Operations Essays (Examples)

Studyspark

Study Document Study Document

Polands Solidarity Movement 1980 1989

Pages: 5 (1353 words) Sources: 4 Document Type:Essay Document #:29966337

… Slowly, Solidarity was able to promote freedom of expression and encourage discourse on divergent perspectives. However, one key distinguishing factor an all the operations of Solidarity was the call for nonviolence (ICNC, 2020). From early on, the movement embraced the nonviolence principle and pursued a wide range ……

References

References

Howlett, C.F. (1984). Nicholas Murray Butler\\\\\\'s Crusade for a Warless World. The Wisconsin Magazine of History, 67(2), 99-120.

International Center on Nonviolent Conflict – ICNC (2020). Czechoslovakia’s Velvet Revolution (1989). Retrieved from  https://www.nonviolent-conflict.org/czechoslovakias-velvet-revolution-1989/ 

International Center on Nonviolent Conflict – ICNC (2020, January 13). A Force More Powerful - English - Denmark / Poland / Chile (high definition) [Video]. YouTube.  https://www.youtube.com/watch?v=cM695veBSUU 

Studyspark

Study Document Study Document

Change Management At Nike

Pages: 8 (2482 words) Sources: 8 Document Type:Essay Document #:61161012

...Operations Why Nike Needs to Cut Colin Kaepernick
Executive Summary
Nike’s decision to tap into “woke culture” and turn the out of work former NFL quarter Colin Kaepernick into a brand ambassador has been a controversial one since the sportswear company launched its Colin ad campaign in 2018. Nike needs to change the way it approaches its consumer base in America while simultaneously addressing the supply chain issues that have arisen as a result of COVID-19, which has caused major production problems for Nike in Asia. While Nike has been active in promoting the ultimate Trump antagonist in Colin Kaepernick, it is now time to bury the hatch and put America first but cutting ties with Kaepernick and opening up production in the US so as to 1) bring manufacturing back to America and solve the supply chain problems caused by the virus, and 2) to help put Americans back to……

References

Bibliography and References

Balaji, S., & Murugaiyan, M. S. (2012). Waterfall vs. V-Model vs. Agile: A comparative study on SDLC. International Journal of Information Technology and Business Management, 2(1), 26-30.

Boehm, B. (2002). Get ready for agile methods, with care. Computer, (1), 64-69.

Boehm, B. (2007). A survey of agile development methodologies. Laurie Williams, 45, 119.

Fernandez, D. J., & Fernandez, J. D. (2008). Agile project management—agilism versus traditional approaches. Journal of Computer Information Systems, 49(2), 10-17.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Cameron, E. and Green, M. (2015), Making Sense of Change Management: A complete Guide to the Models, Tools and Techniques of Organizational Change. Kogan Page: London

Kotter, J. P. (2012). Leading Change. Harvard Business Review Press.

TMZ. (2018). Kaep Deal Adds Up... WE GOT NIKE'S CUSTOMER BREAKDOWN. Retrieved from  https://www.tmz.com/2018/09/06/colin-kaepernick-nike-contract-urban-consumers-market-research/

Studyspark

Study Document Study Document

Indirect Vs Direct Abortion And Catholic Teaching

Pages: 3 (1021 words) Sources: 3 Document Type:Essay Document #:51097022

...Operations Ethics
First off, no decision can be made without the informed consent of the parents and if they are opposed to a hysterectomy then it is unethical to go ahead with the operation. Additionally, if they are opposed to an abortion to save the mother’s life then this option cannot be advised or considered either. The principle of the double effect states that there are times when it is morally permissible to perform an action in pursuit of a good end even though it will also have bad effects as well. This is the basic concept behind an indirect evil. In the pursuit of a good, i.e., the preservation of the mother’s life an indirect bad may result but it is not immoral because the bad result was not pursued directly. This would be the situation with a hysterectomy and the direct vs. indirect sterilization issue. The mother does not……

References

Bibliography

Cancer Cures. https://chemo.st/cancer-cures/

Evangelium Vitae 62

Watanabe, Y., Tsuritani, M., Kataoka, T., Kanemura, K., Shiina, M., Ueda, H., & Hoshiai, H. (2009). Radical hysterectomy for invasive cervical cancer during pregnancy: a retrospective analysis of a single institution experience. European journal of gynaecological oncology, 30(1), 79-81.

Studyspark

Study Document Study Document

Telemedicine And Its Impact On Patient Care

Pages: 11 (3241 words) Sources: 10 Document Type:Essay Document #:26347879

...Operations Telemedicine: How does it impact patient care?
Introduction
The modern health care system is better and considerably more complex than what the situation previously was a decade and several decades ago. According to various researchers, the modern health care system is a managed one, and it widely uses technology in contrast to previous health care systems (Conklin, 2002). The many uses of technology in the modern health care system include the use of technology for diagnosis, for minimally invasive treatments, and better monitoring of vital signs and other signs. Moreover, technology is now also being used to consult with medical experts from all over the world remotely. This has led to improved healthcare and has enhanced patent experience.
Furthermore, many mobile applications have been invented to help both patients and doctors specifically. Moreover, they are not only helping patients recover but also improving their quality of life (Tiago et al.,……

References

References

Meyers, A. J., Pontarelli, E., Dutta, S. K., Grinberg, G., & Yenumula, P. R. (2018). Telemedicine Follow-up After Bariatric Surgery. Surgery for Obesity and Related Diseases, 14(11), S168.

Tiago, M. T. B., Tiago, F., Amaral, F. E. B., & Silva, S. (2016). Healthy 3.0: Healthcare digital dimensions. In Reshaping medical practice and care with health information systems (pp. 287-322). IGI Global.

Conklin, T. P. (2002). Health care in the United States: An evolving system. Michigan Family Review, 7(1).

Board on Health Care Services; Institute of Medicine. (2012). \\\\\\\\\\\\"3The Evolution of Telehealth: Where Have We Been and Where Are We Going?\\\\\\\\\\\\" in The Role of Telehealth in an Evolving Health Care Environment: Workshop Summary. National Academies Press, Washington (DC).

Sada, A., Asaad, M., Reidt, W. S., Kellogg, T. A., Kendrick, M. L., McKenzie, T. J., & Habermann, E. B. (2019). Are In-Person Post-operative Clinic Visits Necessary to Detect Complications Among Bariatric Surgery Patients?. Obesity Surgery, 1-4.

Krupka, D. C., Sandberg, W. S., & Weeks, W. B. (2012). The impact on hospitals of reducing surgical complications suggests many will need shared savings programs with payers. Health Affairs, 31(11), 2571-2578.

Fasano, P. (2013). Transforming health care: The financial impact of technology, electronic tools, and data mining. John Wiley & Sons.

Burch, S., Gray, D., & Sharp, J. (2017). The power and potential of telehealth what health systems should know: proposed legislation in Congress offers the promise that the nation\\\\\\\\\\\\'s healthcare policy will support the expansion of telehealth, allowing hospitals and health systems to fully realize the benefits of this important emerging approach to care. Healthcare Financial Management, 71(2), 46-50.

Studyspark

Study Document Study Document

Career Counseling

Pages: 8 (2777 words) Sources: 7 Document Type:Essay Document #:22553329

… for this path. The tasks included directing and coordinating budgets to maximize a firm’s profitability, appointing department heads to improve company leadership, analyzing operations, planning and directing company policies, and preparing budgets. Corresponding knowledge required included administration and management, personnel and human resources, and customer and personal ……

References

References

Holland, J.L., Johnston, J.A. & Asama, F. (1994). More evidence for the relationship between Holland’s personality types and personality variables. Journal of Career Assessment 2(4): 331-340.

“Holland’s Six Personality Types.” Career Key. Retrieved online:  https://www.careerkey.org/choose-a-career/holland-personality-types.html#.WgEWKxNSyRt 

Occupational Information Network (ONet, 2017). Website;  https://www.onetonline.org/ 

Rogers, M.E. & Creed, P.A. (2011). A longitudinal examination of adolescent career planning and exploration using a social cognitive career theory framework. Journal of Adolescence 34(1): 163-172.

Rogers, M.E., Creed, P.A. & Glendon, A.I. (2008). The role of personality in adolescent career planning and exploration: A social cognitive perspective. Journal of Vocational Behavior 73(1): 132-142.

Savickas, M.L. (2004). The theory and practice of career construction. In Career Development and Counseling. John Wiley.

Walsh, B. W., & Holland, J. L. (1992). A theory of personality types and work environments. In W. B. Walsh, K. H. Craik, & R. H. Price (Eds.), Person–environment psychology: Models and perspectives (pp. 35-69). Hillsdale, NJ: Lawrence Erlbaum Associates.

Studyspark

Study Document Study Document

Digital Forensics Importance Of Hash Values

Pages: 5 (1350 words) Sources: 5 Document Type:Essay Document #:47872866

...Operations Hash Values in Digital Forensics
Introduction
Hash values denote condensed representations of digitized or binary content within digital material; however, they offer no additional information pertaining to the contents of any material interpretable by an individual. Moreover, the hash function is algorithms that convert variable-sized text quantities into hash values (which are fixed-sized outputs). Also called “cryptographic hash functions,” they facilitate the development of digital signatures, short textual condensations, and hash tables for the purpose of analysis (Fang et al., 2011; Kumar et al., 2012). In this paper, hash functions and their significance will be addressed.
Description
H (hash function) represents a transformation taking variable-sized input „m? and returning fixed-sized strings (h or hash value; i.e., h = H (m)) (Kumar et al., 2012). The hash functions possessing only the above property can be put to various broad computational uses; however, when applied to cryptography, they normally possess a few……

References

References

Fang, J., Jiang, Z. L., Yiu, S. M., & Hui, L. C. (2011). An efficient scheme for hard disk integrity check-in digital forensics by hashing with combinatorial group testing. International Journal of Digital Content Technology and its Applications.

Kaya, M., & Eris, M. (2017). Hash-based block matching for digital evidence image files from forensic software tools. World Academy of Science, Engineering, and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 11(10), 1068-1071.

Kumar, K., Sofat, S., Jain, S. K., & Aggarwal, N. (2012). SIGNIFICANCE of hash value generation in digital forensic: A case study. International Journal of Engineering Research and Development, 2(5), 64-70.

Netherlands Forensic Institute, (2018a). Technical Supplement Forensic Use of Hash Values and Associated Hash Algorithms. Ministry of Justice and security.

Rasjid, Z. E., Soewito, B., Witjaksono, G., & Abdurachman, E. (2017). A review of collisions in cryptographic hash function used in digital forensic tools. Procedia computer science, 116, 381-392.

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

… possibility until the personal computer began to hit the market in the 1970s (Computer Hope, 2019). As businesses and organizations began to more operations online, individuals began to see an opportunity to exploit weak supports to gain access over company data, individual personal information, or access to ……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

Papa Johns Strategic Analysis

Pages: 7 (2158 words) Sources: 9 Document Type:Essay Document #:51025972

...Operations Papa John’s is the fourth-largest pizza chain in the US, and 20th-largest quick service restaurant overall (QSR, 2018). Its total revenues for 2018 were $1.573 billion, with net income of $1.64 million, according to the company’s latest 10-K. In terms of sales per unit, QSR Magazine (2018) lists Papa John’s with $968,000, higher than Little Caesar’s and Pizza Hut, but lower than Domino’s. The company has over 3300 units in total. According to the company’s website, it has over 5000 locations total, in 45 countries. Founded in 1985 in Jeffersonville, IN, the company began franchising the next year, and has grown steadily since then, although there was a decline in the number of stores in 2017 (QSR, 2018).
According to IBIS World, the pizza industry in the US is worth $47 billion, which gives Papa John’s a 3.3% share. The largest competitor, Domino’s, has a 12.5% share, so there is……

References

References

Halzack, S. (2018) Papa John’s just went from bad to worse. BNN Bloomberg. Retrieved April 7, 2019 from https://www.bnnbloomberg.com/papa-john-s-just-went-from-bad-to-worse-1.1120265

IBIS World (2019) Pizza restaurants industry in the US. IBIS World. Retrieved April 7, 2019 from  https://www.ibisworld.com/industry-trends/specialized-market-research-reports/consumer-goods-services/food-service-drinking-places/pizza-restaurants.html 

Kenton, W. (2019) Porter’s 5 forces. Investopedia. Retrieved April 7, 2019 from  https://www.investopedia.com/terms/p/porter.asp 

McCormick, M. (2018) Key success factors in a pizza business. Houston Chronicle. Retrieved April 7, 2019 from  https://smallbusiness.chron.com/key-success-factors-pizza-business-2788.html 

Navellier, L. (2009) Papa John’s – how to beat the recession with pizza. NASDAQ. Retrieved April 7, 2019 from https://www.nasdaq.com/personal-finance/papa-johns-PZZA.stm

Papa John’s Form 10-K 2018. Retrieved April 7, 2019 from  https://ir.papajohns.com/static-files/2977c391-0218-4bac-8eb2-dcabd4561cfe 

Papa John’s website, various pages. (2019) Retrieved April 7, 2019 from  https://www.papajohns.com/company/about-papa-johns.html 

QSR (2018) The QSR Top 50. QSR Magazine. Retrieved April 7, 2019 from  https://www.qsrmagazine.com/content/qsr50-2018-top-50-chart

Studyspark

Study Document Study Document

Formulating An Effective National Response To Ebola In Nigeria

Pages: 17 (5038 words) Sources: 20 Document Type:Research Paper Document #:83371879

… purposes were adapted to focus on the Ebola disease. Moreover, the country’s political leadership also established isolation facilities and a fully equipped emergency operations center to coordinate the work by specially trained health care staff for diagnosing the disease.
This was no small undertaking by any measure, ……

References

References

Allam, M. F. (2014, September). Ebola hemorrhagic fever: Case fatality rate 90%? Central European Journal of Public Health 22(3), 207-210.

Allam, M. F. & Vonka, V. (2015, March). Ebola virus disease: Temperature checks for travelers? Central European Journal of Public Health, 23(1), 84.

Brand, J. E. & Stela, D. (2014, October). Ebola is here: Knowledge, identification, and appropriate infection control are key. American Nurse Today, 9(10), 37-39.

Brown, G. (2015, Winter). Ebola in America: An epidemic or a pandemic? ABNF Journal, 26(1), 3-5.

Ebola. (2019). Doctors without Borders. Retrieved from https://www.doctorswithout borders.org/what-we-do/medical-issues/ebola.

Ebola outbreak. (2019). U.S. Centers for Disease Control and Prevention. Retrieved from  https://www.cdc.gov/vhf/ebola/history/2014-2016-outbreak/index.html .

Ebola virus disease. (2019). U.S. Centers for Disease Control and Prevention. Retrieved from  https://www.cdc.gov/vhf/ebola/index.html .

Hancock, M. (2019, September). After Ebola. African Business, 422, 56-58.

Studyspark

Study Document Study Document

Optimizing Health Information Systems

Pages: 12 (3717 words) Sources: 16 Document Type:Research Paper Document #:99273225

… In addition, it will be vitally important to ensure the compatibility of the two merged health information systems in order to optimize their operations. In the past, compatibility between disparate health information systems was somewhat easier to achieve because the data typically consisted of alpha-numeric data only; ……

References

References

Abouzhar, C. & Boerma, T. (2009, August). Health information systems: The foundations of public health. Bulletin of the World Health Organization, 83(8), 578-583.

Cresswell, K. & Aziz, S. (2013, May). Organizational issues in the implementation and adoption of health information technology innovations: An interpretative review. International Journal of Medical Informatics, 87(5), 73-86.

Drazen, E. L. (2006, February). Maximizing the benefits of health care information systems. Journal of Medical Systems, 10(1), 51-56.

Kruse, C. S. & Smith, D. (2017, July). Security techniques for the electronic health records. Journal of Medical Systems, 41(8), 127.

Kumar, V. (2011). Impact of health information systems on organizational health communication and behavior. The Internet Journal of Allied Health Sciences and Practice, 9(2), 37-44.

McGrail, K. M. & Black, C. (2009, August). Access to data in health information systems. Bulletin of the World Health Organization, 83(8), 563-569.

Murphy, M. L. (2019, March). Mastering accounting for business combinations: Mergers and acquisitions present challenges that finance can overcome by staying involved with the deal and preparing in advance of the closing. Journal of Accountancy, 227(3), 24-27.

NAHQ code of ethics for healthcare quality. (2019). National Association for Healthcare Quality. Retrieved from  https://nahq.org/about/code-of-ethics .

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".