Research Questions Essays (Examples)

Studyspark

Study Document Study Document

Domestic Extremism And Terrorism

Pages: 12 (3640 words) Sources: 12 Document Type:Research Paper Document #:16554681

Proud Boys vs Antifa War of Words
Introduction and research Question
When it comes to domestic extremism, there are groups on both the Right and the Left of the socio-political spectrum in America. … great deal of similarities. This paper looks at two extremist groups in particular—Antifa on the Left and Proud Boys on the Right. The questions this paper poses are: What is the nature of Antifa and how does Proud Boys mirror the group from the opposite spectrum? How … to stop their spread overall since they naturally feed upon one another and the invective that they both communicate.
Conclusions
To answer the research questions, it has been shown that Antifa and Proud Boys are essentially two sides of the same coin. Both represent the extreme sides of … by a three-pronged approach using a public health method, governmental collaboration, and a change in laws regarding the expression……

References

References

Breger, M. L. (2017). Reforming by re-norming: How the legal system has the potential to change a toxic culture of domestic violence. J. Legis., 44, 170.

Beinart, P. (2017). The rise of the violent left. Retrieved from  https://www.theatlantic.com/magazine/archive/2017/09/the-rise-of-the-violent-left/534192/ 

Brockhoff, S., Krieger, T. & Meierrieks, D. (2014). Great expectations and hard times: the (nontrivial) impact of education on domestic terrorism. Journal of Conflict Resolution, 59(7), 1186-1215.

Brown, D. (2017). Proud boys founder. Retrieved from  https://www.portlandmercury.com/blogtown/2017/12/12/19540403/proud-boys-founder-wants-to-trigger-the-entire-state-of-oregon-by-helping-patriot-prayers-joey-gibson-win-the-oregon-person-of-the-year- p

Cramer, E. P., Choi, Y. J., & Ross, A. I. (2017). Race, Culture, and Abuse of Persons with Disabilities. In Religion, Disability, and Interpersonal Violence (pp. 89-110). Springer, Cham.

Dalgaard-Nielsen, A. (2016). Countering violent extremism with governance networks. Perspectives on Terrorism, 10(6), 135-139.

DeCook, J. R. (2018). Memes and symbolic violence:# proudboys and the use of memes for propaganda and the construction of collective identity. Learning, Media and Technology, 43(4), 485-504.

Doyle, E. (Ed.). (2018). Antifa and the Radical Left. Greenhaven Publishing LLC.

Studyspark

Study Document Study Document

The FBI Counterproliferation And Weapons Of Mass Destruction

Pages: 6 (1839 words) Sources: 8 Document Type:Research Paper Document #:33590628

...Research questions The FBI, Counterproliferation, and Weapons of Mass Destruction
The United States government significantly increased activities in programs involved in the protection of the nation and the world against weapons of mass destruction (WMD) in 2009 and 2010. The Obama Administration, in December 2009, gave a presidential policy directive aimed at countering biological threats with a focus on infectious illnesses whether such threats were manmade or natural. It was the second such directive the Administration had issued. The Quadrennial Defense Review in 2010 emphasized on how WMD’s proliferation was a threat to global security. In April of the same year, the Administration unclassified the Nuclear Posture Review for the first time and it was released alongside the Strategic Arms Reduction Treaty. The treaty was aimed at lowering the number of deployable US and Russian weapons. Representatives drawn from all over the world met in May with a goal of renewing the……

References

References

Busch, Nathan, and Joyner, Daniel (ed). 2009. “Introduction: Nonproliferation at a Crossroads.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Athens, GA: The University of Georgia Press.

Reiss, Mitchell. 2009. “Foreword.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Edited by Nathan Busch, and Daniel Joyner. Athens, GA: The University of Georgia Press.

Cameron, Gavin, Pate, Jason & Vogel, Kathleen. (2001). “Planting Fear: How Real is the Threat of Agricultural Terrorism?” Bulletin of Atomic Scientists, 57(5), 38-44.

Jennings, Elain. 2013. U. S. proliferation policy and the campaign against transnational terror: Linking the U.S. non-proliferation regime to homeland security efforts. Master’s Thesis. Naval Postgraduate School.

Levi, Michael. 2009. “On Nuclear Terrorism.” Cambridge, MA: Cambridge University Press.

Mauroni, Albert. J. 2010. “A Counter-WMD Strategy for the Future.” Parameters, 58-73.

Ogilvie-White, Tanya. 2008. “Facilitating Implementation of Resolution 1540 in South- East Asia, and the South Pacific.” In Implementing Resolution 1540: The Role of Regional Organizations. Edited by Lawrence Scheinman. New York: United Nations Institute for Disarmament Research.

Pilat Joseph F. 2009. “Dealing with Proliferation and Terrorism.” In Combating Weapons of Mass Destruction: The Future of International Nonproliferation Policy, edited by Nathan E. Busch and Daniel H. Joyner. Athens, GA: University of Georgia Press.

Studyspark

Study Document Study Document

FBI Drugs And WMDs

Pages: 11 (3378 words) Sources: 13 Document Type:Research Paper Document #:66505511

… counterproliferation strategy that would inevitably become the plan to stop the spread and usage of WMDs by terrorists against America. As the primary research question of this study is “In what ways can the nonproliferation regime connect and collaborate with homeland security as a way to improve … Fentanyl Smuggling." US Att'ys Bull. 66 (2018): 57.]
Conclusion
The FBI’s counterproliferation strategy can be successful if it follows the recommendations of the scholars and research cited herein: their recommendations are to engage in greater collaboration with other nations in the international community; engage in covert operations to track ……

References

Bibliography

Arnold, Aaron and Daniel Salisbury, “The Long Arm,” Belfer Center, 2019. https://www.belfercenter.org/publication/long-arm

Carter, Ashton B. "Overhauling counterproliferation." Technology in Society 26, no. 2-3 (2004): 257-269.

The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. “Combating Proliferation of Weapons of Mass Destruction,” Washington, D.C., 1999.

FBI. “COINTELPRO.”  https://vault.fbi.gov/cointel-pro 

FBI Counterproliferation Center. “About.”  https://www.fbi.gov/about/leadership-and-structure/national-security-branch/fbi-counterproliferation-center 

Fischer, Rowena Rege. “Guide to the Study of Intelligence: Counterproliferation,” Journal of U.S. Intelligence Studies 21, no. 1 (Winter 2014-15), 78-82.

Liow, Joseph Chinyong. "The Mahathir administration's war against Islamic militancy: operational and ideological challenges." Australian Journal of International Affairs 58, no. 2 (2004): 241-256.

Manchikanti, Laxmaiah, Jaya Sanapati, Ramsin M. Benyamin, Sairam Atluri, Alan D. Kaye, and Joshua A. Hirsch. "Reframing the prevention strategies of the opioid crisis: focusing on prescription opioids, fentanyl, and heroin epidemic." Pain physician 21, no. 4 (2018): 309-326.

Studyspark

Study Document Study Document

Effect Of Digital Marketing On Competitiveness Of Automobile Companies

Pages: 7 (2171 words) Sources: 8 Document Type:Research Paper Document #:71991463

Introduction
In the research article “Effect of Digital Marketing on Competitiveness of Automobile Companies in Kenya” by Eva Nkatha Kigunda, the objective was to assess how digital … return on investment (ROI) is still insignificant. Digital marketing strategies are mainly used in maintaining the current customer pool for the dealers. The research article is a standard-structured paper that included a literature review under chapter two, pages 8-25. In this paper, a critique of the literature … one, which contains the topic, aim, and scope of the study. The scope of the study is the Kenyan automobile industry and the research conducted review in Nairobi, and the neighboring towns of Rongai, Athi River, Kiambu, and Thika. The study focused on social media marketing, search … The study focused on social media marketing, search engine marketing, and email marketing. This notwithstanding, the author has included some of the crucial research questions in……

References

References

Evans, M.P., 2007. Analysing Google rankings through search engine optimization data. Internet research, 17(1), pp.21-37.

Galvan, J.L. and Galvan, M.C., 2017. Writing literature reviews: A guide for students of the social and behavioral sciences. Routledge.

Kaplan, A.M. and Haenlein, M., 2010. Users of the world, unite! The challenges and opportunities of Social Media. Business horizons, 53(1), pp.59-68.

Kigunda, E. N. 2017. Effect of Digital Marketing on Competitiveness of Automobile Companies in Kenya (Doctoral dissertation, United States International University-Africa).

Kimani, B., 2012. When social media does the marketing. Management magazine, (36-37).

Machi, L.A. and McEvoy, B.T., 2016. The literature review: Six steps to success. Corwin Press.

Ngulube, P., Mathipa, E.R. and Gumbo, M.T., 2015. Theoretical and conceptual frameworks in the social and management sciences. Addressing research challenges: Making headway in developing researchers, pp.43-66.

Wong, L.L.C., 2016. Challenges and expectations: Preparing postgraduate students to write literature reviews. In International Conference of the Spanish Association of Applied Linguistics (AESLA), 2016. University of Alicante.

Studyspark

Study Document Study Document

Depression And Social Media

Pages: 8 (2464 words) Sources: 13 Document Type:Research Paper Document #:12318199

… has more than doubled. This coincides with the rise of social media and the social media usage among adolescents, according to the Pew research Center, which finds that 95% of teens have access to a smart phone and 45% of teens say they are online “all the … between the rise of social media use among young people and the rise of depression and loneliness among the same demographic raises serious questions, such as: Is there a relationship between social media use and loneliness among young adults, ages 15-25?
Statement of research Question and Significance
The research question for this proposal is: Does social media make people lonely—particularly those who are between the ages of 15-25?
The significance of this ……

References

Works Cited

Andreassen, Cecilie Schou, Ståle Pallesen, and Mark D. Griffiths. \\\\\\\\\\\\"The relationship between addictive use of social media, narcissism, and self-esteem: Findings from a large national survey.\\\\\\\\\\\\" Addictive behaviors 64 (2017): 287-293.

Bandura, A. “Toward a psychology of human agency: Pathways and reflections.”  Perspectives on Psychological Science 13.2 (2018): 130-136.

Chester, Jeff, and Kathryn Montgomery. \\\\\\\\\\\\"No escape: Marketing to kids in the digital age.\\\\\\\\\\\\" Multinational Monitor 29.1 (2008): 11.

Greenberg, P. The Growing Economic Burden of Depression in the U.S. 2015. Retrieved from  https://blogs.scientificamerican.com/mind-guest-blog/the-growing-economic-burden-of-depression-in-the-u-s/ 

Klinenberg, Eric. \\\\\\\\\\\\"Is loneliness a health epidemic?.\\\\\\\\\\\\" New York Times (2018): SR8.

Lim, Xin Jean, et al. \\\\\\\\\\\\"The impact of social media influencers on purchase intention and the mediation effect of customer attitude.\\\\\\\\\\\\" Asian Journal of Business Research 7.2 (2017): 19-36.

Lohmann, R. What\\\\\\\\\\\\'s Driving the Rise in Teen Depression? 2019. https://health.usnews.com/wellness/for-parents/articles/2019-04-22/teen-depression-is-on-the-rise

Mayo Clinic. “Depression.” MayoClinic, 2019.  https://www.mayoclinic.org/diseases-conditions/teen-depression/symptoms-causes/syc-20350985

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by … intelligence gathering approach and strategy for national security decisions. However, cyber espionage remains a form of cyberattack, which is legally and ethically unacceptable.
research Question
Is cyber espionage a method used by state for intelligence gathering a form of unacceptable cyberattack?
How is cyber espionage as an …
How is cyber espionage as an acceptable state behavior for intelligence gathering though it is a form of unacceptable…[break]…data. For this study, the research will adopt an exploratory approach to qualitative case study to gain a deeper understanding of……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf 

National Counterintelligence and Security Center. “Foreign Economic Espionage in Cyberspace.” Office of the Director of National Intelligence, 2018.  https://www.dni.gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf 

Rubenstein, D. “Nation State Cyber Espionage and its Impacts.” Washington University in St. Louis, December 2014.  https://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/ 

Weissbrodt, D. “Cyber-Conflict, Cyber-Crime, and Cyber-Espionage.” Minnesota Journal of International Law 22, no. 2 (2013).

Studyspark

Study Document Study Document

Maslow S Hierarchy Of Needs Model And Its Application In Human Resources

Pages: 12 (3607 words) Sources: 9 Document Type:Research Paper Document #:83319615



How to Use Employee Referrals to Increase Workforce but Still be Able to Maintain Diversity within an Organization
Table of Contents
Introduction 2
research Findings 3
Theoretical Framework 4
Findings of Literature research 6
Case 8
Conclusion 11
Bibliography 12
Introduction
As Frank (2018) points out, over 33% of all US employees obtained their job with … search strategies like deliberately asking for diverse referrals or even for leads instead of referrals can help reduce the risk of non-diverse hires.
research Findings
The theory used to assess the findings for this research was agency theory, which is used to explain the relationship between agents and principles. The theory helps one to understand the limitations of … good agent for the organization and assist HR in identifying diverse candidates who will meet the needs of the company.
Findings of Literature research
Frank (2018) shows that HR must determine the relationship……

References

Bibliography

Bussin, M., & Christos, D. (2018). Blind hiring not as crazy as it sounds. HR Future,  2018(Sep 2018), 36-39.

CBS News (2017). Retrieved from  http://www.cbsnews.com/videos/meet-bozoma-saint-john-the-woman-tasked-with-fixing-ubers-image/ " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

What Followers Can Learn From Their Leaders During Crisis

Pages: 10 (2861 words) Sources: 5 Document Type:Research Paper Document #:13609293

… direction/ guidance from their leaders. This paper investigates what exactly followers seek or need from their leaders during crises.
Methodology and results
This research involved the use of a qualitative design methodology to gather the data needed to answer the research question. The population from whom the data was gathered was only made up of followers/ subordinates from the Department of Justice. The data … was gathered was only made up of followers/ subordinates from the Department of Justice. The data was gathered through interviewing the subordinates. The questions for the interviews were designed to find out what the subordinates wanted from their leaders in times of crisis. A total of 3 … many things unpredictable. This is why followers look to their leaders for certainty. They also look to their leaders for competence and honesty. research conducted last year (2019) indicated that only 13 percent of employees/ followers……

References

References

Birnbaum, T., & Friedman, H. H. (2014). Ezra and Nehemiah: Lessons in Moral and Spiritual Leadership. Available at SSRN 2390230.

Carrington, D. J., Combe, I. A., & Mumford, M. D. (2019). Cognitive shifts within leader and follower teams: Where consensus develops in mental models during an organizational crisis. The Leadership Quarterly, 30(3), 335-350.

Harter, J. (2019). Why Some Leaders Have Their Employees\\\\\\' Trust, and Some Don\\\\\\'t. Workplace. Gallup.

Hofmeyr, K., Cook, J., & Richardson, A. (2011). How leaders generate hope in their followers. South African Journal of Labour Relations, 35(2), 47-66.

Kranke, D., Gin, J., Der-Martirosian, C., Weiss, E. L., & Dobalian, A. (2020). VA social work leadership and compassion fatigue during the 2017 hurricane season. Social Work in Mental Health, 18(2), 188-199.

Patton, C. (2017). What made Nehemiah an effective leader?. Journal of Applied Christian Leadership, 1(1), 8-14.

Rogers, A. P., & Barber, L. K. (2019). Workplace intrusions and employee strain: the interactive effects of extraversion and emotional stability. Anxiety, Stress, & Coping, 32(3), 312-328.

Skeet, A. (2020, April 4). Ethical Followership in Times of Crisis. Markkula Center for Applied Ethics, Santa Clara University.

Studyspark

Study Document Study Document

How To Use Employee Referrals To Increase Workforce But Still Be

Pages: 10 (3022 words) Sources: 5 Document Type:Research Paper Document #:50167640

How to Use Referrals to Identify Diverse Candidates for a Job
Table of Contents
Introduction 2
research Findings 3
Theoretical Framework 4
Findings of Literature research 6
Case 8
Conclusion 11
Bibliography 12
Introduction
As Frank (2018) points out, over 33% of all US employees obtained their job with … search strategies like deliberately asking for diverse referrals or even for leads instead of referrals can help reduce the risk of non-diverse hires.
research Findings
The theory used to assess the findings for this research was agency theory, which is used to explain the relationship between agents and principles. The theory helps one to understand the limitations of … good agent for the organization and assist HR in identifying diverse candidates who will meet the needs of the company.
Findings of Literature research
Frank (2018) shows that HR must determine the relationship between the referring source and the referral so……

References

Bibliography

Bussin, M., & Christos, D. (2018). Blind hiring not as crazy as it sounds. HR Future,  2018(Sep 2018), 36-39.

CBS News (2017). Retrieved from  http://www.cbsnews.com/videos/meet-bozoma-saint-john-the-woman-tasked-with-fixing-ubers-image/ " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Weapons Of Mass Destruction

Pages: 9 (2563 words) Sources: 10 Document Type:Research Paper Document #:76982977

… the use of international treaties, the rise of terrorism, and counter-proliferation strategies, this paper will assess the measures available for achieving the aim.
research Question
What can nations do to prevent or reduce the risk of CBRN WMD attacks?
Literature Review
International Strategies
While international treaties may ……

References

References

Asada, M. (2008). Security Council Resolution 1540 to combat WMD terrorism: effectiveness and legitimacy in international legislation. Journal of Conflict & Security Law, 13(3), 303-332.

Carter, A. B. (2004). Overhauling counterproliferation. Technology in Society 26(2-3), 257-269.

CBS. (2011). Clinton on Qaddafi: We came, we saw, he died. Retrieved from  https://www.youtube.com/watch?v=mlz3-OzcExI 

The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. (1999). Combating Proliferation of Weapons of Mass Destruction. Washington, D.C.

Forest, J.J.F. (2012, Winter). Framework for Analyzing the Future Threat of WMD Terrorism. Journal of Strategic Security 5, 4. Retrieved from  http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1193&context=jss 

Hochman, D. (2006). Rehabilitating a rogue: Libya's WMD reversal and lessons for US policy. Parameters, 36(1), 63.

Lang, C. G. (1937). Archbishop's Appeal: Individual Will and Action; Guarding Personality. London Times, 28.

Stone, O., & Kuznick, P. (2013). The untold history of the United States. Simon and Schuster.

Join thousands of other students and

"spark your studies".