Study Document
… of the Army, 2017). Senior leaders / Sergeant Major should also read the following publications: Theater-Level Human Resources Support (ATP) 1-0.2, Army Command policy (AR) 600-20, and Legal Support to the Operational Army (FM) 1-04, and Soldier for Life – Transition Assistance Program (AR) 600-81. The above ……
References
United States Department of the Army. (2014). Field Manual FM 1-0 Human Resources Support April 2014. Retrieved from website: https://armypubs.us.army.mil/doctrine/index.html
United States Department of the Army. (2013). Field Manual FM 1-04 Legal Support to the Operational Army March 2013. Retrieved from website:
Study Document
...Policy making Introduction
The maritime industry is increasingly moving towards the adoption of systems that rely heavily on digitization, automation, and integration (Hayes, 2016). The extensive use of advanced technological solutions in the maritime industry is driven by the urgent need to maintain the industry in sync with all other industries that seem to have a step forward in adopting technological solutions. As a result of this growth and development in technological solutions, the security of data and other sensitive information has increasingly become a huge concern for the industry (Bueger, 2015). Cybersecurity has become a priority for the maritime industry. With many of the operational and critical system having already been digitized, automated, and integrated, the concern has now shifted to how entities within the maritime industry should implement appropriate procedures and policies to respond to cybersecurity incidents effectively.
Background
Cybersecurity refers to the ability of entities to prepare for possible……
References
Bowen, B.M. (2011). Measuring the Human Factor of Cyber Security. Rerieved from http://www.cs.columbia.edu/~bmbowen/papers/metrics_hst.pdf
Bueger, C. (2015). What is Maritime Security? Maritime Policy, 53, 159-164.
Fitton, O. P. (2015). The Future of Maritime Cyber Security. Retrieved from https://eprints.lancs.ac.uk/id/eprint/72696/1/Cyber_Operations_in_the_Maritime_Environment_v2.0.pdf
Hadlington, L. (2018). The \\\\\\"Human Factor\\\\\\" in cybersecurity: Exploring the accidental insider. Psychological and Behavioral Examinations in Cyber Security, 4(6), 46-63.
Hareide, O. S. (2018). Enhancing Navigator Competence By Demonstrating Maritime Cyber Security. The Journal of Navigation, 71(5), 1025-1039.
Hayes, C. R. (2016). Maritime Cybersecurity: The Future of National Security. Monterey, California: Naval Post Graduate School.
Herzog, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), 49-60.
Hoffmann, J. (2018). Review of Maritime Transport. New York: UNCTAD.
Study Document
… bribery are extreme examples of this type of corruption. The authors analyze the quantitative indicators of corruption, and provide case study examples of policy reform but also of instances in which such policies failed. Ultimately, this source corroborates the others used in my bibliography and adds to … is associated with larger gaps between so-called winners and losers, resulting in poorer public opinions about the legitimacy of elections, government, and public policy. The author concludes that media reform may be the key to reducing corruption worldwide. Because this author’s approach to political corruption focuses on ……
Study Document
… 2013). Three strategies for improving…[break]…treatments and preventative interventions” (p. 528). If ERs do not address this issue by more thoroughly developing an appropriate policy for intervention that respects the person, focuses on beneficence, and promotes justice, the problem is only going to worsen.
As Stanley et al. … the risk of suicide for patients who present to ERs with mental health issues. Their intervention should thus become a staple of ER policy and intervention. Training can be conducted in a simple manner, according to the developers of the intervention. The training steps are:
1. reading … evidence base provided by Stanley et al. (2018) to assist with the instruction phase of the training.
To measure the effectiveness of this policy, a statistical percentage of patient-suicide rate should be obtained similar to what Stanley et al. (2018) did for their longitudinal study when they ……
References
Appleby, L., Morriss, R., Gask, L., Roland, M., Lewis, B., Perry, A., ... & Davies, L. (2000). An educational intervention for front-line health professionals in the assessment and management of suicidal patients (The STORM Project). Psychological medicine, 30(4), 805-812.
Belmont Report. (1979). Ethical Principles and Guidelines for the Protection of Human
Subjects of Research The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. Department of Health, Education, and Welfare. Retrieved from https://www.hhs.gov/ohrp/regulations-and-policy/belmont-report/index.html
Browne, V., Knott, J., Dakis, J., Fielding, J., Lyle, D., Daniel, C., ... & Virtue, E. (2011). Improving the care of mentally ill patients in a tertiary emergency department: development of a psychiatric assessment and planning unit. Australasian Psychiatry, 19(4), 350-353.
Burnette, C., Ramchand, R., & Ayer, L. (2015). Gatekeeper training for suicide prevention: A theoretical model and review of the empirical literature. Rand health quarterly, 5(1).
Callaghan, P., Eales, S., Coates, T., & Bowers, L. (2003). A review of research on the structure, process and outcome of liaison mental health services. Journal of Psychiatric and Mental Health Nursing, 10(2), 155-165.
Chatterjee, R. (2018). A Simple Emergency Room Intervention Can Help Cut Suicide Risk. Retrieved from https://www.npr.org/sections/health-shots/2018/07/11/628029412/a-simple-emergency-room-intervention-can-help-cut-future-suicide-risk
Cooper, J., Kapur, N., Webb, R., Lawlor, M., Guthrie, E., Mackway-Jones, K., & Appleby, L. (2005). Suicide after deliberate self-harm: a 4-year cohort study. American Journal of Psychiatry, 162(2), 297-303.
Study Document
… data assets and create trust among interested entities. Accompanying it is the ISO 27002 standard (Almatari et al., 2018), setting down…[break]…For guaranteeing security policy adherence and ascertaining the minimum control set needed for the reduction of risks to a satisfactorily low level, security audits ought to be … company's security baseline, (6) risk/threat analysis – evaluation of the many threats and risks the information systems of the organization encounter, and (7) policy auditing – which is an audit of the firm's security policy for making sure it is aligned with the firm's business aims.
In the course of, as well as, after the culmination of, security auditing, a … system of the company, reports addressing the risks and threats encountered by the firm owing to extant susceptibilities such as infrastructure and faulty policy, and audit reports that present security overview as well as audit results.
Suduc and colleagues (2010)……
References
Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.
Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.
Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.
Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.
Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.
Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).
Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.
Study Document
… the EU has to say about it. After looking at issues such as 1) Brexit, 2) the immigration crisis, 3) the open borders policy, 4) the problem of NATO, 5) the ultra-high and potentially catastrophic levels of debt that the European Central Bank (ECB) has made possible … potentially catastrophic levels of debt that the European Central Bank (ECB) has made possible through its easy credit and low interst rates monetary policy, and now 6) the COVID-19 coronavirus pandemic, this paper will show why the future of the EU looks grim and what might happen … their country. Germany has been very open about accepting immigrants, but it has come with a tremendous price for the party involved in making that decision. Germany’s leader Angela Merkl, so often seen as the face of the EU has lost considerable prestige and support in Germany … currently in sight those countries……
References
Amadeo, K. (2019). Eurozone debt crisis. Retrieved from https://www.thebalance.com/eurozone-debt-crisis-causes-cures-and-consequences-3305524
BBC. (2020). Brexit. Retrieved from https://www.bbc.com/news/uk-politics-32810887
Chadwick, L. (2020). Recession could tip EU. Retrieved from https://www.euronews.com/2020/02/27/could-covid-19-coronavirus-trigger-a-european-economic-recession
Grose, T. (2020). Coronavirus tests Europe’s open borders. Retrieved from https://www.usnews.com/news/best-countries/articles/2020-03-02/europes-open-border-agreement-may-become-casualty-to-coronavirus
Herszenhorn, D. (2019). Europe’s NATO problem. Retrieved from https://www.politico.eu/article/europe-nato-problem-defense-procurement-training-research/
Pew Research Center. (2016). European opinions of the refugee crisis. Retrieved from https://www.pewresearch.org/fact-tank/2016/09/16/european-opinions-of-the-refugee-crisis-in-5-charts/
Wirtz, B. (2019). The Beginning Of The End Of Open Borders In Europe. Retrieved from https://www.theamericanconservative.com/articles/the-beginning-of-the-end-of-open-borders-in-europe/
Study Document
… was not long before economists applied the Phillips curve to inflation in general rather than to only wages. It became evident that monetary policy could be determined by using the Phillips curve as a model. One economist who objected, however, was Milton Friedman, who argued that employers … the 1970s that the sooner workers adjusted their expectations of price inflation, the less successful the government would be in applying its monetary policy to the problem of unemployment.
Friedman’s argument led to the creation of the expectations-augmented Phillips curve and the consensus opinion that at some … learned at university may be becoming apparent. Regardless, the outlook for the Phillips curve is not positive. Its utility in terms of developing policy is no longer relevant: 2008 changed everything. Now the central bank’s only policy is to continue to inflate the asset bubble or risk bringing down the entire global financial……
References
Amadeo, K. (2019). Unemployment rate by year since 1929 compared to inflation and GDP. Retrieved from https://www.thebalance.com/unemployment-rate-by-year-3305506
FRED. (2019). FRED Graph. Retrieved from https://fred.stlouisfed.org/series/LNU04000024#0
Friedman, M. (1977). Nobel lecture: inflation and unemployment. Journal of political economy, 85(3), 451-472.
Heller, R. (2017). Monetary mischief and the debt trap. Cato Journal, 37(2), 247-261.
Lucas, R. E., & Rapping, L. A. (1969). Price expectations and the Phillips curve. The American Economic Review, 59(3), 342-350.
Stiglitz, J. (1997). Reflections on the natural rate hypothesis. Journal of Economic Perspectives, 11(1), 3-10.
Wulwick, N. J. (1987). The Phillips curve: which? whose? to do what? how?. Southern Economic Journal, 834-857.
Study Document
… for a variety of reasons: first, the U.S. changes its administration every four to eight years and this means a new approach to policy is brought in each time, which makes it difficult for a consistent international policy to take hold. Second, if “strategy is a concept for relating means to ends,”[footnoteRef:2] the means (military power) may stay the same but …
As Gray points out, there is a “multiplicity and sheer variety of sources of friction” in the U.S. when it comes to developing policy.[footnoteRef:4] The variety of sources are there because there are so many different moving parts to the problem of establishing and pursuing political objectives. ……
Bibliography
Builder, Carl H. “The Masks of War: American Military Styles in Strategy and Analysis.”
Gray, Colin S. “Why Strategy is Difficult,” JFQ.
Habeck, Mary. “Why They Did It,” Knowing the Enemy: Jihadist Ideology and the War on Terror.”
Walt, Stephen. “Why Alliances Endure or Collapse,” Survival, vol. 39, no. 1 (Spring 1997), 156-179.
Study Document
...Policy making My view of criminal justice has changed completely. Before this course, I was under the impression that the criminal justice system might be flawed—but what system is perfect? Now I have a much better understanding of the nature of that system and the reasons it is not just imperfect but in major need of reform if not total re-development. The reason I say that is I have come to understood criminological theories that explain why crime happens, and mental health issues are a big part of the problem. It is almost to the point where crime has really become not a criminal justice problem but rather a mental health problem, as nearly half of all crimes are committed by people with a history of mental health issues (Evans Cuellar, McReynolds & Wasserman, 2006). Instead of getting the mental health treatment they need, these people become self-destructive, break laws because they……
References
Evans Cuellar, A., McReynolds, L. S., & Wasserman, G. A. (2006). A cure for crime: Can mental health treatment diversion reduce crime among youth?. Journal of Policy Analysis and Management: The Journal of the Association for Public Policy Analysis and Management, 25(1), 197-214.
Pelaez, V. (2014). The prison industry in the United States: big business or a new form of slavery?. Global Research, 31, 1-2.
Study Document
...Policy making Adolescent Psychosocial Assessment
SECTION I – SOCIAL HISTORY
Personal
In list format, cover the following:
1. Name: John Mathew
2. Age: 18
3. Sex: Male
4. Race/Ethnic: Black, African-American
5. Education/Occupation: Student
6. Health: Okay
Social
John's family lives in an apartment situated in the middle of a range of complexes. The residence is right in the middle of communities in Washington, DC. The household is always abuzz with activity. There are two boys named Zebulon and David. The boys still call for their mother's attention. Ervin, my father, does not have a job. He is grounded in a wheelchair, following health challenges he has faced in the past couple of years. My mother is a part-time writer. Her name is Monique. The main poverty indicator about my family is the challenge we face in paying bills and lack of money to travel around (Sherman, 2012). Several aspects of culture……
References
Alexander Jr, R. (2010). The Impact of Poverty on African American Children in the Child Welfare and Juvenile Justice Systems. In Forum on Public Policy Online (Vol. 2010, No. 4). Oxford Round Table. 406 West Florida Avenue, Urbana, IL 61801.
Belgrave, F. Z., & Allison, K. W. (2009). African American psychology: From Africa to America. Los Angeles: Sage.
Brittian A. S. (2012). Understanding African American Adolescents\\\\\\' Identity Development: A Relational Developmental Systems Perspective. The Journal of black psychology, 38(2), 172–200. https://doi.org/10.1177/0095798411414570
Chávez, R. (2016). Psychosocial development factors associated with occupational and vocational identity between infancy and adolescence. Adolescent Research Review, 1(4), 307-327.
Crain, W. C. (2014). Theories of development: Concepts and applications. Harlow, Essex: Pearson.
Fernandes-Alcantara, A. L. (2018). Vulnerable Youth: Background and policies.Congressional Research Service
Newman, B. M., & Newman, P. R. (2015). Theories of human development. Psychology Press.
Reubins, B. M., &Reubins, M. S. (2014). Pioneers of child psychoanalysis: Influential theories and practices in healthy child development. London: Karnac.
We have over 150,000+ study documents to help you.
Sign Up for FREE