Risk Assessment Essays (Examples)

Studyspark

Study Document Study Document

The Phillips Cure And Unemployment

Pages: 7 (2166 words) Sources: 7 Document Type:Essay Document #:92308322

… rate of inflation; however, the data shows that the relationship tends to be more complicated in reality than in theory (Stiglitz, 1997). An assessment, analysis and evaluation of the 20-year U.S. unemployment and inflation data will show this complexity. The relationship between unemployment and inflation is different … realize the value of their real wages which causes unemployment to return to its natural rate.
20-Year U.S. Unemployment and Inflation Data
An assessment of the current 20-year U.S. unemployment and inflation data (1999 to 2019) does confirm the short-run Phillips curve. In 1999, unemployment stood at … policy is no longer relevant: 2008 changed everything. Now the central bank’s only policy is to continue to inflate the asset bubble or risk bringing down the entire global financial system when confidence in that system evaporates.
Conclusion
By trying to intervene in the markets through the ……

References

References

Amadeo, K. (2019). Unemployment rate by year since 1929 compared to inflation and GDP. Retrieved from  https://www.thebalance.com/unemployment-rate-by-year-3305506 

FRED. (2019). FRED Graph. Retrieved from  https://fred.stlouisfed.org/series/LNU04000024#0 

Friedman, M. (1977). Nobel lecture: inflation and unemployment. Journal of political economy, 85(3), 451-472.

Heller, R. (2017). Monetary mischief and the debt trap. Cato Journal, 37(2), 247-261.

Lucas, R. E., & Rapping, L. A. (1969). Price expectations and the Phillips curve. The American Economic Review, 59(3), 342-350.

Stiglitz, J. (1997). Reflections on the natural rate hypothesis. Journal of Economic Perspectives, 11(1), 3-10.

Wulwick, N. J. (1987). The Phillips curve: which? whose? to do what? how?. Southern Economic Journal, 834-857.

Studyspark

Study Document Study Document

Alzhemier S Prevention Healthcare

Pages: 6 (1871 words) Sources: 3 Document Type:Research Article Chart Document #:28350849

… nutrients;…[break]…/>
There are 24 references in total.
Emerson Lombardo NB, Volicer L, Martin A, Wu B, Zhang XW. Memory preservation diet to reduce risk and slow progression of Alzheimer’s disease. In: Vellas B, Grundman M, Feldman H, Fitten LJ, Winblad B (eds). Research and Practice in Alzheimer’s … D, Clark C, Thal LJ (1997) Development of cognitive instruments for use in clinical trials of antidementia drugs: additions to the Alzheimer’s Disease assessment Scale that broaden its scope. The Alzheimer’s Disease Cooperative Study. Alzheimer Dis Assoc Disord 11(Suppl 2), S13-21
Sun Y, Lu CJ, Chien KL, ……

References

References

Abraham, R. P., Denton, D. A., Al?Assaf, A. S., Rutjes, A. W., Chong, L. Y., Malik, M. A., & Tabet, N. (2015). Vitamin and mineral supplementation for prevention of dementia or delaying cognitive decline in people with mild cognitive impairment. Cochrane Database of Systematic Reviews, (10).

Kwok, T. C. Y., Lam, L. C. W., Sea, M. M. M., Goggins, W., & Woo, J. (2012). A randomized controlled trial of dietetic interventions to prevent cognitive decline in old age hostel residents. European journal of clinical nutrition, 66(10), 1135.

Dangour, A. D., Whitehouse, P. J., Rafferty, K., Mitchell, S. A., Smith, L., Hawkesworth, S., & Vellas, B. (2010). B-vitamins and fatty acids in the prevention and treatment of Alzheimer\\'s disease and dementia: a systematic review. Journal of Alzheimer\\'s disease, 22(1), 205-224.

Studyspark

Study Document Study Document

Cognitive Theory Clinical Social Work Practice

Pages: 7 (2210 words) Sources: 11 Document Type:question answer Document #:73366521

… connection/relationships, and is actually reinforced in every individual phase of the helping process (Gonzalez-Prendes, 2012).
2. Provide a theory driven problem statement and assessment of the client system in the environment.
Problem statement: If the client (Mr. Jackson) lacks personal strength (as shown by his physical weakness, … and cognitive impairment) as well as environmental resources (as exhibited by his few friends, lack of children, frail wife, and minimal pension), he risk disorganization, deterioration, and disorientation. In this case, a directive and active social worker should immediately dedicate time to being an extra or critical … adherence to ART through showing confidence in their abilities (Adefolalu, 2018).
Physiological symptoms
Physiological symptoms serve as information sources pertaining to a person’s self-assessment of competence. An individual’s physical reaction to challenging situations could affect their level of preparedness to effectively deal with the situation (Bandura, 1998). ……

References

Bibliography

Adefolalu, A. O. (2018). Cognitive-behavioural theories and adherence: Application and relevance in antiretroviral therapy. South Afr J HIV Med., 762.

Bandura A. Organizational applications of social cognitive theory. Aust J Manage. 1988;13(2):275–302. https://doi.org/10.1177/031289628801300210 [Google Scholar]

Berlin, S. B. (1987). Cognitive behavioral interventions for social work practice. National Association of Social Workers, Inc.

Gitterman, A., & Heller, N. (2011). Integrating Social Work Perspectives and Models with Concepts, Methods and Skills with Other Professions’ Specialized Approaches. Clinical Social Work Journal, 204-211.

Gonzalez-Prendes, A. (2012). Cognitive-behavioral practice and social work values: A critical analysis. Journal of Social Work Values and Ethics.

National Association of Social Workers. (1996). Code of Ethics. Retrieved from http://www.naswdc.org/pubs/code/code.asp.

Nevill, D. (2014). Positive Interventions: Developing a Theoretical Model to Guide Their Development and Use. Master of Applied Positive Psychology (MAPP) Capstone Projects.

Parks, A. C., & Biswas-Diener, R. (2013). Positive interventions: Past, present, and future. In T. Kashdan & J. Ciarrochi (Eds.), Mindfulness, acceptance, and positive psychology: The seven foundations of well-being (pp.140-165). Oakland, CA: New Harbinger Publications

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

… political, economic or military advantage. Since this practice results in illegitimate possession of personal, sensitive, classified or proprietary information, it can generate numerous risk or threats to the owner/possessor of the information. Cyber espionage is carried out through various exploitation methods or techniques on individual computers, networks … world. Even though a proposition for cyber espionage to be viewed as an acceptable state behavior exists, the practice poses significant national security risk and threats. Therefore, it is increasingly important to establish whether or not cyber espionage should be regarded an acceptable state behavior while cyberattack ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf 

National Counterintelligence and Security Center. “Foreign Economic Espionage in Cyberspace.” Office of the Director of National Intelligence, 2018.  https://www.dni.gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf 

Rubenstein, D. “Nation State Cyber Espionage and its Impacts.” Washington University in St. Louis, December 2014.  https://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/ 

Weissbrodt, D. “Cyber-Conflict, Cyber-Crime, and Cyber-Espionage.” Minnesota Journal of International Law 22, no. 2 (2013).

Studyspark

Study Document Study Document

Stakeholder Dedication Approval And Participation

Pages: 5 (1587 words) Sources: 4 Document Type:Case Study Document #:63031378

… when it comes to natural resource management. Hence, active participation of communities in decision-making is crucial, right from formulating policy to adoption and assessment. Further, relying on donor resources and finance proves problematic. Therefore, participatory community role during the stages of budgeting and planning will facilitate stakeholder ……

References

References

Callahan, K., Olshfski, D., & Schwella, E. (2005). Global public management: Cases and comments. Thousand Oaks, CA: Sage Publications Inc.

Chirenje, L. I., Giliba, R. A., & Musamba, E. B. (2013). Local communities’ participation in decision-making processes through planning and budgeting in African countries. Chinese Journal of Population Resources and Environment, 11(1), 10-16.

Eskerod, P., & Jepsen, A. L. (2016). Project stakeholder management. Routledge.

Fleming, Q. W., & Koppelman, J. M. (2016). Earned value project management. Project Management Institute.

Studyspark

Study Document Study Document

Building Resilience In Travis County

Pages: 7 (1950 words) Sources: 10 Document Type:Essay Document #:90529532

… through the arts, culture, and community pride will be the solution-focused approach to addressing persistent disparities in Travis County, Texas.
Vulnerabilities
A needs assessment of the African American community in Travis County reveals several areas of vulnerability this strategy aims to address by coordinating with existing ongoing … resources, and lacking the robustness of a firm small business financial foundation, African American individuals, families, and companies are at a much greater risk of losing everything in the wake of a disaster. In fact, past records prove the current vulnerabilities in the African American community. According ……

References

References

Austin History Center (2019). African American Community Archivist. Retrieved from  https://library.austintexas.gov/ahc/african-american-community-archivist 

Castillo, J. (2018). Exhibit on African Americans in Travis County tells stories, reveals gaps. Statesman. 27 Sept, 2018. Retrieved from  https://www.statesman.com/article/20120925/NEWS/309259130 

Chang, J. (2018). Black children in Travis County 8 times more likely to be removed by CPS than white children. Statesman. 25 Oct, 2018. Retrieved from  https://www.statesman.com/news/20181020/black-children-in-travis-county-8-times-more-likely-to-be-removed-by-cps-than-white-children 

Craver, J. (2017). African-Americans spend more time in Travis County jail for same offenses as whites. Austin Monitor. 14 Jul 2017. Retrieved from  https://www.austinmonitor.com/stories/2017/07/african-americans-spend-time-travis-county-jail-offenses-whites/ 

Davis, C. (2018). African-Americans are moving to Austin again, but many don’t feel welcome. KXAN. 15 Jan, 2018. Retrieved from  https://www.kxan.com/news/local/austin/african-americans-are-moving-to-austin-again-but-many-dont-feel-welcome/ 

Menon, S. (2019). Conference aims to help more African-Americans get mental health care. KUT. 25 Feb, 2019. Retrieved from  https://www.kut.org/post/conference-aims-help-more-african-americans-get-mental-health-care 

“New report points to racism and longer confinement of African Americans in Travis County Jail,” (2017). Grassroots Leadership. 13 July, 2017. Retrieved from  https://grassrootsleadership.org/releases/2017/07/new-report-points-racism-and-longer-confinement-african-americans-travis-county 

Prosperity Now (2019). Racial wealth divide in Austin. Retrieved from https://www.austincf.org/Portals/0/Uploads/Documents/Reports/Racial%20Wealth%20Divide%20Profile%20Austin_February%202019_%20Final3.pdf

Studyspark

Study Document Study Document

Data Security Using RFID Bands At Music Festivals

Pages: 5 (1616 words) Sources: 6 Document Type:Essay Document #:97930410

...Risk assessment The radio frequency identification or RFID is the new technological method for quick identification of the user, especially if used for public events like music festivals. It makes data management easier, so that information about the attendees is managed technically by capturing data from scanners and transmitting it to the computer without the user's physical contact. This paper is about managing adult attendees at music festivals whose information would be stored in RFID wrist bands linked to their Twitter, Facebook, and credit/debit bank cards. The following sections would probe into its compliance issues and the related regulations that would impact the planned implementation.
Analysis
Description of the Chosen Use Case
RFID wrist bands would be used for managing adult attendees at a music festival at a hotel where bands would be linked to their Twitter and Facebook accounts and their bank credit/debit cards so that the buying of eatables is……

References

References

Event Tribe. (n.a.). The top 10 benefits of using RFID for events. Retrieved from  https://www.eventbrite.com/blog/academy/the-top-10-benefits-of-using-rfid-for-events/ 

ID&C. (n.a.). How to RFID wristbands work? Retrieved from  https://www.idcband.com/blog/how-do-rfid-wristbands-work/ 

Kacicki, T. (2019, July 15). 4 commonly overlooked facts about RFID wristbands. Intellitix. Retrieved from  https://intellitix.com/hub/four-commonly-overlooked-facts-rfid 

OECD. (2008). OECD policy guideline on RFID.  https://www.oecd.org/sti/ieconomy/40892347.pdf 

Quirk, R.E. & Borrello, S.J. (2005). RFID: Rapid deployment and regulatory challenges. Retrieved from  https://www.pharmamanufacturing.com/assets/Media/MediaManager/VenableRFIDpaper.pdf?SESSID=62935cf41f5a19909f5bb3ae3a598490 

Williamson, A., Tsay, L., Kateeb, I.A. & Burton, L. (2013). Solutions for RFID smart tagged card security vulnerabilities. AASRI Procedia, 4, 282-287. DOI: 10.1016/j.aasri.2013.10.042

Studyspark

Study Document Study Document

The Moral And Ethical Implications Emerging Due To Globalization

Pages: 4 (1235 words) Sources: 4 Document Type:Essay Document #:84484876

… phenomenon of interconnectedness and integration of economies around the world, has resulted not only to increasing opportunities for trade diversification but presents inherent risk such as global financial instability, increased inequalities, terrorism. In an increasingly interdependent world, increasing world population, scientific and technology innovation advancement, global human … across the globe has put pressure on the supply of energy water, fisheries, and forest resources, resulting in their rapid depletion, presenting a risk of future scarcity (Yi. et al., 2012). The expanded economic activity triggered climate change that's evident by the prevalent extreme weather, rising sea ……

References

References

Ahmad, A. (2013) \\\\\\'A Global Ethics for a Globalized World,\\\\\\' Policy Perspectives, 10(1), pp. 63–77. Available at: http://www.jstor.org/stable/42909298.

Bereiter, C. and Scardamalia, M. (2020) \\\\\\'What will it mean to be\\\\\\" educated\\\\\\" in 2020\\\\\\', The Gordon Commission on the Future of Assessment in Education.

Buller, P. F., Kohls, J. J. and Anderson, K. S. (1991) \\\\\\'The challenge of global ethics,\\\\\\' Journal of Business Ethics, 10(10), pp. 767–775. DOI: 10.1007/BF00705711.

Gampel, E. H. (2010) \\\\\\'A framework for reasoning about ethical issues\\\\\\', pp. 1–18. Available at:  http://www.academia.edu/4323854/A_Framework_for_Reasoning_about_Ethical_Issues .

Gong, Q. and Zhang, L. (2010) \\\\\\'Virtue ethics and modern society—A response to the thesis of the modern predicament of virtue ethics _ SpringerLink,\\\\\\' Frontiers of Philosophy in China, 5(2), pp. 255–265.

Newton, L. (2008) \\\\\\'Hale Chair in Applied Ethics Resources - Manuals.\\\\\\' Available at:  http://www.rit.edu/cla/ethics/resources/manuals/dgae1p1.html .

The Blogxer (2012) \\\\\\'Responsibilities of an educated person,\\\\\\' The Third Eye. Available at:  http://enlighten-me-not.blogspot.co.ke/2012/03/responsibilities-of-educated-person.html .

Studyspark

Study Document Study Document

Foxtrot Phone Scandal

Pages: 6 (1877 words) Sources: 6 Document Type:Case Study Document #:53518196

...Risk assessment Foxtrot Phone Scandal - Case Study
Ethical dilemmas and issues are common in different areas in public and private sectors. These dilemmas and issues are attributable to the emergence of different situations in the work setting. Therefore, addressing these issues is critical toward promoting a suitable work environment and interactions with others. Cooper (2012) states that a decision making model is essential in addressing ethical issues as it helps in moving from a problem to developing a course of action to resolve the issue. An example of an ethical dilemma or issue relates to Foxtrot Phone Scandal. Foxtrot Company comprises nearly one hundred cadets from all four classes in the United States Coast Guard Academy. The company is one of the eight firms that constitute the Corps of Cadets. Cadets in this class at the academy are committed to the values of honor and dedication to duty. The ethical dilemma……

References

References

Cooper, T.L. (2012). The responsible administrator: An approach to ethics for the administrative role (6th ed.). San Francisco, CA: Jossey-Bass.

European Ombudsman. (2012, November 15). Ensuring Ethics in Public Administration: The Role of the Ombudsman. Retrieved June 7, 2020, from  https://www.ombudsman.europa.eu/en/speech/en/49379 

Kapstein, M. (2015). The Battle for Business Ethics: A Struggle Theory. Journal of Business Ethics, 144, 343-361.

Ondrova, D. (2017). Challenges of Modern Public Administration and Ethical Decision-Making. RAP, 3, 255-279.

Singh, A.K. & Mishra, N.K. (2018). Ethical Theory & Business – A Study Based on Utilitarianism and Kantianism. International Journal of Humanities and Social Development Research, 2(1), 97-113.

Stein, C. (2019, January 25). Ethical Considerations in Public Administration. PA Times. Retrieved June 7, 2020, from https://patimes.org/ethical-considerations-in-public-administration/

Studyspark

Study Document Study Document

Agency Theory And The Limitations Of Representative Government

Pages: 11 (3159 words) Sources: 5 Document Type:Essay Document #:26643855

… trust and that there is no way the relationship can work without implicit trust supporting it. However, there have to be precautions and risk reduction strategies in place so that one is not being naïve with respect to the fact that bias and self-interest can and do ……

References

References

Eisenhardt, K. M. (1989). Agency theory: An assessment and review. Academy of management review, 14(1), 57-74.

Elwood, T. W. (2008). Politics of the US Federal Budget Process. International quarterly of community health education, 28(1), 3-12.

Jennings, M. (2008). Business Ethics: Case Studies and Selected Readings. Cengage.

Machold, S., Ahmed, P.K., & Farquhar, S.S. (2007). Corporate Governance and Ethics: A Feminist Perspective. Journal of Business Ethics (2008) 81:665-678.

ProActive Solutions. (2020). Agency theory. Retrieved from http://knowledgegrab.com/learners-zone/study-support/performance-management-review/framework-introduction-to-hrm/agency-theory/

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".