Process Essays (Examples)(Examples)

Studyspark

Study Document Study Document

Change Management In Health Care

Pages: 4 (1231 words) Sources: 5 Document Type:Essay Document #:30752808

… employee engagement, discuss how different perspectives and agendas impact the change, and explain how change can best be managed.
Change Management is a process that proceeds in steps, which generally consist of preparation, management, and reinforcement (NHS, 2011). The first of these steps—preparation—requires that the change manager … depends upon involving stakeholders and obtaining their input and feedback on various proposals and change ideas. The more involved stakeholders are in the process of change, from the beginning, the more likely they are to embrace the change during the implementation stage.
The management stage, which is … adhere to the Kotter 8 Step Model of Change management. This allows for the integration of employees’ opinions and thoughts throughout the change process from beginning to end. The more that management allows workers to invest in the process, the more willing employees are to take ownership of the change process and embrace……

References

References

Doll, G. A., Cornelison, L. J., Rath, H., & Syme, M. L. (2017). Actualizing culture change: The Promoting Excellent Alternatives in Kansas Nursing Homes (PEAK 2.0) program. Psychological services, 14(3), 307.

Joshi.(2014). Change is Constant, but Improvement is Rapid. H and HN: Hospitals and Health Networks (2014).

Kodama, Y., & Fukahori, H. (2017). Nurse managers’ attributes to promote change in their wards: A qualitative study. Nursing open, 4(4), 209-217.

Kotter’s 8 Step Change Model. (2018). Retrieved from  https://www.toolshero.com/change-management/8-step-change-model-kotter/ 

NHS. (2011). Overview – Change Management – the Systems and Tools for Managing Change. Retrieved from  https://www.england.nhs.uk/improvement-hub/wp-content/uploads/sites/44/2017/11/Overview-Change-management.pdf 

Tobias, R. M. (2015). Why do so many organizational change efforts fail?. Public Manager, 44(1), 35

Studyspark

Study Document Study Document

Higher Education Labor Rights Faculty Tenure

Pages: 5 (1587 words) Sources: 6 Document Type:Essay Document #:61972797

… whether or how to terminate tenured faculty for financial reasons. In situations like these, tenured faculty have some legal rights such as due process. Part-time and untenured faculty do not enjoy the same legal rights, and may not even be entitled to collective bargaining. An increasing number … vested interest in shared governance models of organizational structure (Curnalia & Mermer, 2018). Shared governance implies that…[break]…and to collective bargaining.
The Collective Bargaining Process
Integral to the exercise of labor rights, collective bargaining is a process by which administrators and faculty negotiate terms with the ideal outcome of a win-win situation. As with shared models of governance in academic ……

References

References

Alleman, N.F. & Haviland, D. (2017). “I expect to be engaged as an equal”: collegiality expectations of full-time, non-tenure-track faculty members. High Educ (2017) 74: 527.  https://doi.org/10.1007/s10734-016-0062-4 

American Association of University Professors (AAUP 2019). Tenure. Retrieved from:  https://www.aaup.org/issues/tenure 

Curnalia, R. M. L., & Mermer, D. (2018). Renewing our commitment to tenure, academic freedom, and shared governance to navigate challenges in higher education. Review of Communication, 18(2), 129–139.doi:10.1080/15358593.2018.1438645

Eastman, N. J., & Boyles, D. (2015). In defense of academic freedom and faculty governance: John Dewey, the 100th anniversary of the AAUP, and  the Threat of Corporatization

Mitchell, M., Palacios, V. & Leachman, M. (2015). States are still funding higher education below pre-recession levels. Journal of Collective Bargaining in the Academy, April 2015, Article 71. Retrieved from:  https://thekeep.eiu.edu/cgi/viewcontent.cgi?article=1524&context=jcba 

Studyspark

Study Document Study Document

Best Buy Purchasing And Supply Management

Pages: 10 (2932 words) Sources: 4 Document Type:Term Paper Document #:84472318

...Process Purchasing and Supply Management at Best Buy Today
Headquartered in Richfield, Minnesota and founded in 1966, Best Buy Co., Inc. (hereinafter alternatively “the company” or “Best Buy”) is a leading retailer in electronics and other consumer products that competes throughout North America and Mexico today. As of early 2019, Best Buy operated nearly 1,200 large format as well as 51 small-format retail stores (Company profile, 2019). Despite its success in growing its market share in its existing market, the company is faced with the same existential threats as other major retailers, including most especially e-commerce operators such as Amazon (Wack, 2017). The purpose of this paper is to provide a review of the relevant literature to develop an informed and timely discussion and explanation concerning Best Buy’s new competitive environment and an analysis concerning how Best Buy's purchasing and supply management strategies contribute to their competitive advantage. In addition, an……

References

References

Chan, R. (2011, June 29). Best Buy. Marketing, 20.

Corporate responsibility and sustainability. (2019). Best Buy Co., Inc. Retrieved from  https://corporate.bestbuy.com/sustainability/ .

Best Buy supply chain. (2019). Best Buy Co., Inc. Retrieved from https://www.bestbuy. com/site/help-topics/ca-transparency-act/pcmcat263000050003.c?id=pcmcat 263000050003.

Company profile. (2019). Yahoo! Finance. Retrieved from  https://finance.yahoo.com/quote/  BBY/profile?p=BBY.

Mitchell, S. (2009, September-October). The big box swindle: The true cost of the mega-retailers. Multinational Monitor, 27(5), 34-39.

Ong, T. (2018, May 1). Best Buy is closing all 250 of its mobile stores in the U.S. The Verge. Retrieved from  https://www.theverge.com/2018/3/1/17066232/best-buy-close-all-mobile-stores-may-us .

Thomas, L. (2019, August 28). Best Buy revs up supply chain ahead of the holiday season. CNBC. Retrieved from  https://www.cnbc.com/2019/08/28/best-buy-revs-up-supply-chain-ahead-of-the-holiday-season.html .

Wack, K. (2017, June 29). Credit card issuers face peril from rise in store closures: American Banker, 182(124), 37-39.

Studyspark

Study Document Study Document

Maritime Safety And Security SOP For Homeland Security Perspectives

Pages: 4 (1341 words) Sources: 11 Document Type:literature review Document #:28623347

… technological issue. There is an increasing need that guidelines established to maintain an effective maritime cybersecurity framework adopt a commitment to people and processes too other the current exclusive commitment on technology (Fitton, 2015). The underlying commitment of this project is to provide a critical guideline of … project is to provide a critical guideline of preparing for, dealing with, and responding to cybersecurity issues based on three fundamental pillars; people, process, and technology.
Literature review
Traditionally, attacks in the maritime industry, especially on ships, were…[break]…and provide timely services to the millions of clients in … have largely been centered around technical protection measures, which largely dictate concentrating on physical security. This approach has hugely neglected the people and processes which have equally huge importance to how the industry detects, deters, and recovers from cybersecurity issues. The current cybersecurity concerns demonstrate the need ……

References

References

Bowen, B.M. (2011). Measuring the Human Factor of Cyber Security. Rerieved from  http://www.cs.columbia.edu/~bmbowen/papers/metrics_hst.pdf 

Bueger, C. (2015). What is Maritime Security? Maritime Policy, 53, 159-164.

Fitton, O. P. (2015). The Future of Maritime Cyber Security. Retrieved from  https://eprints.lancs.ac.uk/id/eprint/72696/1/Cyber_Operations_in_the_Maritime_Environment_v2.0.pdf 

Hadlington, L. (2018). The \\\\\\"Human Factor\\\\\\" in cybersecurity: Exploring the accidental insider. Psychological and Behavioral Examinations in Cyber Security, 4(6), 46-63.

Hareide, O. S. (2018). Enhancing Navigator Competence By Demonstrating Maritime Cyber Security. The Journal of Navigation, 71(5), 1025-1039.

Hayes, C. R. (2016). Maritime Cybersecurity: The Future of National Security. Monterey, California: Naval Post Graduate School.

Herzog, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), 49-60.

Hoffmann, J. (2018). Review of Maritime Transport. New York: UNCTAD.

Studyspark

Study Document Study Document

Exploring The Issue In Evaluating Adult Learning

Pages: 8 (2390 words) Sources: 6 Document Type:Research Paper Document #:65651598

… posits that adult learners are self-motivated, capable of self-direction, have a wealth of experience that they can draw upon to facilitate the learning process, and are generally active learners. This means that adult learners learn in much different ways from children, who often require guidance and a … learning, which is what heutagogy is. Based on whether or not the adult learners have sufficient access to materials to facilitate the learning process and sufficient time to learn on their own, the idea of moving towards Heutagogy can be a good one. Adults on the other … level. The instructor should recognize this as a favorable characteristic of adult learners and allow them to participate more fully in the evaluation process.
Implications for Practice
Approaching university students as adult learners will necessarily change the way instructors approach the evaluation process. It means there will be more focus on giving the……

References

References

Fenwick, T. J., & Parsons, J. (2009). The art of evaluation: A resource for educators and trainers. Thompson Educational Publishing.

Forrest III, S. P., & Peterson, T. O. (2006). It\\\\\\'s called andragogy. Academy of management learning & education, 5(1), 113-122.

Hase, S., & Kenyon, C. (2000). From andragogy to heutagogy. Ulti-BASE In-Site.

Howatt, W. A. (1999). Journaling to self-evaluation: A tool for adult learners. International Journal of Reality Therapy, 8(2), 32-34.

Knowles, M. (1984). Andragogy in action. San Francisco: Jossey-Bass.

Moss, D., & Van Duzer, C. (1998). Project-Based Learning for Adult English Language Learners. ERIC Digest.

Studyspark

Study Document Study Document

School Uniforms

Pages: 5 (1474 words) Sources: 5 Document Type:Essay Document #:15058485

… Problem
School uniforms have become mandatory in many school districts across the nation as administrators consider them to be critical in the learning process. The US Department of Education reports that wearing school uniforms is linked to decreased risks of violence and theft, instills discipline, and help … have already established policies to guide approved and disapproved dress codes.
However, the idea that school uniforms have positive impacts on the learning process and student outcomes/achievements has generated numerous concerns among policymakers, parents and the public. It is believed that student outcomes and achievements is a … this study is to examine the benefits of school uniforms to learning and whether such policies lessen discrimination and improve the overall learning process. This study seeks to address…[break]…comprise fill in the blank, short answer questions, Likert-type questions, and multiple choice questions. Students’ responses to Likert-type questions … generate findings and relevant conclusions……

References

References

Adams, B.J. (2007, May 2). The Effectiveness of School Uniforms on Students’ Academic Achievement and Overall Classroom Behavior. Retrieved from Rowan University website:  https://rdw.rowan.edu/cgi/viewcontent.cgi?article=1769&context=etd 

Creswell, J.W. (2014). Research design: Qualitative, quantitative and mixed methods approaches (4th ed.). Thousand Oaks, CA: SAGE Publications Inc.

DeMitchell, T.A. (2015, December 15). Does Wearing a School Uniform Improve Student Behavior? Retrieved October 19, 2019, from  http://theconversation.com/does-wearing-a-school-uniform-improve-student-behavior-51553 

Ordway, D. (2018, April 20). School Uniforms: Do They Really Improve Student Achievement, Behavior? Retrieved October 19, 2019, from  https://journalistsresource.org/studies/society/education/school-uniforms-research-achievement/ 

Sanchez, J. (2013, April 23). College of Education Researchers Conduct Study on Impacts of School Uniform. Retrieved from University of Nevada, Reno website:  https://www.unr.edu/nevada-today/news/2013/school-uniform-study 

Studyspark

Study Document Study Document

Irregular Warfare And United States

Pages: 5 (1609 words) Sources: 4 Document Type:Case Study Document #:48593751

Introduction
Irregular warfare refers to the violent process through which various non-state and state actors fight for influence and legitimacy over populations. While the full might of military power may be … generally uses asymmetric and indirect approaches to reduce the power, will, and influence of the adversary. Because of the irregular approaches, such a process is usually very “messy” and the actions during such a war cannot be distilled into a clear definite and repeatable process. The process is usually characterized by terrorism, counterterrorism, insurgency, and counterinsurgency (Department of Defense Washington DC, 2017).
Just like in any organization, the execution of ……

References

References

Davis, R. G. (Ed.). (2010). US Army and Irregular Warfare 1775-2007: Selected Papers From the 2007 Conference of Army Historians: Selected Papers From the 2007 Conference of Army Historians. Government Printing Office.

Department of Defense Washington DC, (2017). Irregular Warfare (IW) Joint Operating Concept (JOC). Washington: 2007. 100 p. Cit, 03-02

Lundberg, K. (2006). The Accidental Statesman: General Petraeus and the City of Mosul, Iraq. Kennedy School of Government, Case Program.

White, J. B. (1996). A different kind of threat: Some thoughts on irregular warfare.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… to intercept communication between two or more parties. Using electronic surveillance, adversaries intercept what is said and planned. Such surveillance always result in processing and exploitation of huge volumes of communications transmitted on the Internet. Therefore, electronic surveillance has provided an avenue for transformation of conventional state-sponsored ……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… previous theories or models in order to produce a more robust overview concerning the effects of different motivational factors on the technology-related decision-making process to identify how and why end users actually use different technologies.
The rationale in support of this more comprehensive model included identifying similarities … of sensor (An & Wang, 2018), and the quality and extensiveness of the data that is collected in only dependent on the respective processing speeds of the host computer network and the sensors that are used in a given configuration (Davis, 2017). These attributes mean that the ……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Evolution Of Forensic Science

Pages: 4 (1241 words) Sources: 7 Document Type:Research Paper Document #:57032460

… Sah, Albright, et al., 2018). Kaplan & Puracal (2018) advocate for a “collaborative approach” to increase validity and reliability (p. 1).
Peer Review Process
Peer review has long been considered a gold standard of establishing scientific credibility, authenticity, and legitimacy. Yet as Ballantyne, Edmond & Found (2017) … gold standard of establishing scientific credibility, authenticity, and legitimacy. Yet as Ballantyne, Edmond & Found (2017) found, after an assessment of peer review processes in forensic science, “its actual value in most forensic science settings has yet to be determined,” (p. 66). Peer review processes are only as valid and reliable as their structure and design;…[break]…communities may consist of well-meaning individuals dedicated to criminal justice proceedings, but lack … reliability and validity. The use of junk science in forensics can, and most likely has, led to miscarriages of justice. Even the peer-reviewed process has proven flawed given the lack of substantial……

References

References

Ballantyne, K. N., Edmond, G., & Found, B. (2017). Peer review in forensic science. Forensic Science International, 277, 66–76.  https://doi.org/10.1016/j.forsciint.2017.05.020 

Bell, S., Sah, S., Albright, T. D., Gates, S. J., Jr, Denton, M. B., & Casadevall, A. (2018). A call for more science in forensic science. Proceedings of the National Academy of Sciences of The United States of America, 115(18), 4541–4544.  https://doi.org//10.1073/pnas.1712161115 

Gaensslen, R. E., & Larsen, K. (2019). Introductory forensic science (2nd ed.). Retrieved from  http://content.ashford.edu/ 

Kaplan , A. B., & Puracal, J. C. (2018). It’s not a match: Why the law can’t let go of junk science. Albany Law Review, 81(3), 895–939. Retrieved from  http://www.albanylawreview.org/Pages/home.aspx 

National Research Council 2009. Strengthening Forensic Science in the United States: A Path Forward. Washington, DC: The National Academies Press.  https://doi.org/10.17226/12589 .

Redmayne, M., Roberts, P., Aitken, C., & Jackson, G. (2011). Forensic science evidence in question. Criminal Law Review 5, 347–356 Retrieved from https://www.researchgate.net/profile/Graham_Jackson6/publication/265654577_Forensic_Science_Evidence_in_Question/links/55006b8d0cf2aee14b548b62/Forensic-Science-Evidence-in-Question.pdf

Shelton, D. E. (2008, March). The ‘CSI effect:’ Does it really exist?. NIJ Journal, 259. Retrieved from  https://www.nij.gov/journals/259/pages/csi-effect.aspx#author 

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".