Learning Experience Essays (Examples)

Studyspark

Study Document Study Document

Code Of Ethics For Managers In Acquisition

Pages: 11 (3162 words) Sources: 5 Document Type:Research Paper Document #:25977313

… language can also turn into vagueness when a manager is confronted with a situation that lies outside of the boundaries of their normal experience, or what might have been documented in the code.
Ultimately, the code of ethics is a set of guidelines, and as with any ……

References

References

Adelstein, J. & Clegg, S. (2016) Code of ethics: A stratified vehicle for compliance. Journal of Business Ethics. Vol. 138 (1) 53-66.

Lazeros, M. (2008) Leaders can learn from Druyun’s ethical lapses and their consequences. USAWC Research Project. Retrieved October 25, 2019 from  https://apps.dtic.mil/dtic/tr/fulltext/u2/a479019.pdf 

McConnnell, A. & Rood, T. (1997) Ethics in government: A survey of misuse of position for personal gain and its implications for developing acquisition strategy. Journal of Business Ethics. Vol. 16 (1997) 1107-1116.

McConnell, T. (2018). Moral dilemmas. Stanford Encyclopedia of Philosophy Retrieved October 25, 2019 from  https://plato.stanford.edu/entries/moral-dilemmas/ 

Neu, D., Everett, J. & Rahaman, A. (2015) Preventing corruption within government procurement: Constructing the disciplined and ethical subject. Critical Perspectives on Accounting. Vol. 28 (2015) 49-61.

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… supports the logical notion that in order to enhance acceptance levels of new technologies, individuals must first have the opportunity to gain hands-on experience with them (Venkatesh et al., 2016). In this regard, Venkatesh et al. (2016) emphasize that, “There is also research on technology adoption by … (1) performance expectancy, (2) effort expectancy, (3) social influence, and (4) facilitating conditions as well as four moderators (1) age, (2) gender, (3) experience, and (4) voluntariness that can facilitate the analysis of behavioral intention levels to actually use a new technology, generally in organizational contexts (Venkatesh ……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Elder Abuse

Pages: 7 (2239 words) Sources: 4 Document Type:Term Paper Document #:22335640

… defining what constitutes elder abuse (Falk, Baigis, Kopac, et al., 2012). Roberto (2016) estimates as many as one in every ten American elders experience some kind of abuse. Unfortunately, “there is no uniform term or agreed-upon definition used among state governments, researchers, health care and service providers, … could get lost. Some patients are quick to lose their tempers at nurses, and it should also be noted that many healthcare providers experience abuse at the hands of their patients. There may also be cases in which patients will abuse the system or manipulate healthcare providers ……

References

References

Falk, N. L., Baigis, J., Kopac, C., (August 14, 2012) \\\\\\\\\\\\"Elder Mistreatment and the Elder Justice Act\\\\\\\\\\\\" OJIN: The Online Journal of Issues in Nursing 17(3).

Forum on Global Violence Prevention; Board on Global Health; Institute of Medicine; National Research Council (2014). Ethical considerations. Washington (DC): National Academies Press (US); 2014 Mar 18.

Lacher, S., Wettstein, A., Senn, O., et al. (2016). Types of abuse and risk factors associated with elder abuse. Swiss Medical Weekly 2016(146): 1-10.

Lachs, M.S., Teresi, J.A., Ramirez, M., et al. (2016). The prevalence of ersident-to-resident elder mistreatment in nursing homes. Annals of Internal Medicine 165(4):229-236.

Malmedal, W., Iversen, M.H. & Kilvik, A. (2014). Sexual abuse of older nursing home residents: A literature review. Nursing Research and Practice 2015(Article 902515):  http://dx.doi.org/10.1155/2015/902515 

Roberto, K.A. (2016). The complexities of elder abuse. American Psychologist 71(4): 302-311.

Saghafi, A., Bahramnezhad, F., Poormollamirza, A., et al. (2019). Examining the ethical challenges in managing elder abuse: a systematic review. Journal of Medical Ethics and History of Medicine 2019(12):  https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6642445/ 

Wangmo, T., Nordstrom, K. & Kressig, R.W. (2017). Preventing elder abuse and neglect in geriatric institutions: Solutions from nursing care providers. Geriatric Nursing 38(5): 385-392.

Studyspark

Study Document Study Document

Using DoorDash To Promote A Restaurant Brand

Pages: 7 (2131 words) Sources: 4 Document Type:Research Paper Document #:85037477

...Learning experience Implementing the Market Strategy
Introduction
Just as important as developing the market strategy is the process of implementing the strategy. Implementation has its own set of challenges that have to be addressed, however. These include forming strategic partnerships, managing top-selling products, improving pricing strategies; developing sales Promotion, advertising and sale promotion strategies; developing digital strategies and measuring market performance. This paper will address each of these challenges and offer solutions for implementing the market strategy for OPG.
Strategic Partnerships
Strategic partnerships the company could develop to help promote both companies could be to look for a local brewer who is wanting to expand and partnering with that brewer to brew in the adjacent building owned by OPG. OPG wants to start brewing its own beer, but instead of hiring a brewmeister and investing in the brewing business, it may make more sense to partner with a small existing brewer and……

References

References

Gallardo-Echenique, E. E., Marqués-Molías, L., Bullen, M., & Strijbos, J. W. (2015). Let’s talk about digital learners in the digital era. International Review of Research in Open and Distributed Learning, 16(3), 156-187.

Gibson, C., & Homan, S. (2004). Urban redevelopment, live music and public space: Cultural performance and the re?making of Marrickville. International Journal of Cultural Policy, 10(1), 67-84.

Lawson, C. (2007). Victorian Young Planners: News and Views-Pot, Parma and Trivia Night. Planning News, 33(6), 12.

Queensland. (2020). Key components of a digital strategy. Retrieved from https://www.business.qld.gov.au/running-business/it/digital-strategy/key-components

Studyspark

Study Document Study Document

Domestic Terrorism And Extremist Groups

Pages: 13 (3981 words) Sources: 12 Document Type:Research Paper Document #:80039324

...Learning experience Right and Left Wing Terror Groups in America
1
Extremism in the U.S. is on the rise, based on the rise in polarization throughout the country as the Left and the Right become more and more opposed to one another ideologically, politically, socially, and emotionally. There is a strong rift between the two and little sense of common ground. Much of this rise has come on the heels of the rise in social media use, which allows individuals to promote their views to the rest of the world in a way that was literally unheard of prior to the digital revolution (Freberg, Graham, McGaughey & Freberg, 2011). As social media use has essentially risen exponentially since its inception in the 2000s, the level of ideologically-driven Influencers in the space is a reflection and facilitator of the level of extremism in the United States.
As both the popularity of groups like……

References

References

Barnett, B. A. (2015). 20 Years Later: A Look Back at the Unabomber Manifesto.  Perspectives on Terrorism, 9(6), 60-71.

Beinart, P. (2017). The rise of the violent left. Retrieved from  https://www.theatlantic.com/magazine/archive/2017/09/the-rise-of-the-violent-left/534192/ 

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Costello, M., & Hawdon, J. (2018). Who are the online extremists among us? Sociodemographic characteristics, social networking, and online experiences of those who produce online hate materials. Violence and gender, 5(1), 55-60.

DeCook, J. R. (2018). Memes and symbolic violence:# proudboys and the use of memes for propaganda and the construction of collective identity. Learning, Media and Technology, 43(4), 485-504.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Hamm, M &Spaaj, R. (2015). Lone wolf terrorism in America: Using knowledge of radicalization pathways to forge prevention strategies. U.S. Department of Justice. Retrieved from  https://www.ncjrs.gov/pdffiles1/nij/grants/248691.pdf 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Studyspark

Study Document Study Document

Walmart Total Rewards Program

Pages: 6 (1754 words) Sources: 5 Document Type:Research Paper Document #:73393007

… and motivation contribute to overall business outcomes, human resources departments have been challenged with expanding their scope, and looking at the total rewards experience of their companies’ employees. When the links between business strategy, people strategy and total rewards are mapped out, it becomes apparent that getting … well because of the company’s need for a highly efficient workforce. The needs of this workforce may still include things like provision for learning…[break]…then, is better training for Walmart’s managers and assistant managers, and supervisors, so that the in-store leadership is stronger, and works with the company ……

References

References

Group Dentistry Now (2019) Walmart introduces first-ever health center, which includes a comprehensive dental clinic. Group Dentistry Now. Retrieved May 7, 2020 from  https://groupdentistrynow.com/dso-group-blog/walmart-introduces-first-ever-health-center-which-includes-a-comprehensive-dental-clinic/ 

Hiles, A. (2009) Tough times demand focus – total rewards strategy. Benefits Quarterly. Vol. 25 (4) 44-47.

Kaplan, S. (2005) Total rewards in action: Developing a total rewards strategy. Benefits & Compensation Digest. Retrieved May 7, 2020 from http://staceykaplan.com/pdf/Stacey_Kaplan_Total_Rewards.pdf

Kaplan, S. (2007) Business strategy, people strategy and total rewards. Benefits & Compensation Digest. Retrieved May 7, 2020 from  http://www.staceykaplan.com/pdf/Stacey_Kaplan_Total_Rewards_And_Business_Strategy.pdf 

Meyersohn, N. (2019) Walmart will recruit high school students with free SAT prep and $1 a day college tuition. CNN Business. Retrieved May 7, 2020 from https://www.cnn.com/2019/06/04/business/walmart-college-tuition-benefit-high-school-students/index.html

Rumpel, S. & Medcof, J. (2006) Total rewards: Good fit for tech workers. Research Technology Management. Retrieved May 7, 2020 from https://www.researchgate.net/profile/John_Medcof/publication/233718407_Total_Rewards_Good_Fit_for_Tech_Workers/links/5b214c87458515270fc6cfdb/Total-Rewards-Good-Fit-for-Tech-Workers.pdf

Studyspark

Study Document Study Document

COVID 19 Pandemic Public Implications Of Government Response

Pages: 4 (1183 words) Sources: 4 Document Type:Case Study Document #:19700171

… vaccines for the virus.
Conclusion
The current coronavirus disease has meant a reorientation of public administration in a manner that has not been experience since World War II. However, even with the various and significant challenges attached to this novel disease, so far, public administration has made ……

References

Reference

Fong, M. W., Gao, H., Wong, J. Y., Xiao, J., Shiu, E. Y., Ryu, S., & Cowling, B. J. (2020). Nonpharmaceutical Measures for Pandemic Influenza in Nonhealthcare Settings-Social Distancing Measures. Emerging infectious diseases, 26(5).

McCloskey, B., Zumla, A., Ippolito, G., Blumberg, L., Arbon, P., Cicero, A., ... & Borodina, M. (2020). Mass gathering events and reducing further global spread of COVID-19: a political and public health dilemma. The Lancet.

O\\\\\\'Leary, R., Van Slyke, D. M., & Kim, S. (Eds.). (2010). The future of public administration around the world: The Minnowbrook perspective. Washington, DC: Georgetown University Press.

Tuite, A. R., Ng, V., Rees, E., & Fisman, D. (2020). Estimation of COVID-19 outbreak size in Italy. The Lancet Infectious Diseases.

Studyspark

Study Document Study Document

Elite Business Solutions EBS Worldwide Inc Field Report

Pages: 8 (2504 words) Sources: 5 Document Type:Essay Document #:33805230

… affect growth. This paper focuses on the Indian business environment by analyzing a Small and Medium Enterprise (SME) and an Entrepreneur who has experience of managing change. The analysis of the business will be done through Lewin's Change Management Model. Therefore, this paper analyses EBS Worldwide Inc., ……

References

References

Doppelt, B., 2017. Leading change toward sustainability: A change-management guide for business, government, and civil society. Routledge.

EBS Worldwide Inc., 2009. Retrieved from http://www.ebsworldwide.biz/index.php

Financial Express, 2002. EasyBuyMusic renames itself, expands product range. Retrieved from  https://www.financialexpress.com/archive/easybuymusic-renames-itself-expands-product-range/37717/ 

Rodrigues, M., 2012. Five entrepreneurs tell us how they reinvented themselves. India Today. Retrieved from  https://www.indiatoday.in/magazine/supplement/story/20120813-business-entrepreneurs-stock-vinay-gupta-nikhil-velpanur-759294-2012-08-01 

Shirey, M. R. (2013). Lewin\\\\\\\\\\\\'s theory of planned change as a strategic resource. JONA: The Journal of Nursing Administration, 43(2), 69-72.

Studyspark

Study Document Study Document

Banking Industry Crimes

Pages: 6 (1933 words) Sources: 6 Document Type:Essay Document #:73861053

… bank robberies have been on a steep decline over the last few decades. Towards this end, the types of crimes the banking industry experience that have been highlighted in this text largely relate to white collar crime. It is important to note that the various kinds of ……

References

References

Albrecht, W.S., Albrecht, C.C., Albrecht, C.O. & Zimbelman, M.F. (2008). Fraud Examination (3rd ed.). Mason, OH: Cengage Learning.

Dionne, B. (2020). Regions Bank Teller Accused of Stealing Customer Identities Faces Felony Charges. Retrieved  https://www.wbrc.com/2020/01/30/regions-bank-teller-accused-stealing-customer-identities-facing-felony-charges/ 

Golden, T.W., Skalak, S.L. & Clayton, M.M. (2006). A Guide to Forensic Accounting Investigation. Hoboken, NJ: John Wiley & Sons.

Krancher, M., Riley, R. & Wells, T.J. (2010). Forensic Accounting and Fraud Examination. Hoboken, NJ: John Wiley & Sons.

Singleton, T.W., Singleton, A.J. & Bologna, R.J. (2006). Fraud Auditing and Forensic Accounting (3rd ed.). Hoboken, NJ: John Wiley & Sons.

Zagaris, B. (2010). International White Collar Crime: Cases and Materials. New York, NY: Cambridge University Press.

Studyspark

Study Document Study Document

John Lewis Gaddis

Pages: 8 (2280 words) Sources: 9 Document Type:Essay Document #:77530466

… the 1930s, into a gargantuan extension of his own pathologically suspicious personality.”[footnoteRef:13] Stalin used terror and coercion to purge dissent. The Gulag Archipelago, experience personally by Solzhenitsyn after he dared to criticize Stalin’s decisions during WW2, was a prime example of Stalin’s totalitarianism. It was this totalitarianism ……

References

Bibliography

Alpha History, “Cold War Historiography.”  https://alphahistory.com/coldwar/cold-war-historiography/ 

Branch, Mark Alden. “Days of Duck and Cover,” Yale Alumni Magazine, 2000.  http://archives.yalealumnimagazine.com/issues/00_03/gaddis.html 

Encyclopedia. “John Lewis Gaddis,” 2020.  https://www.encyclopedia.com/arts/educational-magazines/gaddis-john-lewis-1941 

Gaddis, John Lewis. We Now Know: Rethinking Cold War History. Oxford University Press, 1997.

Kaplan, Fred. “America’s Cold War Sage and His Discontents,” NYTimes, 2007. https://www.nytimes.com/2011/11/23/books/george-f-kennan-by-john-lewis-gaddis-review.html

Lundestad, Geir. "The Cold War According to John Gaddis." Cold War History 6, no. 4 (2006): 535-542.

National Endowment for the Humanities. “John Lewis Gaddis,” 2005.  https://www.neh.gov/about/awards/national-humanities-medals/john-lewis-gaddis 

Paxton, Robert. Anatomy of Fascism. New York: Vintage, 2012.

Join thousands of other students and

"spark your studies".