Online Courses Essays (Examples)

Studyspark

Study Document Study Document

How Do Marriage And Family Therapist View Fathers As Being The Single

Pages: 6 (1680 words) Sources: 5 Document Type:Essay Document #:29707714

...Online courses Abstract
Children in the 21st century have to confound with a fundamentally different cultural and social environment in the course of their growth and development—one of the most notable developments in the increase of single-father families. Single fathers are also, commonly, the legal guardians of their children. Various reasons lead to these situations. Some single parents may opt to be in such a state by choice. Others are forced into the situation by circumstances such as the loss of their partners or separation. It has also been observed that single parents commonly experience a range of challenges, including stress. Single parents face challenges that emanate from the sheer parenting responsibility. Other sources of stress could include but not limited to, financial obligations and coping with their situations. Children of single parents may find it hard to cope and maybe confused because the rules in one household may not be the……

References

References

DeJean, S. L., McGeorge, C. R., & Stone Carlson, T. (2012). Attitudes toward never-married single mothers and fathers: Does gender matter? Journal of Feminist Family Therapy, 24(2), 121-138.

Greif, G. L., Finney, C., Greene-Joyner, R., Minor, S., & Stitt, S. (2007). Fathers who are court-mandated to attend parenting education groups at a child abuse prevention agency: Implications for family therapy. Family Therapy, 34(1), 13-26.

Haire, A. R., &McGeorge, C. R. (2012). Negative perceptions of never-married custodial single mothers and fathers: Applications of a gender analysis for family therapists. Journal of Feminist Family Therapy, 24(1), 24-51.

Jones, E. (1983). Leaving whom? Motherless families: problems of termination for the female family therapist. Journal of Family Therapy, 5(1), 11-22.

Maier, C. A., &McGeorge, C. R. (2014). Positive attributes of never-married single mothers and fathers: Why gender matters and applications for family therapists. Journal of Feminist Family Therapy, 26(3), 163-190.

Studyspark

Study Document Study Document

Platos Republic And Justice

Pages: 3 (1016 words) Sources: 2 Document Type:Essay Document #:77363231

...Online courses Plato’s Republic: A Definition of Justice
According to Plato, “justice is the excellence of the soul, and injustice the defect of the soul” (20). Another definition of it, however, is that justice is “the repayment of a debt” (4). This is a rather narrow definition of justice, and it is one that Socrates unpacks—but it to can get to the heart of the underlying meaning. The just man is one who pursues the good, while the unjust man is one who pursues evil. Of course, as is always the case with Socrates, everything must come around eventually to a definition of the good, which Plato defines in the dialogue as transcendental ideals that objectively exist as universals: to know justice is, as Socrates explains in the Allegory of the Cave, to pursue the ultimate reality, which exists high above, where the source of all good is to be found—in God.……

References

Works Cited

Plato. The Republic.

Plato. The Dialouges, vol. 1. Online Library of Liberty. Retrieved from http://lf-oll.s3.amazonaws.com/titles/111/Plato_0131-01_EBk_v6.0.pdf

Studyspark

Study Document Study Document

Papa Johns Strategic Analysis

Pages: 7 (2158 words) Sources: 9 Document Type:Essay Document #:51025972

… mature market, is not conducive to weakness.
The industry is also impacted by social forces such as trends towards healthier eating, gluten-free eating, online ordering and turns towards more local goods. Founder and then-CEO John Schnatter was forced to resign after using a racial slur during a ……

References

References

Halzack, S. (2018) Papa John’s just went from bad to worse. BNN Bloomberg. Retrieved April 7, 2019 from https://www.bnnbloomberg.com/papa-john-s-just-went-from-bad-to-worse-1.1120265

IBIS World (2019) Pizza restaurants industry in the US. IBIS World. Retrieved April 7, 2019 from  https://www.ibisworld.com/industry-trends/specialized-market-research-reports/consumer-goods-services/food-service-drinking-places/pizza-restaurants.html 

Kenton, W. (2019) Porter’s 5 forces. Investopedia. Retrieved April 7, 2019 from  https://www.investopedia.com/terms/p/porter.asp 

McCormick, M. (2018) Key success factors in a pizza business. Houston Chronicle. Retrieved April 7, 2019 from  https://smallbusiness.chron.com/key-success-factors-pizza-business-2788.html 

Navellier, L. (2009) Papa John’s – how to beat the recession with pizza. NASDAQ. Retrieved April 7, 2019 from https://www.nasdaq.com/personal-finance/papa-johns-PZZA.stm

Papa John’s Form 10-K 2018. Retrieved April 7, 2019 from  https://ir.papajohns.com/static-files/2977c391-0218-4bac-8eb2-dcabd4561cfe 

Papa John’s website, various pages. (2019) Retrieved April 7, 2019 from  https://www.papajohns.com/company/about-papa-johns.html 

QSR (2018) The QSR Top 50. QSR Magazine. Retrieved April 7, 2019 from  https://www.qsrmagazine.com/content/qsr50-2018-top-50-chart

Studyspark

Study Document Study Document

Ethics And Health Information

Pages: 8 (2462 words) Sources: 6 Document Type:Term Paper Document #:87876213

...Online courses Managing Medical Records and the Implementation of Tools and Safeguards Required within HIS
Introduction
Few practices are more important in managing health information systems than managing medical records, safeguarding patients’ medical history, and ensuring that all end users of medical information technology are approved and trained. Some of the biggest factors in security breaches are end users themselves (Rhee, Kim & Ryu, 2009). This is why training of staff on how to use equipment and the importance of protecting passwords is so important (Jackson, 2018). However, the system itself should have system protections built-in that can protect against end user mistakes—protections such as double security via multi-factor authentication (Crossler & Posey, 2017). This paper will discuss the programming language and relational databases that should be used to accommodate security needs for the HIS, the information tools and safeguards required to protect it, the security needed for electronic health records, an……

References

References

Campbell, R. J. (2004). Database Design: What HIM Professionals Need to Know.

Perspectives in Health Information Management 2004, 1:6 (August 4, 2004). Retrieved from  http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_024637.hcsp?dDocName=bok1_024637 

Crossler, R. E., & Posey, C. (2017). Robbing Peter to Pay Paul: Surrendering Privacy for Security's Sake in an Identity Ecosystem. Journal of The Association for Information Systems, 18(7), 487-515.

Donovan, F. (2018). Judge Gives Final OK to $115M Anthem Data Breach Settlement. Retrieved from https://healthitsecurity.com/news/judge-gives-final-ok-to-115m-anthem-data-breach-settlement

HealthIT.gov. (2018). Health Information Privacy, Security, and Your EHR. Retrieved from  https://www.healthit.gov/providers-professionals/ehr-privacy-security 

The IMIA Code of Ethics for Health Information Professionals. (n.d.). Retrieved from http://www.imia medinfo.org/new2/pubdocs/Ethics_Eng.pdf

Jackson, R. (2018). Pulling strings. Retrieved from  https://iaonline.theiia.org/2018/Pages/Pulling-Strings.aspx 

Prince, B. (2013). Programming Languages Susceptible to Specific Security Flaws: Report. Eweek, 12.  Retrieved from  https://www.eweek.com/security/programming-languages-susceptible-to-specific-security-flaws-report

Studyspark

Study Document Study Document

Counterintelligence

Pages: 12 (3490 words) Sources: 6 Document Type:question answer Document #:11133529

...Online courses Question 1: Construct an assessment of ONCIX strategy, prevention and detection concerning either insider threats, or, economic threats.
Preventing and detecting insider threats is one of the core aspects of the ONCIX strategy. As a new premier counterintelligence and security agency in the U.S. government, ONCIX needs a strong understanding of how to identify and deter insider threats. According to its strategy, “the most effective safeguard against insider threats is a knowledgeable, trusted workforce which is confident that their privacy and civil liberties are respected.”[footnoteRef:2] Making sure that its employees are trustworthy and invested is the first line of defense against insider threats. Gathering data from multiple sources is another line of defense in the ONCIX strategy to mitigate the risk of malicious insiders. The basis of the approach is to use a whole-person, whole-of-career concept that so as to analyze data and to identify anomalies that present themselves. Anomalies……

References

Bibliography

Counter intelligence for National Security, CIA, 1993. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol2no4/html/v02i4a10p_0001.htm

Johnston, David and James Risen, “U.S.had evidence of espionage,” New York Times, 2001. https://www.nytimes.com/2001/02/23/us/us-had-evidence-of-espionage-but-fbi-failed-to-inspect-itself.html

National Counterintelligence Strategy of the United States of America 2016 (Strategy).  https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf 

Prunckun, Hank. 2012. Counterintelligence Theory and Practice, Lanham: Rowman&Littlefield Publishers Inc. Read the following: Chapters 8 to 14, pages 131 to 217. Appendices A to D, pages 219 to 231.

Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September 17). National Security Archive. Accessed January 19, 2017.  http://nsarchive.gwu.edu/NSAEBB/NSAEBB230/ .

Van Cleave, Michelle. “Strategic Counterintelligence: What Is It and What Should We Do About It ?” 2007. CIA Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html

Studyspark

Study Document Study Document

Childrens Amusement Park

Pages: 10 (3072 words) Sources: 10 Document Type:Marketing Plan Document #:62460752

...Online courses Marketing Plan for a Children’s Amusement Park
Executive Summary
The marketing objectives for this paper are to create a strategic marketing plan that considers the situational analysis, target segmentation, marketing mix, financials and controls needed to get the Park to the kids and get parents to buy an annual membership.
The vision for the Park is to be a safe place where all ethnicities and children are welcome and stimulated; where they can play games and have a snack zone with healthy but good-tasting treats. It is to be a place where parents are comfortable spending time as well while they allow their children to play on their own.
The mission is to reach this vision by adhering to the company’s main principles: 1) differentiate, 2) advocate, and 3) create. The first step is to make sure the Park is always offering something unique that sets it apart from other……

References

References

Andzulis, J. M., Panagopoulos, N. G., & Rapp, A. (2012). A review of social media and implications for the sales process. Journal of Personal Selling & Sales Management, 32(3), 305-316.

Appelbaum, S. H., Habashy, S., Malo, J. L., & Shafiq, H. (2012). Back to the future: revisiting Kotter's 1996 change model. Journal of Management Development, 31(8), 764-782.

Chyi, H. I. (2005). Willingness to pay for online news: An empirical study on the viability of the subscription model. Journal of Media Economics, 18(2), 131-142.

Douglas, E. (2019). Houston economy to grow bigger, slower than other Texas cities: analysis. Retrieved from https://www.houstonchronicle.com/business/economy/article/Houston-economy-to-grow-bigger-slower-than-other 13903941.php#targetText=The%20Austin%20metro%20area%2C%20which,pace%2C%20according%20to%20the%20projections.

Frederick, S., Novemsky, N., Wang, J., Dhar, R., & Nowlis, S. (2009). Opportunity cost neglect. Journal of Consumer Research, 36(4), 553-561.

Lin, C. F. (2002). Segmenting customer brand preference: demographic or psychographic. Journal of Product & Brand Management, 11(4), 249-268.

Mangold, W. G., & Faulds, D. J. (2009). Social media: The new hybrid element of the promotion mix. Business horizons, 52(4), 357-365.

Teece, D. J. (2010). Business models, business strategy and innovation. Long range planning, 43(2-3), 172-194.

Studyspark

Study Document Study Document

Fiscal Health Of Public Administration

Pages: 8 (2386 words) Sources: 4 Document Type:response paper Document #:45658914

… skilled jobs for themselves. One way to do this is through the system of public libraries already in place. Public libraries can offer online learning courses through their system that patrons can log into and learn from so that they can cultivate and develop skills that will be useful ……

References

RReferences

Abiad, A. & Khatiwada, S. (2019). 5 ways technology is improving governance, public service delivery in developing Asia. Retrieved from  https://blogs.adb.org/blog/5-ways-technology-improving-governance-public-service-delivery-developing-asia 

Florida Tech. (2019). Five global trends in public administration. Retrieved from  https://www.fit.edu/your-college-decision/trends-in-public-administration/ 

McDonald, B. (2017). Measuring the fiscal health of municipalities. Retrieved from  https://www.lincolninst.edu/sites/default/files/pubfiles/mcdonald_wp17bm1.pdf 

VCU. (2019). Public personnel administration. Retrieved from  https://commed.vcu.edu/IntroPH/Management/management/personnel.html 

Studyspark

Study Document Study Document

Intelligence Oversight Ethics

Pages: 11 (3311 words) Sources: 15 Document Type:Research Paper Document #:23829007

...Online courses

This literature review first looks at the history if intelligence oversight (IO) and then explains the current problem it faces in terms of ethics and the arrival of the Digital Age, which has complicated the matter. It next synthesizes the literature on what the various ethical theories are and how this further complicates the issue of IO. Finally, it discusses research on the fundamentals of ethics and gives recommendations for future research.
History of IO
The history of IO begins with the purpose for which it was established, which was to safeguard the privacy and rights of U.S. persons while enabling the Department of Defense to carry out its intelligence functions most effectively (Ford 2006, 721). The question that has always been at the forefront of IO, however, is the question of ethics. As Goldman (2013) notes, as far back as 1929 this question of ethics and its role in……

References

References

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Brown, William F., and Americo R. Cinquegrana. \\\\\\\\\\\\"Warrantless Physical Searches for Foreign Intelligence Purposes: Executive Order 12,333 and the Fourth Amendment.\\\\\\\\\\\\" Cath. UL Rev. 35 (1985): 97.

Cantarella, Michele. \\\\\\\\\\\\"Intelligence ethics in the digital age.\\\\\\\\\\\\" (2016).

Congressional Research Service, “CIA Ethics Education: Background and Perspectives” (2018).

Ferrari, Rachel. \\\\\\\\\\\\"Moral Relativism and Dangerous Ethical Dilemmas in the US Intelligence Community.\\\\\\\\\\\\" (2018).

Ford, Christopher M. \\\\\\\\\\\\"Intelligence Demands in a Democratic State: Congressional Intelligence Oversight.\\\\\\\\\\\\" Tul. L. Rev. 81 (2006): 721.

Goldman, Jan. \\\\\\\\\\\\"Teaching About Intelligjence and Ethics.\\\\\\\\\\\\" Journal of US Intelligence Studies 20, no. 2 (2013): 79.

Hayes, Jonathan. \\\\\\\\\\\\"The Cinema of Oliver Stone: Art, Authorship and Activism by Ian

Studyspark

Study Document Study Document

Elon Musk And Power At Tesla

Pages: 6 (1701 words) Sources: 5 Document Type:Essay Document #:68738154

...Online courses Tesla is a company that has had at least a 5 year relationship with its CEO Elon Musk. Up until recently Musk was also Chairman of the Board. He was removed from his role as Chairman as part of a settlement with the Securities and Exchange Commission (SEC). The settlement resulted from charges filed by the SEC relating to securities fraud when Musk’s public Tweet on Twitter about taking the company private and that he had “funding secured.” The statement was shown to be a lie (Gaydos, 2018). Musk settled with the SEC and paid a hefty fine and Robyn Denholm replace Musk as Chairman of the Board. Denholm had been a Board member for five years up to that point (Porter, 2018). Thus, up until Musk’s run-in with the SEC in 2018, he had been both CEO and Chairman of the Board—which can serve as a conflict of interest,……

References

References

Abels, P. B., & Martelli, J. T. (2013). CEO duality: how many hats are too many?. Corporate Governance: The international journal of business in society, 13(2), 135-147.

Dickins, D. (2010). CEO and COB duality: Does it matter. Internal Auditing, 25(4), 35-38.

Gaydos, R. (2018). Elon Musk may have violated Tesla’s conduct and ethics code after smoking up in podcast interview: report. Retrieved from  https://www.foxnews.com/tech/elon-musk-may-have-violated-teslas-conduct-and-ethics-code-after-smoking-up-in-podcast-interview-report 

Porter, J. (2018). Tesla has found a new chairperson to replace Elon Musk. Retrieved from  https://www.theverge.com/2018/11/8/18074800/tesla-new-chair-2018-robyn-denholm-elon-musk 

Yang, T., & Zhao, S. (2014). CEO duality and firm performance: Evidence from an exogenous shock to the competitive environment. Journal of Banking & Finance, 49, 534-552.

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

...Online courses Executive Summary
The purpose of this study is to develop timely and informed answers to a series of guiding research questions and subquestions to identify the risks and barriers that are associated with Internet of Things implementations. These types of studies are important today because the Internet of Things is changing the manner in which companies of all sizes and types operate their businesses, and current trends indicate that these implementations are increasing exponentially. The Internet of Things allows conventional computer-based networks to incorporate data collected from everyday objects to provide real-time analyses and new applications for these technologies are being developed every day. Indeed, there are already more mobile devices in use around the world than there are people, and most authorities agree that the Internet of Things deployments will continue to increase well into the foreseeable future. Chapter one of the study provides the rationale in support of……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Join thousands of other students and

"spark your studies".