Masters Business Administration Essays (Examples)

Studyspark

Study Document Study Document

Optimizing Health Information Systems

Pages: 12 (3717 words) Sources: 16 Document Type:Research Paper Document #:99273225

Optimizing Merged Health Information Systems
Although the merger of two comparably sized companies competing in the same industry is a relatively commonplace business strategy, the process is fraught with obstacles and challenges and a significant percentage of merged entities fail outright because of these problems (Murphy, ……

References

References

Abouzhar, C. & Boerma, T. (2009, August). Health information systems: The foundations of public health. Bulletin of the World Health Organization, 83(8), 578-583.

Cresswell, K. & Aziz, S. (2013, May). Organizational issues in the implementation and adoption of health information technology innovations: An interpretative review. International Journal of Medical Informatics, 87(5), 73-86.

Drazen, E. L. (2006, February). Maximizing the benefits of health care information systems. Journal of Medical Systems, 10(1), 51-56.

Kruse, C. S. & Smith, D. (2017, July). Security techniques for the electronic health records. Journal of Medical Systems, 41(8), 127.

Kumar, V. (2011). Impact of health information systems on organizational health communication and behavior. The Internet Journal of Allied Health Sciences and Practice, 9(2), 37-44.

McGrail, K. M. & Black, C. (2009, August). Access to data in health information systems. Bulletin of the World Health Organization, 83(8), 563-569.

Murphy, M. L. (2019, March). Mastering accounting for business combinations: Mergers and acquisitions present challenges that finance can overcome by staying involved with the deal and preparing in advance of the closing. Journal of Accountancy, 227(3), 24-27.

NAHQ code of ethics for healthcare quality. (2019). National Association for Healthcare Quality. Retrieved from  https://nahq.org/about/code-of-ethics .

Studyspark

Study Document Study Document

Fero Beauty

Pages: 7 (2143 words) Sources: 9 Document Type:Marketing Plan Document #:70961218

… competitive analysis, online and direct marketing plan, and social responsibility/cause-related marketing plan.
Pricing and Distribution Strategy
Pricing alludes to the practice of a business setting the price for retailing its products and services. Distribution channels encompass the course and path through which products move from production to … recent times, Facebook has grown from simply being a website where friends connect and share information and pictures online, to a platform for business to market themselves via interrelation with consumers and also self-advertising and self-promoting (Palma, 2016). Fero Beauty will capitalize its official business page on the platform to advance its brand identity. This will be through sharing pictures, videos, and links associated with the product items … to cast a wider net on reaching its target audience (Al-Hadban et al., 2014).
Social Responsibility Plan
A social responsibility plan elucidates the business’ approach of taking into consideration the different stakeholders,……

References

References

Al-Hadban, N., Hadeel, A. G., Al-Hassoun, T., & Hamdi, R. (2014). The Effectiveness of Facebook as a Marketing Tool (Saudi Arabia case study). International Journal of Management & Information Technology, 10(2), 1815-1827.

Andrews, J. C., & Shimp, T. A. (2017). Advertising, promotion, and other aspects of integrated marketing communications. Nelson Education.

Deepa, S., & Chitramani, P. (2015). CSR in retailing industry-a case of three retail stores. International Journal of Business and Administration Research Review, 3(9), 128.

Gould, M. (n.d). Pricing Strategies. Research Starters: Academic Topic Overviews.

Khan, S. (2018). Instagram as a marketing tool for luxury brand. International Journal of Management, Business, and Research, 8(2), 126.

Kotler, P., Armstrong, G., Ang, S. H., Leong, S. M., Tan, C. T., & Yau, O. (2009). Principles of marketing: A global perspective. Prentice-Hall.

Palma, A. P. (2016). Effectiveness of Facebook as a free marketing tool. University of Mindanao International Multidisciplinary Research Journal, 1(2), 21-26.

Smith, P. R., & Taylor, J. (2004). Marketing communications: an integrated approach. Kogan Page Publishers.

Studyspark

Study Document Study Document

Strategies To Improve Retention Rates At A Consulting Firm

Pages: 8 (2352 words) Sources: 7 Document Type:Research Proposal Document #:75835646

… navigate the company’s career ladder will begin one month following acceptance of the recommendations set forth herein.
A specific timeline for implementation and administration of the three above-listed recommendations using the existing 32.5% turnover rate as a benchmark is provided in Table 2 below.
Other companies’ practices:
……

References

References

Christie, J. (2014, September). Cochrane review brief: Exit interviews to reduce turnover amongst healthcare professionals. Online Journal of Issues in Nursing. 19(3), 7-11.

Dobbs, K. (2009, April). Knowing how to keep your best and brightest. Workforce, 80(4), 56-60.

Hansen, F. (2009, March 27). Refining signing bonuses. Workforce Management, 85(6), 1-3.

Johns, R. & Gorrick, J. (2016, April). Exploring the behavioral options of exit and voice in the exit interview process. International Journal of Employment Studies, 24(1), 25-29.

Ohunakin, F. & Adeniji, A. (2018, March). Perception of frontline employees towards career growth opportunities: Implications on turnover untention. Business: Theory and Practice, 19(1), 278-283.

Tatham, P. (2008, Spring). At my desk. Australian Journal of Career Development, 17(3), 6-9.

Turnover rates by industry. (2019). Compensation Force. Retrieved from  https://www.compensationforce.com/2017/04/2016-turnover-rates-by-industry.html .

Studyspark

Study Document Study Document

Weapons Of Mass Destruction WMD Antifa

Pages: 13 (3787 words) Sources: 12 Document Type:Research Paper Document #:67320498


An electro-magnetic pulse (EMP) attack could crash the American economy and bring virtually every industry to a standstill—such is the reliance of modern business upon the digital infrastructure. Thus, considering an EMP attack is something that government should take very seriously. As more and more of the … Without a functioning electrical, oil and gas pipelines, etc., a nation can quickly become plunged in darkness and chaos. Energy keeps a nation’s business and activities operational and therefore the economic and social life of a nation depends upon having a functioning energy infrastructure (Maras, 2014). Making … all over the country to see the effect that a loss of the energy infrastructure has on a country. Venezuela experienced food shortages, business closed, and crime broke out with gangs roving from place to place to try to find resources for themselves.
Energy security is needed … the Cybersecurity and Infrastructure Agency,……

References

References

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Christenson, G. (2015). CBRN response. National Guard Bureau.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from  https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat 

Jennings, P. (2006). Miami port poses serious risks. Retrieved from  https://abcnews.go.com/WNT/story?id=131634&page=1 

Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from  http://www.johnstonsarchive.net/terrorism/chembioattacks.html 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Maras, M-H. (2014). Transnational Security. Florida: CRC Press.

Studyspark

Study Document Study Document

Struggle To Achieve Political Objectives In United States

Pages: 3 (1041 words) Sources: 4 Document Type:Essay Document #:90705510

… overwhelming military power, the United States has sometimes struggled to achieve political objectives for a variety of reasons: first, the U.S. changes its administration every four to eight years and this means a new approach to policy is brought in each time, which makes it difficult for … the problem of establishing and pursuing political objectives. There is the State Department, the military, the intelligence community, the White House, Congress, and business interests—and all have…[break]…/>
In conclusion, to achieve international political objectives, it requires stability, consistency of vision, coherent and consistent strategy, and support from ……

References

Bibliography

Builder, Carl H. “The Masks of War: American Military Styles in Strategy and Analysis.”

Gray, Colin S. “Why Strategy is Difficult,” JFQ.

Habeck, Mary. “Why They Did It,” Knowing the Enemy: Jihadist Ideology and the War on Terror.”

Walt, Stephen. “Why Alliances Endure or Collapse,” Survival, vol. 39, no. 1 (Spring 1997), 156-179.

Studyspark

Study Document Study Document

Advantages And Disadvantages Of Interrelationships Between Organizational

Pages: 16 (4728 words) Sources: 28 Document Type:Essay Document #:81594345

… Organizational Functions and Impact on Organisational Structure
Organizational Functions
The functions of an organization take into account the different aspects undertaken by the business including production or manufacturing, marketing, sales, accounting as well as research and development. In accordance to Sherman and Thompson (2019), the organizational structure … research and development. In accordance to Sherman and Thompson (2019), the organizational structure delineates the relationship and interrelations between the functions of a business and ascertains the manner in which the chain of command operates through the various levels. The interrelationship between organizational functions and organizational structure … organizational functions and organizational structure is akin to a flow chart. This is in the sense that an entity can set up its business structure around the organizational functions. However, even if the entity fails to do so, the organizational functions and structure will have an impact … an impact on one another……

References

References

Air India. (2019). Board of Directors. Retrieved from:  http://www.airindia.in/board-of-directors.htm 

Aquinas, P. G. (2008). Organization structure and design. India: Excel Books India.

Burns, T., & Stalker, G. M. (2005). Mechanistic and organic systems. Organizational Behavior, 2, 214-25.

Choo, S., & Bowley, C. (2007). Emerald Article: Using training and development to affect job satisfaction. Journal of Small Business and Enterprise Development, 14(2),339 - 352.

Cichocki, P., & Irwin, C. (2014). Organization design: A guide to building effective organizations. Kogan Page Publishers.

Civil Aviation. (2019). About Us: Organizational Setup. Retrieved from:  http://www.civilaviation.gov.in/en/aboutus/orgsetup 

Cunliffe, A. L. (2008). Organization theory. New York: Sage.

Cunliffe, A. L., & Luhman, J. T. (2012). Key concepts in organization theory. New York: Sage.

Studyspark

Study Document Study Document

Democracy In America In The 21st Century

Pages: 7 (2223 words) Sources: 5 Document Type:Essay Document #:23576697

… through unelected (i.e., appointed) officials who control the strings of government and have their pockets padded by insiders and lobbyists of various big business. Democracy is the buzzword of many an authoritarian government the world over today, yet democracy is hardly seen in reality. Both Mansbridge and … world is now living under a global command economy whose terms are dictated by a triumvirate of central banks, government leaders and big business owners. Everyone else is simply told what to do and expected to like, and one should need no more example of this fact … world today is the threat of authoritarianism that looms over government via the integration of central banking, organs of the state and big business circumventing the will of power and the democratic means of control.
Authoritarianism was always a problem for democracy, even in Athenian society, because … schedule one narcotic by the……

References

Works Cited

Dahl, Robert. On Democracy.

Ferejohn, John. Is Inequality a Threat to Democracy?

Friedman, Milton. Capitalism and Freedom. University of Chicago Press.

Mansbridge, Jane. On the Importance of Getting Things Done. PS, 2012.

Runciman, David. The Confidence Trap. Princeton University Press.

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

… cybercrime did not really become a possibility until the personal computer began to hit the market in the 1970s (Computer Hope, 2019). As business and organizations began to more operations online, individuals began to see an opportunity to exploit weak supports to gain access over company data, … ships, and steal data. Common cyber crime often takes the form of enterprise crime, in which illegal activities are united under a legitimate business front, allowing the crime to have a corporate status even though it is engaged in criminal activity. Rather than trying to get around … hide behind. Enterprise crime is also sometimes known as organized crime. The Mafia is such an organization and it may have a legitimate business front but behind the scenes it is moving drugs or guns, and during the days of Prohibition it was moving alcohol. Enterprise crime … have to be very tech……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

Counterintelligence Issues Within The United States

Pages: 18 (5457 words) Sources: 29 Document Type:Research Paper Document #:72238996

… the matter of confusing counterintelligence with security, which is precisely what has happened in the past and is currently happening under the Trump Administration…[break]…counterintelligence is to put one’s own national reputation at risk: that is one reason the Israeli Mossad changed its motto, which used to state, … in the era of globalization” (1). Yet the culture of deception has spread all over the globe. Developers, technicians, production personnel, IT personnel, business development personnel, human resources personnel, and facility personnel are all potential targets of foreign actors and foreign collectors of intelligence (National Counterintelligence and … of intelligence (National Counterintelligence and Security Center n.d.). Private industry is at risk because it possesses intellectual property that foreign actors covet and business activities can be exploited. Cyber operations are also at risk, as is confidential information, which can be mishandled by employees. Counterintelligence operations could ……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. "The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles." Bachelor's thesis, Università Ca'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Cohen, Shlomo. 2016. "Are There Moral Limits to Military Deception?." Philosophia 44 (4): 1305-1318.

Coyne, John, Peter Bell, and Shannon Merrington. 2013. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2 (10): 27-37.

Erskine, Toni. 2004. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. "Strategic denial and deception." International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Studyspark

Study Document Study Document

Counterintelligence Issues Within United States

Pages: 13 (3766 words) Sources: 16 Document Type:Essay Document #:41694312

… the matter of confusing counterintelligence with security, which is precisely what has happened in the past and is currently happening under the Trump Administration with its 2020-2022 National Counterintelligence Strategy.
The strategic objectives of the 2020-2022 National Counterintelligence Strategy of the United States (2020) are: 1) to … of globalization” (1). Given the use of technology today, however, clarifying that role is no easy process. Developers, technicians, production personnel, IT personnel, business development personnel, human resources personnel, and facility personnel are all potential targets of foreign actors and foreign collectors of intelligence (National Counterintelligence and … of intelligence (National Counterintelligence and Security Center n.d.). Private industry is at risk because it possesses intellectual property that foreign actors covet and business activities can be exploited. Cyber operations are also at risk, as is confidential information, which can be mishandled by employees. Counterintelligence operations could ……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. \\\\\\"The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles.\\\\\\" Bachelor\\\\\\'s thesis, Università Ca\\\\\\'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Erskine, Toni. 2004. \\\\\\"\\\\\\'As Rays of Light to the Human Soul\\\\\\'? Moral Agents and Intelligence Gathering.\\\\\\" Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. \\\\\\"Strategic denial and deception.\\\\\\" International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Horkheimer, Max. 1972. Critical Theory. New York: Seabury Press.

Intelligence and National Security Alliance. 2020. Counterintelligence for the 21st Century. Arlington, VA.

Join thousands of other students and

"spark your studies".