Responsibility Essays (Examples)

Studyspark

Study Document Study Document

Counterterrorism Strategy For The Next U S Presidential Administration

Pages: 6 (1889 words) Sources: 6 Document Type:Term Paper Document #:70457523

...Responsibility Introduction
One of the goals of the G. W. Bush Administration, which launched the War on Terrorism campaign, was to “end the state sponsorship of terrorism” (White House, 2003). The top goals of the Bush Administration, however, were to defeat Bin Laden and Al-Zarqawi, as well to identify terrorist organizations and demolish them. The first two goals have been accomplished. The latter is dependent upon eradicating state sponsorship of terrorism. Thus, as shall be seen in this strategy paper, ending the state sponsorship of terrorism should be the number one goal of this administration, as state sponsorship is the primary means by which terrorism continues to this day (Malzahn 2002).
Successes and Failures Since 2001
While the U.S. has been successful at defeating terrorists since 9/11, it has not done as well when it comes to defeating the idea of terrorism (Bipartisan Policy Center, 2017). Even though ISIS has been……

References

References

Bipartisan Policy Center. (2017). Defeating terrorists, not terrorism. Retrieved from  https://bipartisanpolicy.org/report/counterterrorism-policy-from-911-to-isis/ 

Englehardt, T. (2018). America’s war on terror. Retrieved from  https://www.thenation.com/article/americas-war-on-terror-has-cost-taxpayers-5-6-trillion/ 

Freeman, M. (2018). ISIS Is a US-Israeli Creation. Top Ten “Indications.” Retrieved from https://www.globalresearch.ca/isis-is-a-us-israeli-creation-top-ten-indications/5518627

Malzahn, S. M. (2002). State Sponsorship and Support of International Terrorism: Customary Norms of State Responsibility. Hastings Int'l & Comp. L. Rev., 26, 83.

Nordland, R. & Mashal, M. (2019). U.S. and Taliban Edge Toward Deal to End America’s Longest War. Retrieved from https://www.nytimes.com/2019/01/26/world/asia/afghanistan-taliban-peace-deal.html

White House. (2003). National strategy for combating terrorism. Retrieved from  https://georgewbush-whitehouse.archives.gov/news/releases/2003/02/20030214-7.html 

Studyspark

Study Document Study Document

Drug Abuse And Horse Assisted Therapy

Pages: 4 (1066 words) Sources: 8 Document Type:literature review Document #:56204955

… not only with animals but also with themselves. By taking a share of ownership over another living thing, they assume an air of responsibility that translates into how they see themselves as dictators of their own experience rather than as passive receivers of unconscious whims and desires. ……

References

References

Birtel, M. D., Wood, L., & Kempa, N. J. (2017). Stigma and social support in substance abuse: Implications for mental health and well-being. Psychiatry Research, 252, 1-8.

Contalbrigo, L., De Santis, M., Toson, M., Montanaro, M., Farina, L., Costa, A., & Nava,F. (2017). The efficacy of dog assisted therapy in detained drug users: A pilot study in an Italian attenuated custody institute. International journal of environmental research and public health, 14(7), 683.

Hauge, H., Kvalem, I. L., Berget, B., Enders-Slegers, M. J., & Braastad, B. O. (2014). Equine-assisted activities and the impact on perceived social support, self-esteem and self-efficacy among adolescents–an intervention study. International journal of adolescence and youth, 19(1), 1-21.

Kelly, M. A., & Cozzolino, C. A. (2015). Helping at-risk youth overcome trauma and substance abuse through animal-assisted therapy. Contemporary Justice Review, 18(4), 421-434.

Kern-Godal, A., Arnevik, E. A., Walderhaug, E., & Ravndal, E. (2015). Substance use disorder treatment retention and completion: a prospective study of horse-assisted therapy (HAT) for young adults. Addiction science & clinical practice, 10(1), 21.

Klemetsen, M. G., & Lindstrom, T. C. (2017). Animal-assisted therapy in the treatment of substance use disorders: A systematic mixed methods review. Human-Animal Interaction Bull, 5, 90-117.

Masini, A., PhD. (2010). Equine-assisted psychotherapy in clinical practice. Journal of Psychosocial Nursing & Mental Health Services, 48(10), 30-34. doi: http://fir.tesu.edu:2074/10.3928/02793695-20100831-08 

Muela, A., Balluerka, N., Amiano, N., Caldentey, M. A., & Aliri, J. (2017). Animal-assisted psychotherapy for young people with behavioural problems in residential care. Clinical Psychology and Psychotherapy, 24(6), O1485-O1494. doi: http://fir.tesu.edu:2074/10.1002/cpp.2112

Studyspark

Study Document Study Document

Code Of Conduct Policies Of US Universities

Pages: 4 (1254 words) Sources: 3 Document Type:Essay Document #:72322264

...Responsibility Code of Conduct Policies
Locate three Code of Conduct policies from three different universities/colleges.
Codes of conduct from three universities have been explained below;
Thomas Edison State University (TESU)
This code of conduct policy aims at defining and advising enrollees of the institution’s conduct code, and describing violations and associated penalties. Further, it outlines a student appeal and hearing process to aid those students who feel the institution has wrongly charged them with violation of scholastic integrity standards.
Boston University (BU)
The academic code of conduct of BU attempts at facilitating the cultivation of an environment conducive to student learning. It explains the ethical requirements of BU students, in addition to guaranteeing student responsibilities and rights owing to their being a member of an academic community. Additionally, it is clear on procedures and policies pertaining to academic conduct. It forms the basis of a professional atmosphere of student integrity in……

References

Bibliography

Boston University. (2019, December 28). Academic Conduct Code. Retrieved from Boston University:  https://www.bu.edu/academics/policies/academic-conduct-code/ 

Brown University. (2019, December 28). The Academic Code. Retrieved from Brown University:  https://www.brown.edu/academics/college/degree/sites/brown.edu.academics.college.degree/files/uploads/Academic-Code.pdf 

Thomas Edison University. (2019, December 28). Academic Code of Conduct. Retrieved from Thomas Edison University:  https://www.tesu.edu/academics/catalog/academic-code-of-conduct 

Studyspark

Study Document Study Document

Treatment Versus Punishment

Pages: 9 (2700 words) Sources: 16 Document Type:Research Paper Document #:36031535

… recidivism. That cycle needs to end so that communities can begin to heal, so that communities and individuals alike can begin to take responsibility and hold themselves accountable for what goes on in their own neighborhoods. The concept of restorative justice is one that should be pursued, ……

References

References

Agnew, R. (2008). Strain Theory. In V. Parrillo (Ed.), Encyclopedia of social problems. (pp. 904-906). Thousand Oaks: SAGE.

Cramer, M. (2014). Parole Board releases 2nd man convicted of murder as juvenile. Retrieved from  https://www.bostonglobe.com/metro/2014/08/06/parole-board-releases-man-convicted-murder-while-juvenile/REwVVe3aR9leuRVMpZsN6O/story.html 

Diskin, M. (2018). New law will put limits. Retrieved from  https://www.vcstar.com/story/news/local/2018/10/11/new-california-law-means-teen-suspect-oxnard-murders-cannot-tried-adult/1535518002/ 

Fritz, J. K. (2015). Diverting young offenders from prison is ‘smart justice.’ Education Digest, 81(2), 53-55.

Jannetta, J., & Okeke, C. (2017). Strategies for Reducing Criminal and Juvenile Justice Involvement. Building Ladders of Opportunity for Young People in the Great Lakes States, brief, 4. Retrieved from  https://www.urban.org/sites/default/files/publication/94516/strategies-for-reducing-criminal-and-juvenile-justice-involvement_2.pdf 

Johnson, T., Quintana, E., Kelly, D. A., Graves, C., Schub, O., Newman, P., & Casas, C. (2015). Restorative Justice Hubs Concept Paper. Revista de Mediación, 8(2), 2340-9754.

McCarthy, P., Schiraldi, V., & Shark, M. (2016). The future of youth justice: A community-based alternative to the youth prison model. US Department of Justice, Office of Justice Programs, National Institute of Justice.

Meli, L. (2014). Hate Crime and Punishment: Why Typical Punishment Does Not Fit the Crime. U. Ill. L. Rev., 921.

Studyspark

Study Document Study Document

Intelligence Oversight Ethics

Pages: 11 (3311 words) Sources: 15 Document Type:Research Paper Document #:23829007

...Responsibility

This literature review first looks at the history if intelligence oversight (IO) and then explains the current problem it faces in terms of ethics and the arrival of the Digital Age, which has complicated the matter. It next synthesizes the literature on what the various ethical theories are and how this further complicates the issue of IO. Finally, it discusses research on the fundamentals of ethics and gives recommendations for future research.
History of IO
The history of IO begins with the purpose for which it was established, which was to safeguard the privacy and rights of U.S. persons while enabling the Department of Defense to carry out its intelligence functions most effectively (Ford 2006, 721). The question that has always been at the forefront of IO, however, is the question of ethics. As Goldman (2013) notes, as far back as 1929 this question of ethics and its role in……

References

References

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Brown, William F., and Americo R. Cinquegrana. \\\\\\\\\\\\"Warrantless Physical Searches for Foreign Intelligence Purposes: Executive Order 12,333 and the Fourth Amendment.\\\\\\\\\\\\" Cath. UL Rev. 35 (1985): 97.

Cantarella, Michele. \\\\\\\\\\\\"Intelligence ethics in the digital age.\\\\\\\\\\\\" (2016).

Congressional Research Service, “CIA Ethics Education: Background and Perspectives” (2018).

Ferrari, Rachel. \\\\\\\\\\\\"Moral Relativism and Dangerous Ethical Dilemmas in the US Intelligence Community.\\\\\\\\\\\\" (2018).

Ford, Christopher M. \\\\\\\\\\\\"Intelligence Demands in a Democratic State: Congressional Intelligence Oversight.\\\\\\\\\\\\" Tul. L. Rev. 81 (2006): 721.

Goldman, Jan. \\\\\\\\\\\\"Teaching About Intelligjence and Ethics.\\\\\\\\\\\\" Journal of US Intelligence Studies 20, no. 2 (2013): 79.

Hayes, Jonathan. \\\\\\\\\\\\"The Cinema of Oliver Stone: Art, Authorship and Activism by Ian

Studyspark

Study Document Study Document

Should High School Students Get Jobs

Pages: 1 (372 words) Sources: 2 Document Type:Essay Document #:45901948

...Responsibility Working While Attending School
The benefits of working while attending high school are that it gives the student the opportunity to take on additional responsibilities, gain some experience in the real world, interact with new people, and learn a skill or trade that could potentially be useful at a later stage in one’s life. One can obtain interpersonal communication skills, develop a list of items to put on a resume, learn what it means to have a work ethic, learn how to manage money, and learn how to manage time (Hintze).
The drawbacks of working while attending high school are that it means one will have less time to spend on studies, reading assignments, and doing homework. If one factors in social time and the need to be with friends, the window of opportunity for actually focusing on school work in the after school hours closes substantially. Those who work……

References

Works Cited

Hintze, Renae. “Should My Teen Work During High School?” Student Tutor,  https://student-tutor.com/blog/should-my-teen-work-during-high-school/ 

Walden University. “Should Students Hold Jobs While in High School?” Walden University, https://www.waldenu.edu/online-doctoral-programs/doctor-of-education/resource/pros-and-cons-of-working-a-job-in-high-school

 

Studyspark

Study Document Study Document

The Ethics Of Clandestine Operations

Pages: 11 (3151 words) Sources: 14 Document Type:literature review Document #:69864024

… The Overview of the United States Intelligence Community for the 111th Congress (2009) states, for instance, that “the National Clandestine Service (NCS) has responsibility for the clandestine collection (primarily HUMINT) of foreign intelligence that is not obtainable through other means. The NCS engages in counterintelligence activities by ……

References

Bibliography

Arnold, A. and D. Salisbury. The Long Arm, 2019. Retrieved from https://www.belfercenter.org/publication/long-arm

Barker, Michael J. \\\\\\"Democracy or polyarchy? US-funded media developments in Afghanistan and Iraq post 9/11.\\\\\\" Media, Culture & Society 30, no. 1 (2008): 109-130.

Best, Richard A. Intelligence to Counter Terrorism: Issues for Congress. Congressional Research Service: CRS Report for Congress, 2002.

Carter, Ashton B. \\\\\\"Overhauling counterproliferation.\\\\\\" Technology in Society 26, no. 2-3

(2004): 257-269.

Crumpton, Henry A. The art of intelligence: lessons from a life in the CIA\\\\\\'s clandestine service. Penguin, 2013.

Hersh, Seymour. Selective Intelligence. The New Yorker, 2003.  http://www.newyorker.com/magazine/2003/05/12/selective-intelligence 

McCormick, G. H., & Owen, G. “Security and coordination in a clandestine organization.” Mathematical and Computer Modelling, 31, no. 6-7 (2000), 175-192.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

...Responsibility Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber warfare, helps to establish appropriate countermeasures against cyberattacks and potential threats in cyberspace, and enhances intelligence gathering. While the study provides significant insights on this topic, future studies should examine the……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Studyspark

Study Document Study Document

Professional Leadership Value Systems

Pages: 1 (328 words) Sources: 1 Document Type:Journal Document #:87260077

… art and science of leading people in an effective manner is an increasingly challenging process though it is a great opportunity and serious responsibility (Nahavandi, 2014). Leadership plays a crucial role in the success and effectiveness of any organization including those in the public health sector. Leaders ……

References

Reference

Nahavandi, A. (2014). The art and science of leadership (7th ed.). Upper Saddle River, NJ: Pearson.

 

Studyspark

Study Document Study Document

Stakeholder Dedication Approval And Participation

Pages: 5 (1587 words) Sources: 4 Document Type:Case Study Document #:63031378

...Responsibility Question A
Stakeholder dedication, approval and participation in the overall change process proves crucial to change management initiative success. To this end, stakeholders ought to be adequately informed about change goals and intent, in addition to being accorded a chance to share individual ideas during change initiative implementation. Studies reveal that an open, consultative approach to change implementation leads to better overall outcomes (Chirenje, Giliba & Musamba, 2013).
Studies reveal that without having an effective communication strategy in place, the whole process of change can end up being a disaster. Both a total lack of communication and over-communicating are detrimental, potentially derailing the entire change endeavor. Without ample organization-wide communication or reciprocal conversation, the change attempt might end up not fulfilling its aims. A communication strategy that is straightforwardly and efficiently devised helps build awareness as well as acquire personnel support all through the course of the initiative. The continuum……

References

References

Callahan, K., Olshfski, D., & Schwella, E. (2005). Global public management: Cases and comments. Thousand Oaks, CA: Sage Publications Inc.

Chirenje, L. I., Giliba, R. A., & Musamba, E. B. (2013). Local communities’ participation in decision-making processes through planning and budgeting in African countries. Chinese Journal of Population Resources and Environment, 11(1), 10-16.

Eskerod, P., & Jepsen, A. L. (2016). Project stakeholder management. Routledge.

Fleming, Q. W., & Koppelman, J. M. (2016). Earned value project management. Project Management Institute.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".