Study Document
...Journal article Quality Management
Executive Summary
Quality management is pivotal in any product or service. One of the key aspects of ensuring this is through the product development process. The product taken into account is MacBook Pro by Apple Inc. Research indicates that the product goes through various steps in the production process, including designing, the formation of a new product team, Apple New product Process, product review, product redesign, assessment and feedback, and then finally product launching. Research also indicates that designing for manufacturing is a pivotal component of the product development cycle. It encompasses the optimization of the product's design for the different processes of manufacturing and assembly, assimilating the various product design needs and requirements with its production approach. In the case of television, the various DFM guidelines taken into consideration for improving manufacturability include a reduction in the number of parts, developing products designs that are modular, usage……
References
Hill, C. W., Jones, G. R., & Schilling, M. A. (2014). Strategic management: theory: an integrated approach. Cengage Learning.
Panzarino, M. (2012). This is how Apple\\\\\\'s top-secret product development process works. The Next Web. Retrieved from: https://thenextweb.com/apple/2012/01/24/this-is-how-apples-top-secret-product-development-process-works/
Interaction Design Foundation. (2020). Apple\\\\\\'s Product Development Process – Inside the World\\\\\\'s Greatest Design Organization. Retrieved from: https://www.interaction-design.org/literature/article/apple-s-product-development-process-inside-the-world-s-greatest-design-organizatio " target="_blank" REL="NOFOLLOW">
Study Document
...Journal article How the Quakers Opposed the Detainment of Japanese Americans during WWII
The American Friends Service Committee (AFSC), the co-beneficiary of the Nobel Peace Prize in 1947, was established in Philadelphia by individuals from the Religious Society of Friends (i.e., the Quakers) in Spring 1917. The link between AFSC and the Religious Society of Friends was always tenuous, as the activism of the organization was something universal that many non-Quakers around the world could celebrate, while the actual tenets of Quakerism were not nearly as popular as the peace movement that the Religious Society of Friends took part in. Initially, the goals of the committee were limited; however, over the 20th century, the AFSC embraced pacifism and began taking part in the fight for peace (Ingle, 2016). The AFSC essentially helped to support and come to the aid of the victims of war, whether they were Jewish, Russian, European, African, etc.……
References.
Franklin, S. (2020). American Friends Service Committee. Retrieved from https://www.mtsu.edu/first-amendment/article/1167/american-friends-service-committee
Frost, J. W. (1992). " Our Deeds Carry Our Message": The Early History of the American Friends Service Committee. Quaker History, 81(1), 1-51.
Ingle, H.L., (2016). "Truly Radical, Non-violent, Friendly Approaches": Challenges to the American Friends Service Committee. Quaker History 105(1), 1-21. DOI:10.1353/qkh.2016.0004.
Mechling, E. W., & Mechling, J. (1992). Hot pacifism and cold war: The American friends service committee's witness for peace in 1950s America. Quarterly Journal of Speech, 78(2), 173-196.
The Nobel Prize. (2020). American Friends Service Committee. Retrieved from https://www.nobelprize.org/prizes/peace/1947/friends-committee/facts/
Weir, A. (2014). Against Our Better Judgment. IN: CreateSpace.
Study Document
...Journal article Meditation
Introduction
The positive psychology arena has undergone swift expansion in the last ten years, with studies explicitly highlighting the significance of examining processes, conditions, and factors improving wellbeing, facilitating psychological prosperity, and optimizing human functioning (Gable & Haidt, 2005; Seligman & Csikszentmihalyi, 2000). Mindfulness is a factor that plays a part in psychological wellbeing and may be attained using meditation (Pepping, Donovan & Davis, 2013). The term 'meditation' is used to define a set of practices training awareness and focus, often aimed at promoting spiritual and mental growth and wellbeing. In meditation, the mind is trained, and mental processes brought under more conscious control, advantageously guiding them. Such control helps develop certain mental characteristics like calm, focus, and feelings like love, happiness, and empathy. Using increased awareness, an individual can get clearer insights into him/ herself as well as his/ her relationship with the world. Also, increased awareness is……
References
Gable, S. L., & Haidt, J. (2005). What (and why) is positive psychology? Review of General Psychology, 9, 103–110. DOI:10.1037/1089-2680.9.2.103
Hasenkamp, W., & Barsalou, L. (2012). Effects of meditation experience on functional connectivity of distributed brain networks. Front. Hum. Neurosci. Retrieved from https://www.frontiersin.org/articles/10.3389/fnhum.2012.00038/full
Kristeller, J. L., & Rikhye, K. (2008). Meditative traditions and contemporary psychology. In K. R. Rao, A. C. Paranjpe & A. K. Dalal (Eds.), Handbook of Indian psychology (pp. 506 –538). New Delhi, India: Cambridge University Press.
McGee, M. (2008). Meditation and psychiatry. Psychiatry, 5, 28 – 40.
Pepping, C. A., Donovan, A., & Davis, P. (2013). The positive effects of mindfulness on self-esteem. The Journal of Positive Psychology, 8(5), 376-386.
Sedlmeier, P., Eberth, J., Schwarz, M., Zimmerman, D., Haarig, F., Jaeger, S., & Kunze, S. (2012). The psychological effects of meditation: A meta-analysis. Psychological Bulletin, 138(6), 1139 –1171.
Seligman, M. E. P., & Csikszentmihalyi, M. (2000). Positive psychology: An introduction. American Psychologist, 55, 5–14. DOI:10.1037//0003-066X.55.1.5
Shapiro, S., Walsh, R., Britton, W., & Britton, B. (2003). An analysis of recent meditation research and suggestions for future directions. The Humanistic Psychology, 3(2-3), 69-90.
Study Document
...Journal article Psychology
Question 1
What differentiated the control group from the two experimental groups and the two experimental groups from each other?
The aim of the experiment is key to differentiating all the groups involved: groups A, B, and control. Festinger and Carlsmith (1959) were trying to identify the occurrence of cognitive dissonance in the experiment through the motivations of the groups, thereby proving the validity of their theory over the behaviorist and reinforcement approach. The main difference between all the groups is the motivation/level of dissonance experienced. The control group experienced no dissonance, as they were not required to lie about the experimental procedure nor offered monetary compensation; the other groups were, however, motivated to lie via monetary compensation. Groups A and B are further differentiated by their level of “induced dissonance” through the amount of monetary compensation offered to them: group A received $1, which is significantly less than……
References
Cherry, K. (2020). The Incentive Theory of Motivation. Retrieved from: https://www.verywellmind.com/the-incentive-theory-of-motivation-2795382
Festinger, L., & Carlsmith, J. M. (1959). Thoughts out of tune. Journal of Abnormal and Social Psychology, 58, 203-210.
Izuma, K., & Murayama, K. (2019). The neural basis of cognitive dissonance. In E. Harmon-Jones (Ed.), Cognitive dissonance: Reexamining a pivotal theory in psychology (p. 227–245). American Psychological Association. https://doi.org/10.1037/0000135-011
Legg, T. (2019). Cognitive dissonance: What to know. Retrieved from: https://www.medicalnewstoday.com/articles/326738#overview
McLeod, S. (2018). Cognitive dissonance. Retrieved from https://www.simplypsychology.org/cognitive-dissonance.html
Northrup, C. (2018). 4 ways to reduce cognitive dissonance. Retrieved from: https://www.drnorthrup.com/4-ways-to-reduce-cognitive-dissonance/
Silverman, K., Jarvis, B. P., Jessel, J., & Lopez, A. A. (2016). Incentives and motivation. Translational Issues in Psychological Science, 2(2), 97–100. DOI:10.1037/tps0000073 Retrieved from: https://sci-hub.tw/10.1037/tps0000073
Van Kampen, H. S. (2019). The principle of consistency and the cause and function of behaviour. Behavioural processes, 159, 42-54. Retrieved from: https://scihub.tw/https://doi.org/10.1016/j.beproc.2018.12.013
Study Document
...Journal article Cyberbullying Essay Outline
I. Introduction
A. Bullying involves an imbalance of power between the victim and the bully.
B. Bullying is more than just isolated incidents of negative behavior; it requires repetitive behavior.
C. Cyberbullying occurs electronically, via the internet, cell phones, and social media.
II. Imbalance of power
A. Bullies have some type of power over victims.
B. There are different ways that bullies can exert power over victims.
1. Social power
2. Financial power
3. Sexual power
4. Group power
C. Bullying cannot be mutual, but bullies and victims can switch roles over time.
III. Bullying is repetitive.
A. Not all mean actions are bullying.
B. To qualify as bullying, behaviors have to be repetitive.
C. Not all acts of bullying have to be committed by one bully to be considered part of a repetitive pattern of bullying.
IV. Cyberbullying occurs electronically.
A. Cyberbullying can occur several ways:……
Bazarova, Natalie. (14 May 2018). Key Questions in the Fight Against Cyberbullying. Psychology Today. https://www.psychologytoday.com/us/blog/social-media-stories/201805/key-questions-in-the-fight-against-cyberbullying . Accessed 16 July 2020.
Ben-Joseph, Elena Pearl. (April 2018). Cyberbullying. TeensHealth. https://kidshealth.org/en/teens/cyberbullying.html . Accessed 16 July 2020.
Scheff, Sue. (29 November 2019). Adult Cyberbullying Is More Common Than You Think. Psychology Today. https://www.psychologytoday.com/us/blog/shame-nation/201911/adult-cyberbullying-is-more-common-you-think . Accessed 16 July 2020.
John, Ann et al., (2018). Self-Harm, Suicidal Behaviors, and Cyberbullying in Children and Young People: Systematic Review. Journal of Medical Internet Research, 20(4): e129 DOI: 10.2196/jmir.9044.
Oakes, Kelly. (15 September 2019). Why Children Become Bullies at School. BBC.com. https://www.bbc.com/future/article/20190913-why-some-children-become-merciless-bullies . Accessed 16 July 2020.
Study Document
...Journal article Weapons of Mass Destruction
1
An electro-magnetic pulse (EMP) attack could crash the American economy and bring virtually every industry to a standstill—such is the reliance of modern business upon the digital infrastructure. Thus, considering an EMP attack is something that government should take very seriously. As more and more of the world becomes dependent upon cyber infrastructure for the maintenance of other systems, the complexity of the security services of a country grows and intensifies. Is it possible therefore that there is an overreliance upon technology and that this overreliance can actually compromise a country’s progress and increase its risk of falling into ruin should a sudden attack like an EMP attack hit where it hurts most? Absolutely—and both state and non-state actors know that, which is why either one could conduct a high altitude EMP attack upon the US. The consequences would be devastating.
Non-state actors are just……
References
Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).
Christenson, G. (2015). CBRN response. National Guard Bureau.
Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.
Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat
Jennings, P. (2006). Miami port poses serious risks. Retrieved from https://abcnews.go.com/WNT/story?id=131634&page=1
Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from http://www.johnstonsarchive.net/terrorism/chembioattacks.html
Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.
Maras, M-H. (2014). Transnational Security. Florida: CRC Press.
Study Document
...Journal article Private Security and the Law
Private security operatives are held liable for their actions based on existing federal and state laws. Potential liability for these operatives occur when attempting to stop or arrest criminals or when carrying out their daily operations. The most common potential liability issues for private security operatives are assault and battery. In addition, private security operatives can be found guilty under vicarious liability for the torts of another and for a violation of 42 U.S.C. 1983 (Reid, 2017). An example of a recent court case involving private security operatives accused or found liable for a 42 U.S.C. 1983 violation and under vicarious liability for the torts of another is State v. Santiago (2009).
In this case, the defendant Luis Santiago was involved in a verbal altercation at the Coronado Mall on July 20, 2005 in Albuquerque. Following the altercation, Santiago was stopped by security guards as……
References
FindLaw. (2010). State of New Mexico, Plaintiff-Petitioner, v. Luis SANTIAGO, Defendant-Respondent. Retrieved March 24, 2019, from https://caselaw.findlaw.com/nm-supreme-court/1001193.html
Reid, B. (2017, April 14). A Legal Overview of Section 1983 Civil Rights Litigation. The Huffington Post. Retrieved March 24, 2019, from https://www.huffingtonpost.com/entry/a-legal-overview-of-section-1983-civil-rights-litigation_us_58f0e17ee4b048372700d793
Wakefield, J. (2018, April 19). As Alberta’s Private Security Industry Surges, What Happens When Guards Behave Badly? Edmonton Journal. Retrieved March 24, 2019, from https://edmontonjournal.com/news/crime/as-albertas-private-security-industry-surges-what-happens-when-guards-behave-badly
Yee, M. (2018, June 24). Security Guard Liability. Retrieved March 24, 2019, from https://www.legalmatch.com/law-library/article/security-guard-liability.html
Study Document
… as enjoying this ability completely. Nevertheless, the universal right to privacy is enshrined in the United Nations Declaration of Human Rights (UDHR) 1948, article 12 which clearly states that: “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks ……
References
Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.
Cantor, M. D. (2006, Summer). No information about me without me: Technology, privacy, and home monitoring. Generations, 30(2), 49-55.
Ethical issues facing businesses. (2020). Florida Tech. Retrieved from https://www.floridatech online.com/blog/business/the-5-biggest-ethical-issues-facing-businesses/.
Haslag, C. (2018, Fall). Technology or privacy: Should you really have to choose only one? Missouri Law Review, 83(4), 1027-1033.
Karn, R. (2019). The biggest threat to data security? Humans, of course. The Privacy Advisor. Retrieved from https://iapp.org/news/a/the-biggest-threat-to-data-security-humans-of-course/ .
Sharma, P. (2017, June). Organizational culture as a predictor of job satisfaction: The role of age and gender. Journal of Contemporary Management Issues, 22(1), 35-40.
Taslitz, A. E. (2009, Spring). The Fourth Amendment in the twenty-first century: Technology, privacy, and human emotions. Law and Contemporary Problems, 65(2), 125-131.
Study Document
...Journal article Goldman Sachs & Co. and Fabrice Tourre were charged by the SEC in 2010 with “Fraud In Connection With the Structuring and Marketing of a Synthetic CDO” from the 2007 subprime mortgage scandal at the heart of the financial crisis of 2007-2008 (SEC, 2010). The specific charge was that the bank and Tourre made material misstatements and omissions in connection with a synthetic collateralized debt obligation that the bank had structured, marketed and sold to investors. The synthetic CDOs were linked to the performance of the subprime housing mortgage market—i.e., the subprime mortgage-backed securities identified by Lewis (2010) as triggering the wave of financial distress that led to central banking intervention (unconventional monetary policy—also known as quantitative easing) and the inflation of asset bubbles currently seen today (Huston & Spencer, 2018). Goldman Sachs settled with the SEC and agreed to pay $550 million on the condition that the bank not……
References
Baer, J. (2014). Former Goldman Trader Tourre Won't Appeal Fraud Verdict. Retrieved from https://www.wsj.com/articles/former-goldman-trader-tourre-wont-seek-appeal-of-securities-fraud-verdict-1401221556
Huston, J. H., & Spencer, R. W. (2018). Quantitative easing and asset bubbles. Applied Economics Letters, 25(6), 369-374.
Lewis, M. (2010). The Big Short. NY: W. W. Norton.
McDonald, R., & Paulson, A. (2015). AIG in Hindsight. Journal of Economic Perspectives, 29(2), 81-106.
Murray, N., Manrai, A. K., & Manrai, L. A. (2018). The role of incentives/punishments, moral hazard, and conflicts of interests in the 2008 financial crisis. The bi-annual academic publication of Universidad ESAN, 22(43).
SEC. (2010). Litigation Release No. 21489 / April 16, 2010. Retrieved from https://www.sec.gov/litigation/litreleases/2010/lr21489.htm
Weisenthal, J. (2009). Goldman Sachs made billions shorting AIG. Retrieved from https://www.businessinsider.com/goldman-sachs-made-billions-shorting-aig-2009-3
Study Document
Abstract
In this article, the problems at FEL are analyzed and assessed from the standpoint of what FEL should do to assign managers to project teams and ……
References
Lumsden, G., Lumsden, D., & Weithoff, C. (2010). Communicating in groups and teams: Sharing leadership (5th ed.). Boston, MA: Wadsworth Cengage Learning.
Muslihat, D. (2018). Why You Need Good Teamwork For Project Management Success. Retrieved from https://zenkit.com/en/blog/why-you-need-good-teamwork-for-project-management-success/
Natvig, D., & Stark, N. L. (2016). A project team analysis using Tuckman's model of small-group development. Journal of Nursing Education, 55(12), 675-681.
We have over 150,000+ study documents to help you.
Sign Up for FREE