International Trade Essays (Examples)

Studyspark

Study Document Study Document

Traditional Medicine Usage In African Nations

Pages: 12 (3615 words) Sources: 30 Document Type:Essay Document #:38085332

...International trade Overview of Africa’s Post-Conflict History
Historical Formal Institutions
Colonial legacies persist in Africa in spite of a post-colonial era (Austin, 2010). These legacies have continued in post-conflict Africa’s history. In Africa, there has been no real unifying factor bringing individuals together, primarily because of the communal aspect of society throughout the continent. Community exists and can be found everywhere in Africa. Structural, dramaturgic and institutional factors in formal institutionalization in Africa of health care has come about as a result of investment, development, and political stability (Ratcliffe, 2013). The relationship among cultural traditions, laws of society, and the symbolic boundaries have served to create the structural meanings behind formal institutions; the expressive dimension, communicative properties and interaction of these elements have made up the dramaturgic, and the actors and organizations themselves have manifested the institutional. An example of this can be seen in Nigeria.
Structurally, dramaturgically and institutionally, Africa has……

References

References

Afro-centric Alliance, A. (2001). Indigenisingorganizational change: Localisation in Tanzania and Malawi. Journal of Managerial Psychology, 16(1), 59-78.

Asiseh, F., Owusu, A., & Quaicoe, O. (2017). An analysis of family dynamics on high school adolescent risky behaviors in Ghana. Journal of Child & Adolescent Substance Abuse, 26(5), 425-431.

Austin, G. (2010). African economic development and colonial legacies (Vol. 1, No. 1, pp. 11-32). Institut de hautes études internationales et du développement.

Brager, G., Specht, H., Torczyner, J. L., &Torczyner, J. (1987). Community organizing. Columbia University Press.

Bratton, M., & Van de Walle, N. (1997). Democratic experiments in Africa: Regime transitions in comparative perspective. Cambridge university press.

Burnham, G. M., Pariyo, G., Galiwango, E., & Wabwire-Mangen, F. (2004). Discontinuation of cost sharing in Uganda. Bulletin of the World Health Organization, 82, 187-195.

Dillard, C., Duncan, K. L., & Johnson, L. (2017). Black History Full Circle: Lessons from a Ghana Study Abroad in Education Program. Social Education, 81(1), 50-53.

Ehui, S. (2020). Protecting food security in Africa. Retrieved from https://www.brookings.edu/blog/africa-in-focus/2020/05/14/protecting-food-security-in-africa-during-covid-19/

Studyspark

Study Document Study Document

Trust And Relationships In Negotiation

Pages: 7 (1997 words) Sources: 5 Document Type:Essay Document #:98491775

...International trade Trust and Relationships in Negotiation
Introduction
Successful negotiations rely heavily upon the ability of those involved to develop trust and build solid relationships. If parties to a negotiation cannot trust one another and do not develop the kind of relationships required, it is highly unlikely that they will arrive at the kind of satisfactory, win-win outcome that all sides desire. But how does one define trust? What steps can be taken to best support a working relationship? How can one tell if one is moving towards a successful negotiation or working against one’s own best interests? This paper will review the topic of trust and relationship development in negotiations to show how one can approach the problem of trust and relationship building while working on negotiating an outcome that satisfies all parties.
What is Trust?
Trust is a concept that has different meanings depending on how one thinks of its……

References

References

Butler Jr, J. K. (1999). Trust expectations, information sharing, climate of trust, and negotiation effectiveness and efficiency. Group & Organization Management, 24(2), 217-238.

Lewicki, R. J., & Stevenson, M. A. (1997). Trust development in negotiation: Proposed actions and a research agenda. Business & Professional Ethics Journal, 16(1/3), 99-132.

Olekalns, M., & Smith, P. L. (2009). Mutually dependent: Power, trust, affect and the use of deception in negotiation. Journal of Business Ethics, 85(3), 347-365.

Ross, W., & LaCroix, J. (1996). Multiple meanings of trust in negotiation theory and research: A literature review and integrative model. International Journal of Conflict Management. 7(4), 314–360.

Shell, G. R. (1991). Opportunism and trust in the negotiation of commercial contracts:Toward a new cause of action. Vand. L. Rev., 44, 221.

Studyspark

Study Document Study Document

The Global Financial Crisis Money Laundering

Pages: 1 (347 words) Document Type:Essay Document #:73965112

… global financial crisis of 2008. According to Rajeev Syal of The Guardian, “Inter-bank loans were funded by money that originated from the drugs trade and other illegal activities,” resulting in the rescue of banks that otherwise could not have stayed solvent. Although this might seem to be … might seem to be a benefit for society, it does not exculpate the violent crimes which occur as the result of the drug trade. Unfortunately, this means that there may be an incentive not to be fully vigilant about the sources of money still necessary for some … industry. It may also cause banks to subtly pressure for less regulation of money laundering in general, since this is what the drug trade is dependent upon. The insecurity caused by the financial crisis may make some banks wary of regulation of any aspect of investment which … forthcoming as governments were more……

References

Bibliography

Rajeev Syal, ‘Drug money saved banks in global crisis, claims UN advisor,’ The Guardian (London, 13 Dec 2009) accessed 13 September 2019

Studyspark

Study Document Study Document

Intellectual Property Ethics

Pages: 3 (941 words) Sources: 3 Document Type:Essay Document #:57117856

… that is expressed in different forms. Intellectual property rights are safeguarded using laws or legislation that are classified into different categories including copyright, trade, patents, and trade secrets. Despite concerns on whether there is a natural right to intellectual property, it is still important to safeguard the intellectual property of ……

References

References

Burris, E. (n.d.). Legal and Ethical Issues with Intellectual Property. Retrieved from University of Missouri-Kansas City website: http://sce2.umkc.edu/BIT/burrise/it222/notes/ip.html

Federal Bureau of Investigation. (n.d.). Intellectual Property Theft/Piracy. Retrieved from U.S. Department of Justice website:  https://www.fbi.gov/investigate/white-collar-crime/piracy-ip-theft 

Maya, J. (2015, April 15). Music’s “Blurred Lines” Verdict Broadens Copyright Protection. Retrieved Florida International University website:  https://law.fiu.edu/blurred-lines-verdict/ 

Studyspark

Study Document Study Document

EV Market Business Opportunity Analysis Report

Pages: 8 (2311 words) Sources: 16 Document Type:Term Paper Document #:80511114

...International trade Overview
The electric vehicle (EV) market has received a considerable boost in recent years thanks in no small part to the rise of Tesla and its Model 3. However, while Tesla is basically a luxury EV manufacturer and most other automakers in the business are approaching the EV design with a tendency towards luxury over affordability, the idea behind this venture is to provide a cheap, high-quality EV to consumers that is practical, appealing, and safe. Considering that internal combustion engine (ICE) cars have reached a plateau in terms of how much further advanced they can get, and the EVs from Tesla, VW, Porsche and other firms are all going after the luxury consumer market, there is room for an innovate EV idea that will transform the entire industry just as the first car transformed the horse and buggy industry. This idea aims to be disruptive. The product will be……

References

References

Andwari, A.M., Pesiridis, A., Rajoo, S., Martinez-Botas, R. and Esfahanian, V., 2017. A review of Battery Electric Vehicle technology and readiness levels. Renewable and Sustainable Energy Reviews, 78, pp.414-430.

Angerer, M., Brem, A., Kraus, S. and Peter, A., 2017. Start-up funding via equity crowdfunding in Germany: A qualitative analysis of success factors. The Journal of Entrepreneurial Finance (JEF), 19(1), pp.1-34.

Baron, R.A. and Tang, J., 2011. The role of entrepreneurs in firm-level innovation: Joint effects of positive affect, creativity, and environmental dynamism. Journal of Business Venturing, 26(1), pp.49-60.

Car, 2019. Best EVs 2019. Retrieved from  https://www.carmagazine.co.uk/electric/best-electric-cars-and-evs/ 

Crum, R. 2018. Elon Musk says Tesla nearly died during Model 3 production ramp. Retrieved from  https://www.mercurynews.com/2018/11/26/elon-musk-says-tesla-nearly-died-during-model-3-production-ramp/ 

Ewing, J. 2017. What Needs to Happen Before Electric Cars Take Over the World. Retrieved from https://www.nytimes.com/2017/12/18/business/electric-car-adoption.html

Fuentelsaz, L., Maicas, J.P. and Montero, J., 2018. Entrepreneurs and innovation: The contingent role of institutional factors. International Small Business Journal, 36(6), pp.686-711.

Inman, P., 2019. Is a global recession imminent? Retrieved from  https://www.theguardian.com/uk-news/2019/aug/25/is-a-global-recession-coming-here-are-seven-warning-signs

Studyspark

Study Document Study Document

Globalization Of Insurance

Pages: 8 (2325 words) Sources: 8 Document Type:Term Paper Document #:88593479

… without investing in risk assets. Likewise, regulatory bodies have gone global as well with organizations like the Common Framework for the Supervision of international Active Insurance Groups (IAIGs) also known as ComFrame. Many companies view it as an increase in regulation—which is understandable on both ends: tighter … ROI that the S&P 500 has provided this year, the insurance companies would go out of business. Thus, even regulation that impacts publicly trade companies impacts insurance companies and their investments because investors are watching the S&P and looking at the financial statements of companies, too—and their … in the U.S., the UK, multiple nations in the EU, Russia, China, India, and so on. The U.S. is currently attempting to renegotiate trade on multiple fronts in an attempt to create deals that are more beneficial to Americans. With every nation and company essentially on its … the rules that are meant……

References

References

Egan, M. (2018). Tax cut triggers $437 billion explosion of stock buybacks. Retrieved from  https://money.cnn.com/2018/07/10/investing/stock-buybacks-record-tax-cuts/index.html 

Flegm, E. H. (2008). The Need for Reliability in Accounting. Why historical cost is more reliable than fair value. Journal of Accountancy, 205(5), 34.

Healy, P. M., Palepu, K., & Serafeim, G. (2009). Subprime Crisis and Fair-Value Accounting. HBS Case, (109-031).

Laux, C., & Leuz, C. (2010). Did fair-value accounting contribute to the financial crisis?. Journal of economic perspectives, 24(1), 93-118.

Light, L. (2019). More than Half of All Stock Buybacks are Now Financed by Debt. Here’s Why That’s a Problem. Retrieved from  https://fortune.com/2019/08/20/stock-buybacks-debt-financed/ 

Reda, J. (2018). How Stock Buybacks Can Affect Executive Compensation. Retrieved from  http://clsbluesky.law.columbia.edu/2018/08/03/how-stock-buybacks-can-affect-executive-compensation/ 

Young, M. R., (2008). Both sides make good points. Journal of Accountancy, 205(5), 34.

Vaughan, E. J., & Vaughan T. M., (2013). Fundamentals of Risk and Insurance, 11th Edition.

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

...International trade Abstract
Cybercrime, data breaches, and fraud represent evils that significantly threaten businesses. Companies have, in the past, lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In this paper, the processes information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT security auditing constitutes a significant step in the safeguarding of corporate data against cybercrime, data breaches, and fraud. It must be performed from time to time in the form of a methodical analysis by an outside specialist on compliance, for identifying any chinks in the armor of the company's information technology system.
Introduction
ICT advancements have meant the availability of vast quantities of data, which also creates considerable risks to the data itself, computer systems, and critical infrastructures and operations it supports. Despite developments in information security,……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Counterintelligence Issues Within The United States

Pages: 18 (5457 words) Sources: 29 Document Type:Research Paper Document #:72238996

...International trade Why Ethical Egoism is a Problematic Framework for Intelligence
CI Literature Review
Introduction
The aim of this examination of the literature is to fill the wide gap that remains in counterintelligence research regarding an appropriate ethical standard that can guide and foster an ethical culture, as called for by Bellaby (2012) and Valentine (2016). The purpose of this review is to identify the lessons that have been learned and presented by researchers on this topic, and to identify an appropriate theoretical framework for assessing the way forward. The research question for this study is: How can the US counterintelligence enterprise support collaboration among the various USIC members and the private sector in an ethical and productive manner? The ultimate purpose of this study is to propose a standardized ethical framework for guiding the counterintelligence program as it works to collaborate with the private sector in the 21st century. Therefore, the……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. "The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles." Bachelor's thesis, Università Ca'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Cohen, Shlomo. 2016. "Are There Moral Limits to Military Deception?." Philosophia 44 (4): 1305-1318.

Coyne, John, Peter Bell, and Shannon Merrington. 2013. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2 (10): 27-37.

Erskine, Toni. 2004. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. "Strategic denial and deception." International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Studyspark

Study Document Study Document

Biblical Text And God S Character

Pages: 8 (2389 words) Sources: 5 Document Type:Research Proposal Document #:46963717

… been used to oppress those perceived to be weak, poor, or inferior. One of the best examples being slavery during the Trans-Atlantic Slave trade were slaves were required to submit to their Masters, for they were superior based on their White skin color. To help maintain slavery, ……

References

References

Elliott, John E. \\\\\\"Oppression, Exploitation and Injustice in the Old Testament: The View from Liberation Theology.\\\\\\" International Journal of Social Economics, Vol. 19, No. 10/11/12 (1992): 15-52.

Hayes, John H., and Carl R. Holladay. Biblical exegesis: a beginner\\\\\\'s handbook. Westminster John Knox Press, 2007.

Klein, William W., Craig L. Blomberg, and Robert L. Hubbard Jr. Introduction to biblical interpretation. Zondervan Academic, 2017.

Pontifical Biblical Commission. The Interpretation of the Bible in the Church: Address of His Holiness Pope John Paul II and Document of the Pontifical Biblical Commission. Libreria Editrice Vaticana, 1993.

Thiselton, Anthony C. Hermeneutics: an introduction. Wm. B. Eerdmans Publishing, 2009.

Thomas, James, and Angela Harden. \\\\\\"Methods for the thematic synthesis of qualitative research in systematic reviews.\\\\\\" BMC medical research methodology 8, no. 1 (2008): 45.

Tikito, Iman, and Nissrine Souissi. \\\\\\"Meta-analysis of systematic literature review methods.\\\\\\" International Journal of Modern Education and Computer Science 11, no. 2 (2019): 17.

West, Gerald O. \\\\\\"Locating \\\\\\'Contextual Bible Study\\\\\\' within biblical liberation hermeneutics and intercultural biblical hermeneutics.\\\\\\" HTS Theological Studies 70, no. 1 (2014): 1-10.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".