Military Essays (Examples)

Studyspark

Study Document Study Document

Hurricane Maria And Puerto Rico S Emergency Management

Pages: 11 (3177 words) Sources: 5 Document Type:Research Paper Document #:67675163

...Military Introduction
Hurricane Maria was the strongest hurricane to strike Puerto Rico in nearly a hundred years when it made landfall on the tiny island state in September of 2017 (Amnesty International, 2018). Maria followed upon the heels of Hurricane Irma, which had struck the island only a mere matter of weeks before. Nearly 3000 died as a result, according to Puerto Rico’s Governor and tens of thousands of people were displaced and forced to take up temporary shelter that gradually took on a character of permanence as the island struggled to cope with the devastation of the Category 4 hurricane (Amnesty International, 2018). Losses were estimated at some $90 billion. The fact that Puerto Rico was still reeling from the damages caused by Irma, which hit on September 6th, meant that local organizations were ill-prepared to cope with a second larger hurricane on September 20th. Irma had already “caused the……

References

References

Acevedo, N. (2018). Puerto Rico lacked disaster planning, communications strategy, hurricane study found. Retrieved from https://www.nbcnews.com/storyline/puerto-rico-crisis/puerto-rico-lacked-disaster-planning-communications-strategy-hurricane-study-found-n904866

Achenbach, J. & Hernandez, A. (2017). FEMA administrator: Puerto Rico’s politics, lack of unity, hindering hurricane response. Retrieved from https://www.washingtonpost.com/national/fema-administrator-puerto-ricos-politics-lack-of-unity-hindering-hurricane-response/2017/10/09/f1711996-ad10-11e7-9e58-e6288544af98_story.html?noredirect=on&utm_term=.eef2e6bc0e3e

Amnesty International. (2018). Puerto Rico a year after Hurricane Maria. Retrieved from  https://www.amnesty.org/en/latest/research/2018/09/puerto-rico-a-year-after-hurricane-maria/ 

Bomey, N. (2017). Hurricane Maria halts crucial drug manufacturing in Puerto Rico, may spur shortages. Retrieved from  https://www.usatoday.com/story/money/2017/09/22/hurricane-maria-pharmaceutical-industry-puerto-rico/692752001/ 

CDC. (2019). PHEP. Retrieved from https://www.cdc.gov/cpr/epf/docs/PuertoRico.pdf de Arzola, O. R. (2018). Emergency Preparedness and Hurricane Maria: The Experience of a Regional Academic Medical Center in Southwest Puerto Rico. Journal of Graduate Medical Education,10(4), 477-480. Florido, A. (2018). Government Lawyer Says Puerto Rico's Hurricane Response Plan 'Does Not Exist'. Retrieved from  https://www.npr.org/2018/10/30/662345336/government-lawyer-says-puerto-ricos-hurricane-response-plan-does-not-exist 

McMahon, C. (2018). Double down on the Jones Act? Journal of Maritime Law & Commerce, 49(2), 153-195.

Samaan, J. L., & Verneuil, L. (2009). Civil–Military Relations in Hurricane Katrina: a case study on crisis management in natural disaster response. Humanitarian Assistance: Improving US-European Cooperation, Center for Transatlantic Relations/Johns Hopkins University, Baltimore, MD/Global Public Policy Institute, Berlin, 413-432.

Studyspark

Study Document Study Document

Right Of Informed Refusal For Minors

Pages: 9 (2623 words) Sources: 4 Document Type:Research Paper Document #:16932208

...Military End-of-Life Decision Making for Minors When the Minor Should be the Decision Maker
Today, the right of adults to refuse medical treatment when they feel it is not in their best interests is universally acknowledged, and physician-assisted suicide is even legal in nine states and the District of Columbia (Physician-assisted suicide, 2019). A growing number of health care providers are also maintaining that the right to refuse medical care extends to young people as well, but this issue is particularly contentious because the vast majority of adults in the United States believe that children need and deserve special protections that preclude end-of-life decisions. Drawing on a virtue theoretical framework, the purpose of this paper is to examine the arguments in support of and against allow minors to make end-of-life decisions for themselves, followed by a summary of the research and important findings concerning this issue in the conclusion.
Review and……

References

References

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Bryden, J. (2016, February 25). Medical help in dying should be widely available, with few restrictions: Report. The Canadian Press, 6.

Hursthouse, R. & Pettigrove, G. (2018, Winter). Virtue ethics. The Stanford Encyclopedia of Philosophy. Retrieved from  https://plato.stanford.edu/archives/win2018/entries/ethics-virtue .

Katz, A. L. & Webb, S. A. (2016, August). Informed consent in decision-making in pediatric practice. Pediatrics, 138(2), 30-37.

Lemmens, C. (2009, September). End- of- life decisions and minors: do minors have the right to refuse life preserving medical treatment? A comparative study. Medical Law Review, 28(3), 479-497.

Physician-assisted suicide. (2019). CNN. Retrieved from https://www.cnn.com/2014/11/26/us/ physician-assisted-suicide-fast-facts/index.html.

Salsberry, P. J. (1999, January 1). Caring, virtue theory, and a foundation for nursing ethics. Scholarly Inquiry for Nursing Practice, 6(2), 155-160.

Williams, Z. (2012, October 25). Early puberty: why are kids growing up faster? The Guardian. Retrieved from  https://www.theguardian.com/society/2012/oct/25/early-puberty-growing-up-faster .

Studyspark

Study Document Study Document

Jesse Imeson Criminal Behavior

Pages: 7 (2025 words) Sources: 8 Document Type:Research Paper Document #:27881804

… relapsing…[break]…to get what he wanted.” (“LFP Archives: The hunt for, and truth about, spree killer Jesse Imeson,” 2018). He lied about being in military (“LFP Archives: The hunt for, and truth about, spree killer Jesse Imeson,” 2018) and also about making money stripping at the club Rivera ……

References

References

Bartol, C. R., & Bartol, A, M. (2018). Criminal behavior: A psychological approach. Boston, MA: Pearson Learning Solutions.

“Jesse Imeson charged in death of Windsor man,” (2007). CTV News. Retrieved from:  https://www.ctvnews.ca/jesse-imeson-charged-in-death-of-windsor-man-1.251008 

Lessard, C. (2008). So, why did he do it? Grand Bend Strip. Retrieved from:  https://grandbendstrip.com/2008/11/so-why-did-he-do-it/ 

“LFP Archives: The hunt for, and truth about, spree killer Jesse Imeson,” (2018). The London Free Press. Retrieved from:  https://lfpress.com/news/local-news/lfp-archives-the-hunt-for-and-truth-about-spree-killer-jesse-imeson 

“Man who killed elderly couple and bartender has appeal rejected by Supreme Court,” (2019). CBC. Retrieved from:  https://www.cbc.ca/news/canada/london/man-who-killed-elderly-couple-and-bartender-has-appeal-rejected-by-supreme-court-1.5129542 

Mellor, L. (2013). Rampage. Toronto, Ontario: Dundurn

Paiva, M. (2019). Windsor murderer claims he was sexually abused. iHeart Radio. Retrieved from:  http://www.iheartradio.ca/purecountry/bc-north/windsor-murderer-claims-he-was-sexually-abused-1.9198384 

Perkel, C. (2018). Family of victims lash out as smirking killer gets life sentence. The Globe and Mail. Retrieved from:  https://www.theglobeandmail.com/news/national/family-of-victims-lash-out-as-smirking-killer-gets-life-sentence/article1350382/

Studyspark

Study Document Study Document

Army Leadership Philosophies

Pages: 3 (1020 words) Sources: 2 Document Type:Essay Document #:60758137

… develop towards the ideal forms pointed out by Plato so many centuries ago—the one, the good, and the true (Santas, 1980).
In the military it is not uncommon to identify attributes such as honor and integrity with philosophies of leadership. The reason for this is that leaders ……

References

References

ADRP 6-0. (2012). Mission command. Headquarters, Department of the Army.

Santas, G. (1980). The form of the Good in Plato\\'s Republic. Philosophical Inquiry, 2(1), 374-403.

Studyspark

Study Document Study Document

Comparison Of Leadership Model And Styles

Pages: 5 (1542 words) Sources: 5 Document Type:Essay Document #:47234629

...Military Part One
My Personal Model: Transformational Leadership
My own personal model of leadership is transformational leadership. This model focuses on giving following a vision of what they should work to become. The transformational leader identifies and explains the goal that the organization is trying to reach and how workers can help the organization to achieve that goal. It typically requires a change in the behavior and approaches of the workers, so logic and reason are used to show why this change is needed, which is a way of helping to break down resistance to the change (Nawaz & Khan, 2016). Communication is a key skill used in this model, and transformational leaders have to be able to relate well with followers, provide support along the way, and keep them focused on the vision and the mission. When it comes to organizational development, transformational leaders can be a very valuable asset……

References

References

Maslow, A. H. (1943). A theory of human motivation. Psychological Review, 50(4), 370.

Nawaz, Z. A. K. D. A., & Khan_ PhD, I. (2016). Leadership theories and styles: A literature review. Leadership, 16, 1-7.

Northouse, P. G. (2016). Leadership: Theory and practice (7th ed.). Thousand Oaks: CA: Sage Publications.

Reivich, K. J., Seligman, M. E., & McBride, S. (2011). Master resilience training in the US Army. American Psychologist, 66(1), 25.

Warrick, D. D. (2011). The urgent need for skilled transformational leaders: Integrating transformational leadership and organization development. Journal of Leadership, Accountability and Ethics, 8(5), 11-26

Studyspark

Study Document Study Document

Indian Removal Act 1830

Pages: 13 (4034 words) Sources: 13 Document Type:Research Paper Document #:92871385

… see them as being nations but rather as being unwanted residents on land that the Southerners could use. Jackson wanted to use the military to remove the Indians and give their land in the south to the Southern states. He was willing to divide the land west ……

References

Works Cited

Primary Sources

Crockett, Davy, “On the removal of the Cherokees, 1834,” Gilder Lehrman Institute of American History. https://www.gilderlehrman.org/history-now/spotlight-primary-source/davy-crockett-removal-cherokees-1834

“The Magnetic Telegraph.” Ladies’ Repository 10(1850): 61-62. O’Sullivan, John. “Annexation.” United States Magazine and Democratic Review, vol.17, no. 1 (July-August 1845): 5-10.

Sevier, John. Letter to the Cherokee. DPLA.  https://dp.la/primary-source-sets/cherokee-removal-and-the-trail-of-tears/sources/1500 

Secondary Sources

Brown-Rice, Kathleen. "Examining the Theory of Historical Trauma Among Native Americans." Professional Counselor 3, no. 3 (2013).

Cave, Alfred A. "Abuse of power: Andrew Jackson and the Indian removal act of 1830." The Historian 65, no. 6 (2003): 1330-1353.

Cherokee Preservation Foundation. “About the Eastern Band.” Cherokee Preservation, 2010.  http://cherokeepreservation.org/who-we-are/about-the-ebci/

Studyspark

Study Document Study Document

Mild Neurocognitive Disorder Due To Traumatic Brain Injury

Pages: 2 (456 words) Sources: 3 Document Type:Essay Document #:12325757

...Military The diagnostic criteria for mild neurocognitive disorder due to traumatic brain injury as indicated in the DSM-5 begins with cognitive problems meaning that the patient must have a diagnosis of a mild neurocognitive disorder. There must be evidence of a traumatic brain injury that might have occurred due to a head injury. This head injury must result in the patient losing consciousness, posttraumatic amnesia, disorientation and confusion, and neurological signs (Cooper et al., 2015). Lastly, the mild neurological disorder presents immediately after the patient has experienced the traumatic brain injury or after the patient regains consciousness and it lasts past the acute post-injury period.
Mild neurocognitive disorders usually do not require any treatment other than the patient taking enough rest and over-the-counter pain relievers mostly for treating the headache. However, the patient should be monitored for any persistent, worsening, or new symptoms (Writer & Schillerstrom, 2009). Treatment for the head……

References

References

Cooper, D. B., Bunner, A. E., Kennedy, J. E., Balldin, V., Tate, D. F., Eapen, B. C., & Jaramillo, C. A. (2015). Treatment of persistent post-concussive symptoms after mild traumatic brain injury: a systematic review of cognitive rehabilitation and behavioral health interventions in military service members and veterans. Brain imaging and behavior, 9(3), 403-420.

Hadanny, A., & Efrati, S. (2016). Treatment of persistent post-concussion syndrome due to mild traumatic brain injury: current status and future directions. Expert review of neurotherapeutics, 16(8), 875-887.

Writer, B. W., & Schillerstrom, J. E. (2009). Psychopharmacological treatment for cognitive impairment in survivors of traumatic brain injury: a critical review. The Journal of neuropsychiatry and clinical neurosciences, 21(4), 362-370.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

… practice that involves obtaining secrets without the permission of the owner/possessor of the information. The information is obtained for personal, political, economic or military advantage. Since this practice results in illegitimate possession of personal, sensitive, classified or proprietary information, it can generate numerous risks or threats to ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

The Ethics Of Clandestine Operations

Pages: 11 (3151 words) Sources: 14 Document Type:literature review Document #:69864024

… as Sheldon (1997) shows, clandestine operations are not new or unique to the modern world and in fact ancient Rome used them whenever military operations were impractical. Thus, “political influence operations, seeding, propaganda, political patronage, safe havens, political assassination, and paramilitary operations” can all be traced back more or less to similar operations implemented by the ancient Romans (Sheldon 1997, 299). Today, there are ……

References

Bibliography

Arnold, A. and D. Salisbury. The Long Arm, 2019. Retrieved from https://www.belfercenter.org/publication/long-arm

Barker, Michael J. \\\\\\"Democracy or polyarchy? US-funded media developments in Afghanistan and Iraq post 9/11.\\\\\\" Media, Culture & Society 30, no. 1 (2008): 109-130.

Best, Richard A. Intelligence to Counter Terrorism: Issues for Congress. Congressional Research Service: CRS Report for Congress, 2002.

Carter, Ashton B. \\\\\\"Overhauling counterproliferation.\\\\\\" Technology in Society 26, no. 2-3

(2004): 257-269.

Crumpton, Henry A. The art of intelligence: lessons from a life in the CIA\\\\\\'s clandestine service. Penguin, 2013.

Hersh, Seymour. Selective Intelligence. The New Yorker, 2003.  http://www.newyorker.com/magazine/2003/05/12/selective-intelligence 

McCormick, G. H., & Owen, G. “Security and coordination in a clandestine organization.” Mathematical and Computer Modelling, 31, no. 6-7 (2000), 175-192.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

...Military Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber warfare, helps to establish appropriate countermeasures against cyberattacks and potential threats in cyberspace, and enhances intelligence gathering. While the study provides significant insights on this topic, future studies should examine the……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Join thousands of other students and

"spark your studies".