Policy Implementation Essays (Examples)

Studyspark

Study Document Study Document

Application Of Quality And Safety Concepts

Pages: 11 (3179 words) Sources: 8 Document Type:Case Study Document #:72132391

… research aimed at providing a basis to comprehend where to concentrate HIT linked human and financial resources, in addition to expectations for HIT implementation for patient safety and healthcare quality, since the above two areas are beginning to adopt HIT for preventing preventable events, taking action in … expected results”. Therefore, this involves “the routine collection, review and analysis of data, either generated by digital systems or purposively collected, which measure implementation fidelity and progress towards achieving intervention objectives”. The content of, and part played by, assessment as well as monitoring alters when an intervention … systems to constantly monitor patient safety need to be developed and financed appropriately.
The process of medication offers an example of improved system implementation giving rise to improved human performance. Drug errors are currently occurring often in healthcare facilities; in spite of this, a number of facilities ……

References

Bibliography

Alotaibi, Y. K., & Federico, F. (2017). The impact of health information technology on patient safety. Saudi Med J, 38(12), 1173–1180.

Amit, M. (2019, January 28). 5 Problems Which Healthcare Technology Can Solve for a Healthier World. Retrieved from Net Solutions:  https://www.netsolutions.com/insights/5-healthcare-problems-which-digital-technologies-can-solve-for-a-fit-and-healthy-world/ 

DeSanctis, G., & Poole, M. S. (1994). Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory. Organization Science, 5(2), 121-147.

Feldman, S. S., Buchalter, S., & Hayes, L. W. (2018). Health Information Technology in Healthcare Quality and Patient Safety: Literature Review. JMIR Med Inform, 6(2).

Halamka, J., Mandl, K., & Tang, P. (2008). Early Experiences with Personal Health Records. Journal of the American Medical Informatics Association, 15(1), 1-7.

IOM. (1999). To Err is Human: Building a Safer Health System. National Academy of Sciences.

Singh, H., & Sittig, D. (2016). Measuring and improving patient safety through health information technology: The Health IT Safety Framework. BMJ Quality & Safety, 25, 226-232.

Weigel, F., Hall, D. J., & Landrum, W. H. (2009). Human/Technology Adaptation Fit Theory for Healthcare. SAIS 2009 Proceedings.

Studyspark

Study Document Study Document

COVID 19 In South Africa Nigeria And Swaziland

Pages: 7 (2030 words) Sources: 6 Document Type:literature review Document #:53851517

...Policy implementation Literature Review on Coping Through The Use Of Informal Institutions during COVID 19 in South Africa, Nigeria, and Swaziland
The institutional theory deals with the outlines, regulations, standards, and procedures that are formulated in the institutions as commanding instructions for social behavior. This theory gives an understanding of how institutions are shaped, and the societal norms and frameworks are informed to all people of an organization. Communication is the sole indicator of how organizations are formulated with the help of formal rules and regulations, as that would reflect how they are conversed across all levels of the firm and in what way people are obeying them. This would ultimately build an organizational culture for coping with social and political issues. The informal institutions are socially shared instructions, typically unwritten, that are formed, transferred and imposed outside the official boundaries (Torniainen & Sasstamoinen, 2007), for example, giving tips to the food……

References

References

Coelho, A. (2019). The role of informal institutions in the enforcement of rules and how to improve corporate and public governance in Brazil: Studies based on a set of corporate governance cases involving state-owned companies (Working Paper). Retrieved from SSRN website  https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3434037 

Dacin, M.T., Goodstein, J. & Scott, W.R. (2002). Institutional theory and institutional change: Introduction to the special research forum. Academy of Management Journal, 45(1), 45- 47. DOI: 10.2307/3069284

Escandon-Barbosa, D.M., Urbano, D., Hurtado-Ayala, A., Paramo, J.S. & Dominguez, A.Z. (2019). Formal institutions, informal institutions, and entrepreneurial activity: A comparative relationship between rural and urban areas in Colombia. Journal of Urban Management, 8(3), 458-471.  https://doi.org/10.1016/j.jum.2019.06.002 

Estrin, S. & Prevezer, M. (2010). The role of informal institutions in corporate governance: Brazil, Russia, India, and China compared. Asia Pacific Journal of Management, 28, 41- 67.  https://doi.org/10.1007/s10490-010-9229-1 

Kaufmann, W., Hooghiemstra, R. & Feeney, M.K. (2018). Formal institutions, informal institutions, and red tape: A comparative study. Public Administration, 96(2), 386-403. https://doi.org/10.1111/padm.12397

Meluch, A.L. (2016, August). Understanding the organizational and institutional origins of social support in a cancer support center. (Unpublished doctoral dissertation). Retrieved from https://etd.ohiolink.edu/!etd.send_file?accession=kent1466944822&disposition=inline

Torniainen, T.J. & Sasstamoinen, O.J. (2007). Formal and informal institutions and their hierarchy in the regulation of the forest lease in Russia. Forestry: An International Journal of Forest Research, 80(5), 489-501.  https://doi.org/10.1093/forestry/cpm033 

Studyspark

Study Document Study Document

Enterprise Risk Management In Wells Fargo During The Pandemic

Pages: 15 (4587 words) Sources: 15 Document Type:Essay Document #:32848070

...Policy implementation Enterprise Risk Management in Wells Fargo during the Pandemic
Introduction
As Beasley (2020) points out, enterprise risk management (ERM) is especially needed during the COVID 19 pandemic because of the “number of different, but interrelated risks spread all across most organization” (p. 2). COVID 19 is not just a factor that has impacted one business or industry. It has impacted all businesses and all industries in different ways. Grocery chains like Kroger, for instance, have seen increased demand. Restaurants on the other hand have seen business dry up due to mandated quarantine orders. Small business owners and large corporations have filed for bankruptcy. All of this impacts the banking sector and Wells Fargo specifically because of its role in managing loan products, using interest rates to attract savers, and offering investment advice. “No single risk associated with the COVID-19 pandemic crisis can be managed in isolation,” as Beasley (2020) points……

References

References

Beasley, M. (2020). How to Leverage ERM Principles to Better Respond to COVID-19-Related Risks. ERM Professional Insights.

Derysh, I. (2020). Watchdog questions why Wells Fargo reported giving only one large PPP loan to a Black-owned business. Retrieved from  https://www.salon.com/2020/07/22/watchdog-questions-why-wells-fargo-reported-giving-only-one-large-ppp-loan-to-a-black-owned-business/ 

English, C. (2020). Wells Fargo Forced to Cut Its Dividend After Fed Stress Test. Here’s What Other Banks Did. Retrieved from  https://www.barrons.com/articles/wells-fargo-forced-to-cut-its-dividend-after-fed-stress-test-51593467664 

Hall, J. (2007). Internal Auditing and ERM: Fitting in and Adding Value. Retrieved from  https://global.theiia.org/about/about-the-iia/Public  Documents/Sawyer_Award_2007.pdf

Kaplan, R. & Mikes, A. (2012). Managing risks: A new framework. Harvard Business Review, 3.

Lewis, M. (2010). The Big Short. NY: W. W. Norton.

Lundqvist, S. (2014). Abandoning Silos for Integration: Implementing Enterprise Risk Management and Risk Governance. Lund University.

Morgenson, G. (2020). More Wells Fargo customers say the bank decided to pause their mortgage payments without asking. Retrieved from https://www.nbcnews.com/business/personal-finance/more-wells-fargo-customers-say-bank-decided-pause-their-mortgage-n1234610

Studyspark

Study Document Study Document

Military Aviation Lack Of Training Personnel And Equipment

Pages: 6 (1677 words) Sources: 5 Document Type:Capstone Project Document #:77103001

...Policy implementation Introduction
The aviation field within the armed forces has serious problems as almost all the related services are making reports that they have training, pilot retention, and general machinery maintenance challenges (Burke, 2018; Deal, 2019; United States Government Accountability Office, 2019). The reason for this malaise is not clear but there are two possible originating problems that are just as common to military aviation as they are to the other branches of the military. First, military aviation was dedicating insufficient resources, including time, to maintenance. The period of the War on Terror had many specialized personnel in many departments working around the clock to ensure things were running smoothly. Maintenance issues were, therefore, rarely a problem. With most of the maintenance work being done by contractors, pilots were left to fly several hours with some accumulating upwards of 100,000 hours within a year (Burke, 2018). The situation after the war……

References

Reference List

Burke, C. (2018). The Biggest Problems Facing Military Aviation, According To An Army Aviator. Task and purpose. Retrieved from  https://taskandpurpose.com/the-biggest-problems-facing-military-aviation-according-to-an-army-aviator 

Deal, K. (2019). Military MRO: Solving the maintenance skills shortage with augmented reality. Military embedded system. Retrieved from  http://www.mil-embedded.com/articles/id/?7274 

Pint, E. M., Schnaubelt, C. M., Dalzell, S., Hastings, J. L., Speed, P., & Shanley, M. G. (2017). Review of Army Total Force Policy Implementation (No. RR-1958-A). RAND ARROYO CENTER SANTA MONICA CA SANTA MONICA United States.

U.S. Department of Defense, (2016). National Guard and Reserve Equipment Report for Fiscal Year 2017. Washington, D.C.

United States Government Accountability Office, (2019). “ARMY READINESS: Progress and Challenges in Rebuilding Personnel, Equipping, and Training.” Testimony Before the Subcommittee on Readiness and Management Support, Committee on Armed Services, U.S. Senate. Defense Capabilities and Management.

Studyspark

Study Document Study Document

Counterintelligence

Pages: 12 (3490 words) Sources: 6 Document Type:question answer Document #:11133529

… case so that they see what is at risk and why security must trump over privacy concerns today.[footnoteRef:13] Only then will a proper implementation of policies and protocols be permitted at the counter-intelligence level. [13: Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September ……

References

Bibliography

Counter intelligence for National Security, CIA, 1993. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol2no4/html/v02i4a10p_0001.htm

Johnston, David and James Risen, “U.S.had evidence of espionage,” New York Times, 2001. https://www.nytimes.com/2001/02/23/us/us-had-evidence-of-espionage-but-fbi-failed-to-inspect-itself.html

National Counterintelligence Strategy of the United States of America 2016 (Strategy).  https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf 

Prunckun, Hank. 2012. Counterintelligence Theory and Practice, Lanham: Rowman&Littlefield Publishers Inc. Read the following: Chapters 8 to 14, pages 131 to 217. Appendices A to D, pages 219 to 231.

Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September 17). National Security Archive. Accessed January 19, 2017.  http://nsarchive.gwu.edu/NSAEBB/NSAEBB230/ .

Van Cleave, Michelle. “Strategic Counterintelligence: What Is It and What Should We Do About It ?” 2007. CIA Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

...Policy implementation Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber warfare, helps to establish appropriate countermeasures against cyberattacks and potential threats in cyberspace, and enhances intelligence gathering. While the study provides significant insights on this topic, future studies should examine the……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Studyspark

Study Document Study Document

History Of Bilingual Education

Pages: 4 (1298 words) Sources: 5 Document Type:Term Paper Document #:54783593

… United States, most of whom had different demographics, came from different backgrounds and spoke different languages. This unique philosophy was manifested through public policy that facilitated teaching in native languages and bilingual education, multilingual theatrical productions, and newspaper printing and circulation in several languages. But, Ovando (2003) ……

References

References

Banks, J. A. (1995). Multicultural Education: Its Effects on Students\\\\\\\\\\\\' Racial and Gender Role Attitudes. Handbook of Research on Multicultural Education (pp. 617-627). New York: Macmillan.

Gándara, P., & Escamilla, K. (2017). Bilingual education in the United States. Bilingual and multilingual education, 1-14.

Ovando, C. J. (2003). Bilingual education in the United States: Historical development and current issues. Bilingual research journal, 27(1), 1-24.

Saravia-Shore, M., & Arvizu, S. F. (2017). Cross-cultural literacy: An anthropological approach to dealing with diversity. In Cross-cultural Literacy (pp. xv-xxxviii). Routledge.

Wei, L. (2013). Integration of Multicultural Education into English Teaching and Learning: A Case Study in Liaoning Police Academy. Theory & Practice in Language Studies, 3(4).

Studyspark

Study Document Study Document

Organizational Situations And Interventions

Pages: 6 (1880 words) Sources: 8 Document Type:Essay Document #:43843471

… was also associated with some disadvantages including reduced personal productivity, increased operational costs brought by team-building exercises, and disruptions in operations. Therefore, the implementation of the intervention could have been carried out in a different manner to avoid these disadvantages. If this was to happen again, changes … In this regard, a flexible work schedule was implemented in the organization to help lessen work overload and reduce working hours. Following the implementation of a flexible work schedule, appropriate nursing shifts were established. Nurses at the facility are required to carry out their responsibilities during their ……

References

References

Bhui, K., Dinos, S., Galant-Miecznikowska, M., de Jongh, B. & Stanfeld, S. (2016, December). Perceptions of Work Stress Causes and Effective Interventions in Employees Working in Public, Private and Non-governmental Organizations: A Qualitative Study. BJPsych Bulletin, 40(6), 318-325.

Kelly, E.L., Moen, P. & Tranby, E. (2011, April). Changing Workplaces to Reduce Work-Family Conflict: Schedule Control in a White-Collar Organization. American Sociological Review, 76(2), 265-290.

Khan, N. & Khurshid, S. (2017, February). Workplace Stress and Employee Wellbeing: Case of Health Care Staff in UAE. European Scientific Journal, 13(5), 217-226.

Korte, R.F. (2007). The Socialization of Newcomers into Organizations: Integrating Learning and Social Exchange Processes. Retrieved from Institute of Education Sciences website:  https://files.eric.ed.gov/fulltext/ED504550.pdf 

Kossek, E.E. & Lee, K. (2017, October). Work-Family Conflict and Work-Life Conflict. Retrieved March 24, 2020, from https://oxfordre.com/business/view/10.1093/acrefore/9780190224851.001.0001/acrefore-9780190224851-e-52?print=pdf

Njegovan, B.R. & Kostic, B. (2014). Impact of Organizational Socialization Towards Employees’ Social Adaptation. Journal of Engineering Management and Competitiveness, 4(1), 34-40.

Van Kleef, D., Steen, T. & Schott, C. (2017, October 26). Informal Socialization in Public Organizations: Exploring the Impact of Informal Socialization on Enforcement Behavior of Dutch Veterinary Inspectors. Public Administration, 97(1), 81-96.

Zhou, S., Da, S., Guo, H. & Zhang, X. (2018, April 17). Work-Family Conflict and Mental Health Among Female Employees: A Sequential Mediation Model via Negative Affect and Perceived Stress. Frontiers in Psychology, 9(544), doi:  https://doi.org/10.3389/fpsyg.2018.00544

Studyspark

Study Document Study Document

US Healthcare Reimbursement And Insurance Issues

Pages: 6 (1653 words) Sources: 8 Document Type:Essay Document #:69275488

...Policy implementation HealthCare Insurance and Reimbursement
Medical Insurance Products and Services
Health and medical insurance represent an insurance coverage form that disburses operation and clinical treatment expenditure incurred by those insured. Such insurance may either reimburse insured individuals for the money they put into treatment for injuries or disease or may directly pay care practitioners. It is commonly a part of the compensation packages offered by organizations to their employees for attracting quality recruits (IMedPub, 2020). It constitutes one means by which individuals in different nations pay for their healthcare needs. When individuals hailing from poor backgrounds without any financial risk protection get sick or injured, they encounter the following difficulty: they may either make use of healthcare services, further impoverishing themselves by financing these services, or may forego treatment, stay sick/injured, and risk not being able to function properly or go to work. Regardless of the differences in funding and corporate……

References

References

Araujo, M. (2020). Health and medical insurance differences: HMO, PPO, POS, EPO. Retrieved from  https://www.thebalance.com/health-and-medical-insurance-2645378 

Bertram, M. Y., Lauer, J. A., De Joncheere, K. D., Edejer, T., Hutubessy, R., Kieny, M. P., & Hill, S. R. (2016). Cost-effectiveness thresholds: pros and cons. Bull World Health Organ, 94, 925–930. http://dx.doi.org/10.2471/BLT.15.164418926

Dey, P., & Bach, P. B. (2019). The 6 functions of health insurance. The JAMA Forum, 321(13), 1242-1243.  DOI:10.1001/jama.2019.2320

Ho, A. (2015). Health insurance. Encyclopedia of Global Bioethics. Retrieved from https://www.researchgate.net/publication/298022702_Health_Insurance

IMedPub. (2020). Health insurance. Retrieved from https://www.imedpub.com/scholarly/health-insurance-journals-articles-ppts-list.php

Maruthappu, M., Hasan, A., & Zeltner, T. (2016). Enablers and barriers in implementing integrated care. Health System & Reform, 1(4), 250-256.  https://doi.org/10.1080/23288604.2015.1077301 

Sekhri, N. (2000). Managed care: The US experience. Bulletin of the World Health Organization, 78(6), 830-844. Retrieved from  https://www.who.int/bulletin/archives/78(6)830.pdf 

Strata Decision Technology. (2020). Healthcare and hospital capital budget. Retrieved from  https://www.stratadecision.com/healthcare-and-hospital-capital-budget/

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384

… as the infrastructure physically situated within the corporate premises. Fitting examples of the extensive usage of infrastructure as a Service are automatic and policy-oriented operations like internal networking, data recovery, backup services, and also website hosting. In this type of cloud computing service, it is the service … particular case, the vendor of cloud services partake in the…[break]…is tasked with responsibilities that are related to issues such as investment, application, and implementation decisions linked to cloud computing.
Ethical Considerations
Research ethics is pivotal in promoting the fundamental aims of a research study, including knowledge, accuracy, ……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Join thousands of other students and

"spark your studies".