Profile Essays (Examples)

Studyspark

Study Document Study Document

White Collar Criminal

Pages: 5 (1593 words) Sources: 3 Document Type:Essay Document #:32631423

… is typically in the 30 to 45 years age range and is more likely to be male than female. Both of these characteristic profile traits fit Miller to a “t”. Moreover, four out of five fraud perpetrators are likely to work in the accounting department of an … with the case of David L. Miller. This paper will analyze the case of David L. Miller and show why he fits the profile of a fraud perpetrator well and why companies tend not to press charges against people like him.
Analysis
The most common traits of ……

References

References

Association of Certified Fraud Examiners. (2010). Who is Most Likely to Commit Fraud at Your Company? Retrieved from  https://www.acfe.com/press-release.aspx?id=1677 

Friedrichs, D. (2009). Trusted Criminals: White Collar Crime In Contemporary Society. Cengage Learning.

US Attorney’s Office. (2019). Attorney Convicted of Embezzling Over $1.5 Million from Virginia Senator, Canadian Business, and Autism Organization. Retrieved from https://www.justice.gov/usao-edva/pr/attorney-convicted-embezzling-over-15-million-virginia-senator-canadian-business-and-0

Studyspark

Study Document Study Document

Domestic Extremism And Terrorism

Pages: 12 (3640 words) Sources: 12 Document Type:Research Paper Document #:16554681

… potential of disrupting and subverting mainstream cultural norms. To accomplish this objective, this paper first reviews the literature on the subject, then provides profiles of both groups while comparing and contrasting them and also discussing ways to counter violent extremism; finally, it adopts a holistic approach to ……

References

References

Breger, M. L. (2017). Reforming by re-norming: How the legal system has the potential to change a toxic culture of domestic violence. J. Legis., 44, 170.

Beinart, P. (2017). The rise of the violent left. Retrieved from  https://www.theatlantic.com/magazine/archive/2017/09/the-rise-of-the-violent-left/534192/ 

Brockhoff, S., Krieger, T. & Meierrieks, D. (2014). Great expectations and hard times: the (nontrivial) impact of education on domestic terrorism. Journal of Conflict Resolution, 59(7), 1186-1215.

Brown, D. (2017). Proud boys founder. Retrieved from  https://www.portlandmercury.com/blogtown/2017/12/12/19540403/proud-boys-founder-wants-to-trigger-the-entire-state-of-oregon-by-helping-patriot-prayers-joey-gibson-win-the-oregon-person-of-the-year- p

Cramer, E. P., Choi, Y. J., & Ross, A. I. (2017). Race, Culture, and Abuse of Persons with Disabilities. In Religion, Disability, and Interpersonal Violence (pp. 89-110). Springer, Cham.

Dalgaard-Nielsen, A. (2016). Countering violent extremism with governance networks. Perspectives on Terrorism, 10(6), 135-139.

DeCook, J. R. (2018). Memes and symbolic violence:# proudboys and the use of memes for propaganda and the construction of collective identity. Learning, Media and Technology, 43(4), 485-504.

Doyle, E. (Ed.). (2018). Antifa and the Radical Left. Greenhaven Publishing LLC.

Studyspark

Study Document Study Document

Formulating An Effective National Response To Ebola In Nigeria

Pages: 17 (5038 words) Sources: 20 Document Type:Research Paper Document #:83371879

...Profile Abstract
Today, there are dozens of deadly diseases in the world, but the Ebola virus disease (alternatively “EVD” or “Ebola”) is among the most virulent and lethal. Although intensive research is underway, there is no cure currently available for Ebola and the death toll attributable to this disease continues to increase. To date, there have been nearly 30,000 cases of Ebola infections that caused more than 11,000 deaths, primarily in West Africa, but the disease has the potential to spread worldwide unless first responders, emergency management managers and the health care community take aggressive steps to identify infections and contain outbreaks. The main purpose of this study is to provide a systematic and critical review of the relevant juried, scholarly and governmental literature about the Ebola virus disease to create an awareness manual that is targeted at educating Nigerian citizens concerning this disease. A secondary purpose of this study is……

References

References

Allam, M. F. (2014, September). Ebola hemorrhagic fever: Case fatality rate 90%? Central European Journal of Public Health 22(3), 207-210.

Allam, M. F. & Vonka, V. (2015, March). Ebola virus disease: Temperature checks for travelers? Central European Journal of Public Health, 23(1), 84.

Brand, J. E. & Stela, D. (2014, October). Ebola is here: Knowledge, identification, and appropriate infection control are key. American Nurse Today, 9(10), 37-39.

Brown, G. (2015, Winter). Ebola in America: An epidemic or a pandemic? ABNF Journal, 26(1), 3-5.

Ebola. (2019). Doctors without Borders. Retrieved from https://www.doctorswithout borders.org/what-we-do/medical-issues/ebola.

Ebola outbreak. (2019). U.S. Centers for Disease Control and Prevention. Retrieved from  https://www.cdc.gov/vhf/ebola/history/2014-2016-outbreak/index.html .

Ebola virus disease. (2019). U.S. Centers for Disease Control and Prevention. Retrieved from  https://www.cdc.gov/vhf/ebola/index.html .

Hancock, M. (2019, September). After Ebola. African Business, 422, 56-58.

Studyspark

Study Document Study Document

Cultural Identity Development

Pages: 8 (2411 words) Sources: 14 Document Type:Research Paper Document #:12452469

...Profile Abstract
This paper addresses the significance of ethnic or cultural identity. It deals with the identity of socially advantaged as well as disadvantaged groups and my relation to them. Additionally, it highlights the significance of the self-identity concept. The Multidimensional Model of Racial Identity (MMRI), put forward by Smith, Sellers, Shelton and colleagues (1998), has been utilized to address all of the above aspects. The paper further explains the model, applying its dimensions to various self-identity aspects. Finally, the paper delves into the way such identity-related aspects intersect with one another.
Introduction
Identity is multifaceted in nature: it may be relational and circumstantial, as well as concurrently permanent, changing and dynamic. Identity development occurs via a process of socialization. It may or may not be self-established. It is, rather frequently, employed in the labeling and categorization of persons believed to possess oppositional or dual differences. Additionally, identity represents a construct applied in creating social……

References

References

Allport, G. (1954). The nature of prejudice. Cambridge, MA: Addison-Wesley.

Babbitt, N. (2013). Identities: Markers of power and privilege. Retrieved from  https://justdessertsblog.wordpress.com/2013/09/15/identities-markers-of-power-and-privilege/ 

Baldwin, J. A. (1984). African self-consciousness and the mental health of African-Americans. Journal of Black Studies, 15, 177-194.

Clark, K. B. (1965). Dark ghetto. New York: Harper & Row.

Cross, W. E. (1991). Shades of black: Diversity in African-American identity. Philadelphia: Temple University Press.

Horowitz, R. (1939). Racial aspects of self-identification in nursery school children. Journal of Psychology, 7, 91-99.

Kambon, K. (I 992). The African personality in America: An Aitricancentered framework. Tallahassee, FL: Nubian Nation Publications

Kardiner, A., & Ovesey, L. (1951). The mark of oppression. New York: Norton.

Studyspark

Study Document Study Document

CFOs Big Data Opportunities In Firms

Pages: 7 (2057 words) Sources: 6 Document Type:Research Paper Document #:26742092

… quickly. Also, the traditional tools and models do not have key functionalities such as the ability to segment customers by psychographic and demographic profiles. This inability for advanced segmentation limits businesses in their ability to accurately target their market segments when doing advertising. There is a growing ……

References

References

Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and analytics: From big data to big impact. MIS quarterly, 36(4).

Jin, X., Wah, B. W., Cheng, X., & Wang, Y. (2015). Significance and challenges of big data research. Big Data Research, 2(2), 59-64.

Joshi, N. (2018). How Big Data Can Transform the Finance Industry. Retrieved October 7, 2019, from  https://www.bbntimes.com/en/technology/big-data-is-transforming-the-finance-industry .

Nath, T. I. (2019). How Big Data Has Changed Finance. Retrieved October 7, 2019, from  https://www.investopedia.com/articles/active-trading/040915/how-big-data-has-changed-finance.asp .

Turner, D., Schroeck, M., & Shockley, R. (2013). Analytics: The real-world use of big data in financial services. IBM Global Business Services, 27.

Yin, S., & Kaynak, O. (2015). Big data for modern industry: challenges and trends [point of view]. Proceedings of the IEEE, 103(2), 143-146.

Zhou, K., Fu, C., & Yang, S. (2016). Big data driven smart energy management: From big data to big insights. Renewable and Sustainable Energy Reviews, 56, 215-225.

Studyspark

Study Document Study Document

Cholelithiasis Gallstones Gallbladder Disease

Pages: 13 (3816 words) Sources: 12 Document Type:Case Study Document #:34628165

...Profile Introduction
Gallbladder disease, especially cholelithiasis (gallstones) affects over 20 million Americans every year. The condition often goes undiagnosed because cholelithiasis rarely presents symptoms. Abdominal discomfort, nausea, jaundice and biliary colic are some symptoms of the condition. Imaging techniques are the most accurate diagnosis tools for gallbladder diseases. However, laboratory values such as CBC, serum amylase, liver-function testing and lipase can help differentiate the type of gallbladder disease/or identify related issues. Surgery is the most effective treatment for gallbladder disease patients. Exercise, diet, and nutrition affect gallbladder disease. It is important for patients to integrate the healthy habits into their lifestyle to lower the risk of developing gallbladder disorders (Jugenheimer, et al., 2008).
Cholelithiasis (gallstones) is the most common type of gallbladder disease. It affects over 20 million Americans every year, translating to over $6.3 billion in direct costs. Generally, gallstones are asymptomatic. The stones are usually identified during autopsy or……

References

References

Anderson, P. O., Knoben, J. E., & Troutman, W. G. (2010). Clinical drug data. New York: McGraw-Hill Medical.

Al-alem, F., Mattar, R. E., Madkhali, A., Alsharabi, A., Alsaif, F., & Hassanain, M. (April 26, 2017). Incidental Gallbladder Cancer.

Borzellino, G., & Cordiano, C. (2008). Biliary lithiasis: Basic science, current diagnosis, and management. Milan: Springer.

Bullock, ., Shane, ., & Hales, . (2012). Principles of Pathophysiology. Sydney: P. Ed Australia.

In Agresta, F., In Campanile, F. C., & In Vettoretto, N. (2014). Laparoscopic Cholecystectomy: An Evidence-based Guide.

In Cox, M. R., In Eslick, G. D., & In Padbury, R. (2018). The management of gallstone disease: A practical and evidence-based approach.

In Wang, D. Q.-H., & In Portincasa, P. A. M. (2017). Gallstones: Recent advances in epidemiology, pathogenesis, diagnosis and management.

Jugenheimer, M., Immenroth, M., Berg, T., & Brenner, J. (2008). Laparoscopic cholecystectomy. Heidelberg: Springer.

Studyspark

Study Document Study Document

Privacy In Social Networks Regarding Machine Learning

Pages: 8 (2537 words) Sources: 10 Document Type:Research Paper Document #:98311751

… et al., 2016). Yet while there are machine learning programs being developed to collect information on users in order to recognize them, create profiles of them, and predict their behaviors, there are machine learning programs like the one developed by Bilogrevic (2016) that are simultaneously being designed … to protect end users’ privacy in an Internet environment where scanning algorithms and constantly looking for data on users to develop their own profiles. Their protocol acts as a wall between the user…[break]…which the problem is likely ever to be solved once and for all. The Internet ……

References

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

Studyspark

Study Document Study Document

Clinical Informatics

Pages: 11 (3264 words) Sources: 12 Document Type:Essay Document #:78574553

… and make them public. Confusion persists as to how “public” social media really is, and some believe that because they have their own profile pages and determine which friends get to see it that the forum is somehow still private. They believe they have a right to ……

References

References

Cho, O. M., Kim, H., Lee, Y. W., & Cho, I. (2016). Clinical alarms in intensive care units: Perceived obstacles of alarm management and alarm fatigue in nurses. Healthcare informatics research, 22(1), 46-53.

Effken, J., Weaver, C., Cochran, K., Androwich, I., & O’Brien, A. (2016). Toward a central repository for sharing nursing informatics’ best practices. CIN: Computers, Informatics, Nursing, 34(6), 245-246.

Elsayed, W. A., Hussein, F. M., & Othman, W. N. (2017). Relation between nursing informatics competency and nurses’ attitude toward evidence-based practice among qualified nurses at Mansoura Oncology Center. International Journal of Nursing Didactics, 7(6), 26-33.

Drolet, B. C., Marwaha, J. S., Hyatt, B., Blazar, P. E., & Lifchez, S. D. (2017). Electronic communication of protected health information: privacy, security, and HIPAA compliance. The Journal of hand surgery, 42(6), 411-416.

Haupeltshofer, A., Egerer, V., & Seeling, S. (2020). Promoting health literacy: What potential does nursing informatics offer to support older adults in the use of technology? A scoping review. Health Informatics Journal, 1460458220933417.

Kharbanda, E. O., Asche, S. E., Sinaiko, A. R., Ekstrom, H. L., Nordin, J. D., Sherwood, N. E., & O’Connor, P. (2018). Clinical decision support for recognition and management of hypertension: a randomized trial. Pediatrics, 141(2).

Khezri, H., & Abdekhoda, M. (2019). Assessing nurses’ informatics competency and identifying its related factors. Journal of Research in Nursing, 24(7), 529-538.

Kleib, M., & Nagle, L. (2018). Factors associated with Canadian nurses\\\\\\\\\\\\' informatics competency. CIN: Computers, Informatics, Nursing, 36(8), 406-415.

Studyspark

Study Document Study Document

General Electric Appliance Company Quality Control Instruments

Pages: 7 (2135 words) Sources: 3 Document Type:Essay Document #:27536334

… in 2018 to $95,214 in 2019 (General Electric, 2019).
Product or Service Mix
General Electric has different appliance brands, including Monogram, Café, Haier, Profile, and Hotpoint. The products manufactured and retailed by GE Appliances comprise of Refrigerators, Ranges, Microwaves, Dishwashers, Washers, Room Air Conditioners, Wall Ovens, Water ……

References

References

General Electric. (2019). Annual Report, 2019. Retrieved from:  https://www.ge.com/sites/default/files/GE_AR19_AnnualReport.pdf 

GE Appliances. (2020). Our Community. Retrieved from:  https://www.geappliances.com/our-company/ 

QIMA. (2020). What is the Product Inspection? Retrieved from: https://www.qima.com/quality-control-services/product-and-manufacturing-inspections

Goh, A., Sullivan, M. (2011). How To Conduct Quality Control With Chinese Manufacturers. Business Insider.

Weber, A. (2019). Assembly Plant of the Year: Refrigerator Production Heats Up at GE Appliances. Assembly. Retrieved from:  https://www.assemblymag.com/articles/95217-assembly-plant-of-the-year-refrigerator-production-heats-up-at-ge-appliance s

Trebilcock, B. (2020). GE Appliance: Pulling the digital thread. Logistics Management. Retrieved from:  https://www.logisticsmgmt.com/article/ge_appliance_pulling_the_digital_thread 

Flannery, R. (January 15, 2016). Haier To Buy GE Appliances For $5.4B In China\\\\\\\\\\\\'s 2nd Big U.S. Acquisition This Week. Forbes. Retrieved from:  https://www.forbes.com/sites/russellflannery/2016/01/15/haier-to-buy-ge-appliances-for-5-4b-in-chinas-2nd-big-u-s-acquisition-this-week/#2a6118503c24 

Hayes, A. (July 28, 2020). Quality Control. Investopedia. Retrieved from: https://www.investopedia.com/terms/q/quality-control.asp

Studyspark

Study Document Study Document

COVID 19 In South Africa Nigeria And Swaziland

Pages: 7 (2030 words) Sources: 6 Document Type:literature review Document #:53851517

...Profile Literature Review on Coping Through The Use Of Informal Institutions during COVID 19 in South Africa, Nigeria, and Swaziland
The institutional theory deals with the outlines, regulations, standards, and procedures that are formulated in the institutions as commanding instructions for social behavior. This theory gives an understanding of how institutions are shaped, and the societal norms and frameworks are informed to all people of an organization. Communication is the sole indicator of how organizations are formulated with the help of formal rules and regulations, as that would reflect how they are conversed across all levels of the firm and in what way people are obeying them. This would ultimately build an organizational culture for coping with social and political issues. The informal institutions are socially shared instructions, typically unwritten, that are formed, transferred and imposed outside the official boundaries (Torniainen & Sasstamoinen, 2007), for example, giving tips to the food……

References

References

Coelho, A. (2019). The role of informal institutions in the enforcement of rules and how to improve corporate and public governance in Brazil: Studies based on a set of corporate governance cases involving state-owned companies (Working Paper). Retrieved from SSRN website  https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3434037 

Dacin, M.T., Goodstein, J. & Scott, W.R. (2002). Institutional theory and institutional change: Introduction to the special research forum. Academy of Management Journal, 45(1), 45- 47. DOI: 10.2307/3069284

Escandon-Barbosa, D.M., Urbano, D., Hurtado-Ayala, A., Paramo, J.S. & Dominguez, A.Z. (2019). Formal institutions, informal institutions, and entrepreneurial activity: A comparative relationship between rural and urban areas in Colombia. Journal of Urban Management, 8(3), 458-471.  https://doi.org/10.1016/j.jum.2019.06.002 

Estrin, S. & Prevezer, M. (2010). The role of informal institutions in corporate governance: Brazil, Russia, India, and China compared. Asia Pacific Journal of Management, 28, 41- 67.  https://doi.org/10.1007/s10490-010-9229-1 

Kaufmann, W., Hooghiemstra, R. & Feeney, M.K. (2018). Formal institutions, informal institutions, and red tape: A comparative study. Public Administration, 96(2), 386-403. https://doi.org/10.1111/padm.12397

Meluch, A.L. (2016, August). Understanding the organizational and institutional origins of social support in a cancer support center. (Unpublished doctoral dissertation). Retrieved from https://etd.ohiolink.edu/!etd.send_file?accession=kent1466944822&disposition=inline

Torniainen, T.J. & Sasstamoinen, O.J. (2007). Formal and informal institutions and their hierarchy in the regulation of the forest lease in Russia. Forestry: An International Journal of Forest Research, 80(5), 489-501.  https://doi.org/10.1093/forestry/cpm033 

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".