Norms Essays (Examples)

Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… cyber espionage is an acceptable state behavior despite being a form of cyberattack, which is deemed unacceptable. The evaluation includes an exploration of norms that are established to promote the acceptability of cyber espionage despite its potential damaging impacts on relations between states.
Significance of the Study
… factors. According to Lotrionte (2015), cyber espionage, particularly economic espionage is brought by the failure by international law to provide public order.[footnoteRef:5] Prescriptive norms of international law are not strong enough to provide public order that would deter cyber espionage, especially economic espionage. Similarly, Libicki (2017) contends … despite objections to certain types of cyber espionage by the United States, such practices are rampant due to lack of suitable and effective norms.[footnoteRef:6] The absence of such norms or policies contribute to the widespread use of cyber espionage to promote cyberattacks on a nation’s critical infrastructure. [5: Catherine Lotrionte, “Countering State-Sponsored ………

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Study Document

Diversity In The Workplace

Pages: 4 (1110 words) Sources: 5 Document Type:Essay Document #:78053044

… influence the modern workplace. This paper will examine some of the prevailing research on the subject to determine the current state of gender norms within the workplace.
Diversity is typically considered a benefit to the workplace, but the way in which diversity manifests should nevertheless be taken … their voices are valued, they are more likely to express those voices clearly. In the dominant culture in the United States, the social norms are quite different, and can leave an international person, for example, feeling that their experiences are not valued; this is the way many … to occur even in environments that are otherwise culturally diverse. As such, is important to explore ideas of how to break down these norms, first by understanding where they come from, and second by understanding the different means by which such norms can be challenged from the outset. Education seems to hold some……

References

References

Ely, R. & Thomas, D. (2001) Cultural diversity at work: The effects of diversity perspectives on work group processes and outcomes. Administrative Science Quarterly. Vol. 46 (2) 229-273.

Hesmondhalgh, D. & Baker, S. (2015) Sex, gender and work segregation in the cultural industries. The Sociological Review. Vol. 63 (S51) 23-36.

MacLeod, A. (1992) Hegemonic relations and gender resistance: The new veiling as accommodating protect in Cairo. . Signs: Journal of Women in Culture and Society. Vol. 17 (3) 533-557.

Nathan, R. (no date). As others see us. No publication, in possession of the author.

Sargent, C. & Corse, S. (2013) Picture my gender(s): Using interactive media to engage students in theories of gender construction. Teaching Sociology. Vol. 41 (3) 242-256.

Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

...Norms Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage,……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

...Norms Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage,……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Study Document

Code Of Ethics For Managers In Acquisition

Pages: 11 (3162 words) Sources: 5 Document Type:Research Paper Document #:25977313

… to managers of contracts in acquisition. They note that the code of ethics “can be used to define organizational interests ostentatiously by stipulating norms of employee ethics.” They also note, however, that codes of ethics also serve an insurance function, and often serve as much to protect ……

References

References

Adelstein, J. & Clegg, S. (2016) Code of ethics: A stratified vehicle for compliance. Journal of Business Ethics. Vol. 138 (1) 53-66.

Lazeros, M. (2008) Leaders can learn from Druyun’s ethical lapses and their consequences. USAWC Research Project. Retrieved October 25, 2019 from  https://apps.dtic.mil/dtic/tr/fulltext/u2/a479019.pdf 

McConnnell, A. & Rood, T. (1997) Ethics in government: A survey of misuse of position for personal gain and its implications for developing acquisition strategy. Journal of Business Ethics. Vol. 16 (1997) 1107-1116.

McConnell, T. (2018). Moral dilemmas. Stanford Encyclopedia of Philosophy Retrieved October 25, 2019 from  https://plato.stanford.edu/entries/moral-dilemmas/ 

Neu, D., Everett, J. & Rahaman, A. (2015) Preventing corruption within government procurement: Constructing the disciplined and ethical subject. Critical Perspectives on Accounting. Vol. 28 (2015) 49-61.

Study Document

Domestic Extremism And Terrorism

Pages: 12 (3640 words) Sources: 12 Document Type:Research Paper Document #:16554681

… deep sub-cultural trends among the American populace that are emerging into popular culture and have the potential of disrupting and subverting mainstream cultural norms. To accomplish this objective, this paper first reviews the literature on the subject, then provides profiles of both groups while comparing and contrasting … society’s culture. The end result is that the nation has a set of laws that promote a toxic culture. Breger (2017) posits that norms have been defined as ‘rules or expectations of behavior within a specific [culture]’ (p. 173) and that these norms have to be redefined so that the problem of toxic culture can be better addressed. To stop the rise of domestic terrorism, extremism ……

References

References

Breger, M. L. (2017). Reforming by re-norming: How the legal system has the potential to change a toxic culture of domestic violence. J. Legis., 44, 170.

Beinart, P. (2017). The rise of the violent left. Retrieved from  https://www.theatlantic.com/magazine/archive/2017/09/the-rise-of-the-violent-left/534192/ 

Brockhoff, S., Krieger, T. & Meierrieks, D. (2014). Great expectations and hard times: the (nontrivial) impact of education on domestic terrorism. Journal of Conflict Resolution, 59(7), 1186-1215.

Brown, D. (2017). Proud boys founder. Retrieved from  https://www.portlandmercury.com/blogtown/2017/12/12/19540403/proud-boys-founder-wants-to-trigger-the-entire-state-of-oregon-by-helping-patriot-prayers-joey-gibson-win-the-oregon-person-of-the-year- p

Cramer, E. P., Choi, Y. J., & Ross, A. I. (2017). Race, Culture, and Abuse of Persons with Disabilities. In Religion, Disability, and Interpersonal Violence (pp. 89-110). Springer, Cham.

Dalgaard-Nielsen, A. (2016). Countering violent extremism with governance networks. Perspectives on Terrorism, 10(6), 135-139.

DeCook, J. R. (2018). Memes and symbolic violence:# proudboys and the use of memes for propaganda and the construction of collective identity. Learning, Media and Technology, 43(4), 485-504.

Doyle, E. (Ed.). (2018). Antifa and the Radical Left. Greenhaven Publishing LLC.

Study Document

Culture Analysis At A Software Company

Pages: 5 (1573 words) Sources: 5 Document Type:Research Paper Document #:44019185

… familiar to most tech employees. The people interviewed found the company fairly progressive at the lower levels in terms of things like social norms and diversity. At the higher levels, where the senior leadership are older, the culture veers more towards a workaholic old white male culture. … the workers, something management may wish to avoid.
The underlying assumptions of management appear to be that they can apply their own cultural norms to the rest of the company and that is probably a mistake, because they are mainly different from the workforce. The underlying assumptions ……

References

References

Chambers, K. & Honeycutt, A. (2009) Telecommunications mega-mergers: Impact on employee morale and turnover intention. Journal of Business & Economics Research. Vol. 7 (2) 43-52.

Dencker, J., Joshi, A, & Martocchio, J. (2007) Employee benefits as context for intergenerational conflict Human Resource Management Review. Vol. 17 (2) 208-220.

Lund, D. (2003) Organizational culture and job satisfaction. Journal of Business and Industrial Marketing. Vol. 18 (3) 219-236.

North, M. & Fiske, S. (2015) Intergenerational resource tensions in the workplace and beyond: Individual, interpersonal, institutional and international. Research in Organizational Behavior. Vol. 35 (2015) 159-179.

Yamanoi, J. & Sayama, H. (2013). Post-merger cultural integration from a social network perspective: A computational modeling approach. Computational and Mathematical Organization Theory Vol. 19 (2013) 516-537.

Study Document

Female Hip Hop Artists Impact

Pages: 6 (1746 words) Sources: 8 Document Type:Research Paper Document #:79905236

… is hip hop, ensuring that feminist values and ideals become mainstream while also making sure that feminism does not become whitewashed. Patriarchal social norms have prevented the women of hip hop from receiving the accolades they deserve, but the artists who have made it their business have ……

References

Works Cited

Bruce, La Mar Jurelle. “’The People Inside My Head, Too’: Madness, Black Womanhood, and the Radical Performance of Lauryn Hill.” African American Review, Vol. 45, No. 3 (2012): 371-389.

Jamerson, J’na. ““Best-of” lists and conversations often exclude women. Why?” BBC. 8 Oct, 2019. Retrieved from  http://www.bbc.com/culture/story/20191007-why-are-there-so-few-women-in-best-of-hip-hop-polls 

Morris, Tyana. “The Evolution of Women in Hip Hop.” The Pine Needle. 31 Jan, 2018. Retreived from  https://www.pineneedlenews.com/single-post/2018/01/31/The-Evolution-of-Women-in-Hip-Hop 

Orcutt, KC. “Each One, Teach One | What generations of women in hip hop teach us about perseverance.” Revolt. Oct 16, 2019. Retrieved from  https://www.revolt.tv/2019/10/16/20917629/women-in-hip-hop-lessons 

Oware, Matthew. “A ‘Man’s Woman’?” Journal of Black Studies, Vol. 39, No. 5 (2007): 786-802.

Tillet, S. (2014). Strange Sampling: Nina Simone and Her Hip-Hop Children. American Quarterly, 66(1), 119–137. doi:10.1353/aq.2014.0006 

UDiscover (2019). Let’s talk about the female MCs who shaped hip-hop. Dec 9, 2019. Retrieved from  https://www.udiscovermusic.com/stories/the-female-rappers-who-shaped-hip-hop/ 

White, Theresa R. “Missy “Misdemeanor” Elliott and Nicki Minaj.” Journal of Black Studies, Vol. 44, No. 6, (2013): 607–626. doi:10.1177/0021934713497365 

Study Document

Teaching Sexual Education In Public School

Pages: 8 (2487 words) Sources: 9 Document Type:Term Paper Document #:19342188

… help reduce the prevalence of mental illness and suicide among teens who struggle with their own sexual identity, and can help transform social norms surrounding sexuality and gender. Given that sexuality is an inherent part of human life, there is really no reason not to teach sexual … and taboos. It can be considered a “spiritual” matter (Lepore, 2015, p. 144). Diversity makes it difficult to present material related to sexual norms of behavior in ways that please all parents and other stakeholders. Some points of controversy specifically include abortion and LGBTQ rights. Other sources ……

References

References

Abbott, K., Ellis, S. J., & Abbott, R. (2016). “We”ve got a lack of family values’: an examination of how teachers formulate and justify their approach to teaching sex and relationships education. Sex Education, 16(6), 678–691. doi:10.1080/14681811.2016.1169398 

“America’s Sex Education: How We Are Failing Our Students,” (2017). USC Department of Nursing. Retrieved from  https://nursing.usc.edu/blog/americas-sex-education/ 

Bauman, S.D. (2018). When sex ed pretends to be secular. Senior Independent Study Theses. Paper 8059. Retrieved from  https://openworks.wooster.edu/independentstudy/8059 

Kirby, D. B. (2008). The impact of abstinence and comprehensive sex and STD/HIV education programs on adolescent sexual behavior. Sexuality Research and Social Policy, 5(3), 18-27

Lepore, J. (2015). The facts of life. 94 Foreign Aff. 144 (2015).

National Conference of State Legislatures (2019). State policies on sex education in schools. Retrieved from  http://www.ncsl.org/research/health/state-policies-on-sex-education-in-schools.aspx 

Pardini, P. (2019). The history of sexuality education. Rethinking Schools. Retrieved from  http://rethinkingschools.aidcvt.com/sex/sexhisto.shtml 

Planned Parenthood (2019). What is sex education? Retrieved from  https://www.plannedparenthood.org/learn/for-educators/what-sex-education

Study Document

Autoethnography On Life In Quarantine

Pages: 9 (2825 words) Sources: 3 Document Type:Essay Document #:69295105

...Norms Those Who Wear the Mask and Those Who Don t Life in a Time of Quarantine
Introduction
The quarantined life can be voyeuristically experienced via social media or by way of any number of the various videos submitted to Instagram, Snapchat, Facebook, YouTube or Twitter by celebrities seeking to share with the world how they themselves are getting on during a time of lockdown. Conan O’Brien and Jimmy Fallon interview friends from their computers at home and post them for our entertainment, and generally the overall feeling that one has is that in spite of the “serious” nature of the event, life in quarantine is like one big slumber party, where people stay in their pajamas, talk to friends using Zoom, play games, and while away the time reconnecting with family at home. In short, it sounds like an extended and much-deserved holiday for everyone. No problem, right? Then again,……

References

Works Cited

Branch, S., Shallcross, L., Barker, M., Ramsay, S., & Murray, J. P. (2018). Theoretical Frameworks That Have Explained Workplace Bullying: Retracing Contributions Across the Decades. Concepts, Approaches and Methods, 1-44.

Hilton, J. L., & Von Hippel, W. (1996). Stereotypes. Annual review of psychology,  47(1), 237-271.

McLeod, S. (2008) Social Identity Theory. Simply Psychology. Retrieved from  http://www.simplypsychology.org/social-identity-theory.html 

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".