Hussein, F. M., & Othman, W. N. (2017). Relation between nursing informatics competency and nurses’ attitude toward evidence-based practice among qualified nurses at Mansoura Oncology Center. International Journal of Nursing Didactics, 7(6), 26-33.

Drolet, B. C., Marwaha, J. S., Hyatt, B., Blazar, P. E., & Lifchez, S. D. (2017). Electronic communication of protected health information: privacy, security, and HIPAA compliance. The Journal of hand surgery, 42(6), 411-416.

Haupeltshofer, A., Egerer, V., & Seeling, S. (2020). Promoting health literacy: What potential does nursing informatics offer to support older adults in the use of technology? A scoping review. Health Informatics Journal, 1460458220933417.

Kharbanda, E. O., Asche, S. E., Sinaiko, A. R., Ekstrom, H. L., Nordin, J. D., Sherwood, N. E., & O’Connor, P. (2018). Clinical decision support for recognition and management of hypertension: a randomized trial. Pediatrics, 141(2).

Khezri, H., & Abdekhoda, M. (2019). Assessing nurses’ informatics competency and identifying its related factors. Journal of Research in Nursing, 24(7), 529-538.

Kleib, M., & Nagle, L. (2018). Factors associated with Canadian nurses\\\\\\\\\\\\' informatics competency. CIN: Computers, Informatics, Nursing, 36(8), 406-415.

Studyspark

Study Document Study Document

Using DoorDash To Promote A Restaurant Brand

Pages: 7 (2131 words) Sources: 4 Document Type:Research Paper Document #:85037477

...International security Implementing the Market Strategy
Introduction
Just as important as developing the market strategy is the process of implementing the strategy. Implementation has its own set of challenges that have to be addressed, however. These include forming strategic partnerships, managing top-selling products, improving pricing strategies; developing sales Promotion, advertising and sale promotion strategies; developing digital strategies and measuring market performance. This paper will address each of these challenges and offer solutions for implementing the market strategy for OPG.
Strategic Partnerships
Strategic partnerships the company could develop to help promote both companies could be to look for a local brewer who is wanting to expand and partnering with that brewer to brew in the adjacent building owned by OPG. OPG wants to start brewing its own beer, but instead of hiring a brewmeister and investing in the brewing business, it may make more sense to partner with a small existing brewer and……

References

References

Gallardo-Echenique, E. E., Marqués-Molías, L., Bullen, M., & Strijbos, J. W. (2015). Let’s talk about digital learners in the digital era. International Review of Research in Open and Distributed Learning, 16(3), 156-187.

Gibson, C., & Homan, S. (2004). Urban redevelopment, live music and public space: Cultural performance and the re?making of Marrickville. International Journal of Cultural Policy, 10(1), 67-84.

Lawson, C. (2007). Victorian Young Planners: News and Views-Pot, Parma and Trivia Night. Planning News, 33(6), 12.

Queensland. (2020). Key components of a digital strategy. Retrieved from https://www.business.qld.gov.au/running-business/it/digital-strategy/key-components

Studyspark

Study Document Study Document

Enhancing Communication Migration From 4G To 5G

Pages: 6 (1692 words) Document Type:Essay Document #:96575438

… hold, and an extension is inevitable. Thus far, some of the constraints attached to migration from 4G to 5G include multi-mode user terminals, security, the choice among the various wireless systems available, jamming and spoofing, and network infrastructure and Quality of service (QoS) support (Alkhazaali 2017).
3. ……

References

References

Alkhazaali, N.H., 2017. Mobile Communication through 5G Technology (Challenges and Requirements). International Journal of Communications, Network and System Sciences, 10(05), p.202.

Gandotra, P., and Jha, R.K., 2016. Device-to-device communication in cellular networks: A survey. Journal of Network and Computer Applications, 71, pp.99-117.

Penttinen, Jyrki T. J., et al. 2019. "Deployment," in 5G Explained: Security and Deployment of Advanced Mobile Communications, Wiley, pp.271-291

Shen, Xuemin. "Device-to-device communication in 5G cellular networks." IEEE Network 29, no. 2 (2015): 2-3.

Tehrani, M.N., Uysal, M., and Yanikomeroglu, H., 2014. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), pp.86-92.

Zhang, A., and Lin, X., 2017. Security-aware and privacy-preserving D2D communications in 5G. IEEE Network, 31(4), pp.70-77.

Studyspark

Study Document Study Document

How Amazon Hedges Its Forex Risk

Pages: 8 (2549 words) Sources: 5 Document Type:Essay Document #:96070504

Abstract
Amazon operates in 58 countries, and while its international operations tend to be offsetting in terms of costs and revenues, there still foreign currency profits that end up being translated back to … company. The operating offsets mean that Amazon doesn’t need to utilize hedging strategies, but tactics like offsetting costs and revenues, and diversification of international operations, help Amazon reduce the translational risk that it faces. This paper will examine what foreign currency exchange rate risks Amazon faces, and … uses third party resellers to help with the provision of the goods that are on each national-level site. This paper will discuss the international aspect of Amazon’s business, in terms of foreign currency pricing and in terms of how the foreign currency policies Amazon utilizes impact on … of the euro – and those transactions will ultimately have implications for Amazon’s bottom line. Amazon notes in its latest……

References

References

Amazon 2019 Annual Report. Retrieved April 29, 2020 from  https://s2.q4cdn.com/299287126/files/doc_financials/2020/ar/2019-Annual-Report.pdf 

HowMuch.net (2019) Charting the most powerful reserve currencies in the world. HowMuch.net. Retrieved April 29, 2020 from  https://howmuch.net/articles/worlds-top-reserve-currencies-2019 

Mehta, N., Detroja, P. & Agashe, A. (2018) Amazon changes prices on its products about every 10 minutes – here’s how and why they do it. Business Insider. Retrieved April 29, 2020 from  https://www.businessinsider.com/amazon-price-changes-2018-8 

Reiff, N. (2020) Hedge. Investopedia. Retrieved April 29, 2020 from  https://www.investopedia.com/terms/h/hedge.asp 

Roamy (2019) The consequences of Amazon’s pricing power. Medium.com. Retrieved April 29, 2020 from  https://medium.com/goods-services/https-medium-com-goods-services-amazons-pricing-power-797e28b63fbd 

Statista (2019) Annual net sales of Amazon in selected leading markets from 2014 to 2019. Statista. Retrieved April 29, 2020 from  https://www.statista.com/statistics/672782/net-sales-of-amazon-leading-markets/ 

Studyspark

Study Document Study Document

Virtual Learning Solutions For English As Second Language Students

Pages: 11 (3230 words) Sources: 10 Document Type:Research Paper Document #:70086670

...International security How Technology Enhances ESL Students’ Learning Experience
Introduction
In the COVID-19 era, education has taken a dramatic turn towards distance learning, meaning that virtual classrooms are now more popular than ever. But what is the effect of the use of technology in an ESL classroom? Evidence shows that technology actually does enhance ESL students’ learning experience (Kasapoglu-Akyol, 2010). The fact is that ESL students use technology tools in their daily lives and thus not to use technology for learning purposes is akin to taking a fish out of water and then asking it to learn to swim. In the digital era, digital natives have been using technology since birth and it is older teachers and educational systems that are slow to recognize this fact. This paper will show how technology enhances ESL students' learning experience related to ESL instructional practices and analyze how that topic or trend impacts the district,……

References

References

Alvarez-Marinelli, H., Blanco, M., Lara-Alecio, R., Irby, B. J., Tong, F., Stanley, K., & Fan, Y. (2016). Computer assisted English language learning in Costa Rican elementary schools: an experimental study. Computer Assisted Language Learning, 29(1), 103-126.

Beetham, H., & Sharpe, R. (Eds.). (2013). Rethinking pedagogy for a digital age: Designing for 21st century learning. NY: Routledge.

Cassady, J. C., Smith, L. L., & Thomas, C. L. (2017). Supporting emergent literacy for English language learners with computer?assisted instruction. Journal of Research in Reading.

Jiang, H., Tang, M., Peng, X., & Liu, X. (2018). Learning design and technology through social networks for high school students in China. International Journal of Technology and Design Education, 28(1), 189-206.

Kahai, S. S., Carroll, E., & Jestice, R. (2007). Team collaboration in virtual worlds. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 38(4), 61-68.

Kasapo?lu-Akyol, P. (2010). Using educational technology tools to improve language and communication skills of ESL students. Novitas-Royal, 4(2).

Meskill, G., & Mossop, J. (2003). Technologies use with learners of ESL in New Your State: Preliminary report. Retrieved from  https://www.albany.edu/lap/Papers/technology%20use.htm 

Park, J. Y. (2011). Design education online: Learning delivery and evaluation. International Journal of Art & Design Education, 30(2), 176-187.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".