Korea Essays (Examples)

Studyspark

Study Document Study Document

General Electric Appliance Company Quality Control Instruments

Pages: 7 (2135 words) Sources: 3 Document Type:Essay Document #:27536334

… a multinational co-creation community, and an ultramodern micro-factory that is set in its headquarters. The company set up the second FirstBuild locality in Korea, and a third high-tech micro-factory is situated in India. These platforms guarantee that the company's most ideal conceptions and novel products for the … market. These include the following:
1. LG Electronics
LG is a multinational electronics corporation with its main center of operations situated in South Korea. LG partakes in the manufacturing of home appliances comprising refrigerators, washing machines, tumble dryers, vacuum cleaners, air conditioners, and microwave ovens. Moreover, in … Acros, Amana, Royalstar, Whirlpool, and also Hefei Sanyo.
3. Samsung
Samsung Electronics is a multinational corporation that has its headquarters situated in South Korea. Significantly, Samsung Electronics operates numerous assembly plants across the globe and has sales systems in more than 70 nations and hires approximately 300,000 ……

References

References

General Electric. (2019). Annual Report, 2019. Retrieved from:  https://www.ge.com/sites/default/files/GE_AR19_AnnualReport.pdf 

GE Appliances. (2020). Our Community. Retrieved from:  https://www.geappliances.com/our-company/ 

QIMA. (2020). What is the Product Inspection? Retrieved from: https://www.qima.com/quality-control-services/product-and-manufacturing-inspections

Goh, A., Sullivan, M. (2011). How To Conduct Quality Control With Chinese Manufacturers. Business Insider.

Weber, A. (2019). Assembly Plant of the Year: Refrigerator Production Heats Up at GE Appliances. Assembly. Retrieved from:  https://www.assemblymag.com/articles/95217-assembly-plant-of-the-year-refrigerator-production-heats-up-at-ge-appliance s

Trebilcock, B. (2020). GE Appliance: Pulling the digital thread. Logistics Management. Retrieved from:  https://www.logisticsmgmt.com/article/ge_appliance_pulling_the_digital_thread 

Flannery, R. (January 15, 2016). Haier To Buy GE Appliances For $5.4B In China\\\\\\\\\\\\'s 2nd Big U.S. Acquisition This Week. Forbes. Retrieved from:  https://www.forbes.com/sites/russellflannery/2016/01/15/haier-to-buy-ge-appliances-for-5-4b-in-chinas-2nd-big-u-s-acquisition-this-week/#2a6118503c24 

Hayes, A. (July 28, 2020). Quality Control. Investopedia. Retrieved from: https://www.investopedia.com/terms/q/quality-control.asp

Studyspark

Study Document Study Document

The Assassination Of Qassem Soleimani The Iranian General

Pages: 11 (3286 words) Sources: 13 Document Type:Research Paper Document #:89148612

… world. The political opinion polls among the important U.S. allies such as Australia , Germany, France Jordan, Japan, Mexico, the U.K. and South Korea indicate that they have no confidence in Trump and his administration (Blazakis, 2020). George Bush and his administration branded the Quds Force, an … 2020). The random approach to geopolitics by President Trump has led to important enemies of the U.S. such as Russia, Iran, and North Korea to outsmart the USA by readjusting their foreign policies to counter Trump's approaches. Trump's administrative team does not seem to have the not ……

References

References

Jahanbani, N. (2020). Beyond Soleimani: Implications for Iran\\\\\\\\\\\\'s Proxy Network in Iraq and Syria. CTC Perspectives.

Vladeck, S. I. (2004). Emergency Power and the Militia Acts. Yale LJ, 114, 149.

Brands, H. (2019). Why America Can\\\\\\\\\\\\" t Quit the Middle East. Hoover Institution, 21.

Tillman, S. P. (1982). The United States in the Middle East: Interests and Obstacles (Vol. 82). Bloomington: Indiana University Press.

Terry, J. P. (1986). Countering State-Sponsored Terrorism: A Law-Policy Analysis. Naval L. Rev., 36, 159.

Maogoto, J. N. (2003). War on the enemy: self-defense and state-sponsored terrorism. Melb. J. Int\\\\\\\\\\\\'l L., 4, 406.

Lillich, R. B., & Paxman, J. M. (1976). State Responsibility for Injuries to Aliens Occasioned by Terrorist Activities. Am. U.L. Rev., 26, 217.

Parker, C. & Noack, R. (2020, January 2). Iran has invested in allies and proxies across the Middle East. Here\\\\\\\\\\\\'s where they stand after Soleimani\\\\\\\\\\\\'s death. Washington Post. Retrieved from https://www.washingtonpost.com/world/2020/01/03/iran-has-invested-allies-proxies-across-middle-east-heres-where-they-stand-after-soleimanis-death/

Studyspark

Study Document Study Document

Drug Abuse

Pages: 8 (2545 words) Sources: 21 Document Type:literature review Document #:24528043

...Korea Impact of Drug Abuse on School Children Aged 10 To 18 in Developed Countries (U.S., Canada, France, England, Germany, Italy, Russia, Australia, Japan and China): Narrative Literature Review
Introduction
The problem addressed in this literature review is that in developed countries around the world, drug abuse among school children between the ages of 10 and 18 is on the rise (UN, 2018). School children are particularly vulnerable because their bodies and minds are still developing and when drugs are introduced to their systems, the impact can be devastating to them personally in physical and mental health terms (Stockings et al., 2016). Yet all around the developed world this is happening. Children are being brought into and exposed to drug culture because drug use, particularly marijuana use is on the rise through vaping, which was meant as a tool to wean tobacco smokers off cigarettes. Instead it is allowing young and……

References

References

Baggio, S., Spilka, S., Studer, J., Iglesias, K., & Gmel, G. (2016). Trajectories of drug use among French young people: Prototypical stages of involvement in illicit drug use. Journal of Substance Use, 21(5), 485-490.

Bonyani, A., Safaeian, L., Chehrazi, M., Etedali, A., Zaghian, M., & Mashhadian, F. (2018). A high school-based education concerning drug abuse prevention. Journal of education and health promotion, 7.

Chu, Y. W. L. (2015). Do medical marijuana laws increase hard-drug use?. The Journal of Law and Economics, 58(2), 481-517.

Downes, D. (2017). The drug addict as a folk devil. In Drugs and politics (pp. 89-97). Routledge.

Goodchild, M., Nargis, N., & d\\'Espaignet, E. T. (2018). Global economic cost of smoking-attributable diseases. Tobacco control, 27(1), 58-64.

Grant, C. N., & Bélanger, R. E. (2017). Cannabis and Canada’s children and youth.  Paediatrics & child health, 22(2), 98-102.

Herbert, A., Gonzalez-Izquierdo, A., McGhee, J., Li, L., & Gilbert, R. (2016). Time-trends in rates of hospital admission of adolescents for violent, self-inflicted or drug/alcohol-related injury in England and Scotland, 2005–11: population-based analysis. Journal of Public Health, 39(1), 65-73.

Henkel, D., & Zemlin, U. (2016). Social inequality and substance use and problematic gambling among adolescents and young adults: a review of epidemiological surveys in Germany. Current drug abuse reviews, 9(1), 26-48.

Studyspark

Study Document Study Document

How Media Coverage Of Operation Desert Storm Was Influenced By The

Pages: 11 (3336 words) Sources: 8 Document Type:Essay Document #:61111774

… be the extent to which such actions are jeopardized and their outcomes adversely affected. The United States could have won the wars in Korea and Vietnam by leaving the north of these countries radioactive wildernesses, but the nation has decided that these weapons are too dangerous to ……

References

References

Curtis, J. (2015, November). Reflecting on strategic results of Operation Desert Storm. Army, 65(11), 24-27.

Khan, H. (2011, July 1). An unbiased estimate of present American competitiveness from deontological and teleological perspectives of utilitarianism. Competition Forum, 9(2), 348-352.

Klotzer, C. L. (2002, October). A lesson for Americans: Desert Storm operation reports were full of lies and distortions. St. Louis Journalism Review, 32(250), 34-39.

Lindsey, J. M. & Smith, C. (2003, Summer). Rally 'round the flag: Opinion in the United States before and after the Iraq War. Brookings Review, 21(3), 20-24.

Operation Desert Storm. (2020). U.S. History. Retrieved from  https://www.ushistory.org/  us/60a.asp.

Stilwell, B. (2015, September 12). 21 facts about the first Gulf War. Military.com. Retrieved from  https://www.military.com/undertheradar/2015/09/21-facts-about-the-first-gulf-war .

Taylor, A. (2016, January 14). Operation Desert Storm: 25 years since the first Gulf War. The Atlantic. Retrieved from  https://www.theatlantic.com/photo/2016/01/operation-desert-storm-25-years-since-the-first-gulf-war/424191/ .

Tilford, K. H., Jr. (1993, Summer). Review: The meaning of victory in Operation Desert Storm: A review essay. Political Science Quarterly, 108(2), 327-331.

Studyspark

Study Document Study Document

Weapons Of Mass Destruction

Pages: 9 (2563 words) Sources: 10 Document Type:Research Paper Document #:76982977

...Korea Countering the Threat of Weapons of Mass Destruction (WMDs)
Purpose Statement
Chemical, biological, radiological, and nuclear (CBRN) weapons of mass destruction (WMD) area a threat that can completely disrupt an entire nation’s way of life. The current situation in China is a perfect illustration of what can happen when a biological weapon is used to destabilize a nation’s economy. China is currently grinding to a halt as the Covin-19 virus spreads like wildfire through China. The example shows how devastating a WMD can be when used in an attack. The purpose of this study is to examine ways to prevent or reduce the risk of a CBRN WMD attack. By looking at the use of international treaties, the rise of terrorism, and counter-proliferation strategies, this paper will assess the measures available for achieving the aim.
Research Question
What can nations do to prevent or reduce the risk of CBRN WMD……

References

References

Asada, M. (2008). Security Council Resolution 1540 to combat WMD terrorism: effectiveness and legitimacy in international legislation. Journal of Conflict & Security Law, 13(3), 303-332.

Carter, A. B. (2004). Overhauling counterproliferation. Technology in Society 26(2-3), 257-269.

CBS. (2011). Clinton on Qaddafi: We came, we saw, he died. Retrieved from  https://www.youtube.com/watch?v=mlz3-OzcExI 

The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. (1999). Combating Proliferation of Weapons of Mass Destruction. Washington, D.C.

Forest, J.J.F. (2012, Winter). Framework for Analyzing the Future Threat of WMD Terrorism. Journal of Strategic Security 5, 4. Retrieved from  http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1193&context=jss 

Hochman, D. (2006). Rehabilitating a rogue: Libya's WMD reversal and lessons for US policy. Parameters, 36(1), 63.

Lang, C. G. (1937). Archbishop's Appeal: Individual Will and Action; Guarding Personality. London Times, 28.

Stone, O., & Kuznick, P. (2013). The untold history of the United States. Simon and Schuster.

Studyspark

Study Document Study Document

Formulating An Effective National Response To Ebola In Nigeria

Pages: 17 (5038 words) Sources: 20 Document Type:Research Paper Document #:83371879

...Korea Abstract
Today, there are dozens of deadly diseases in the world, but the Ebola virus disease (alternatively “EVD” or “Ebola”) is among the most virulent and lethal. Although intensive research is underway, there is no cure currently available for Ebola and the death toll attributable to this disease continues to increase. To date, there have been nearly 30,000 cases of Ebola infections that caused more than 11,000 deaths, primarily in West Africa, but the disease has the potential to spread worldwide unless first responders, emergency management managers and the health care community take aggressive steps to identify infections and contain outbreaks. The main purpose of this study is to provide a systematic and critical review of the relevant juried, scholarly and governmental literature about the Ebola virus disease to create an awareness manual that is targeted at educating Nigerian citizens concerning this disease. A secondary purpose of this study is……

References

References

Allam, M. F. (2014, September). Ebola hemorrhagic fever: Case fatality rate 90%? Central European Journal of Public Health 22(3), 207-210.

Allam, M. F. & Vonka, V. (2015, March). Ebola virus disease: Temperature checks for travelers? Central European Journal of Public Health, 23(1), 84.

Brand, J. E. & Stela, D. (2014, October). Ebola is here: Knowledge, identification, and appropriate infection control are key. American Nurse Today, 9(10), 37-39.

Brown, G. (2015, Winter). Ebola in America: An epidemic or a pandemic? ABNF Journal, 26(1), 3-5.

Ebola. (2019). Doctors without Borders. Retrieved from https://www.doctorswithout borders.org/what-we-do/medical-issues/ebola.

Ebola outbreak. (2019). U.S. Centers for Disease Control and Prevention. Retrieved from  https://www.cdc.gov/vhf/ebola/history/2014-2016-outbreak/index.html .

Ebola virus disease. (2019). U.S. Centers for Disease Control and Prevention. Retrieved from  https://www.cdc.gov/vhf/ebola/index.html .

Hancock, M. (2019, September). After Ebola. African Business, 422, 56-58.

Studyspark

Study Document Study Document

Strategy For National Defense

Pages: 7 (2014 words) Sources: 7 Document Type:Essay Document #:59270793

… and deterrence abilities. For example, the Russian military carries out “regular nuclear-capable Tu-95 Bear bomber long-range aviation flights off the coasts of Japan, Korea, Canada, and Alaska.”[footnoteRef:5] In the past few years, Russia has increased investments in military infrastructure, deployed anti-ship missile systems, enhanced control and command ……

References

Bibliography

Davidson, P.S. “Statement of Admiral Philip S. Davidson, U.S. Navy Commander, U.S. Indo-Pacific Command Before the House Armed Services Committee on U.S. Indo-Pacific Command Posture.” United States Senate, March 27, 2019,  https://www.armed-services.senate.gov/imo/media/doc/Davidson_02-12-19.pdf 

Department of Defense. “Summary of the 2018 National Defense Strategy of the United States of America.” National Defense Strategy, 2018,  https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf 

Muller, K. “The Essence of Coercive Air Power: A Primer for Military Strategies.” Air University,  https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/mueller.pdf 

Pape, R.A. Bombing to Win: Air Power and Coercion in War, 1st ed. Ithaca, NY: Cornell University Press, 1996.

Tammen, R.L., Kugler, J. & Lemke, D. “Power Transition Theory.” International Relations, June 27, 2017, DOI: 10.1093/OBO/9780199743292-0038

The White House. “National Security Strategy of the United States of America.” The White House, December 2017, https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf

Withers, P. “Integrating Cyber with Air Power in the Second Century of the Royal Air Force.” Medium, March 4, 2019,  https://medium.com/raf-caps/integrating-cyber-with-air-power-in-the-second-century-of-the-royal-air-force-bca74b8d42ed 

 

Studyspark

Study Document Study Document

Feminism In Popular Culture

Pages: 5 (1477 words) Sources: 10 Document Type:Annotated Bibliography Document #:46863850

...Korea Topic
Feminism/Post-Feminism in Popular Culture
Search Terms
“feminism pop culture,” “post-feminism pop culture,” “feminist studies current,” and “feminist post-feminist popular culture”
Baer, H. (2016). Redoing feminism: digital activism, body politics, and neoliberalism.  Feminist Media Studies, 16(1), 17-34.
This study looks at the influence of digital platforms in projecting feminism in the 21st century. The author discusses subjects such as Pussy Riot and Twitter movements like #YesAllWomen. The point the author makes is that neoliberal societies are still oppressive towards women and that feminism is both needed and alive on social and digital media. This source comes from a peer-reviewed journal and is relevant to my topic of interest because it discusses whether feminism is still possible or prevalent in the 21st century, since it seems so often taken for granted. The strength of the article is its case study focus with specific examples of feminism on digital platforms. The main weakness……

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

...Korea Executive Summary
The purpose of this study is to develop timely and informed answers to a series of guiding research questions and subquestions to identify the risks and barriers that are associated with Internet of Things implementations. These types of studies are important today because the Internet of Things is changing the manner in which companies of all sizes and types operate their businesses, and current trends indicate that these implementations are increasing exponentially. The Internet of Things allows conventional computer-based networks to incorporate data collected from everyday objects to provide real-time analyses and new applications for these technologies are being developed every day. Indeed, there are already more mobile devices in use around the world than there are people, and most authorities agree that the Internet of Things deployments will continue to increase well into the foreseeable future. Chapter one of the study provides the rationale in support of……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".