Policy Development Essays (Examples)

Studyspark

Study Document Study Document

Government Transparency

Pages: 2 (684 words) Sources: 5 Document Type:Essay Document #:90421039

… to increase the knowledge of the public about their governments. For example, the Association of Southeast Asian Nations (ASEAN) recently reported upon a policy conference designed to promote awareness of policy and dialogue about the creation of micro enterprises to fuel economic growth, and the need for government support of such emerging economic entities … freer disclosure and propagation of voices that might otherwise have gone unheard of in the past.
According to a study conducted by UN development Programme and the UN Office of the High Commissioner for Human Rights “people valued governance not only as an enabler of development, but also as a stand-alone objective” and a study by Transparency International indicated a “clear connection between poor governance and poverty” (UN SDG, ……

References

References

ASEAN holds policy dialogue on formalisation of micro enterprises. 2019. Accessed June 30,2109 at:  https://asean.org/asean-holds-policy-dialogue-formalisation-micro-enterprises/ 

Government transparency. 2019. Ballotpedia. Accessed June 30, 2109 at:  https://ballotpedia.org/Government_transparency 

An honest and responsive government. 2014. UN SDG Action. Accessed June 30, 2109 at:  https://sdgactioncampaign.org/2014/10/24/an-honest-and-responsive-government-the - role-of-citizen-voice/

Krastev, T. 2019. Does more transparency mean more trust? Open Government Partnership. Accessed June 30, 2109 at:

 https://www.opengovpartnership.org/trust/does-more-transparency-mean-more-trust/ 

Transparency in the age of social media influence. 2017. Bookmark This. Accessed June 30, 2109 at: https://bookmarkcontent.com/blog/content/transparency-age-social-media - influence/#

Studyspark

Study Document Study Document

Maritime Safety And Security SOP For Homeland Security Perspectives

Pages: 4 (1341 words) Sources: 11 Document Type:literature review Document #:28623347

… sync with all other industries that seem to have a step forward in adopting technological solutions. As a result of this growth and development in technological solutions, the security of data and other sensitive information has increasingly become a huge concern for the industry (Bueger, 2015). Cybersecurity … to those attacks, and be able to recover from those cyber incidents (Kimberly, 2018). Cybersecurity in the maritime industry is not an isolated development, and recent incidents such as the Estonia cybersecurity attack in 2007 and Stuxnet in 2009 should have served to demonstrate to the Maritime ……

References

References

Bowen, B.M. (2011). Measuring the Human Factor of Cyber Security. Rerieved from  http://www.cs.columbia.edu/~bmbowen/papers/metrics_hst.pdf 

Bueger, C. (2015). What is Maritime Security? Maritime Policy, 53, 159-164.

Fitton, O. P. (2015). The Future of Maritime Cyber Security. Retrieved from  https://eprints.lancs.ac.uk/id/eprint/72696/1/Cyber_Operations_in_the_Maritime_Environment_v2.0.pdf 

Hadlington, L. (2018). The \\\\\\"Human Factor\\\\\\" in cybersecurity: Exploring the accidental insider. Psychological and Behavioral Examinations in Cyber Security, 4(6), 46-63.

Hareide, O. S. (2018). Enhancing Navigator Competence By Demonstrating Maritime Cyber Security. The Journal of Navigation, 71(5), 1025-1039.

Hayes, C. R. (2016). Maritime Cybersecurity: The Future of National Security. Monterey, California: Naval Post Graduate School.

Herzog, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), 49-60.

Hoffmann, J. (2018). Review of Maritime Transport. New York: UNCTAD.

Studyspark

Study Document Study Document

The Ethics Of Clandestine Operations

Pages: 11 (3151 words) Sources: 14 Document Type:literature review Document #:69864024

… on their own independent clandestine operations at times—often in ways that are not supportive of a unified aim or of a particular administration’s policy, as Warner and McDonald (2005) point out in their research. The Overview of the United States Intelligence Community for the 111th Congress (2009) … under any one administration, the events leading up to the Iraq War provide a fertile ground for understanding: As Hersh (2003) shows, Bush’s policy advisors in the OSP were involved in their own clandestine operation, which focused on overruling the intelligence analysts at the CIA and shaping … in the OSP were involved in their own clandestine operation, which focused on overruling the intelligence analysts at the CIA and shaping foreign policy till it met their own aims and objectives. The “cabal” at the OSP involved in this clandestine operation consisted of a group of … such as Abram Shulsky, Paul……

References

Bibliography

Arnold, A. and D. Salisbury. The Long Arm, 2019. Retrieved from https://www.belfercenter.org/publication/long-arm

Barker, Michael J. \\\\\\"Democracy or polyarchy? US-funded media developments in Afghanistan and Iraq post 9/11.\\\\\\" Media, Culture & Society 30, no. 1 (2008): 109-130.

Best, Richard A. Intelligence to Counter Terrorism: Issues for Congress. Congressional Research Service: CRS Report for Congress, 2002.

Carter, Ashton B. \\\\\\"Overhauling counterproliferation.\\\\\\" Technology in Society 26, no. 2-3

(2004): 257-269.

Crumpton, Henry A. The art of intelligence: lessons from a life in the CIA\\\\\\'s clandestine service. Penguin, 2013.

Hersh, Seymour. Selective Intelligence. The New Yorker, 2003.  http://www.newyorker.com/magazine/2003/05/12/selective-intelligence 

McCormick, G. H., & Owen, G. “Security and coordination in a clandestine organization.” Mathematical and Computer Modelling, 31, no. 6-7 (2000), 175-192.

Studyspark

Study Document Study Document

Learning Goals Real Life Experience And Personal Experience

Pages: 10 (3023 words) Document Type:Essay Document #:36646335

… functions.
Limitations
Sex offender supervision has a singular general model
The lack of official policies for supervising sex offenders has led to the development of several policies that detail the minimum standards for the management and supervision of offenders. Some of the key standards and practices in ……

Studyspark

Study Document Study Document

Counterintelligence Issues Within The United States

Pages: 18 (5457 words) Sources: 29 Document Type:Research Paper Document #:72238996

… Wirtz (2000) help to make the problem of morality in CI even more complicated by asking if deception should have any part in policy. They represent one side of the ethical spectrum and Cohen (2016) represents the other side. Kent (2019) and Godson and Wirtz (2000) represent … the era of globalization” (1). Yet the culture of deception has spread all over the globe. Developers, technicians, production personnel, IT personnel, business development personnel, human resources personnel, and facility personnel are all potential targets of foreign actors and foreign collectors of intelligence (National Counterintelligence and Security ……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. "The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles." Bachelor's thesis, Università Ca'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Cohen, Shlomo. 2016. "Are There Moral Limits to Military Deception?." Philosophia 44 (4): 1305-1318.

Coyne, John, Peter Bell, and Shannon Merrington. 2013. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2 (10): 27-37.

Erskine, Toni. 2004. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. "Strategic denial and deception." International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Studyspark

Study Document Study Document

Counterintelligence Issues Within United States

Pages: 13 (3766 words) Sources: 16 Document Type:Essay Document #:41694312

… globalization” (1). Given the use of technology today, however, clarifying that role is no easy process. Developers, technicians, production personnel, IT personnel, business development personnel, human resources personnel, and facility personnel are all potential targets of foreign actors and foreign collectors of intelligence (National Counterintelligence and Security ……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. \\\\\\"The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles.\\\\\\" Bachelor\\\\\\'s thesis, Università Ca\\\\\\'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Erskine, Toni. 2004. \\\\\\"\\\\\\'As Rays of Light to the Human Soul\\\\\\'? Moral Agents and Intelligence Gathering.\\\\\\" Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. \\\\\\"Strategic denial and deception.\\\\\\" International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Horkheimer, Max. 1972. Critical Theory. New York: Seabury Press.

Intelligence and National Security Alliance. 2020. Counterintelligence for the 21st Century. Arlington, VA.

Studyspark

Study Document Study Document

Traditional Medicine Usage In African Nations

Pages: 12 (3615 words) Sources: 30 Document Type:Essay Document #:38085332

… in Africa. Structural, dramaturgic and institutional factors in formal institutionalization in Africa of health care has come about as a result of investment, development, and political stability (Ratcliffe, 2013). The relationship among cultural traditions, laws of society, and the symbolic boundaries have served to create the structural … of the rules of the community, one must have a sense of the people (Afro-centric Alliance, 2001). There is a community basis for development that goes entirely missed by the progressive reformers who seek to update Africa in accordance with Westernized models of development.
As such, Africa has its mythological leaders and figures, as Prempeh (2007) points out, noting that “the assault on constitutionalism was spearheaded by … the top: the narrative is a type of political propaganda.
Nigeria is one nation in Africa that has benefited extensively from investment and development, and that has thus seen its structural, dramaturgical and……

References

References

Afro-centric Alliance, A. (2001). Indigenisingorganizational change: Localisation in Tanzania and Malawi. Journal of Managerial Psychology, 16(1), 59-78.

Asiseh, F., Owusu, A., & Quaicoe, O. (2017). An analysis of family dynamics on high school adolescent risky behaviors in Ghana. Journal of Child & Adolescent Substance Abuse, 26(5), 425-431.

Austin, G. (2010). African economic development and colonial legacies (Vol. 1, No. 1, pp. 11-32). Institut de hautes études internationales et du développement.

Brager, G., Specht, H., Torczyner, J. L., &Torczyner, J. (1987). Community organizing. Columbia University Press.

Bratton, M., & Van de Walle, N. (1997). Democratic experiments in Africa: Regime transitions in comparative perspective. Cambridge university press.

Burnham, G. M., Pariyo, G., Galiwango, E., & Wabwire-Mangen, F. (2004). Discontinuation of cost sharing in Uganda. Bulletin of the World Health Organization, 82, 187-195.

Dillard, C., Duncan, K. L., & Johnson, L. (2017). Black History Full Circle: Lessons from a Ghana Study Abroad in Education Program. Social Education, 81(1), 50-53.

Ehui, S. (2020). Protecting food security in Africa. Retrieved from https://www.brookings.edu/blog/africa-in-focus/2020/05/14/protecting-food-security-in-africa-during-covid-19/

Studyspark

Study Document Study Document

Maslow S Hierarchy Of Needs Model And Its Application In Human Resources

Pages: 12 (3607 words) Sources: 9 Document Type:Research Paper Document #:83319615

… being’s need for friendship, fellowship, social connectivity, family and intimacy. Once the need for love and belonging is fulfilled, the individual requires the development of esteem, which includes having a sense of respect, self-esteem, status, approval, recognition, stature, strength in one’s abilities, and the freedom to pursue ……

References

Bibliography

Bussin, M., & Christos, D. (2018). Blind hiring not as crazy as it sounds. HR Future,  2018(Sep 2018), 36-39.

CBS News (2017). Retrieved from  http://www.cbsnews.com/videos/meet-bozoma-saint-john-the-woman-tasked-with-fixing-ubers-image/ 

Eisenhardt, K. M. (1989). Agency theory: An assessment and review. Academy of management review, 14(1), 57-74.

Frank, L. (2018). How to Use Employee Referrals Without Giving Up Workplace Diversity. Retrieved from  https://hbr.org/2018/03/how-to-use-employee-referrals-without-giving-up-workplace-diversity 

Jensen, M., & Meckling, W. (1976) Theory of the firm: Man- agerial behavior, agency costs, and ownership structure. Journal of Financial Economics, 3, 305-360.

Larcker, D. F., & Tayan, B. (2017). Governance Gone Wild: Epic Misbehavior at Uber Technologies. Rock Center for Corporate Governance at Stanford University Closer Look Series: Topics, Issues and Controversies in Corporate Governance No. CGRP-70, 18-3.

Payscale. (2018). Retrieved from  https://www.payscale.com/data/job-referral s

ProActive Solutions. (2020). Agency theory. Retrieved from http://knowledgegrab.com/learners-zone/study-support/performance-management-review/framework-introduction-to-hrm/agency-theory/

Studyspark

Study Document Study Document

Self Regulation Proposal

Pages: 6 (1825 words) Sources: 6 Document Type:Essay Document #:60406308

...Policy development Response to Self-Regulation Proposal
Standards and Culture in Self Regulation
Introduction
The pitfalls of self-regulation are not unknown: object lessons abound in Tyco, WorldCom, Enron, Arthur Andersen, and several others (Pritchard, 2003). What to make then of a proposal for the implementation of self-regulation, thus decreasing regulatory oversight of our company? On the one hand, few firms are going to reject such a proposal as it means less red tape for them; on the other hand, compliance is culture and a culture without it can quickly turn into a slippery slope down the same path taken by the companies already mentioned. Yet, as Omarova (2011) points out, an industry without self-regulation is one unlikely to address the problems that plague it: at some point, accountability and firm responsibility is needed to address issues that by and large elude regulators by more than a few paces. The problem of relying regulators……

References

References

Arner, D. W., Barberis, J., & Buckey, R. P. (2016). FinTech, RegTech, and the reconceptualization of financial regulation. Nw. J. Int'l L. & Bus., 37, 371.

Arnone, M., & Padoan, P. C. (2008). Anti-money laundering by international institutions: a preliminary assessment. European Journal of Law and Economics, 26(3), 361-386.

Greene, E., & Odorski, C. (2015). SEC enforcement in the financial sector: addressing

Omarova, S. T. (2010). Rethinking the future of self-regulation in the financial industry. Brook. J. Int'l L., 35, 665.post-crisis criticism. Bus. L. Int'l, 16, 5.

Omarova, S. T. (2011). Wall street as community of fate: Toward financial industry self-regulation. University of Pennsylvania Law Review, 159(2), 411-492.

Pritchard, A. C. (2003). Self-regulation and securities markets. Regulation, 26, 32.

Studyspark

Study Document Study Document

The Rise Of The Opium Trade In Afghanistan Following The US Invasion

Pages: 14 (4271 words) Sources: 15 Document Type:Research Paper Document #:85024812

… along with implementable action items to mobilizing members to advance that action and promote the ideology that supports it. Tactics refers to the development of a spirit of mission where a command-and-control structure is in place, with discipline and rigor resulting. Training is involved and motivation is … of the contextual factors in which it is situated. Afghanistan is but one small piece in a much bigger geopolitical puzzle of foreign policy that becomes clearer as the years pass. The US may have been waging a war on terror in these past 20 years, but ……

References

References

Almukhtar, S. & Nordland, R. (2019). What Did the U.S. Get for $2 Trillion in Afghanistan? Retrieved from  https://www.nytimes.com/interactive/2019/12/09/world/middleeast/afghanistan-war-cost.html 

Barno, D. (2007). The Other War: Counterinsurgency Strategy in Afghanistan 2003– 20. Military Review, 87(5), 32–44.

Barton, G. (2016). Out of the ashes of Afghanistan and Iraq: the rise and rise of Islamic State. Retrieved from  https://theconversation.com/out-of-the-ashes-of-afghanistan-and-iraq-the-rise-and-rise-of-islamic-state-55437 

Felbab-Brown, V. (2017). Afghanistan’s opium production is through the roof—why Washington shouldn’t overreact. Retrieved from  https://www.brookings.edu/blog/order-from-chaos/2017/11/21/afghanistans-opium-production-is-through-the-roof-why-washington-shouldnt-overreact/ 

FM 3-24. (2014). Retrieved from  https://fas.org/irp/doddir/army/fm3-24.pdf 

Hitz, F. P. (1999). Obscuring Propriety: The CIA and Drugs. International Journal of Intelligence and CounterIntelligence, 12(4), 448-462.

IrishTimes. (2001). Britain freezes £61m of suspected Taliban assets. Retrieved from  https://www.irishtimes.com/news/britain-freezes-61m-of-suspected-taliban-assets-1.398565 

Kiras, J. D. (2002). Terrorism and Irregular Warfare, in John Baylis, James Wirtz, Eliot Cohen and Colin Gray eds., Strategy in the Contemporary World (Oxford: Oxford University Press, 2002), 208–232.

Join thousands of other students and

"spark your studies".