Play Essays (Examples)

Studyspark

Study Document Study Document

Maritime Safety And Security SOP For Homeland Security Perspectives

Pages: 4 (1341 words) Sources: 11 Document Type:literature review Document #:28623347

… Having had no major cybersecurity issues in recent times, the maritime industry seems to have let its guard down. The maritime industry has played down any of the legitimate fears of a potential cybersecurity attack, despite 90% of the world trade being facilitated by the maritime industry ……

References

References

Bowen, B.M. (2011). Measuring the Human Factor of Cyber Security. Rerieved from  http://www.cs.columbia.edu/~bmbowen/papers/metrics_hst.pdf 

Bueger, C. (2015). What is Maritime Security? Maritime Policy, 53, 159-164.

Fitton, O. P. (2015). The Future of Maritime Cyber Security. Retrieved from  https://eprints.lancs.ac.uk/id/eprint/72696/1/Cyber_Operations_in_the_Maritime_Environment_v2.0.pdf 

Hadlington, L. (2018). The \\\\\\"Human Factor\\\\\\" in cybersecurity: Exploring the accidental insider. Psychological and Behavioral Examinations in Cyber Security, 4(6), 46-63.

Hareide, O. S. (2018). Enhancing Navigator Competence By Demonstrating Maritime Cyber Security. The Journal of Navigation, 71(5), 1025-1039.

Hayes, C. R. (2016). Maritime Cybersecurity: The Future of National Security. Monterey, California: Naval Post Graduate School.

Herzog, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), 49-60.

Hoffmann, J. (2018). Review of Maritime Transport. New York: UNCTAD.

Studyspark

Study Document Study Document

Cholelithiasis Gallstones Gallbladder Disease

Pages: 13 (3816 words) Sources: 12 Document Type:Case Study Document #:34628165

...Play Introduction
Gallbladder disease, especially cholelithiasis (gallstones) affects over 20 million Americans every year. The condition often goes undiagnosed because cholelithiasis rarely presents symptoms. Abdominal discomfort, nausea, jaundice and biliary colic are some symptoms of the condition. Imaging techniques are the most accurate diagnosis tools for gallbladder diseases. However, laboratory values such as CBC, serum amylase, liver-function testing and lipase can help differentiate the type of gallbladder disease/or identify related issues. Surgery is the most effective treatment for gallbladder disease patients. Exercise, diet, and nutrition affect gallbladder disease. It is important for patients to integrate the healthy habits into their lifestyle to lower the risk of developing gallbladder disorders (Jugenheimer, et al., 2008).
Cholelithiasis (gallstones) is the most common type of gallbladder disease. It affects over 20 million Americans every year, translating to over $6.3 billion in direct costs. Generally, gallstones are asymptomatic. The stones are usually identified during autopsy or……

References

References

Anderson, P. O., Knoben, J. E., & Troutman, W. G. (2010). Clinical drug data. New York: McGraw-Hill Medical.

Al-alem, F., Mattar, R. E., Madkhali, A., Alsharabi, A., Alsaif, F., & Hassanain, M. (April 26, 2017). Incidental Gallbladder Cancer.

Borzellino, G., & Cordiano, C. (2008). Biliary lithiasis: Basic science, current diagnosis, and management. Milan: Springer.

Bullock, ., Shane, ., & Hales, . (2012). Principles of Pathophysiology. Sydney: P. Ed Australia.

In Agresta, F., In Campanile, F. C., & In Vettoretto, N. (2014). Laparoscopic Cholecystectomy: An Evidence-based Guide.

In Cox, M. R., In Eslick, G. D., & In Padbury, R. (2018). The management of gallstone disease: A practical and evidence-based approach.

In Wang, D. Q.-H., & In Portincasa, P. A. M. (2017). Gallstones: Recent advances in epidemiology, pathogenesis, diagnosis and management.

Jugenheimer, M., Immenroth, M., Berg, T., & Brenner, J. (2008). Laparoscopic cholecystectomy. Heidelberg: Springer.

Studyspark

Study Document Study Document

Program Logic Model

Pages: 6 (1769 words) Sources: 8 Document Type:question answer Document #:91645810

… show, educators should have a sexual health culture competency when training to educate teens about the risks associated with sexual activity, as culture plays an important role in the lives of families and individuals and how they perceive themselves, others and the world around them. The more ……

References

References

Bandura, A. (2018). Toward a psychology of human agency: Pathways and reflections.  Perspectives on Psychological Science, 13(2), 130-136.

Bickel, R., Weaver, S., Williams, T., & Lange, L. (1997). Opportunity, community, and teen pregnancy in an Appalachian state. The Journal of Educational Research, 90(3), 175-181.

Chapin, J. (2001). It won't happen to me: The role of optimistic bias in African American teens' risky sexual practices. Howard Journal of Communication, 12(1), 49-59.

Damon, W. (1984). Peer education: The untapped potential. Journal of applied developmental psychology, 5(4), 331-343.

Kerpelman, J. L., McElwain, A. D., Pittman, J. F., & Adler-Baeder, F. M. (2016). Engagement in risky sexual behavior: Adolescents’ perceptions of self and the parent–child relationship matter. Youth & Society, 48(1), 101-125.

Sciolla, A., Ziajko, L. A., & Salguero, M. L. (2010). Sexual health competence of international medical graduate psychiatric residents in the United States. Academic Psychiatry, 34(5), 361-368.

Stakic, S., Zielony, R., Bodiroza, A., & Kimzeke, G. (2003). Peer education within a frame of theories and models of behaviour change. Entre Nous: The European Magazine for Sexual and Reproductive Health, 56, 4-6.

Walsh-Buhi, E. R., Marhefka, S. L., Wang, W., Debate, R., Perrin, K., Singleton, A., ... & Ziemba, R. (2016). The impact of the Teen Outreach Program on sexual intentions and behaviors. Journal of Adolescent Health, 59(3), 283-290.

Studyspark

Study Document Study Document

Comparing Irans Military And Culture To The U S Military And Culture

Pages: 8 (2313 words) Sources: 10 Document Type:Essay Document #:35757446

...Play Introduction
Military is an extension of culture, politics and history. As Eric Ouellet (n.d.) points out, understanding a nation’s military requires that one focus “on the organized violence of armed groups; whether this violence is actual, potential, or symbolic” (p. 30). When it comes to the U.S. and Iran, no two countries could be more different. The U.S. is a liberal, Western democracy with the world’s biggest all-volunteer military. Iran is a Middle Eastern nation that operates under a theocracy and mandates military service for its men. In the U.S., the military is something separate and distinct from civilian life—soldiers are respected and honored for their courage and sacrifice and regarded as heroes for defending the nation; but in Iran, military service is mandatory and there is no clear line between civilian life and the military life as every male civilian has to serve—and this difference between the two military……

References

References

Adams, G., & Murray, S. (Eds.). (2014). Mission creep: the militarization of US foreign policy?. Georgetown University Press.

Butler, S. (2003). War is a Racket. LA: Feral House.

Chambers, J. (2003). To Raise an Army: The Draft Comes to Modern America. New York: The Free Press.

Forsling, C. (2017). The military has a toxic leadership problem. Retrieved from  https://taskandpurpose.com/military-toxic-leadership-problem 

Jacobson, M. (2008). Sanctions against Iran: A promising struggle. Washington Quarterly, 31(3), 69-88.

Ouellet, E. (n.d.). New directions in military sociology.

Reuters. (2019). Senior Iranian military adviser threatens broad response to any U.S. move. Retrieved from  https://www.reuters.com/article/us-saudi-aramco-iran-guards/senior-iranian-military-adviser-threatens-broad-response-to-any-u-s-move-idUSKBN1W50WG 

Snow, R., & Wynn, S. T. (2018). Managing Opioid Use Disorder and Co-Occurring Posttraumatic Stress Disorder Among Veterans. Journal of psychosocial nursing and mental health services, 56(6), 36-42.

Studyspark

Study Document Study Document

Why Hamlet Hesitates To Act

Pages: 1 (364 words) Document Type:Essay Document #:26719766

… The resolution is satisfactory to me because this is all very plausible and I could see no other way for the story to play out. Justice is served the king and Hamlet, no longer in doubt—and also no longer alive.…

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

...Play Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage,……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf 

National Counterintelligence and Security Center. “Foreign Economic Espionage in Cyberspace.” Office of the Director of National Intelligence, 2018.  https://www.dni.gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf 

Rubenstein, D. “Nation State Cyber Espionage and its Impacts.” Washington University in St. Louis, December 2014.  https://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/ 

Weissbrodt, D. “Cyber-Conflict, Cyber-Crime, and Cyber-Espionage.” Minnesota Journal of International Law 22, no. 2 (2013).

Studyspark

Study Document Study Document

EV Market Business Opportunity Analysis Report

Pages: 8 (2311 words) Sources: 16 Document Type:Term Paper Document #:80511114

… must differentiate or die—and that is what this innovative idea aims to do.
Role of Entrepreneurs and Entrepreneurship on Innovation
Entrepreneurs and entrepreneurship play big roles in the delivery of business innovation. As Weinberger (2016) notes “entrepreneurs are creating jobs at more than twice the rate of ……

References

References

Andwari, A.M., Pesiridis, A., Rajoo, S., Martinez-Botas, R. and Esfahanian, V., 2017. A review of Battery Electric Vehicle technology and readiness levels. Renewable and Sustainable Energy Reviews, 78, pp.414-430.

Angerer, M., Brem, A., Kraus, S. and Peter, A., 2017. Start-up funding via equity crowdfunding in Germany: A qualitative analysis of success factors. The Journal of Entrepreneurial Finance (JEF), 19(1), pp.1-34.

Baron, R.A. and Tang, J., 2011. The role of entrepreneurs in firm-level innovation: Joint effects of positive affect, creativity, and environmental dynamism. Journal of Business Venturing, 26(1), pp.49-60.

Car, 2019. Best EVs 2019. Retrieved from  https://www.carmagazine.co.uk/electric/best-electric-cars-and-evs/ 

Crum, R. 2018. Elon Musk says Tesla nearly died during Model 3 production ramp. Retrieved from  https://www.mercurynews.com/2018/11/26/elon-musk-says-tesla-nearly-died-during-model-3-production-ramp/ 

Ewing, J. 2017. What Needs to Happen Before Electric Cars Take Over the World. Retrieved from https://www.nytimes.com/2017/12/18/business/electric-car-adoption.html

Fuentelsaz, L., Maicas, J.P. and Montero, J., 2018. Entrepreneurs and innovation: The contingent role of institutional factors. International Small Business Journal, 36(6), pp.686-711.

Inman, P., 2019. Is a global recession imminent? Retrieved from  https://www.theguardian.com/uk-news/2019/aug/25/is-a-global-recession-coming-here-are-seven-warning-signs

Studyspark

Study Document Study Document

Security In Communication Challenges

Pages: 10 (2871 words) Sources: 11 Document Type:Research Paper Document #:73429324

...Play Chapter 1: Introduction
Wireless communications are, to any extent, the most rapidly growing section of the communications sector. For this reason, it has seized the consideration and responsiveness of the media and the imaginings of the general public (Ijemaru et al., 2018). In the past decade, cellular communications systems have faced exponential growth and development and there exist billions of users all over the globe. Statistics indicate that by the culmination of 2018, there were approximately 5.1 billion individuals across the globe that subscribed to mobile services, and this signified approximately 67 percent of the world’s populace. Furthermore, the statistics indicate that more than 60 percent of the population in the world has accessibility to internet (GSMA, 2019).
In delineation, wireless communication takes into account the transmission of message signals through minimal energy radio frequency waves by utilizing open air, with the media aspect including both a transmitter and a……

References

References

Bagheri-Karam, G. (2010). Physical-Layer Security in Wireless Communication Systems. Ontario: Waterloo.

Chang, Z. (2019). Physical Layer Security in Wireless Communications. University Of Jyväskylä. Retrieved from:  http://users.jyu.fi/~timoh/TIES327/WPLS.pdf 

Chen, Q., Zhang, C., & Zhang, S. (2008). Secure transaction protocol analysis: models and applications. Springer-Verlag.

GSMA. (2019). Number of Mobile Subscribers Worldwide Hits 5 Billion. Retrieved from:  https://www.gsma.com/newsroom/press-release/number-mobile-subscribers-worldwide-hits-5-billion/ 

Gu, X., & Hunt, R. (2005). Wireless LAN attacks and vulnerabilities. the proceeding of IASTED Networks and Communication Systems.

Ijemaru, G. K., Adeyanju, I. A., Olusunyi, K. O., Ofusori, T. J., Ngharamike, E. T., Sobowale, A. A. (2018). Security Challenges of Wireless Communications Networks: A Survey. International Journal of Applied Engineering Research, 13 (8): 5680 – 5692.

IJEMARU, G. K., UDUNWA, A. I., NGHARAMIKE, E. T., & OLEKA, E. U. (2015). Evaluating the Challenging Issues in the Security of Wireless Communication Networks in Nigeria. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 3, Issue 12, pp. 1-5, 2014.

Jain, A. (2013). Network Security-The Biggest Challenge in Communication. Advance in Electronic and Electric Engineering. Research India Publications.

Studyspark

Study Document Study Document

School Uniforms

Pages: 5 (1474 words) Sources: 5 Document Type:Essay Document #:15058485

… discipline, behavioral issues, the nature of the learning environment, and the student’s learning style and abilities (Adams, 2007). Therefore, the role school uniforms play in influencing student outcomes and achievement is very minimal. School uniform policies have also generated legal issues since they are considered unconstitutional as ……

References

References

Adams, B.J. (2007, May 2). The Effectiveness of School Uniforms on Students’ Academic Achievement and Overall Classroom Behavior. Retrieved from Rowan University website:  https://rdw.rowan.edu/cgi/viewcontent.cgi?article=1769&context=etd 

Creswell, J.W. (2014). Research design: Qualitative, quantitative and mixed methods approaches (4th ed.). Thousand Oaks, CA: SAGE Publications Inc.

DeMitchell, T.A. (2015, December 15). Does Wearing a School Uniform Improve Student Behavior? Retrieved October 19, 2019, from  http://theconversation.com/does-wearing-a-school-uniform-improve-student-behavior-51553 

Ordway, D. (2018, April 20). School Uniforms: Do They Really Improve Student Achievement, Behavior? Retrieved October 19, 2019, from  https://journalistsresource.org/studies/society/education/school-uniforms-research-achievement/ 

Sanchez, J. (2013, April 23). College of Education Researchers Conduct Study on Impacts of School Uniform. Retrieved from University of Nevada, Reno website:  https://www.unr.edu/nevada-today/news/2013/school-uniform-study 

Studyspark

Study Document Study Document

Intelligence Oversight Ethics

Pages: 11 (3311 words) Sources: 15 Document Type:Research Paper Document #:23829007

...Play

This literature review first looks at the history if intelligence oversight (IO) and then explains the current problem it faces in terms of ethics and the arrival of the Digital Age, which has complicated the matter. It next synthesizes the literature on what the various ethical theories are and how this further complicates the issue of IO. Finally, it discusses research on the fundamentals of ethics and gives recommendations for future research.
History of IO
The history of IO begins with the purpose for which it was established, which was to safeguard the privacy and rights of U.S. persons while enabling the Department of Defense to carry out its intelligence functions most effectively (Ford 2006, 721). The question that has always been at the forefront of IO, however, is the question of ethics. As Goldman (2013) notes, as far back as 1929 this question of ethics and its role in……

References

References

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Brown, William F., and Americo R. Cinquegrana. \\\\\\\\\\\\"Warrantless Physical Searches for Foreign Intelligence Purposes: Executive Order 12,333 and the Fourth Amendment.\\\\\\\\\\\\" Cath. UL Rev. 35 (1985): 97.

Cantarella, Michele. \\\\\\\\\\\\"Intelligence ethics in the digital age.\\\\\\\\\\\\" (2016).

Congressional Research Service, “CIA Ethics Education: Background and Perspectives” (2018).

Ferrari, Rachel. \\\\\\\\\\\\"Moral Relativism and Dangerous Ethical Dilemmas in the US Intelligence Community.\\\\\\\\\\\\" (2018).

Ford, Christopher M. \\\\\\\\\\\\"Intelligence Demands in a Democratic State: Congressional Intelligence Oversight.\\\\\\\\\\\\" Tul. L. Rev. 81 (2006): 721.

Goldman, Jan. \\\\\\\\\\\\"Teaching About Intelligjence and Ethics.\\\\\\\\\\\\" Journal of US Intelligence Studies 20, no. 2 (2013): 79.

Hayes, Jonathan. \\\\\\\\\\\\"The Cinema of Oliver Stone: Art, Authorship and Activism by Ian

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".