Public Transportation Essays (Examples)

Studyspark

Study Document Study Document

Incident Command System ICS

Pages: 9 (2818 words) Sources: 7 Document Type:Essay Document #:51934248

… social sophistication (Buck et al., 2006).
In summary, ICS effectiveness depends on its context. The type or size of a disaster and the public infrastructure complexity in disaster response are key to assessing the efficiency and effectiveness of ICS. The anticipated ICS effectiveness is dependent on the ……

References

References

AmeriCorps St. Louis. (2016). “Missouri Winter Flooding 2016.” Retrieved from https://www. americorps-stl.org/our-teams/emergency-response-team/disaster-deployment-archive/missouri-winter-flooding-2016/.

Buck, Dick A., Joseph E. Trainor, and Benigno E. Aguirre. (2006). “A Critical Evaluation of the Incident Command System and NIMS.” Journal of Homeland Security and Emergency Management, 3(3).

Bigley, Gregory A. and Karlene H. Roberts. (2001). “The Incident Command System: High-Reliability Organizing for Complex and Volatile Task Environments.” Academy of Management Journal, 44(6): 1281-1299.

Butterfield, Karen. (2016, January 21). “AmeriCorps Helping Flood Victims Find Place to Stay.” The Missourian. Retrieved from http://www.emissourian.com/local_news/washington/americorps-helping-flood-victims-find-place-to-stay/article_56f75bab-87de-5198-843e-bdfdb8229b5a.html.

Cardwell, Michael D. and Patrick T. Cooney. (2000). “Nationwide Application of the Incident Command System: Standardization Is the Key.” FBI Law Enforcement Bulletin 69.10: 10-16.

Cole, Dana. (2000). The Incident Command System: A 25-Year Evaluation by California Practitioners. National Fire Academy.

Corporation for National and Community Service (CNCS). (2014). “Disaster Response Framework.” Retrieved from  http://www.nationalservice.gov/sites/default/files/documents/CNCS%20DSU%20  Disaster%20Response%20Framework.pdf.

Dynes, Russell Rowe. (1970). Organized Behavior in Disaster. Lexington, MA: Heath Lexington.

Studyspark

Study Document Study Document

Change Management At Nike

Pages: 8 (2482 words) Sources: 8 Document Type:Essay Document #:61161012

… and supply chains. To maintain the livelihood of the nation at the same time that people are protected, changes need to be made. transportation may be halted altogether in the coming months and years, which means Nike will need to ask major questions about how it plans … time for nations to become more isolationist in terms of transport? Perhaps a solution can be arrived at that will not require all transportation to grind to a halt—but how transports are thought of is something that should be discussed more openly, whether this involves disinfecting all … is clicking, and where traffic is coming from as this will show how well Nike’s new direction is gaining traction with the American public (Freberg, Graham, McGaughey & Freberg, 2011).
Managing resistance to change is another important aspect that has to be considered. Change management requires that ……

References

Bibliography and References

Balaji, S., & Murugaiyan, M. S. (2012). Waterfall vs. V-Model vs. Agile: A comparative study on SDLC. International Journal of Information Technology and Business Management, 2(1), 26-30.

Boehm, B. (2002). Get ready for agile methods, with care. Computer, (1), 64-69.

Boehm, B. (2007). A survey of agile development methodologies. Laurie Williams, 45, 119.

Fernandez, D. J., & Fernandez, J. D. (2008). Agile project management—agilism versus traditional approaches. Journal of Computer Information Systems, 49(2), 10-17.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Cameron, E. and Green, M. (2015), Making Sense of Change Management: A complete Guide to the Models, Tools and Techniques of Organizational Change. Kogan Page: London

Kotter, J. P. (2012). Leading Change. Harvard Business Review Press.

TMZ. (2018). Kaep Deal Adds Up... WE GOT NIKE'S CUSTOMER BREAKDOWN. Retrieved from  https://www.tmz.com/2018/09/06/colin-kaepernick-nike-contract-urban-consumers-market-research/

Studyspark

Study Document Study Document

Weapons Of Mass Destruction WMD Antifa

Pages: 13 (3787 words) Sources: 12 Document Type:Research Paper Document #:67320498

… Border Protection, the Cybersecurity and Infrastructure Agency, the U.S. Citizenship & Immigration Services, U.S. Immigrations and Customs Enforcement, U.S. Secret Service and the transportation Security Administration. These groups should all be collaborating to stop or to reduce the risk of unsecured ports so that an attack by ……

References

References

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Christenson, G. (2015). CBRN response. National Guard Bureau.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from  https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat 

Jennings, P. (2006). Miami port poses serious risks. Retrieved from  https://abcnews.go.com/WNT/story?id=131634&page=1 

Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from  http://www.johnstonsarchive.net/terrorism/chembioattacks.html 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Maras, M-H. (2014). Transnational Security. Florida: CRC Press.

Studyspark

Study Document Study Document

Advantages And Disadvantages Of Interrelationships Between Organizational

Pages: 16 (4728 words) Sources: 28 Document Type:Essay Document #:81594345

… for manufacturing of basic equipment necessitated for the airplanes. The commercial department of the organization deals with sales and revenues, business promotion and public, as well as matters that pertain to public relation and advertisement. What is more, the personnel department of Air India is liable for recruitment, assessment and hiring of employees. It is … and executive control over involved and self-governing establishments such as the Directorate General of Civil Aviation, Bureau of Civil Aviation Security and conglomerated public Sector activities (Civil Aviation, 2019).
The complexities of Air India’s business structure significantly impact the company’s organizational functions. It is imperative to note ……

References

References

Air India. (2019). Board of Directors. Retrieved from:  http://www.airindia.in/board-of-directors.htm 

Aquinas, P. G. (2008). Organization structure and design. India: Excel Books India.

Burns, T., & Stalker, G. M. (2005). Mechanistic and organic systems. Organizational Behavior, 2, 214-25.

Choo, S., & Bowley, C. (2007). Emerald Article: Using training and development to affect job satisfaction. Journal of Small Business and Enterprise Development, 14(2),339 - 352.

Cichocki, P., & Irwin, C. (2014). Organization design: A guide to building effective organizations. Kogan Page Publishers.

Civil Aviation. (2019). About Us: Organizational Setup. Retrieved from:  http://www.civilaviation.gov.in/en/aboutus/orgsetup 

Cunliffe, A. L. (2008). Organization theory. New York: Sage.

Cunliffe, A. L., & Luhman, J. T. (2012). Key concepts in organization theory. New York: Sage.

Studyspark

Study Document Study Document

Online Auctions For Fund Raising By Non Profit Organizations

Pages: 8 (2322 words) Sources: 4 Document Type:Essay Document #:34213505

...Public transportation A Systematic Review of Online Auctions for Fund Raising by Non-Profit Organizations
Background
Its origin dating back to Babylon in 500 BC auctions account as one of the oldest forms of price determination mechanism in the markets. Auction is negotiation protocols that entail simultaneous bidding with the price determined bidders and products or services allocated based on competition amongst potential buyers (McAfee, 2017).
Classifications of Auctions
There are four major classifications of auctions formats in the market based on the information asymmetry and the flow of prices. The auction types include English Auction, Dutch Auctions, sealed-bid first-price auctions, and Vickrey auctions (Klemperer, 2004).
English and Dutch auctions are both open auctions implying that they are orally implemented but entail distinguishing value setting features. According to Klemperer (2004), an English Auction also known as the oral ascending auction or first-price auction entails an ascending sequential price strategy where the auctioneer sets a……

References

References

Cachon, G. P., Daniels, K., & Lobel, R. (2015). The Role of Surge Pricing on a Service Platform with Self-Scheduling Capacity.  https://ssrn.com/abstract=2698192 

Connelly, A., & Winter, M. (2003). Going...Going...Gone!: Successful Auctions for Non-Profit Institutions (Second). Target Funding Group, Inc. All.

Fasli, M., Co, C., & Co, C. (2014). Designing and Implementing E-market Games. Designing and Implementing e-Market Games. January 2005.

Forbes Magazine. (2019). The 100 Largest U.S. Charities. Forbes Magazine.  https://doi.org/10.1007/springerreference_75918 

Hasker, K., & Sickles, R. (2010). eBay in the Economic Literature: Analysis of an Auction Marketplace. Review of Industrial Organization, 37(1), 3–42.  https://doi.org/10.1007/s11151-010-9257-5 

Kingston, K. (2015). A Higher Bid: How to Transform Special Event with Strategic Benefit Auctions. John Wiley & Sons, Inc., Hoboken, New Jersey.

Klemperer, P. (2004). Auctions: Theory and Practice. In Princeton University Press.  https://doi.org/10.4337/9781839107429.00004 

McAfee, P. (2017). The Ideal Auction - Numberphile. YouTube.  https://www.youtube.com/watch?v=4kWuxfVbIaU

Studyspark

Study Document Study Document

Homeland Defense And Private Security After September 11 Attacks

Pages: 6 (1861 words) Sources: 5 Document Type:Essay Document #:15174853

… key government reactions to the September 11 attacks and the role of the private sector in the country’s security policy after the attacks.
public Opinion After 9/11 Attack
After the September 11 attacks, most Americans called for and supported the creation of a strong security policy to … attacks, most Americans called for and supported the creation of a strong security policy to respond to the threat of terrorism. The general public felt very angry. However, in contrast, the Americans who were directly affected by the attacks felt quite anxious and stressed about terrorism and … in the United States government increased to percentages only previously witnessed in the 1960s. The last polling that measured the percentage of the public that trusted the Bush government before the September 11 attacks was a Los Angeles Times national poll conducted in March 2001. The national … attacks was a Los Angeles……

References

References

Chanley, V. (2002). Trust in Government in the Aftermath of 9/11: Determinants and Consequences. Political Psychology, 23(3), 469-483. Retrieved May 11, 2020, from https://www.jstor.org/stable/3792588

Dugulin, R., & Niglia, A. (2015, May 17). The private sector in the protection of critical infrastructure - GRI. Global Risk Insights. https://globalriskinsights.com/2015/05/the-private-sectors-vital-role-in-the-protection-of-critical-infrastructure/

Gramlich, J. (2018, September 11). Since 9/11, Americans have seen anti-terrorism policy as a top priority. Pew Research Center.  https://www.pewresearch.org/fact-tank/2018/09/11/defending-against-terrorism-has-remained-a-top-policy-priority-for-americans-since-9-11/ 

Morgan, D. (2019). Homeland Security Research and Development: Homeland Security Issues in the 116th Congress. Current Politics and Economics of the United States, Canada, and Mexico, 21(1), 43-46.

Moteff, J., Copeland, C., & Fischer, J. (2003, January). Critical infrastructures: What makes an infrastructure critical?. Library of Congress Washington DC Congressional Research Service.

Studyspark

Study Document Study Document

US Criminal Justice System

Pages: 3 (988 words) Sources: 6 Document Type:question answer Document #:28826402

… warrants and subpoenas. The third component of the justice system, corrections, are employed in making certain that criminals remain under confinement, facilitate the transportation of convicts to hearings, and also partake in the supervision of individuals subsequent to their release from custody. What is more, the courts ……

References

References

Ortmeier, P. J. (2006). Introduction to law enforcement and criminal justice. New York: Prentice Hall.

Peak, K. J. (Ed.). (2013). Encyclopedia of community policing and problem solving. Sage Publications.

Perez, D. W., & Moore, J. A. (2012). Police Ethics. Cengage Learning.

Science Daily. (2008). Impact Of Stress On Police Officers\\' Physical And Mental Health. Retrieved from: https://www.sciencedaily.com/releases/2008/09/080926105029.htm

The New York Times. (2014). Sir Robert Peel’s Nine Principles of Policing. Retrieved from: https://www.nytimes.com/2014/04/16/nyregion/sir-robert-peels-nine-principles-of-policing.html

University of San Diego. (2019). The Top 5 Trends in Law Enforcement. Retrieved from:  https://onlinedegrees.sandiego.edu/top-5-trends-in-law-enforcement/ 

Studyspark

Study Document Study Document

Healthcare Advocacy For The Elderly

Pages: 8 (2541 words) Sources: 6 Document Type:Essay Document #:36286528

… a nursing home. Information is power, so when one organizes the community with the aim of spreading information, raising awareness, and empowering the public to act, the healthcare advocate can make sufficient strides in helping the elderly population—simply by getting others educated and involved in the struggle.

One way to do that is to host community forums. Community centers are great locations for hosting these kinds of forums, as the public is going to know where they are, they are easy to get to, and they can hold a good size crowd. The healthcare … to, and they can hold a good size crowd. The healthcare advocate can invite members of the elderly population to talk to the public or they can speak on the behalf of the elderly community by sharing their stories and experiences, whether they touch on the inability … the inability to pay for……

References

References

Brojeni, S. A., Ilali, E. S., Taraghi, Z., & Mousavinasab, N. (2019). Lifestyle and its related factors in elderly. Journal of Nursing and Midwifery Sciences, 6(1), 32.

Community Health Advocates. (2015). Helping New Yorkers get, keep, and use health coverage. Retrieved from:  http://www.cssny.org/programs/entry/community-health-advocates 

Davoodvand, S., Abbaszadeh, A., & Ahmadi, F. (2016). Patient advocacy from the clinical nurses' viewpoint: A qualitative study. Journal of Medical Ethics & History of Medicine, 9(5), 1-8.

Maryland, M. A., & Gonzalez, R. I. (2012). Patient advocacy in the community and legislative arena. Online Journal of Issues in Nursing, 17(1), 2.

Stainton, H. (2016). Horizon to fund new NJ healthcare advocacy organization. News, Issues, andIinsight for New Jersey. Retrieved from:  http://www.njspotlight.com/stories/16/11/21/horizon-to-fund-new-nj-healthcare-advocacy-organization/ 

Yamada, T., Chen, C. C., Murata, C., Hirai, H., Ojima, T., & Kondo, K. (2015). Access disparity and health inequality of the elderly: unmet needs and delayed healthcare. International journal of environmental research and public health, 12(2), 1745-1772.

Studyspark

Study Document Study Document

Drug Abuse

Pages: 8 (2545 words) Sources: 21 Document Type:literature review Document #:24528043

...Public transportation Impact of Drug Abuse on School Children Aged 10 To 18 in Developed Countries (U.S., Canada, France, England, Germany, Italy, Russia, Australia, Japan and China): Narrative Literature Review
Introduction
The problem addressed in this literature review is that in developed countries around the world, drug abuse among school children between the ages of 10 and 18 is on the rise (UN, 2018). School children are particularly vulnerable because their bodies and minds are still developing and when drugs are introduced to their systems, the impact can be devastating to them personally in physical and mental health terms (Stockings et al., 2016). Yet all around the developed world this is happening. Children are being brought into and exposed to drug culture because drug use, particularly marijuana use is on the rise through vaping, which was meant as a tool to wean tobacco smokers off cigarettes. Instead it is allowing young and……

References

References

Baggio, S., Spilka, S., Studer, J., Iglesias, K., & Gmel, G. (2016). Trajectories of drug use among French young people: Prototypical stages of involvement in illicit drug use. Journal of Substance Use, 21(5), 485-490.

Bonyani, A., Safaeian, L., Chehrazi, M., Etedali, A., Zaghian, M., & Mashhadian, F. (2018). A high school-based education concerning drug abuse prevention. Journal of education and health promotion, 7.

Chu, Y. W. L. (2015). Do medical marijuana laws increase hard-drug use?. The Journal of Law and Economics, 58(2), 481-517.

Downes, D. (2017). The drug addict as a folk devil. In Drugs and politics (pp. 89-97). Routledge.

Goodchild, M., Nargis, N., & d\\'Espaignet, E. T. (2018). Global economic cost of smoking-attributable diseases. Tobacco control, 27(1), 58-64.

Grant, C. N., & Bélanger, R. E. (2017). Cannabis and Canada’s children and youth.  Paediatrics & child health, 22(2), 98-102.

Herbert, A., Gonzalez-Izquierdo, A., McGhee, J., Li, L., & Gilbert, R. (2016). Time-trends in rates of hospital admission of adolescents for violent, self-inflicted or drug/alcohol-related injury in England and Scotland, 2005–11: population-based analysis. Journal of Public Health, 39(1), 65-73.

Henkel, D., & Zemlin, U. (2016). Social inequality and substance use and problematic gambling among adolescents and young adults: a review of epidemiological surveys in Germany. Current drug abuse reviews, 9(1), 26-48.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… are additional contributing factors. According to Lotrionte (2015), cyber espionage, particularly economic espionage is brought by the failure by international law to provide public order.[footnoteRef:5] Prescriptive norms of international law are not strong enough to provide public order that would deter cyber espionage, especially economic espionage. Similarly, Libicki (2017) contends that despite objections to certain types of cyber espionage by … their adversaries. For example, China has hacked every big American company looking for useful information as well as the computer systems of private transportation firms working for the U.S. Army. [7: Scott Jasper, “Deterring Malicious Behavior in Cyberspace”, Strategic Studies Quarterly 9, no. 1 (2015):60]
Cyber Espionage ……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".