Privacy Essays (Examples)

Studyspark

Study Document Study Document

The EU And European Goverments

Pages: 1 (410 words) Sources: 2 Document Type:Essay Document #:60649240

… Union has also had some notable economic successes as a collective unit, such as a recent trade deal with Japan, and enacting anti-trust and privacy regulation of the American technology industry (including Google) that America has refused to enact (Belin & Reinert, 2019). The ability to engage in ……

References

References

Belin, C. & Reinert, T. (2019). The eclipse of the European Union’s global influence. The Brookings Institute. Retrieved from:  https://www.brookings.edu/blog/order-from-chaos/2019/04/08/the-eclipse-of-the - european-unions-global-influence/

Lehne, S. (2019). Europe’s East-West divide: Myth or reality? Carnegie Europe. Retrieved from:  https://carnegieeurope.eu/2019/04/11/europe-s-east-west-divide-myth-or-reality-pub-78847 

Studyspark

Study Document Study Document

Recent Broadway Crises

Pages: 2 (676 words) Sources: 2 Document Type:Essay Document #:88025521

… is exactly what the movement does not want to do. The need to balance the needs of the individual, who may wish for privacy or to forget an incident involving a disturbing sexual assault, and the need for society to bring such concerns to light, is highlighted ……

References

Works Cited

Jacobs, Julia. “Dancer Tries to Quell ‘West Side Story’ Controversy: ‘I Am Not a Victim.’” The New York Times. 31 January 2020.

Marshall, Alex. “Broadway Is Closed, but London’s Theaters Carry On.” The New York Times. 20 March 2020.

Paulson, Michael. “Broadway, Seeking to Stay Open, Suggests Stars Keep Their Distance.” The New York Times. 11 March 2020.

Studyspark

Study Document Study Document

Gestalt Therapy Counseling Psychology History And Interventions

Pages: 7 (2051 words) Sources: 8 Document Type:Research Paper Document #:37769060

… relationships like the one that develops between counselor and client. The counselor-client relationship itself has a boundary, which is respected via confidentiality and privacy agreements and mutual trust. Points of contact emerge between the counselor and client, and those points of contact become opportunities for growth, observation, ……

References

References

Brownell, P. (2016). Contemporary Gestalt therapy. In D. J. Cain, K. Keenan, & S. Rubin (Eds.), Humanistic psychotherapies: Handbook of research and practice (p. 219–250). American Psychological Association.  https://doi.org/10.1037/14775-008 

Cherry, K. (2019). Gestalt psychology overview. Very Well Mind. Retrieved from:  https://www.verywellmind.com/what-is-gestalt-psychology-2795808 

Covey, G. (2017). Theory and practice of counseling and psychotherapy, enhanced, 10th edition. Cengage.

Jacobs, L. (1989). Dialogue in Gestalt theory and therapy. The Gestalt Journal 12(1): 1-25. Retrieved from:  http://www.gestaltpsychotherapie.de/jacobs1.pdf 

Kepner, E. (n.d.). Gestalt group processes. Retrieved from:  http://www.elementsuk.com/libraryofarticles/gestalt.pdf 

Oaklander, V. (1994). Gestalt play therapy. In O’Connor, K.J. & Schaefer, C.E. (Eds.). Handbook of play therapy. John Wiley & Sons, pp. 143-156.

Rock, I. & Palmer, S. (1990). The legacy of Gestalt psychology. Scientific American 263(6): 84-91.

Yontef, G. & Jacobs, L. (n.d.). Gestalt therapy. Retrieved from:  https://pdfs.semanticscholar.org/1211/3bf06e5fa3208fea4330873403ae65b0891c.pdf

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… technology risks: availability, security, compliance, and performance risks. Security risks constitute accessing data without permission, including information leakage, fraud, endpoint security, and data privacy. This class also encompasses broad threats from external sources (e.g., viruses), and more focused attacks on particular users, data, or applications. A survey ……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Banking Industry Crimes

Pages: 6 (1933 words) Sources: 6 Document Type:Essay Document #:73861053

...Privacy Financial Crimes, Fraud, and Investigation
The banking sector is a critical part of a country’s economy. This is more so the case given that it is actively involved in the holding as well as management of diverse financial assets and the coordination of financial activities for the various other economic sectors. Although at the core of banking is holding of financial assets, other key activities include, but they are not limited to, commercial and personal banking services, insurance, etc. In that regard, therefore, banks happen to be one of the most sensitive sectors in an economy. Bank managers have a responsibility to ensure that all the regulatory standards are observed. Further, they also have a responsibility to ensure that the interests of various stakeholders in the banking sector are secured. The key stakeholders, from the perspective of a bank institution are inclusive of the government and the various regulatory agencies,……

References

References

Albrecht, W.S., Albrecht, C.C., Albrecht, C.O. & Zimbelman, M.F. (2008). Fraud Examination (3rd ed.). Mason, OH: Cengage Learning.

Dionne, B. (2020). Regions Bank Teller Accused of Stealing Customer Identities Faces Felony Charges. Retrieved  https://www.wbrc.com/2020/01/30/regions-bank-teller-accused-stealing-customer-identities-facing-felony-charges/ 

Golden, T.W., Skalak, S.L. & Clayton, M.M. (2006). A Guide to Forensic Accounting Investigation. Hoboken, NJ: John Wiley & Sons.

Krancher, M., Riley, R. & Wells, T.J. (2010). Forensic Accounting and Fraud Examination. Hoboken, NJ: John Wiley & Sons.

Singleton, T.W., Singleton, A.J. & Bologna, R.J. (2006). Fraud Auditing and Forensic Accounting (3rd ed.). Hoboken, NJ: John Wiley & Sons.

Zagaris, B. (2010). International White Collar Crime: Cases and Materials. New York, NY: Cambridge University Press.

Studyspark

Study Document Study Document

Veteran Benefits Administration

Pages: 8 (2465 words) Sources: 3 Document Type:Implementation Paper Document #:56829115

...Privacy Technology Proposal/Implementation Paper
A: Introduction
The Department of Veterans Affairs (VA) remains a vital entity in as far as the provision of key services to veterans in the country is concerned. The Veteran Benefits Administration (VBA), to a large extent, concerns itself with the administration of U.S. Department of Veteran Affairs’ programs. This is more so the case with regard to the provision or advancement of various forms of support to not only veterans and survivors, but also their dependents. Towards this end, some of the main programs that VBA administers include, but they are not limited to; pension and compensation, rehabilitation and employment, loan guaranty, and insurance. In the year 2016, the National Archives and Records Administration (2016) released a records management inspection report which was categorical that “the VA Records Management Program lacks several basic records management fundamentals.” The relevance of VA records cannot be overstated when it……

References

References

Aziz, A.A., Mohammad Y., Mokhtar, U.A. & Ambari, D.I. (2017). Establishing Policy for the Implementation of Electronic Document and Records Management System in Public Sector in Malaysia: The Influencing Factors. Advanced Science Letters, 23(11), 10732-10736.

National Archives and Records Administration (2016). Department of Veterans Affairs Records Management Program: Records Management Inspection Report. Retrieved from  https://www.archives.gov/files/records-mgmt/pdf/va-2016-inspection.pdf 

U.S. Department of Veteran Affairs (2020). About VBA. Retrieved from  https://www.benefits.va.gov/BENEFITS/about.a sp

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

...Privacy What is Cybercrime?
Definition of Cybercrime
Cybercrime is any criminal activity that is conducted using computers or the Internet. As today’s digital natives have the most experience with computers, cybercriminals tend to be of the Millennial generation—i.e., born after 1980. They are young, digitally sophisticated, and able to operate with a degree of professionalism and discipline that allows them to hide their crimes beneath legitimate-looking facades. Spearphishing is one example of a type of cybercrime used by professional criminals to lure victims into traps or sites that have the appearance of legitimacy.
Cybercrime is committed by people who know computer code, understand computer systems and networks, know how to navigate databases, access data storage, get past firewalls, exploit cloud computing services, control the Internet of Things and more. They
How Cybercrime Has Evolved over Time
Computers and the rise of the Internet ushered in the era of cybercrime. IBM’s first……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

C Suite Executive Leadership And Ethics

Pages: 9 (2693 words) Sources: 7 Document Type:Essay Document #:16009984

… sense that because something is normative it is ethical—predominate in the workplace. An interview with C. Linden (name altered to protect the individual’s privacy) shows how personal ethical beliefs clash with the prevailing norms and values in the field. Employee diversity adds to the complications involved in ……

References

References

Bailey, C. & Shantz, A. (2018). Creating an ethically strong organization. MIT Sloan Management Review. http://ilp.mit.edu/media/news_articles/smr/2018/60101.pdf

Crossan, M., Mazutis, D. & Seijts, G. (2013). In search of virtue. Journal of Business Ethics 113(4): 567-581.

Hatcher, T. (2008). The value of values in the C-suite. In Sims, R.R. & Quatro, S.A. (Eds.) Executive Ethics. Charlotte: IAP, pp. 97-122.

Hoekstra, E., Bell, A. & Peterson, S.R. (2008). Humility in Leadership: Abandoning the Pursuit of Unattainable Perfection. In S.A. Quatro & R. R. Sims (Eds.), Executive Ethics: Ethical Dilemmas and Challenges for the C-Suite. Greenwich, CT: Information Age Publishing, pp. 79-96.

MacDougall, A.E., Bagdarasov, Z. & Buckley, M.R. (2008). Applying a primary risk management model to the C-suite. In Sims, R.R. & Quatro, S.A. (Eds.) Executive Ethics. Second Edition. Charlotte: IAP, pp. 211-234.

Martin, R. (2011). The CEO\\\\'s ethical dilemma in the era of earnings management. Strategy & Leadership 39(6): 43-47.

Schwartz, M.S. (2013). Developing and sustaining an ethical corporate culture: The core elements. Business Horizons 56(1): 39-50.

Studyspark

Study Document Study Document

Gun Control Act Of 1968

Pages: 7 (2011 words) Sources: 8 Document Type:Research Paper Document #:16217740

… DeJong (2016), micro-stamping as well as background checks have also been opposed in some quarters and branded an affront on the right to privacy. However, there is also the perspective that loose gun control laws have wreaked havoc in our society…[break]…own a gun, for example, were much ……

References

References

Ausman, J.I. & Faria, M.A. (2019). Is Gun Control Really About People Control? Surgical Neurology International, 10(6), 195-204.

Bouton, L., Conconi, P., Pino, F. & Zanardi, M. (2014). Guns and Votes. Retrieved from  https://www.nber.org/papers/w20253 

Cole, G.F., Smith, C.E. & DeJong, C. (2016). Criminal Justice in America (9th ed.). Boston, MA: Cengage Learning.

Gramlich, J. & Schaeffer, K. (2019). 7 facts about guns in the U.S. Retrieved from  https://www.pewresearch.org/fact-tank/2019/10/22/facts-about-guns-in-united-states/ 

Hayes, V. (2016). Gun Control in the United States. Journal of Political Sciences & Public Affairs, 4(2), 33-39.

Johnson, N.J., Kopel, D.B. & Mocsary, G.A. (2017). Firearms Law and the Second Amendment: Regulation, Rights, and Policy. New York, NY: Wolters Kluwer Law & Business.

Joslyn, M., Haider-Markel, D., Baggs, M. & Bilbo, A. (2017). Emerging Political Identities? Gun Ownership and Voting in Presidential Elections. Social Science Quarterly, 98(2), 382-396.

Webster, D.W. & Wintemute, G.J. (2015). Effects of Policies Designed to Keep Firearms from High-Risk Individuals. Annual Review of Public Health, 36, 21-37.

Studyspark

Study Document Study Document

Ethical Dilemmas In Counseling American Counseling Association

Pages: 1 (330 words) Sources: 2 Document Type:Essay Document #:60128520

… ACA (2014), “Trust is the cornerstone of the counseling relationship, and counselors have the responsibility to respect and safeguard the client’s right to privacy and confidentiality.” Therefore, the counselor needs to consult first with Robert before divulging the intent to see the client personally—the primary ethical obligation ……

References

References

ACA (2014). Code of ethics. Retrieved from:  https://www.counseling.org/resources/aca-code-of-ethics.pdf 

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".