Problem Solution Essays (Examples)(Examples)

Studyspark

Study Document Study Document

Suicide Prevention Intervention In The Emergency Department

Pages: 11 (3348 words) Sources: 7 Document Type:Essay Document #:74237246

… patients are not offered counseling services. Instead, they are referred or voluntarily or involuntarily committed. The lack of any other treatment is a problem because as Olfson, Marcus and Bridge (2013) point out, “each year in the United States, roughly two-thirds of a million patients present to … homes or come as walk-ins. The ER becomes a revolving door and clients are treated for chief complaints and not for the underlining problem. The issue is relevant to social work because there is a need to address the underlying concerns of this population so that the … of an existing program for others to understand. However, in more recent years there has been more emphasis on the need for a solution-based intervention to be used in EDs instead of simply passing these patients along without treating them (Kondrat & Teater, 2012). The target population … it will be failing in……

References

References

Appleby, L., Morriss, R., Gask, L., Roland, M., Lewis, B., Perry, A., ... & Davies, L. (2000). An educational intervention for front-line health professionals in the assessment and management of suicidal patients (The STORM Project). Psychological medicine, 30(4), 805-812.

Belmont Report. (1979). Ethical Principles and Guidelines for the Protection of Human

Subjects of Research The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. Department of Health, Education, and Welfare. Retrieved from  https://www.hhs.gov/ohrp/regulations-and-policy/belmont-report/index.html 

Browne, V., Knott, J., Dakis, J., Fielding, J., Lyle, D., Daniel, C., ... & Virtue, E. (2011). Improving the care of mentally ill patients in a tertiary emergency department: development of a psychiatric assessment and planning unit. Australasian Psychiatry, 19(4), 350-353.

Burnette, C., Ramchand, R., & Ayer, L. (2015). Gatekeeper training for suicide prevention: A theoretical model and review of the empirical literature. Rand health quarterly, 5(1).

Callaghan, P., Eales, S., Coates, T., & Bowers, L. (2003). A review of research on the structure, process and outcome of liaison mental health services. Journal of Psychiatric and Mental Health Nursing, 10(2), 155-165.

Chatterjee, R. (2018). A Simple Emergency Room Intervention Can Help Cut Suicide Risk. Retrieved from  https://www.npr.org/sections/health-shots/2018/07/11/628029412/a-simple-emergency-room-intervention-can-help-cut-future-suicide-risk 

Cooper, J., Kapur, N., Webb, R., Lawlor, M., Guthrie, E., Mackway-Jones, K., & Appleby, L. (2005). Suicide after deliberate self-harm: a 4-year cohort study. American Journal of Psychiatry, 162(2), 297-303.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… with the permission of the owner/possessor of the information.[footnoteRef:2] As a form of cyberattack, cyber espionage is one of the most complex international problem in today’s world despite being seen as an acceptable state behavior. [1: Magnus Hjortdal, “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence”, … Combating Techniques”, Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf]
Background Information
Cyber espionage has become one of the most important and complex international problem in today’s world. It can generate numerous risks or threats to security and other critical operations because it involves illegitimate possession of personal, … as an acceptable state behavior. [3: William C. Banks, “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage”, Emory law Journal 66, (2017):513.]
problem Statement
Cyber espionage involves illegal practices that result in information theft that could be used to attack an adversary. It poses threats and … that could be used to……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Studyspark

Study Document Study Document

Agency Theory

Pages: 8 (2457 words) Sources: 10 Document Type:Essay Document #:56977009

… any direct shares in the financial results of the company (Tearney and Dodd, 2009).
As a result, this could give rise to agency problem for the reason that this theory encompasses the costs incurred in solving conflicts between the company principals and agents and ensuring that the … because they know that there is an improbability that they will be affected by the ensuing consequences (Buockova, 2015).
Information Asymmetry & Principal-Agent problem
Information asymmetry implies that the general outcome of the relationship between the principal and the agent is impacted by numerous uncertainties, and these … these two parties will by and large have dissimilar information to make an assessment or evaluation of these uncertainties (Mitnick, 2015).
The principal-agent problem takes place when a principal generates a setting in which the incentives of an agent are not in alignment with those of the … the issue of horizontal disparity.……

References

References

Ballwieser, W., Bamberg, G., Beckmann, M. J., Bester, H., Blickle, M., Ewert, R., ... & Gaynor, M. (2012). Agency theory, information, and incentives. Springer Science & Business Media.

Bou?ková, M. (2015). Management accounting and agency theory. Procedia Economics and Finance, 25, 5-13.

Eisenhardt, K. M. (1989). Agency theory: An assessment and review. Academy of management review, 14(1), 57-74.

Healy, P. M. (2005). Financial Reporting Problems at Molex, Inc.(A). Harvard Business School.

Larcker, D. F., & Tayan, B. (2007). Executive Compensation at Nabors Industries: Too Much, Too Little, or Just Right?. Rock Center for Corporate Governance at Stanford University Case Teaching No. CG-05.

Mitnick, B. M. (2015). Agency theory. Wiley encyclopedia of management, 1-6.

Scott, W. R., & O\\\\\\'Brien, P. C. (2003). Financial accounting theory (Vol. 3). Toronto: Prentice Hall.

Tearney, M. G., & Dodd, J. (2009). Accounting theory. H. I. Wolk (Ed.). New York: Sage.

Studyspark

Study Document Study Document

Privacy In Social Networks Regarding Machine Learning

Pages: 8 (2537 words) Sources: 10 Document Type:Research Paper Document #:98311751

… influence users’ sharing decisions, such as the identity of the person that is requesting the information and the current location” (p. 126). The problem is that users do not know how to articulate their own personal information settings desires, nor are these desires static. For that reasons … algorithms and constantly looking for data on users to develop their own profiles. Their protocol acts as a wall between the user…[break]…which the problem is likely ever to be solved once and for all. The Internet has opened up a world of coding that in a state ……

References

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

Studyspark

Study Document Study Document

Homeless Population And Health Disparities

Pages: 6 (1880 words) Sources: 4 Document Type:Research Paper Document #:72425103

Health Disparities and Homeless Population
The causes of homelessness are complex but its tragic consequences are very clear. Homelessness is a huge problem in many rural areas, towns, and cities across the world. It is also a public health problem. The homeless are a vulnerable population. They not only live a poor quality of life on the streets but they also face hunger … addition to poor social determinants of health, the homeless also face several external and internal barriers to healthcare. Internal barriers entail downplaying health problem, and great pressure to satisfy competing needs such as food, water, clothing, and shelter instead of healthcare. While external barriers entail unavailable primary … that of the city’s general population.…[break]…2016). So for the health disparities to be removed, there is a need to deal with the big problem itself and that is homelessness.
In European states, the development of housing solution for……

References

References

Andaya, A. (2016). Understanding the Causes Health Disparities among the Homeless. UC Merced Undergraduate Research Journal, 9(1).

Fajardo-Bullón, F., Esnaola, I., Anderson, I., & Benjaminsen, L. (2019). Homelessness and self-rated health: evidence from a national survey of homeless people in Spain. BMC public health, 19(1), 1081.

Koh, H. K., & O’Connell, J. J. (2016). Improving health care for homeless people. Jama, 316(24), 2586-2587.

Plumb J. D. (2000). Homelessness: reducing health disparities. CMAJ : Canadian Medical Association journal = journal de l\\\\\\'Association medicale canadienne, 163(2), 172–173.

Studyspark

Study Document Study Document

Enterprise Risk Management In Wells Fargo During The Pandemic

Pages: 15 (4587 words) Sources: 15 Document Type:Essay Document #:32848070

… the COVID-19 pandemic crisis can be managed in isolation,” as Beasley (2020) points out (p.2). This means that from an ERM perspective the problem has to be approached comprehensively with risk understood at the macro level. This paper will provide 1) a critical analysis, including a comparison … macro viewpoint. In traditional risk management, the focus is on pure risk and every risk is viewed as its own separate and distinct problem; with ERM, risk is more comprehensively addressed as part of an overall strategy (Ogutu, Bennett & Olawoyin, 2018).
Traditional risk management looks at ……

References

References

Beasley, M. (2020). How to Leverage ERM Principles to Better Respond to COVID-19-Related Risks. ERM Professional Insights.

Derysh, I. (2020). Watchdog questions why Wells Fargo reported giving only one large PPP loan to a Black-owned business. Retrieved from  https://www.salon.com/2020/07/22/watchdog-questions-why-wells-fargo-reported-giving-only-one-large-ppp-loan-to-a-black-owned-business/ 

English, C. (2020). Wells Fargo Forced to Cut Its Dividend After Fed Stress Test. Here’s What Other Banks Did. Retrieved from  https://www.barrons.com/articles/wells-fargo-forced-to-cut-its-dividend-after-fed-stress-test-51593467664 

Hall, J. (2007). Internal Auditing and ERM: Fitting in and Adding Value. Retrieved from  https://global.theiia.org/about/about-the-iia/Public  Documents/Sawyer_Award_2007.pdf

Kaplan, R. & Mikes, A. (2012). Managing risks: A new framework. Harvard Business Review, 3.

Lewis, M. (2010). The Big Short. NY: W. W. Norton.

Lundqvist, S. (2014). Abandoning Silos for Integration: Implementing Enterprise Risk Management and Risk Governance. Lund University.

Morgenson, G. (2020). More Wells Fargo customers say the bank decided to pause their mortgage payments without asking. Retrieved from https://www.nbcnews.com/business/personal-finance/more-wells-fargo-customers-say-bank-decided-pause-their-mortgage-n1234610

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384

… Cloud Computing within an Accounting Organization
Table of Contents
1 Introduction 4
1.1 Background 4
1.2 Significance of the Topic 4
1.3 Research problem 5
1.4 Research Questions 5
1.5 Purpose of the Study 5
1.6 Methodology 5
1.7 Good Title for Study 5
2 Literature Review … day and from varying geographical areas. Ultimately, this provides the organization with a competitive advantage because the business operations continue running smoothly.
Research problem
In the present day, the advancement of globalization has significantly increased the level of competition in industries and sectors. Multinational companies in different ……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

Trust And Relationships In Negotiation

Pages: 7 (1997 words) Sources: 5 Document Type:Essay Document #:98491775

… own best interests? This paper will review the topic of trust and relationship development in negotiations to show how one can approach the problem of trust and relationship building while working on negotiating an outcome that satisfies all parties.
What is Trust?
Trust is a concept that … skeptical of the party’s words and deeds. Additionally, trust can be seen as a pattern of predictable behavior or as an orientation towards problem-solving (Ross & LaCroix, 1996). If one’s actions and words are consistent and one is focused on overcoming obstacles and working towards a solution, one will be seen as more worthy of trust than a negotiator who remains aloof and inconsistent throughout the process. Thus, trust can … the commitment of oneself to the process of negotiation. Defining one’s objectives and what one is willing to do to come to a solution is part of that process.
Building……

References

References

Butler Jr, J. K. (1999). Trust expectations, information sharing, climate of trust, and negotiation effectiveness and efficiency. Group & Organization Management, 24(2), 217-238.

Lewicki, R. J., & Stevenson, M. A. (1997). Trust development in negotiation: Proposed actions and a research agenda. Business & Professional Ethics Journal, 16(1/3), 99-132.

Olekalns, M., & Smith, P. L. (2009). Mutually dependent: Power, trust, affect and the use of deception in negotiation. Journal of Business Ethics, 85(3), 347-365.

Ross, W., & LaCroix, J. (1996). Multiple meanings of trust in negotiation theory and research: A literature review and integrative model. International Journal of Conflict Management. 7(4), 314–360.

Shell, G. R. (1991). Opportunism and trust in the negotiation of commercial contracts:Toward a new cause of action. Vand. L. Rev., 44, 221.

Studyspark

Study Document Study Document

Agency Theory And The Limitations Of Representative Government

Pages: 11 (3159 words) Sources: 5 Document Type:Essay Document #:26643855

… creates a conflict of interest among the politicians overseeing the budget process. On the one hand they are tasked with producing a budget solution and allocating funds based on the duty to serve the collective good; on the other hand they have a vested self-interest in ensuring … programs and departments as important. However, as Elwood (2008) points out, where money is a factor, corruption is sure to be found. The problem with the federal budget process is that it is overseen by individuals who suffer from the agent-principle paradox.
Agency theory posits that “an agency relationship … called principals, hire one or more other individuals, called agents, to perform some service and then delegate decision-making authority to the agents” (ProActive solution, 2020). In terms of representative government, the representatives of the people are the members of Congress—they are the agents of the principles, i.e., ……

References

References

Eisenhardt, K. M. (1989). Agency theory: An assessment and review. Academy of management review, 14(1), 57-74.

Elwood, T. W. (2008). Politics of the US Federal Budget Process. International quarterly of community health education, 28(1), 3-12.

Jennings, M. (2008). Business Ethics: Case Studies and Selected Readings. Cengage.

Machold, S., Ahmed, P.K., & Farquhar, S.S. (2007). Corporate Governance and Ethics: A Feminist Perspective. Journal of Business Ethics (2008) 81:665-678.

ProActive Solutions. (2020). Agency theory. Retrieved from http://knowledgegrab.com/learners-zone/study-support/performance-management-review/framework-introduction-to-hrm/agency-theory/

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".