Security Management Essays (Examples)

Studyspark

Study Document Study Document

Physical And Mental Disabilities In The Workplace

Pages: 9 (2585 words) Sources: 15 Document Type:Research Paper Document #:74915062

… example, in 2015, $143 billion was spent in helping 9 millions workers with disability and 2 millions PwD family members through the Social security Disability Insurance (SSDI) program (Montez, Hayward & Wolf, 2017). Bias still exists, but social scientists are actively engaged in helping employers to overcome ……

References

References

Baruch, Y. (2000). Teleworking: benefits and pitfalls as perceived by professionals and managers. New technology, work and employment, 15(1), 34-49.

Bortz, D. (2018). Can Blind Hiring Improve Workplace Diversity? Retrieved from  https://www.shrm.org/hr-today/news/hr-magazine/0418/pages/can-blind-hiring-improve-workplace-diversity.aspx 

Center for Disability Rights. (2019). Ableism. Retrieved from  http://cdrnys.org/blog/uncategorized/ableism/ 

Corrigan, P. W. (2016). Lessons learned from unintended consequences about erasing the stigma of mental illness. World Psychiatry, 15(1), 67-73.

Fabian, R. (2019). New Marvel Film \\\\\\\\\\\\'The Eternals\\\\\\\\\\\\' Will Feature First Deaf Superhero. Retrieved from https://finance.yahoo.com/news/marvel-film-eternals-feature-first-211402332.html

Faurer, J., Rogers-Brodersen, A., & Bailie, P. (2014). Managing the re-employment of military veterans through the Transition Assistance Program (TAP). Journal of Business & Economics Research (Online), 12(1), 55.

Guruge, S., Wang, A. Z. Y., Jayasuriya-Illesinghe, V., & Sidani, S. (2017). Knowing so much, yet knowing so little: a scoping review of interventions that address the stigma of mental illness in the Canadian context. Psychology, Health & Medicine, 22(5), 507-523.

Marquis, J.P., Lim, N., Kavanagh, J., Harrell, M.C. & Scott, L.M. (2007). Managing Diversity in Corporate America: An Exploratory Analysis. Pittsburgh, PA: Rand Corporation.

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… view implementing and using IoT a risk?
RQ1a. What are the barriers (real or perceived) to implementation of IoT?
RQ2. How are IoT security risks and business risks related?
RQ2a. Under what conditions would SMEs adopt IoT implementation?
RQ3. Why is the IoT applicable and beneficial in … same attributes that make the IoT a valuable resource for businesses of all sizes and types, though, are the same attributes that create security risks for its implementation and administration (Banham, 2016). For example, a study by Celik, Fernandes, Tan and McDaniel (2019) noted that recent innovations … in nearly every conceivable environment, which leads to the adoption of device-based interaction and automation. However, IoT has also raised issues about the security and privacy of these digitally augmented spaces” (p. 1). Some of the digitally augmented spaces in IoT implementations that are most vulnerable to … and privacy of these digitally……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Acquisition Process In Action At The Department Of Energy

Pages: 10 (2943 words) Sources: 8 Document Type:Research Paper Document #:56403146

… major program that has been managed, via the acquisition process, over the past decade, by the Department of Energy at the Y-12 National security Complex. A description of the demolition project is followed by a discussion concerning the acquisition process that was used to guide the process. … conducted by the U.S. Department of Defense (DOE) in its Alpha 5 project. The stated mission of the DOE is “to ensure America’s security and prosperity by addressing its energy, environmental and nuclear challenges through transformative science and technology solutions” (About DOE, 2020, para. 1).
With more … September 11, 2001. Maintaining the DOE’s far-flung network of facilities demands ongoing attention, though, including one its most important resources, the Y-12 National security Complex. According to the description provided by the DOE, “The Y?12 National security Complex is a premier manufacturing facility dedicated to making our nation and the world a safer……

References

References

About DOE. (2020). U.S. Department of Energy. Retrieved from  https://www.energy.gov/about-us ,

About Y-12. (2020). U.S. Department of Energy. Retrieved from  https://www.y12.doe.gov/  about.

Birchfield, J. W. & Albrecht, L. (2012). Successful characterization strategies for the active high risk Y-12 National Security Complex 9201-5 (Alpha-5) Facility, Oak Ridge, TN - 12164. United States.

Recovery cleanup project at Y-12. (2010). U.S. Department of Energy. Retrieved from  https://www.energy.gov/orem/articles/recovery-cleanup-project-y-12-leaves-alpha-5-empty-feeling .

Standard review plan: Acquisition strategy review module. (2010, March). Washington, DC: Office of Environmental Management.

Supplement analysis for the site-wide environmental impact statement for the Y-12 National Security Complex (DOE/EIS-0387-SA-02). (2018, May). U.S. Department of Energy. Retrieved from  https://www.energy.gov/sites/prod/files/2018/05/f51/EIS-0387-SA02-2018_0.pdf .

Teamwork successfully brings down the Alpha 5 Annex. (2018). U.S. Department of Energy. Retrieved from

Studyspark

Study Document Study Document

Ethics And Health Information

Pages: 8 (2462 words) Sources: 6 Document Type:Term Paper Document #:87876213

… patients’ medical history, and ensuring that all end users of medical information technology are approved and trained. Some of the biggest factors in security breaches are end users themselves (Rhee, Kim & Ryu, 2009). This is why training of staff on how to use equipment and the … so important (Jackson, 2018). However, the system itself should have system protections built-in that can protect against end user mistakes—protections such as double security via multi-factor authentication (Crossler & Posey, 2017). This paper will discuss the programming language and relational databases that should be used to accommodate … via multi-factor authentication (Crossler & Posey, 2017). This paper will discuss the programming language and relational databases that should be used to accommodate security needs for the HIS, the information tools and safeguards required to protect it, the security needed for electronic health records, an applicable code of ethics, and proposals for training……

References

References

Campbell, R. J. (2004). Database Design: What HIM Professionals Need to Know.

Perspectives in Health Information Management 2004, 1:6 (August 4, 2004). Retrieved from  http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_024637.hcsp?dDocName=bok1_024637 

Crossler, R. E., & Posey, C. (2017). Robbing Peter to Pay Paul: Surrendering Privacy for Security's Sake in an Identity Ecosystem. Journal of The Association for Information Systems, 18(7), 487-515.

Donovan, F. (2018). Judge Gives Final OK to $115M Anthem Data Breach Settlement. Retrieved from https://healthitsecurity.com/news/judge-gives-final-ok-to-115m-anthem-data-breach-settlement

HealthIT.gov. (2018). Health Information Privacy, Security, and Your EHR. Retrieved from  https://www.healthit.gov/providers-professionals/ehr-privacy-security 

The IMIA Code of Ethics for Health Information Professionals. (n.d.). Retrieved from http://www.imia medinfo.org/new2/pubdocs/Ethics_Eng.pdf

Jackson, R. (2018). Pulling strings. Retrieved from  https://iaonline.theiia.org/2018/Pages/Pulling-Strings.aspx 

Prince, B. (2013). Programming Languages Susceptible to Specific Security Flaws: Report. Eweek, 12.  Retrieved from  https://www.eweek.com/security/programming-languages-susceptible-to-specific-security-flaws-report

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384


2.3.3 Hybrid Cloud 9
2.4 Effectiveness of Cloud Computing 9
2.4.1 Cost-Savings 9
2.4.2 Remote Accessibility 10
2.4.3 Scalability and Flexibility 11
2.4.4 security 11
2.4.5 Energy Efficiency 11
3 Methodology 12
3.1 Research Approach and Design 12
3.2 Data Collection Sources & Selection Plan 12
3.3 … of the cloud, including infinite and unrestricted storage and powerful analytic tools, system infrastructure software, various accounting applications in addition to enterprise resource management and customer relationship management, play a pivotal role in everyday business operations. Significantly, in the contemporary setting, companies and entrepreneurs in the accounting sector are no longer … can preclude an accounting organization’s capability of conducting business operations productively, cloud computing can facilitate a greater level of control and data backup, security accessibilities and also enables the accounting enterprises in business diversification. Numerous accounting organizations are shifting towards cloud computing owing to the reason that … design,……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

Optimizing Health Information Systems

Pages: 12 (3717 words) Sources: 16 Document Type:Research Paper Document #:99273225

… (HIS) that meets current Health Information Technology for Economic and Clinical Health (HITECH) Act and the Health Insurance Portability and Accountability Act (HIPAA) security and Privacy regulatory requirements. To this end, a discussion and analysis of health information systems, a description concerning how a system will affect … and compatibility of disparate health information systems is the use of middleware. For example, Shahmoradi and Habibi-Koolaee (2016) report that:
Standards on terminology, security and data exchange play a critical role to integrate health information systems and provide interoperability across heterogeneous systems. Middleware is a tool to … to the success of the project
Title
Role
Expertise
Contribution
Project leader
Oversee and coordinate efforts by other team members
? Human resource management and compliance with HIPPA and HITECH
? Information technology background
Ensure that schedules and timelines are followed and collaboration between team members.
IT … app, database, and web portal……

References

References

Abouzhar, C. & Boerma, T. (2009, August). Health information systems: The foundations of public health. Bulletin of the World Health Organization, 83(8), 578-583.

Cresswell, K. & Aziz, S. (2013, May). Organizational issues in the implementation and adoption of health information technology innovations: An interpretative review. International Journal of Medical Informatics, 87(5), 73-86.

Drazen, E. L. (2006, February). Maximizing the benefits of health care information systems. Journal of Medical Systems, 10(1), 51-56.

Kruse, C. S. & Smith, D. (2017, July). Security techniques for the electronic health records. Journal of Medical Systems, 41(8), 127.

Kumar, V. (2011). Impact of health information systems on organizational health communication and behavior. The Internet Journal of Allied Health Sciences and Practice, 9(2), 37-44.

McGrail, K. M. & Black, C. (2009, August). Access to data in health information systems. Bulletin of the World Health Organization, 83(8), 563-569.

Murphy, M. L. (2019, March). Mastering accounting for business combinations: Mergers and acquisitions present challenges that finance can overcome by staying involved with the deal and preparing in advance of the closing. Journal of Accountancy, 227(3), 24-27.

NAHQ code of ethics for healthcare quality. (2019). National Association for Healthcare Quality. Retrieved from  https://nahq.org/about/code-of-ethics .

Studyspark

Study Document Study Document

Public Safety And Public Relations

Pages: 7 (2022 words) Sources: 9 Document Type:Essay Document #:36972565

… organizations, including the fire department, police department, and sheriff's department. Some federal level public safety institutions include the CIA, FBI, Department of Homeland security, and Border Patrol (Vault, 2020).
The most predominant public safety jobs are connected with the police: police officers, detectives/ investigators, or correctional officers. … personnel, highway patrol officials, and firefighters make up another major public safety employee cluster. The majority of private-sector safety personnel include private detectives, security consultants, and security guards. A profession swiftly increasing in popularity is that of computer forensic investigators, owing to alarming rates of growth of cybercrime across the … in charge of policing a city populated by 8.5 million individuals; its responsibilities include public safety (various forms), law enforcement, emergency response, traffic management, and counterterrorism. Over the last twenty- five years, the NYPD has ensured immense drops in the property as well as violent crime rates … Public Safety……

References

References

Achim, A. C. (2014). Risk management issues in policing: from safety risks faced by law enforcement agents to occupational health. Procedia Economics and Finance, 15, 1671-1676.

Bornstein, A. (2005). Antiterrorist policing in New York City after 9/11: Comparing perspectives on a complex process. Human Organization, 64(1), 52-61. Retrieved from https://www.jstor.org/stable/44127004?seq=1

Buyantseva, L. V., Tulchinsky, M., Kapalka, G. M., Chinchilli, V. M., Qian, Z., Gillio, R., et al. (2007). Evolution of lower respiratory symptoms in New York police officers after 9/11: A prospective longitudinal study. J Occup Environ Med, 49, 310–17.

Homeland Security. (2005). Grand reform: The faster and smarter funding for first responders. Washington, DC: U.S. Government Printing Office.

Lippmann, M., Cohen, M. D., & Chen, L-C. (2015). Health effects of World Trade Center (WTC) Dust: An unprecedented disaster with inadequate risk management. Crit Rev Toxicol, 45(6), 492-530. DOI: 10.3109/10408444.2015.1044601

NYPD. (2020). About NYPD. Retrieved from  https://www1.nyc.gov/site/nypd/about/about-nypd/about-nypd-landing.page 

OHS. (2008). Occupational Health and Safety Code of Practice. Australian Government.

Vault. (2020). Overview. Retrieved from  https://www.vault.com/industries-professions/industries/public-safety

Studyspark

Study Document Study Document

Weapons Of Mass Destruction WMD Antifa

Pages: 13 (3787 words) Sources: 12 Document Type:Research Paper Document #:67320498

… seriously. As more and more of the world becomes dependent upon cyber infrastructure for the maintenance of other systems, the complexity of the security services of a country grows and intensifies. Is it possible therefore that there is an overreliance upon technology and that this overreliance can … food shortages, businesses closed, and crime broke out with gangs roving from place to place to try to find resources for themselves.
Energy security is needed to support the lives of people who depend upon electricity for work and livelihood. Everyone from farmers to accountants will use … patients and students supported. If the energy system is compromised, hospitals are unable to provide adequate healthcare. If a country has no energy security, it cannot provide all the services required by people when they are most needed—i.e., in a time of attack.
Even though most of …
Even though most of the……

References

References

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Christenson, G. (2015). CBRN response. National Guard Bureau.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from  https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat 

Jennings, P. (2006). Miami port poses serious risks. Retrieved from  https://abcnews.go.com/WNT/story?id=131634&page=1 

Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from  http://www.johnstonsarchive.net/terrorism/chembioattacks.html 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Maras, M-H. (2014). Transnational Security. Florida: CRC Press.

Studyspark

Study Document Study Document

Formulating An Effective National Response To Ebola In Nigeria

Pages: 17 (5038 words) Sources: 20 Document Type:Research Paper Document #:83371879

… that caused more than 11,000 deaths, primarily in West Africa, but the disease has the potential to spread worldwide unless first responders, emergency management managers and the health care community take aggressive steps to identify infections and contain outbreaks. The main purpose of this study is to … place. Therefore, while the search for a cure for the Ebola virus disease continue, it is vitally important for national and local emergency management teams to formulate effective response interventions to minimize the transmission of the disease, including educating citizens concerning the Ebola disease virus to prevent … disease, including transmission methods, symptoms, diagnosis, and current treatment strategies. In addition, this chapter provides an analysis concerning ways to identify optimal emergency management strategies for Ebola outbreaks in Nigeria.
Overview of the Ebola virus disease
Cause of the Ebola virus disease
The Ebola virus disease is ……

References

References

Allam, M. F. (2014, September). Ebola hemorrhagic fever: Case fatality rate 90%? Central European Journal of Public Health 22(3), 207-210.

Allam, M. F. & Vonka, V. (2015, March). Ebola virus disease: Temperature checks for travelers? Central European Journal of Public Health, 23(1), 84.

Brand, J. E. & Stela, D. (2014, October). Ebola is here: Knowledge, identification, and appropriate infection control are key. American Nurse Today, 9(10), 37-39.

Brown, G. (2015, Winter). Ebola in America: An epidemic or a pandemic? ABNF Journal, 26(1), 3-5.

Ebola. (2019). Doctors without Borders. Retrieved from https://www.doctorswithout borders.org/what-we-do/medical-issues/ebola.

Ebola outbreak. (2019). U.S. Centers for Disease Control and Prevention. Retrieved from  https://www.cdc.gov/vhf/ebola/history/2014-2016-outbreak/index.html .

Ebola virus disease. (2019). U.S. Centers for Disease Control and Prevention. Retrieved from  https://www.cdc.gov/vhf/ebola/index.html .

Hancock, M. (2019, September). After Ebola. African Business, 422, 56-58.

Studyspark

Study Document Study Document

Clinical Informatics

Pages: 11 (3264 words) Sources: 12 Document Type:Essay Document #:78574553

… what evidence-based practice (EBP) shows with respect to clinical informatics, how the law figures into this issue with respect to HIPAA, privacy/confidentiality and security issues; and how patient safety, the nursing role and electronic medical records are impacted.
Clinical Informatics Concepts in the 21st Century
Controlling the … nursing role and electronic medical records are impacted.
Clinical Informatics Concepts in the 21st Century
Controlling the flow of information to promote efficiency, security, and safety is the number one priority of clinical informatics. 21st century concepts for how this can be accomplished include training in how … 2009 likewise gives the Department of Health and Human Services the ability to regulate the use of Health IT and clinical informatics. Safety, security and quality issues are all overseen by the federal government under HITECH.
Privacy, Confidentiality and security Issues
One of the challenges facing the field of nursing is how to……

References

References

Cho, O. M., Kim, H., Lee, Y. W., & Cho, I. (2016). Clinical alarms in intensive care units: Perceived obstacles of alarm management and alarm fatigue in nurses. Healthcare informatics research, 22(1), 46-53.

Effken, J., Weaver, C., Cochran, K., Androwich, I., & O’Brien, A. (2016). Toward a central repository for sharing nursing informatics’ best practices. CIN: Computers, Informatics, Nursing, 34(6), 245-246.

Elsayed, W. A., Hussein, F. M., & Othman, W. N. (2017). Relation between nursing informatics competency and nurses’ attitude toward evidence-based practice among qualified nurses at Mansoura Oncology Center. International Journal of Nursing Didactics, 7(6), 26-33.

Drolet, B. C., Marwaha, J. S., Hyatt, B., Blazar, P. E., & Lifchez, S. D. (2017). Electronic communication of protected health information: privacy, security, and HIPAA compliance. The Journal of hand surgery, 42(6), 411-416.

Haupeltshofer, A., Egerer, V., & Seeling, S. (2020). Promoting health literacy: What potential does nursing informatics offer to support older adults in the use of technology? A scoping review. Health Informatics Journal, 1460458220933417.

Kharbanda, E. O., Asche, S. E., Sinaiko, A. R., Ekstrom, H. L., Nordin, J. D., Sherwood, N. E., & O’Connor, P. (2018). Clinical decision support for recognition and management of hypertension: a randomized trial. Pediatrics, 141(2).

Khezri, H., & Abdekhoda, M. (2019). Assessing nurses’ informatics competency and identifying its related factors. Journal of Research in Nursing, 24(7), 529-538.

Kleib, M., & Nagle, L. (2018). Factors associated with Canadian nurses\\\\\\\\\\\\' informatics competency. CIN: Computers, Informatics, Nursing, 36(8), 406-415.

Join thousands of other students and

"spark your studies".