Study Document
...International trade Overview of Africa’s Post-Conflict History
Historical Formal Institutions
Colonial legacies persist in Africa in spite of a post-colonial era (Austin, 2010). These legacies have continued in post-conflict Africa’s history. In Africa, there has been no real unifying factor bringing individuals together, primarily because of the communal aspect of society throughout the continent. Community exists and can be found everywhere in Africa. Structural, dramaturgic and institutional factors in formal institutionalization in Africa of health care has come about as a result of investment, development, and political stability (Ratcliffe, 2013). The relationship among cultural traditions, laws of society, and the symbolic boundaries have served to create the structural meanings behind formal institutions; the expressive dimension, communicative properties and interaction of these elements have made up the dramaturgic, and the actors and organizations themselves have manifested the institutional. An example of this can be seen in Nigeria.
Structurally, dramaturgically and institutionally, Africa has……
References
Afro-centric Alliance, A. (2001). Indigenisingorganizational change: Localisation in Tanzania and Malawi. Journal of Managerial Psychology, 16(1), 59-78.
Asiseh, F., Owusu, A., & Quaicoe, O. (2017). An analysis of family dynamics on high school adolescent risky behaviors in Ghana. Journal of Child & Adolescent Substance Abuse, 26(5), 425-431.
Austin, G. (2010). African economic development and colonial legacies (Vol. 1, No. 1, pp. 11-32). Institut de hautes études internationales et du développement.
Brager, G., Specht, H., Torczyner, J. L., &Torczyner, J. (1987). Community organizing. Columbia University Press.
Bratton, M., & Van de Walle, N. (1997). Democratic experiments in Africa: Regime transitions in comparative perspective. Cambridge university press.
Burnham, G. M., Pariyo, G., Galiwango, E., & Wabwire-Mangen, F. (2004). Discontinuation of cost sharing in Uganda. Bulletin of the World Health Organization, 82, 187-195.
Dillard, C., Duncan, K. L., & Johnson, L. (2017). Black History Full Circle: Lessons from a Ghana Study Abroad in Education Program. Social Education, 81(1), 50-53.
Ehui, S. (2020). Protecting food security in Africa. Retrieved from https://www.brookings.edu/blog/africa-in-focus/2020/05/14/protecting-food-security-in-africa-during-covid-19/
Study Document
...International trade Trust and Relationships in Negotiation
Introduction
Successful negotiations rely heavily upon the ability of those involved to develop trust and build solid relationships. If parties to a negotiation cannot trust one another and do not develop the kind of relationships required, it is highly unlikely that they will arrive at the kind of satisfactory, win-win outcome that all sides desire. But how does one define trust? What steps can be taken to best support a working relationship? How can one tell if one is moving towards a successful negotiation or working against one’s own best interests? This paper will review the topic of trust and relationship development in negotiations to show how one can approach the problem of trust and relationship building while working on negotiating an outcome that satisfies all parties.
What is Trust?
Trust is a concept that has different meanings depending on how one thinks of its……
References
Butler Jr, J. K. (1999). Trust expectations, information sharing, climate of trust, and negotiation effectiveness and efficiency. Group & Organization Management, 24(2), 217-238.
Lewicki, R. J., & Stevenson, M. A. (1997). Trust development in negotiation: Proposed actions and a research agenda. Business & Professional Ethics Journal, 16(1/3), 99-132.
Olekalns, M., & Smith, P. L. (2009). Mutually dependent: Power, trust, affect and the use of deception in negotiation. Journal of Business Ethics, 85(3), 347-365.
Ross, W., & LaCroix, J. (1996). Multiple meanings of trust in negotiation theory and research: A literature review and integrative model. International Journal of Conflict Management. 7(4), 314–360.
Shell, G. R. (1991). Opportunism and trust in the negotiation of commercial contracts:Toward a new cause of action. Vand. L. Rev., 44, 221.
Study Document
… global financial crisis of 2008. According to Rajeev Syal of The Guardian, “Inter-bank loans were funded by money that originated from the drugs trade and other illegal activities,” resulting in the rescue of banks that otherwise could not have stayed solvent. Although this might seem to be … might seem to be a benefit for society, it does not exculpate the violent crimes which occur as the result of the drug trade. Unfortunately, this means that there may be an incentive not to be fully vigilant about the sources of money still necessary for some … industry. It may also cause banks to subtly pressure for less regulation of money laundering in general, since this is what the drug trade is dependent upon. The insecurity caused by the financial crisis may make some banks wary of regulation of any aspect of investment which … forthcoming as governments were more……
Bibliography
Rajeev Syal, ‘Drug money saved banks in global crisis, claims UN advisor,’ The Guardian (London, 13 Dec 2009) accessed 13 September 2019
Study Document
… that is expressed in different forms. Intellectual property rights are safeguarded using laws or legislation that are classified into different categories including copyright, trade, patents, and trade secrets. Despite concerns on whether there is a natural right to intellectual property, it is still important to safeguard the intellectual property of ……
References
Burris, E. (n.d.). Legal and Ethical Issues with Intellectual Property. Retrieved from University of Missouri-Kansas City website: http://sce2.umkc.edu/BIT/burrise/it222/notes/ip.html
Federal Bureau of Investigation. (n.d.). Intellectual Property Theft/Piracy. Retrieved from U.S. Department of Justice website: https://www.fbi.gov/investigate/white-collar-crime/piracy-ip-theft
Maya, J. (2015, April 15). Music’s “Blurred Lines” Verdict Broadens Copyright Protection. Retrieved Florida International University website: https://law.fiu.edu/blurred-lines-verdict/
Study Document
...International trade Overview
The electric vehicle (EV) market has received a considerable boost in recent years thanks in no small part to the rise of Tesla and its Model 3. However, while Tesla is basically a luxury EV manufacturer and most other automakers in the business are approaching the EV design with a tendency towards luxury over affordability, the idea behind this venture is to provide a cheap, high-quality EV to consumers that is practical, appealing, and safe. Considering that internal combustion engine (ICE) cars have reached a plateau in terms of how much further advanced they can get, and the EVs from Tesla, VW, Porsche and other firms are all going after the luxury consumer market, there is room for an innovate EV idea that will transform the entire industry just as the first car transformed the horse and buggy industry. This idea aims to be disruptive. The product will be……
References
Andwari, A.M., Pesiridis, A., Rajoo, S., Martinez-Botas, R. and Esfahanian, V., 2017. A review of Battery Electric Vehicle technology and readiness levels. Renewable and Sustainable Energy Reviews, 78, pp.414-430.
Angerer, M., Brem, A., Kraus, S. and Peter, A., 2017. Start-up funding via equity crowdfunding in Germany: A qualitative analysis of success factors. The Journal of Entrepreneurial Finance (JEF), 19(1), pp.1-34.
Baron, R.A. and Tang, J., 2011. The role of entrepreneurs in firm-level innovation: Joint effects of positive affect, creativity, and environmental dynamism. Journal of Business Venturing, 26(1), pp.49-60.
Car, 2019. Best EVs 2019. Retrieved from https://www.carmagazine.co.uk/electric/best-electric-cars-and-evs/
Crum, R. 2018. Elon Musk says Tesla nearly died during Model 3 production ramp. Retrieved from https://www.mercurynews.com/2018/11/26/elon-musk-says-tesla-nearly-died-during-model-3-production-ramp/
Ewing, J. 2017. What Needs to Happen Before Electric Cars Take Over the World. Retrieved from https://www.nytimes.com/2017/12/18/business/electric-car-adoption.html
Fuentelsaz, L., Maicas, J.P. and Montero, J., 2018. Entrepreneurs and innovation: The contingent role of institutional factors. International Small Business Journal, 36(6), pp.686-711.
Inman, P., 2019. Is a global recession imminent? Retrieved from https://www.theguardian.com/uk-news/2019/aug/25/is-a-global-recession-coming-here-are-seven-warning-signs
Study Document
… without investing in risk assets. Likewise, regulatory bodies have gone global as well with organizations like the Common Framework for the Supervision of international Active Insurance Groups (IAIGs) also known as ComFrame. Many companies view it as an increase in regulation—which is understandable on both ends: tighter … ROI that the S&P 500 has provided this year, the insurance companies would go out of business. Thus, even regulation that impacts publicly trade companies impacts insurance companies and their investments because investors are watching the S&P and looking at the financial statements of companies, too—and their … in the U.S., the UK, multiple nations in the EU, Russia, China, India, and so on. The U.S. is currently attempting to renegotiate trade on multiple fronts in an attempt to create deals that are more beneficial to Americans. With every nation and company essentially on its … the rules that are meant……
References
Egan, M. (2018). Tax cut triggers $437 billion explosion of stock buybacks. Retrieved from https://money.cnn.com/2018/07/10/investing/stock-buybacks-record-tax-cuts/index.html
Flegm, E. H. (2008). The Need for Reliability in Accounting. Why historical cost is more reliable than fair value. Journal of Accountancy, 205(5), 34.
Healy, P. M., Palepu, K., & Serafeim, G. (2009). Subprime Crisis and Fair-Value Accounting. HBS Case, (109-031).
Laux, C., & Leuz, C. (2010). Did fair-value accounting contribute to the financial crisis?. Journal of economic perspectives, 24(1), 93-118.
Light, L. (2019). More than Half of All Stock Buybacks are Now Financed by Debt. Here’s Why That’s a Problem. Retrieved from https://fortune.com/2019/08/20/stock-buybacks-debt-financed/
Reda, J. (2018). How Stock Buybacks Can Affect Executive Compensation. Retrieved from http://clsbluesky.law.columbia.edu/2018/08/03/how-stock-buybacks-can-affect-executive-compensation/
Young, M. R., (2008). Both sides make good points. Journal of Accountancy, 205(5), 34.
Vaughan, E. J., & Vaughan T. M., (2013). Fundamentals of Risk and Insurance, 11th Edition.
Study Document
...International trade Abstract
Cybercrime, data breaches, and fraud represent evils that significantly threaten businesses. Companies have, in the past, lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In this paper, the processes information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT security auditing constitutes a significant step in the safeguarding of corporate data against cybercrime, data breaches, and fraud. It must be performed from time to time in the form of a methodical analysis by an outside specialist on compliance, for identifying any chinks in the armor of the company's information technology system.
Introduction
ICT advancements have meant the availability of vast quantities of data, which also creates considerable risks to the data itself, computer systems, and critical infrastructures and operations it supports. Despite developments in information security,……
References
Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.
Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.
Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.
Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.
Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.
Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).
Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.
Study Document
...International trade Why Ethical Egoism is a Problematic Framework for Intelligence
CI Literature Review
Introduction
The aim of this examination of the literature is to fill the wide gap that remains in counterintelligence research regarding an appropriate ethical standard that can guide and foster an ethical culture, as called for by Bellaby (2012) and Valentine (2016). The purpose of this review is to identify the lessons that have been learned and presented by researchers on this topic, and to identify an appropriate theoretical framework for assessing the way forward. The research question for this study is: How can the US counterintelligence enterprise support collaboration among the various USIC members and the private sector in an ethical and productive manner? The ultimate purpose of this study is to propose a standardized ethical framework for guiding the counterintelligence program as it works to collaborate with the private sector in the 21st century. Therefore, the……
Bibliography
2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center
Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.
Bernardi, Beatrice. 2013. "The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles." Bachelor's thesis, Università Ca'Foscari Venezia.
Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.
Cohen, Shlomo. 2016. "Are There Moral Limits to Military Deception?." Philosophia 44 (4): 1305-1318.
Coyne, John, Peter Bell, and Shannon Merrington. 2013. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2 (10): 27-37.
Erskine, Toni. 2004. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19 (2): 359-381.
Godson, Roy, and James J. Wirtz. 2000. "Strategic denial and deception." International Journal of Intelligence and Counterintelligence 13 (4): 424-437.
Study Document
… been used to oppress those perceived to be weak, poor, or inferior. One of the best examples being slavery during the Trans-Atlantic Slave trade were slaves were required to submit to their Masters, for they were superior based on their White skin color. To help maintain slavery, ……
References
Elliott, John E. \\\\\\"Oppression, Exploitation and Injustice in the Old Testament: The View from Liberation Theology.\\\\\\" International Journal of Social Economics, Vol. 19, No. 10/11/12 (1992): 15-52.
Hayes, John H., and Carl R. Holladay. Biblical exegesis: a beginner\\\\\\'s handbook. Westminster John Knox Press, 2007.
Klein, William W., Craig L. Blomberg, and Robert L. Hubbard Jr. Introduction to biblical interpretation. Zondervan Academic, 2017.
Pontifical Biblical Commission. The Interpretation of the Bible in the Church: Address of His Holiness Pope John Paul II and Document of the Pontifical Biblical Commission. Libreria Editrice Vaticana, 1993.
Thiselton, Anthony C. Hermeneutics: an introduction. Wm. B. Eerdmans Publishing, 2009.
Thomas, James, and Angela Harden. \\\\\\"Methods for the thematic synthesis of qualitative research in systematic reviews.\\\\\\" BMC medical research methodology 8, no. 1 (2008): 45.
Tikito, Iman, and Nissrine Souissi. \\\\\\"Meta-analysis of systematic literature review methods.\\\\\\" International Journal of Modern Education and Computer Science 11, no. 2 (2019): 17.
West, Gerald O. \\\\\\"Locating \\\\\\'Contextual Bible Study\\\\\\' within biblical liberation hermeneutics and intercultural biblical hermeneutics.\\\\\\" HTS Theological Studies 70, no. 1 (2014): 1-10.
We have over 150,000+ study documents to help you.
Sign Up for FREE