Risk Essays (Examples)

Studyspark

Study Document Study Document

Dangers Of Alcohol Usage

Pages: 5 (1565 words) Sources: 3 Document Type:Essay Document #:87204808

… linked to different groups. The foremost step when finding out whether alcohol is creating problems in one's life or not is, grasping the risks related to drinking, which transcend mere hangovers, or unclear speech, or making a fool of oneself before others.
The Chemical Effect of Alcohol … and digestive glands. Excessive alcohol consumption may lead…[break]…the body's mechanism that maintains bone strength. The habit can lead to thinner bones, thereby increasing risks of fractures in the event the individual takes a fall. Further, if a fracture does occur, it will take longer to mend. Drinking … as compared to the general public. Roughly one in ten tuberculosis cases across the globe may be associated with drinking. Lastly, drinking exacerbates risks for various kinds of cancer, such as breast, colon and mouth.
The Danger of Withdrawal
Alcohol's dangers do not come to an end ……

References

Bibliography

Foundation for a Drug-Free World. (2019). What is alcohol? Retrieved from  https://www.drugfreeworld.org/drugfacts/alcohol.html 

Healthline Media. (2019). The effects of alcohol on your body. Retrieved from  https://www.healthline.com/health/alcohol/effects-on-body#1 

Rehabs. (2019). Dangers of alcohol in men, women and teenagers. Retrieved from  https://luxury.rehabs.com/alcohol-addiction/alcohol/ 

Studyspark

Study Document Study Document

Weapons Of Mass Destruction WMD Antifa

Pages: 13 (3787 words) Sources: 12 Document Type:Research Paper Document #:67320498

… it possible therefore that there is an overreliance upon technology and that this overreliance can actually compromise a country’s progress and increase its risk of falling into ruin should a sudden attack like an EMP attack hit where it hurts most? Absolutely—and both state and non-state actors … and Customs Enforcement, U.S. Secret Service and the Transportation Security Administration. These groups should all be collaborating to stop or to reduce the risk of unsecured ports so that an attack by an organization like Antifa in collaboration with ISIS using a WMD could be reduced. Otherwise, … ports so that an attack by an organization like Antifa in collaboration with ISIS using a WMD could be reduced. Otherwise, the US risks facing a major catastrophe. Collaboration and communication are essential tools in the effort to prevent attacks on the US infrastructure, as so many … surveillance and oversight to ports……

References

References

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Christenson, G. (2015). CBRN response. National Guard Bureau.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from  https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat 

Jennings, P. (2006). Miami port poses serious risks. Retrieved from  https://abcnews.go.com/WNT/story?id=131634&page=1 

Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from  http://www.johnstonsarchive.net/terrorism/chembioattacks.html 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Maras, M-H. (2014). Transnational Security. Florida: CRC Press.

Studyspark

Study Document Study Document

Counterintelligence

Pages: 12 (3490 words) Sources: 6 Document Type:question answer Document #:11133529

… line of defense against insider threats. Gathering data from multiple sources is another line of defense in the ONCIX strategy to mitigate the risk of malicious insiders. The basis of the approach is to use a whole-person, whole-of-career concept that so as to analyze data and to … strategy and ONCIX plans to use automated records checkers to help identify applicable counterintelligence information that would assist in identifying an insider threat.[footnoteRef:4] Risk management is also part of its strategy: insider threat methods are meant to include counterintelligence equities within a risk-based framework for detection purposes. [4: National Counterintelligence Strategy of the United States of America 2016 (Strategy), 5. https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf]
The culture of the office … insider threat awareness among employees so that workers are both conscious and vigilant of insider threat potential and remain alert to possibilities of risk at all times.[footnoteRef:5] To achieve that end, networking and system……

References

Bibliography

Counter intelligence for National Security, CIA, 1993. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol2no4/html/v02i4a10p_0001.htm

Johnston, David and James Risen, “U.S.had evidence of espionage,” New York Times, 2001. https://www.nytimes.com/2001/02/23/us/us-had-evidence-of-espionage-but-fbi-failed-to-inspect-itself.html

National Counterintelligence Strategy of the United States of America 2016 (Strategy).  https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf 

Prunckun, Hank. 2012. Counterintelligence Theory and Practice, Lanham: Rowman&Littlefield Publishers Inc. Read the following: Chapters 8 to 14, pages 131 to 217. Appendices A to D, pages 219 to 231.

Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September 17). National Security Archive. Accessed January 19, 2017.  http://nsarchive.gwu.edu/NSAEBB/NSAEBB230/ .

Van Cleave, Michelle. “Strategic Counterintelligence: What Is It and What Should We Do About It ?” 2007. CIA Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html

Studyspark

Study Document Study Document

Starbucks

Pages: 8 (2288 words) Sources: 7 Document Type:financial analysis Document #:63475461

...Risk
Introduction
Over the past 20 years, Starbucks has experienced both periods of strong growth, and periods of retraction, most notably during the Great Recession. The company’s investment strategies should have reflected its strategic priorities during this period, and an analysis of the company’s financials over this time should illustrate that. Starbucks’ growth since 1998 has mainly been in overseas markets, but the company has also branched out into other business lines, in an attempt to diversify its income streams. Today, Starbucks appears to have settled into more of a “cash cow” state, where the company is earning healthy returns from its businesses, and focused on growth mainly in some of the overseas markets where the coffee market is maybe a bit more nascent, in other words where there remains high growth potential going forward.
Starbucks Income Statement
Starbucks has been a strong growth story for most of this period. According……

References

References

Cannivet, M. (2019) Starbucks’ big stock buyback limits future upside. Forbes. Retrieved October 4, 2019 from  https://www.forbes.com/sites/michaelcannivet/2019/08/29/starbucks-big-stock-buyback-limits-future-upside/#26c434067047 

Hawley, J. (2019) Who are Starbucks’ main competitors? Investopedia. Retrieved October 4, 2019 from  https://www.investopedia.com/articles/markets/101315/who-are-starbucks-main-competitors.asp 

Macrotrends (2019) Starbucks. Macrotrends.com. Retrieved October 4, 2019 from  https://www.macrotrends.net/stocks/charts/SBUX/starbucks/financial-statements 

Marketwatch (2019) McDonalds Marketwatch. Retrieved October 4, 2019 from https://www.marketwatch.com/investing/stock/mcd/financials

Sharf, S. (2013) Starbucks ordered to pay Kraft $2.8 billion. Forbes. Retrieved October 4, 2019 from  https://www.forbes.com/sites/samanthasharf/2013/11/12/starbucks-ordered-to-pay-kraft-2-8-billion/#5516b7fa167d 

Starbucks 1999 Annual Report. Retrieved October 4, 2019 from  https://s22.q4cdn.com/869488222/files/doc_financials/annual/1999/102640_financials2_99.pdf 

The Coffee Brewers (2008) With Starbucks closing 600 shops, is the coffee business still lucrative? The Coffee Brewers. Retrieved October 4, 2019 from  https://www.thecoffeebrewers.com/starbucks.html 

Studyspark

Study Document Study Document

Clinical Informatics

Pages: 11 (3264 words) Sources: 12 Document Type:Essay Document #:78574553

… to help promote the use of more EBP in the nursing field.
Nursing informatics can also be used to promote health literacy among at-risk patients (Haupeltshofer, Egerer & Seeling, 2020). By teaching older patients how to use technology to retrieve health information, nurses can increase their access … support system can be engaged to notify care providers when parameters in the patient’s records are reached, suggesting that the patient is at risk (Kharbanda et al., 2018).
EMR-linked clinical decision support can also facilitate the decision process for ordering diagnostic testing for patients. Too much testing ……

References

References

Cho, O. M., Kim, H., Lee, Y. W., & Cho, I. (2016). Clinical alarms in intensive care units: Perceived obstacles of alarm management and alarm fatigue in nurses. Healthcare informatics research, 22(1), 46-53.

Effken, J., Weaver, C., Cochran, K., Androwich, I., & O’Brien, A. (2016). Toward a central repository for sharing nursing informatics’ best practices. CIN: Computers, Informatics, Nursing, 34(6), 245-246.

Elsayed, W. A., Hussein, F. M., & Othman, W. N. (2017). Relation between nursing informatics competency and nurses’ attitude toward evidence-based practice among qualified nurses at Mansoura Oncology Center. International Journal of Nursing Didactics, 7(6), 26-33.

Drolet, B. C., Marwaha, J. S., Hyatt, B., Blazar, P. E., & Lifchez, S. D. (2017). Electronic communication of protected health information: privacy, security, and HIPAA compliance. The Journal of hand surgery, 42(6), 411-416.

Haupeltshofer, A., Egerer, V., & Seeling, S. (2020). Promoting health literacy: What potential does nursing informatics offer to support older adults in the use of technology? A scoping review. Health Informatics Journal, 1460458220933417.

Kharbanda, E. O., Asche, S. E., Sinaiko, A. R., Ekstrom, H. L., Nordin, J. D., Sherwood, N. E., & O’Connor, P. (2018). Clinical decision support for recognition and management of hypertension: a randomized trial. Pediatrics, 141(2).

Khezri, H., & Abdekhoda, M. (2019). Assessing nurses’ informatics competency and identifying its related factors. Journal of Research in Nursing, 24(7), 529-538.

Kleib, M., & Nagle, L. (2018). Factors associated with Canadian nurses\\\\\\\\\\\\' informatics competency. CIN: Computers, Informatics, Nursing, 36(8), 406-415.

Studyspark

Study Document Study Document

Counterintelligence Issues Within The United States

Pages: 18 (5457 words) Sources: 29 Document Type:Research Paper Document #:72238996

… precisely what has happened in the past and is currently happening under the Trump Administration…[break]…counterintelligence is to put one’s own national reputation at risk: that is one reason the Israeli Mossad changed its motto, which used to state, “By way of deception, thou shalt conduct war” (86). Nations thus … personnel are all potential targets of foreign actors and foreign collectors of intelligence (National Counterintelligence and Security Center n.d.). Private industry is at risk because it possesses intellectual property that foreign actors covet and business activities can be exploited. Cyber operations are also at risk, as is confidential information, which can be mishandled by employees. Counterintelligence operations could be used to deliberately leak false information to known foreign … be mishandled by employees. Counterintelligence operations could be used to deliberately leak false information to known foreign actors, but doing so runs the risk of escalating a larger conflict among nations, as……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. "The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles." Bachelor's thesis, Università Ca'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Cohen, Shlomo. 2016. "Are There Moral Limits to Military Deception?." Philosophia 44 (4): 1305-1318.

Coyne, John, Peter Bell, and Shannon Merrington. 2013. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2 (10): 27-37.

Erskine, Toni. 2004. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. "Strategic denial and deception." International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Studyspark

Study Document Study Document

Counterintelligence Issues Within United States

Pages: 13 (3766 words) Sources: 16 Document Type:Essay Document #:41694312

… on counterintelligence (CI) awareness and response, [but that] these efforts have been plagued by a limited concept of which industry sectors are at risk, inconsistency in programs, and redundancies across agencies” (1). Overall, there is a lack of reconciliation between vision and mission and what is being … 2020), the reality of how this collaboration is to take place, ethically and practically, is a problem that remains to be addressed. The risk of not addressing it puts the CI community in danger of operating outside of its scope and engaging in the precise problematic misinterpretation … personnel are all potential targets of foreign actors and foreign collectors of intelligence (National Counterintelligence and Security Center n.d.). Private industry is at risk because it possesses intellectual property that foreign actors covet and business activities can be exploited. Cyber operations are also at risk, as is confidential information, which can be mishandled……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. \\\\\\"The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles.\\\\\\" Bachelor\\\\\\'s thesis, Università Ca\\\\\\'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Erskine, Toni. 2004. \\\\\\"\\\\\\'As Rays of Light to the Human Soul\\\\\\'? Moral Agents and Intelligence Gathering.\\\\\\" Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. \\\\\\"Strategic denial and deception.\\\\\\" International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Horkheimer, Max. 1972. Critical Theory. New York: Seabury Press.

Intelligence and National Security Alliance. 2020. Counterintelligence for the 21st Century. Arlington, VA.

Studyspark

Study Document Study Document

How Interest Rates Compare Over The Last Decade Within The United

Pages: 6 (1728 words) Sources: 6 Document Type:Essay Document #:11480675

… used in almost every industry, country, and geography. Interest rates can also influence corporate and consumer behaviors. For example, depending on the inherent risk of a consumer, credit card rates determine how much an individual must pay on a month basis to the financial institution. Corporations looking ……

References

References

1. Goodhard, C and E Perotti, 2008 “Maturity mismatch stretching: Banking has taken a wrong turn”, CEPR Policy Insight 81, 6-July

2. Holston, Laubach, and Williams. 2017. “Measuring the Natural Rate of Interest: International Trends and Determinants,” Journal of International Economics 108, supplement 1 (May): S39–S75

3. Laubach and Williams. 2003. “Measuring the Natural Rate of Interest,” Review of Economics and Statistics 85, no.4 (November): 1063-70.

4. Rachel, L. and Smith, T.D., 2017. Are low real interest rates here to stay?. International Journal of Central Banking, 13(3), pp.1-42.

5. Schularick, M, and A M Taylor, (2009), “Credit Booms Gone Bust: Monetary Policy, Leverage Cycles and Financial Crises, 1870-2008”, NBER DP 15512

6. Stock, J.H. and Watson, M.W., 2007. Why has US inflation become harder to forecast?. Journal of Money, Credit and banking, 39, pp.3-33

Studyspark

Study Document Study Document

Gangs Formation And Functioning

Pages: 9 (2774 words) Sources: 15 Document Type:Essay Document #:94080589

… without ambition or identity. Gaining entry into a gang, therefore, became the means of taking back control of their lives using engaging in risky offensive/delinquent conduct, as well as a means for acquiring the identity of a "bad" boy that helped them derive intrinsic pleasure and gave … them derive intrinsic pleasure and gave them a criminally seductive feeling. Young females were attracted to such bad boys, excited by the indirect risk while continuing to abide by the law.
This research work sheds light on a major and alarming socio-psychological motivator triggered by marginalization. According … sheds light on a major and alarming socio-psychological motivator triggered by marginalization. According to the author, this area has mostly been overlooked by risk factor-centered interventions, which mostly pay attention to the concepts of sociological positivism and rational choice theory.
Alleyne & Wood (2013)
This research work … resources across and within organizations.……

References

References

Alleyne, E., & Wood, J. L. (2013). Gang-related crime: The social, psychological, and behavioral correlates. Psychology, Crime & Law, 19(7), 611-627.

FBI, (n.d.). Gangs. Retrieved from  https://www.fbi.gov/investigate/violent-crime/gangs#The-Gang%20Threat  on 12 June 2020

Finelli, G. A. (2019). Slash, Shoot, Kill Gang Recruitment of Children, and the Penalties Gangs Face. Family Court Review, 57(2), 243-257.

Hesketh, R. F. (2018). A critical exploration of why some individuals with similar backgrounds do or do not become involved in deviant street groups and the potential implications for their future life choices. (Doctoral dissertation, University of Chester, United Kingdom).

Hesketh, R.F. (2019). Joining gangs: living on the edge?. Journal of Criminological Research, Policy and Practice, Vol. 5 No. 4; 280-294.

Higginson, A., Benier, K., Shenderovich, Y., Bedford, L., Mazerolle, L., & Murray, J. (2018). Factors associated with youth gang membership in low?and middle?income countries: a systematic review. Campbell Systematic Reviews, 14(1), 1-128.

Howell, J. C. (2010). Gang Prevention: An Overview of Research and Programs. Juvenile Justice Bulletin. Office of Juvenile Justice and Delinquency Prevention.

Klein, M.W. (1995). The American street gang: Its nature, prevalence, and control. New York: Oxford University Press.

Studyspark

Study Document Study Document

Enhancing Communication Migration From 4G To 5G

Pages: 6 (1692 words) Document Type:Essay Document #:96575438

… cost, increased efficient energy consumption, massive device and machine connectivity for IoT, and better QoS and improved experience.
Scientific analysis
One of the risks in migrating from 4G to 5G is the choice of wireless systems. Evert wireless has specific roles and features. To determine the best … specific time and place and given the QoS requirements for the consumer (). In the process of migrating to 5G, this is a risk that might result in a try and error process in the process of selecting the best fit wireless system, as the previously used ……

References

References

Alkhazaali, N.H., 2017. Mobile Communication through 5G Technology (Challenges and Requirements). International Journal of Communications, Network and System Sciences, 10(05), p.202.

Gandotra, P., and Jha, R.K., 2016. Device-to-device communication in cellular networks: A survey. Journal of Network and Computer Applications, 71, pp.99-117.

Penttinen, Jyrki T. J., et al. 2019. "Deployment," in 5G Explained: Security and Deployment of Advanced Mobile Communications, Wiley, pp.271-291

Shen, Xuemin. "Device-to-device communication in 5G cellular networks." IEEE Network 29, no. 2 (2015): 2-3.

Tehrani, M.N., Uysal, M., and Yanikomeroglu, H., 2014. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), pp.86-92.

Zhang, A., and Lin, X., 2017. Security-aware and privacy-preserving D2D communications in 5G. IEEE Network, 31(4), pp.70-77.

Join thousands of other students and

"spark your studies".