Risk Assessment Essays (Examples)

Studyspark

Study Document Study Document

Program Logic Model

Pages: 6 (1769 words) Sources: 8 Document Type:question answer Document #:91645810

… What social problem did the program seek to address?
The social problem that the program sought to address was the need to reduce risk sexual behaviors among teenage youths. risk sexual behavior is common among teens (Chapin, 2001) and programs that focus on educating teens about reducing risk associated with sex can be a way to address the issue (Walsh-Buhi et al., 2016). However, there is a need to understand teens’ … perspective and for adults to be able to relate to what teens are going through in order to help convey the message about risk (Kerpelman, McElwain, Pittman & Adler-Baeder, 2016). For that reason, the program aimed to find a way to help bridge the gap between adult … which found that peer education could facilitate the change of mind in young people needed to get them to think more seriously about risk and taking responsibility. Promoted by……

References

References

Bandura, A. (2018). Toward a psychology of human agency: Pathways and reflections.  Perspectives on Psychological Science, 13(2), 130-136.

Bickel, R., Weaver, S., Williams, T., & Lange, L. (1997). Opportunity, community, and teen pregnancy in an Appalachian state. The Journal of Educational Research, 90(3), 175-181.

Chapin, J. (2001). It won't happen to me: The role of optimistic bias in African American teens' risky sexual practices. Howard Journal of Communication, 12(1), 49-59.

Damon, W. (1984). Peer education: The untapped potential. Journal of applied developmental psychology, 5(4), 331-343.

Kerpelman, J. L., McElwain, A. D., Pittman, J. F., & Adler-Baeder, F. M. (2016). Engagement in risky sexual behavior: Adolescents’ perceptions of self and the parent–child relationship matter. Youth & Society, 48(1), 101-125.

Sciolla, A., Ziajko, L. A., & Salguero, M. L. (2010). Sexual health competence of international medical graduate psychiatric residents in the United States. Academic Psychiatry, 34(5), 361-368.

Stakic, S., Zielony, R., Bodiroza, A., & Kimzeke, G. (2003). Peer education within a frame of theories and models of behaviour change. Entre Nous: The European Magazine for Sexual and Reproductive Health, 56, 4-6.

Walsh-Buhi, E. R., Marhefka, S. L., Wang, W., Debate, R., Perrin, K., Singleton, A., ... & Ziemba, R. (2016). The impact of the Teen Outreach Program on sexual intentions and behaviors. Journal of Adolescent Health, 59(3), 283-290.

Studyspark

Study Document Study Document

Criminal Perspectives Social Trait Classical

Pages: 4 (1310 words) Sources: 3 Document Type:Capstone Project Document #:11929443

… life trigger these traits (Siegel, 2015). In this regard, people with traits related to criminality are more likely to commit crime, but the risk is higher if they live in disorganized neighborhoods or have a close relative with criminal tendencies.
The Social Perspective
The social perspective argues … theories emphasize the effect of neighborhood characteristics such as school drop-out rates, gang activity, unemployment, deteriorating infrastructures, and single-parent homes, which increase the risk of engaging in crime (Hagan, 2010). According to the social disorganization theory, conventional institutions of social control including community organizations, churches, schools, and … social control including community organizations, churches, schools, and family units are weak and unable to regulate criminal behavior in such neighborhoods, increasing the risk of criminality (Hagan, 2010). Social process theories, on the other hand, argue that criminal tendencies are learned from interacting with or observing those … models has its share of……

References

References

Cole, G., & Smith, C. (2007). Criminal Justice in America (5th ed.). Belmont, CA: Cengage Learning.

Hagan, F. E. (2010). Introduction to Criminology: Theory, Methods and Criminal Behavior (7th ed.). Thousand Oaks, CA: Sage.

Mackenzie, D. L. (2001). Sentencing and Corrections in the 21st century: Setting the Stage for the Future. National Criminal Justice Reference Service (NCJRS). Retrieved from  https://www.ncjrs.gov/pdffiles1/nij/189106-2.pdf 

Siegel, L. J. (2015). Criminology: Theories, Patterns and Typologies (12th ed.). Boston, MA: Cengage Learning.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf]
Background Information
Cyber espionage has become one of the most important and complex international problem in today’s world. It can generate numerous risk or threats to security and other critical operations because it involves illegitimate possession of personal, sensitive, classified or proprietary information. Cyber espionage is … Statement
Cyber espionage involves illegal practices that result in information theft that could be used to attack an adversary. It poses threats and risk to relations between states and has become a complex international problem in the modern world. Cyber espionage is largely viewed as a new … world. Even though a proposition for cyber espionage to be viewed as an acceptable state behavior exists, the practice poses significant national security risk and threats. This qualitative case study research examined existing data on this issue based on a set of documents. Data obtained from these ……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Studyspark

Study Document Study Document

Healthcare Marketing

Pages: 11 (3219 words) Sources: 3 Document Type:Essay Document #:80789957

… lead one into pitfalls if not careful.
Ethics, Rules and Regulations
Direct to consumer marketing in the healthcare industry comes with its own risk and rewards. For one, there are many critics of direct to consumer marketing who feel that the healthcare companies take advantage of consumers’ … of a new drug coming to market that is advertised as something that will solve their ailments (while the potential side effects and risk are quickly communicated in a fast-paced subdued tone that one must strain one’s ears to hear and understand). As Arnold and Oakley (2013) … This means that healthcare companies have a reputation for preying on uneducated consumers and patients who do not know how to make careful assessment and evaluations of the information they are being presented on the screen. They see data coming at them in between an advertisement for … to consumer healthcare marketing are……

References

References

Arnold, D. G., & Oakley, J. L. (2013). The politics and strategy of industry self-regulation: the pharmaceutical industry's principles for ethical direct-to-consumer advertising as a deceptive blocking strategy. Journal of Health Politics, Policy and Law, 38(3), 505-544.

Blythe, J. (2009). Key Concepts in Marketing. Los Angeles: SAGE Publications Ltd.

Chand, S. (2019). Target Marketing: Four Generic Target Marketing Strategies. Retrieved from  http://www.yourarticlelibrary.com/marketing/target-marketing-four-generic-target-marketing-strategies/13400 

Dolliver, M. (2009). Take care when targeting the younger generations. Retrieved from  https://www.adweek.com/digital/take-care-when-targeting-the  younger generations-online-113643/

Goi, C. L. (2009). A review of marketing mix: 4Ps or more?. International journal of marketing studies, 1(1), 2.

Hartley, K. & Rudelius, W. (2001). Marketing, The Core, 4th Ed., McGraw-Hill.

Hawn, C. (2009). Take two aspirin and tweet me in the morning: how Twitter, Facebook, and other social media are reshaping health care. Health affairs, 28(2), 361-368.

Lane, T. (2019). Healthcare marketing laws. Retrieved from  https://smallbusiness.chron.com/healthcare-marketing-laws-67307.html

Studyspark

Study Document Study Document

General Electric Appliance Company Quality Control Instruments

Pages: 7 (2135 words) Sources: 3 Document Type:Essay Document #:27536334

...Risk assessment Quality Control of General Electric Appliance Company
Company background
General Electric Appliances is renowned for designing and building the best appliances across the globe. Ranging from the design process to production and further to service, the main endeavor of GE Appliances is to assist people in enhancing their lives at home. From self-cleaning varieties to ice and water dispensers, to speed cook rotisseries and fridges that make coffee, GE Appliances has electrified and simplified life for over 12 decades with our heritage of innovation (GE Appliances, 2020).
GE Appliances has its main center of operations situated in Louisville in the state of Kentucky, United States. The company has manufacturing facilities operating in Decatur in the state of Alabama. Moreover, GE Appliances has wholly-owned subsidiaries that are situated in Georgia and also in Tennessee (GE Appliances, 2020). Significantly, GE Appliances has ownership of FirstBuild, a multinational co-creation community, and an ultramodern……

References

References

General Electric. (2019). Annual Report, 2019. Retrieved from:  https://www.ge.com/sites/default/files/GE_AR19_AnnualReport.pdf 

GE Appliances. (2020). Our Community. Retrieved from:  https://www.geappliances.com/our-company/ 

QIMA. (2020). What is the Product Inspection? Retrieved from: https://www.qima.com/quality-control-services/product-and-manufacturing-inspections

Goh, A., Sullivan, M. (2011). How To Conduct Quality Control With Chinese Manufacturers. Business Insider.

Weber, A. (2019). Assembly Plant of the Year: Refrigerator Production Heats Up at GE Appliances. Assembly. Retrieved from:  https://www.assemblymag.com/articles/95217-assembly-plant-of-the-year-refrigerator-production-heats-up-at-ge-appliance s

Trebilcock, B. (2020). GE Appliance: Pulling the digital thread. Logistics Management. Retrieved from:  https://www.logisticsmgmt.com/article/ge_appliance_pulling_the_digital_thread 

Flannery, R. (January 15, 2016). Haier To Buy GE Appliances For $5.4B In China\\\\\\\\\\\\'s 2nd Big U.S. Acquisition This Week. Forbes. Retrieved from:  https://www.forbes.com/sites/russellflannery/2016/01/15/haier-to-buy-ge-appliances-for-5-4b-in-chinas-2nd-big-u-s-acquisition-this-week/#2a6118503c24 

Hayes, A. (July 28, 2020). Quality Control. Investopedia. Retrieved from: https://www.investopedia.com/terms/q/quality-control.asp

Studyspark

Study Document Study Document

Self Regulation Proposal

Pages: 6 (1825 words) Sources: 6 Document Type:Essay Document #:60406308

… only a viable alternative to external regulation by third party agencies, it is also a necessary step towards the reduction and management of risk. Companies alone have the most access to records and numbers, to workers and actions that may need investigating: external regulators do not generally ……

References

References

Arner, D. W., Barberis, J., & Buckey, R. P. (2016). FinTech, RegTech, and the reconceptualization of financial regulation. Nw. J. Int'l L. & Bus., 37, 371.

Arnone, M., & Padoan, P. C. (2008). Anti-money laundering by international institutions: a preliminary assessment. European Journal of Law and Economics, 26(3), 361-386.

Greene, E., & Odorski, C. (2015). SEC enforcement in the financial sector: addressing

Omarova, S. T. (2010). Rethinking the future of self-regulation in the financial industry. Brook. J. Int'l L., 35, 665.post-crisis criticism. Bus. L. Int'l, 16, 5.

Omarova, S. T. (2011). Wall street as community of fate: Toward financial industry self-regulation. University of Pennsylvania Law Review, 159(2), 411-492.

Pritchard, A. C. (2003). Self-regulation and securities markets. Regulation, 26, 32.

Studyspark

Study Document Study Document

Social Work Policy For Sex Trafficking

Pages: 8 (2423 words) Sources: 6 Document Type:Essay Document #:78918009

… happen to any individual. However, it is significant to note that some persons are more susceptible compared to others. Some of the major risk factors influencing this aspect comprise new relocation or immigration to an area, substance use, problems with mental health, lacking proper guardians, and being ……

References

References

Alliance to End Slavery and Trafficking. (2017). Summary of the Trafficking Victims Protection Act (TVPA) and Reauthorizations FY 2017. Retrieved from:  https://endslaveryandtrafficking.org/summary-trafficking-victims-protection-act-tvpa-reauthorizations-fy-2017-2/ 

Benoit, C., Smith, M., Jansson, M., Healey, P., & Magnuson, D. (2019). “The prostitution problem”: Claims, evidence, and policy outcomes. Archives of Sexual Behavior, 48(7), 1905-1923.

Brooks, A., & Heaslip, V. (2019). Sex trafficking and sex tourism in a globalized world. Tourism Review of AIEST - International Association of Scientific Experts in Tourism, 74(5), 1104-1115. doi:http://dx.doi.org/10.1108/TR-02-2017-001

Bruckert, C., & Parent, C. (2002). Trafficking in human beings and organized crime: A literature review (pp. 1-35).

Clawson, H. J., Dutch, N., Solomon, A., & Grace, L. G. (2009). Human trafficking into and within the United States: A review of the literature. Washington, DC: Office of the Assistant Secretary for Planning and Evaluation, US Department of Human and Health Services. Retrieved December 25, 2009.

Greenbaum, V. J. (2017). Child sex trafficking in the United States: Challenges for the healthcare provider. PLoS medicine, 14(11).

International Labour Organization. (2017). Global Estimates of Modern Slavery. Retrieved from:  https://www.ilo.org/wcmsp5/groups/public/---dgreports/---dcomm/documents/publication/wcms_575479.pdf 

Kelly, C. (July 30, 2019). 13 sex trafficking statistics that explain the enormity of the global sex trade. USA Today. Retrieved from:  https://www.usatoday.com/story/news/investigations/2019/07/29/12-trafficking-statistics-enormity-global-sex-trade/1755192001/

Studyspark

Study Document Study Document

Telemedicine And Its Impact On Patient Care

Pages: 11 (3241 words) Sources: 10 Document Type:Essay Document #:26347879

… because it is very patient-centered. It is very patient-centered in the sense that it gives patients convenience, the quality care they need, quick assessment of their issues, timely diagnosis of critical situations or conditions, fewer expenses, and vastly better outcomes. It is what patients have been needing ……

References

References

Meyers, A. J., Pontarelli, E., Dutta, S. K., Grinberg, G., & Yenumula, P. R. (2018). Telemedicine Follow-up After Bariatric Surgery. Surgery for Obesity and Related Diseases, 14(11), S168.

Tiago, M. T. B., Tiago, F., Amaral, F. E. B., & Silva, S. (2016). Healthy 3.0: Healthcare digital dimensions. In Reshaping medical practice and care with health information systems (pp. 287-322). IGI Global.

Conklin, T. P. (2002). Health care in the United States: An evolving system. Michigan Family Review, 7(1).

Board on Health Care Services; Institute of Medicine. (2012). \\\\\\\\\\\\"3The Evolution of Telehealth: Where Have We Been and Where Are We Going?\\\\\\\\\\\\" in The Role of Telehealth in an Evolving Health Care Environment: Workshop Summary. National Academies Press, Washington (DC).

Sada, A., Asaad, M., Reidt, W. S., Kellogg, T. A., Kendrick, M. L., McKenzie, T. J., & Habermann, E. B. (2019). Are In-Person Post-operative Clinic Visits Necessary to Detect Complications Among Bariatric Surgery Patients?. Obesity Surgery, 1-4.

Krupka, D. C., Sandberg, W. S., & Weeks, W. B. (2012). The impact on hospitals of reducing surgical complications suggests many will need shared savings programs with payers. Health Affairs, 31(11), 2571-2578.

Fasano, P. (2013). Transforming health care: The financial impact of technology, electronic tools, and data mining. John Wiley & Sons.

Burch, S., Gray, D., & Sharp, J. (2017). The power and potential of telehealth what health systems should know: proposed legislation in Congress offers the promise that the nation\\\\\\\\\\\\'s healthcare policy will support the expansion of telehealth, allowing hospitals and health systems to fully realize the benefits of this important emerging approach to care. Healthcare Financial Management, 71(2), 46-50.

Studyspark

Study Document Study Document

Twitter External Internal Analysis Report To CEO

Pages: 15 (4857 words) Sources: 1 Document Type:Essay Document #:23822356

… order to encourage freedom of expression and make it more comprehensive and relevant. (C-141)
1.4.2. Verification badge placed on accounts that are at risk of impersonification to indicate legitimacy. (C-141)
1.4.3. Social media platforms have implemented features such as broadcasting live videos, photo attachments to increase engagement. … fact, Senator Mark Warner of the Intelligence Committee asked Twitter to disclose any data sharing agreements they have with Chinese companies (C-148)
1.6.3. risk associated with impersonation, offensive, malicious posts/users. (C-141 & C-147)
1.7 Conclusions
Political: U.S. President Donald Trump has help boost Twitter popularity.
Economic: Twitter … help boost Twitter popularity.
Economic: Twitter is a global brand. The blue bird alone communicate twitter worldwide.
Social: Twitter accounts that are at risk of impersonification have a verification badge.
Technological: Internet access is readily available in most parts of the world. So, the number of social ……

References

References

Thompson, Arthur A.,. (2015). Crafting and Executing Strategy: Concepts and Readings..New York: McGraw-Hill Education, (pp. 138-148)

Studyspark

Study Document Study Document

C Suite Executive Leadership And Ethics

Pages: 9 (2693 words) Sources: 7 Document Type:Essay Document #:16009984

… resources should remain more actively involved in promoting the ethical culture of the company through more robust hiring and training practices. At the risk of overreliance on personality assessment, a human resources department can use tools and techniques to seek out the character traits most suitable to the organization’s outlook. Similarly, through ……

References

References

Bailey, C. & Shantz, A. (2018). Creating an ethically strong organization. MIT Sloan Management Review. http://ilp.mit.edu/media/news_articles/smr/2018/60101.pdf

Crossan, M., Mazutis, D. & Seijts, G. (2013). In search of virtue. Journal of Business Ethics 113(4): 567-581.

Hatcher, T. (2008). The value of values in the C-suite. In Sims, R.R. & Quatro, S.A. (Eds.) Executive Ethics. Charlotte: IAP, pp. 97-122.

Hoekstra, E., Bell, A. & Peterson, S.R. (2008). Humility in Leadership: Abandoning the Pursuit of Unattainable Perfection. In S.A. Quatro & R. R. Sims (Eds.), Executive Ethics: Ethical Dilemmas and Challenges for the C-Suite. Greenwich, CT: Information Age Publishing, pp. 79-96.

MacDougall, A.E., Bagdarasov, Z. & Buckley, M.R. (2008). Applying a primary risk management model to the C-suite. In Sims, R.R. & Quatro, S.A. (Eds.) Executive Ethics. Second Edition. Charlotte: IAP, pp. 211-234.

Martin, R. (2011). The CEO\\\\'s ethical dilemma in the era of earnings management. Strategy & Leadership 39(6): 43-47.

Schwartz, M.S. (2013). Developing and sustaining an ethical corporate culture: The core elements. Business Horizons 56(1): 39-50.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".