Risk Factor Essays (Examples)

Studyspark

Study Document Study Document

Healthcare Ethics Bioethics Decisions

Pages: 5 (1545 words) Sources: 3 Document Type:Case Study Document #:55208071

...Risk factor Problem Statement
Organs are rare and expensive resources. Distributing these resources equitably remains one of the most pressing dilemmas in bioethics. Given that the dying patient did consent to organ donation, the primary ethical dilemmas in this case arise when determining the recipient. The case presents four different options, two of which (Michael and Mario) seem relatively easy to rule out. Mario is an infant who may not be a suitable candidate, and Michael has a history of liver disease due to alcoholism. Emily and Anita, however, both seem equally suitable candidates for the liver.
This case raises several moral questions. If every patient is deemed equally as worthy and valuable, according to ethical principles like equity and justice, then how is it possible to favor one person over the other? The answer to that question would be first to rule out any potential recipient who might reject the organ……

References

References

“Ethical Theory and Bioethics,” (n.d.).

“Principles of Ethics,” (n.d.).

Steinbock, B., London, A.J. & Arras, J.D. (n.d.). Ethical issues in modern medicine. 8th edition. McGraw Hill.

Studyspark

Study Document Study Document

Maritime Safety And Security SOP For Homeland Security Perspectives

Pages: 4 (1341 words) Sources: 11 Document Type:literature review Document #:28623347

...Risk factor Introduction
The maritime industry is increasingly moving towards the adoption of systems that rely heavily on digitization, automation, and integration (Hayes, 2016). The extensive use of advanced technological solutions in the maritime industry is driven by the urgent need to maintain the industry in sync with all other industries that seem to have a step forward in adopting technological solutions. As a result of this growth and development in technological solutions, the security of data and other sensitive information has increasingly become a huge concern for the industry (Bueger, 2015). Cybersecurity has become a priority for the maritime industry. With many of the operational and critical system having already been digitized, automated, and integrated, the concern has now shifted to how entities within the maritime industry should implement appropriate procedures and policies to respond to cybersecurity incidents effectively.
Background
Cybersecurity refers to the ability of entities to prepare for possible……

References

References

Bowen, B.M. (2011). Measuring the Human Factor of Cyber Security. Rerieved from  http://www.cs.columbia.edu/~bmbowen/papers/metrics_hst.pdf 

Bueger, C. (2015). What is Maritime Security? Maritime Policy, 53, 159-164.

Fitton, O. P. (2015). The Future of Maritime Cyber Security. Retrieved from  https://eprints.lancs.ac.uk/id/eprint/72696/1/Cyber_Operations_in_the_Maritime_Environment_v2.0.pdf 

Hadlington, L. (2018). The \\\\\\"Human Factor\\\\\\" in cybersecurity: Exploring the accidental insider. Psychological and Behavioral Examinations in Cyber Security, 4(6), 46-63.

Hareide, O. S. (2018). Enhancing Navigator Competence By Demonstrating Maritime Cyber Security. The Journal of Navigation, 71(5), 1025-1039.

Hayes, C. R. (2016). Maritime Cybersecurity: The Future of National Security. Monterey, California: Naval Post Graduate School.

Herzog, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), 49-60.

Hoffmann, J. (2018). Review of Maritime Transport. New York: UNCTAD.

Studyspark

Study Document Study Document

Fiscal Health Of Public Administration

Pages: 8 (2386 words) Sources: 4 Document Type:response paper Document #:45658914

… how society can solve it without having to turn people over to the justice department.
Third, technology is going to be a major factor in public administration going forward. This means that public administrators will need to be experienced in and knowledgeable of tech concepts and tools … both how to use these tools effectively and also how to safeguard and protect data, for as the world becomes more technological the risk of hacking increase as well.
Fourth, public administrators will be relying more and more on grassroots advocacy in order to get policies moving ……

References

RReferences

Abiad, A. & Khatiwada, S. (2019). 5 ways technology is improving governance, public service delivery in developing Asia. Retrieved from  https://blogs.adb.org/blog/5-ways-technology-improving-governance-public-service-delivery-developing-asia 

Florida Tech. (2019). Five global trends in public administration. Retrieved from  https://www.fit.edu/your-college-decision/trends-in-public-administration/ 

McDonald, B. (2017). Measuring the fiscal health of municipalities. Retrieved from  https://www.lincolninst.edu/sites/default/files/pubfiles/mcdonald_wp17bm1.pdf 

VCU. (2019). Public personnel administration. Retrieved from  https://commed.vcu.edu/IntroPH/Management/management/personnel.html 

Studyspark

Study Document Study Document

Culture And Nursing

Pages: 11 (3252 words) Sources: 14 Document Type:Research Paper Document #:16877652

...Risk factor Introduction: The Concept of Culture
Culture is the way of life for a person, society or group of people. It embodies the soul of the community and the heart of a team; it is seen in the way its members express themselves, communicate, think, feel, and believe. It determines what they value and how they honor the principles that guide them. It is different for every society, as Hofstede (1980) showed—and yet there are universal elements to every culture that allow people from different backgrounds to understand one another and rise above their differences to find common ground. Culture shapes the way people, families and communities communicate, perceive the self, think about sexuality, express spirituality, manage stress, cope with less, and deal with death and grief. Some cultures are open and indulgent about individuals’ choices, spirituality, sexuality and how they choose to communicate themselves. Others are more restrained and promote……

References

References

Bassert, J. M. (2017). McCurnin\\\\\\\\\\\\'s Clinical Textbook for Veterinary Technicians-E-Book. Elsevier Health Sciences.

Bovee, C.L., & Thill, J.V. (1992). Business Communication Today. NY, NY: McGraw- Hill.

Burnett, M.J., & Dollar, A. (1989). Business Communication: Strategies for Success. Houston, Texas: Dane.

Davidson, L., Tondora, J., Miller, R., O’Connell, M. (2015). Person-Centered Care. Person-Centered Care for Mental Illness. WA: American Psychological Association.

Hambrick, D.C., Davison, S.C., Snell, S.A. & Snow, C.C. (1998). When groups consist of multiple nationalities: Towards a new understanding of the implications. Organization studies, 19(2), 181-205.

Hofstede, G. (2011). Dimensionalizing cultures: The Hofstede model in context. Online Readings in Psychology and Culture, 2(1), 8.

Hofstede, G. (1980). Motivation, leadership, and organization: do American theories apply abroad?. Organizational Dynamics, 9(1), 42-63.

Hofstede Insights. (2019). Retrieved from  https://www.hofstede-insights.com/country-comparison/china,the-usa/

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384

… accounting organizations are shifting towards cloud computing owing to the reason that they presently understand the benefits facilitated, including increased mobility and heightened factor interactions with consumers. Furthermore, rather than spending massive amounts of money on investing in servers, storage, and IT assets, progressively, more accounting organizations ……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

Patient Scenario Metastatic Prostate Adenocarcinoma

Pages: 5 (1496 words) Sources: 5 Document Type:Assessment Document #:66070329

… of a physical examination. To begin with, we have the observation of the diseases’ physical signs as well as assessment of a few factor such as skin color changes, stimuli responsiveness, alertness, mobility, facial expression, posture, etc. Next, there is the taking of the vital signs of ……

References

References

American Heart Association (2020). Understanding Blood Pressure Readings. Retrieved from  https://www.heart.org/en/health-topics/high-blood-pressure/understanding-blood-pressure-reading s

Davis, C.P. (2018). CT Scan vs. MRI Differences between Machines, Costs, Uses. Retrieved from  https://www.medicinenet.com/ct_scan_vs_mri/article.htm 

Palmer, A. (2005). A Simple Guide to Blood Pressure. Mason, OH: CSF Medical Communications.

Sawyers, T. (2019). CT Scan vs. MRI. Retrieved from  https://www.healthline.com/health/ct-scan-vs-mri 

Taylor, R. (2002). Family Medicine: Principles and Practice. New York, NY: Springer Science & Business Media.

Studyspark

Study Document Study Document

Ankle Pain Diagnosis Management

Pages: 1 (335 words) Sources: 2 Document Type:Essay Document #:78325302

… diagnosis process requires obtaining information to support possible differentials of strain, sprain, tear, or fracture. Information for proper diagnosis and identification of these factor is obtained through history and objective assessment. Some of the information needed include history of ankle injury, severity of injury, history of fracture, … of sprains and strain would entail the use of non-steroidal anti-inflammatory drugs (NSAIDs). However, within the first 24-48 hours of the injury, low risk analgesics would be utilized before considering NDAIDs (Braund, 2006). In addition to medications, sprains and strains will be managed through manual therapy and ……

References

References

Braund, R. (2006, June 3). Should NSAIDs Be Routinely Use in the Treatment of Sprains and Strains? The Pharmaceutical Journal, 276, 655-656.

McGovern, R.P. & Martin, R.L. (2016, March 2). Managing Ankle Ligament Sprains and Tears: Current Opinion. Open Access Journal of Sports Medicine, 7, 33-42.

Studyspark

Study Document Study Document

Domestic Terrorism And Extremist Groups

Pages: 13 (3981 words) Sources: 12 Document Type:Research Paper Document #:80039324

… a feeling of representation and a sense that politicians are trying to strip citizens of their Constitutional rights are two of the main factor that have contributed to the rise of political extremist groups in the US. Beinart (2017) notes for instance that Antifa has developed in ……

References

References

Barnett, B. A. (2015). 20 Years Later: A Look Back at the Unabomber Manifesto.  Perspectives on Terrorism, 9(6), 60-71.

Beinart, P. (2017). The rise of the violent left. Retrieved from  https://www.theatlantic.com/magazine/archive/2017/09/the-rise-of-the-violent-left/534192/ 

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Costello, M., & Hawdon, J. (2018). Who are the online extremists among us? Sociodemographic characteristics, social networking, and online experiences of those who produce online hate materials. Violence and gender, 5(1), 55-60.

DeCook, J. R. (2018). Memes and symbolic violence:# proudboys and the use of memes for propaganda and the construction of collective identity. Learning, Media and Technology, 43(4), 485-504.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Hamm, M &Spaaj, R. (2015). Lone wolf terrorism in America: Using knowledge of radicalization pathways to forge prevention strategies. U.S. Department of Justice. Retrieved from  https://www.ncjrs.gov/pdffiles1/nij/grants/248691.pdf 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Studyspark

Study Document Study Document

Traumatic Stress In Age Of COVID 19 Student Teacher Syllabus

Pages: 9 (2722 words) Sources: 2 Document Type:Article Review Document #:56613298

… whose livelihood and entire existence are threatened by the situation. More affected are individuals with an existing mental health condition, who stand the risk of developing new stress-related mental issues or exacerbating existing ones. Humans are typically social beings and are not easily open to changing their … study. From a diagnostics point of view, this paper identifies the classification of PTSD as a mental health issue to be a significant factor in the development of new aspects of mental health research in the past few years. This, in turn, closed significant gaps that would ……

References

References

Richmond, A., Slattery, J., Mitchell, N., & Morgan, R. (2016). Can a learner-centered syllabus change students’ perceptions of student-professor rapport and master teacher behaviors? Scholarship of Teaching and Learning in Psychology, 2(3), 159-168.

Saville, B. K., Zinn, T. E., Brown, A. R., & Marchuk, K. A. (2010). Syllabus Detail and Students’ Perceptions of Teacher Effectiveness. Teaching of Psychology, 37(3), 186–189. DOI:10.1080/00986283.2010.488523 

Harrington, C. M., & Gabert-Quillen, C. A. (2015). Syllabus length and use of images: An empirical investigation of student perceptions. Scholarship of Teaching and Learning in Psychology, 1(3), 235.

Wilson, J. H., & Ryan, R. G. (2013). Professor–student rapport scale: Six items predict student outcomes. Teaching of Psychology, 40(2), 130-133.

Cullen, R., & Harris, M. (2009). Assessing learner?centredness through course syllabi. Assessment & Evaluation in Higher Education, 34(1), 115-125.

 

Studyspark

Study Document Study Document

Coronavirus And The Courts

Pages: 8 (2481 words) Sources: 4 Document Type:Term Paper Document #:21023640

… other hand, has not embarked on a mission of economic suicide and has adopted the position that few of its citizens are at risk from the novel coronavirus, which the state has identified as new form of the flu, and effect of this decision is that Sweden … Thus, what can we do to filter out the noise and reduce our own cognitive bias as we begin to examine the relevant factor of this case? I have already bracketed out my bias by stating it up front. Conscious of my own thoughts and feelings on ……

References

Works Cited

Allen v. Harrison (2016).  https://law.justia.com/cases/oklahoma/supreme-court/2016/111877.html 

Baker, Sinead. “The architect of Sweden's controversially lax coronavirus response says he thinks it's working, and that the capital city is already benefiting from herd immunity.” Business Insider, 2020.  https://www.businessinsider.com/coronavirus-sweden-defends-plan-not-to-lock-down-immunity-2020-4 

C&A Carbone, Inc. v. Town of Clarkstown, N.Y., 511 U.S. 383 (1994).  https://www.oyez.org/cases/1993/92-1402 

District of Columbia v. Heller (2008). Retrieved from  https://www.oyez.org/cases/2007/07-290 

Fox 2. “Alleged fraudulent COVID-19 treatments spark FBI raid of Shelby Twp medical spa.” Fox 2, 2020.  https://www.fox2detroit.com/news/alleged-fraudulent-covid-19-treatments-spark-fbi-raid-of-shelby-twp-medical-spa 

Jacobson v. Massachusetts, 197 U.S. 11 (1905).  https://supreme.justia.com/cases/federal/us/197/11/ 

Roe v. Wade (1973).  https://www.oyez.org/cases/1971/70-18 

Zucht v. King (1922).  https://supreme.justia.com/cases/federal/us/260/174/

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".