Social Policy Essays (Examples)

Studyspark

Study Document Study Document

Data Security Using RFID Bands At Music Festivals

Pages: 5 (1616 words) Sources: 6 Document Type:Essay Document #:97930410

… and which ones cannot attract any attendees. Unlike the traditional ticketing method, RFID bands would have a unique identification system linked with his social media profiles, thus, making it impossible for fraud and duplication. Taking out wallets from their pockets from time to time and paying for … with improved customer experience as time reduction and standing in line are eliminated from all the processes at the event and integration of social media activities with the attendees' check-in function, enabling the event's enhanced promotion value-added marketing potential.
Description of Five or More Types of Personal/Private … lines would be eradicated from the process. The wrist bands are secured with a unique key to unlock the user profiles, such as social media profiles, that have an added benefit to be linked with the wristbands since the event's promotion would be done on the user's … media profiles, that have an……

References

References

Event Tribe. (n.a.). The top 10 benefits of using RFID for events. Retrieved from  https://www.eventbrite.com/blog/academy/the-top-10-benefits-of-using-rfid-for-events/ 

ID&C. (n.a.). How to RFID wristbands work? Retrieved from  https://www.idcband.com/blog/how-do-rfid-wristbands-work/ 

Kacicki, T. (2019, July 15). 4 commonly overlooked facts about RFID wristbands. Intellitix. Retrieved from  https://intellitix.com/hub/four-commonly-overlooked-facts-rfid 

OECD. (2008). OECD policy guideline on RFID.  https://www.oecd.org/sti/ieconomy/40892347.pdf 

Quirk, R.E. & Borrello, S.J. (2005). RFID: Rapid deployment and regulatory challenges. Retrieved from  https://www.pharmamanufacturing.com/assets/Media/MediaManager/VenableRFIDpaper.pdf?SESSID=62935cf41f5a19909f5bb3ae3a598490 

Williamson, A., Tsay, L., Kateeb, I.A. & Burton, L. (2013). Solutions for RFID smart tagged card security vulnerabilities. AASRI Procedia, 4, 282-287. DOI: 10.1016/j.aasri.2013.10.042

Studyspark

Study Document Study Document

COVID 19 In South Africa Nigeria And Swaziland

Pages: 7 (2030 words) Sources: 6 Document Type:literature review Document #:53851517

… and Swaziland
The institutional theory deals with the outlines, regulations, standards, and procedures that are formulated in the institutions as commanding instructions for social behavior. This theory gives an understanding of how institutions are shaped, and the societal norms and frameworks are informed to all people of … all levels of the firm and in what way people are obeying them. This would ultimately build an organizational culture for coping with social and political issues. The informal institutions are social shared instructions, typically unwritten, that are formed, transferred and imposed outside the official boundaries (Torniainen & Sasstamoinen, 2007), for example, giving tips to … food delivery man is now an informal institution, which is actually not an official rule written anywhere but is still followed as acceptable social behavior.
Studies have been conducted to see what drives change in an organization and how institutional theory comes into play. There……

References

References

Coelho, A. (2019). The role of informal institutions in the enforcement of rules and how to improve corporate and public governance in Brazil: Studies based on a set of corporate governance cases involving state-owned companies (Working Paper). Retrieved from SSRN website  https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3434037 

Dacin, M.T., Goodstein, J. & Scott, W.R. (2002). Institutional theory and institutional change: Introduction to the special research forum. Academy of Management Journal, 45(1), 45- 47. DOI: 10.2307/3069284

Escandon-Barbosa, D.M., Urbano, D., Hurtado-Ayala, A., Paramo, J.S. & Dominguez, A.Z. (2019). Formal institutions, informal institutions, and entrepreneurial activity: A comparative relationship between rural and urban areas in Colombia. Journal of Urban Management, 8(3), 458-471.  https://doi.org/10.1016/j.jum.2019.06.002 

Estrin, S. & Prevezer, M. (2010). The role of informal institutions in corporate governance: Brazil, Russia, India, and China compared. Asia Pacific Journal of Management, 28, 41- 67.  https://doi.org/10.1007/s10490-010-9229-1 

Kaufmann, W., Hooghiemstra, R. & Feeney, M.K. (2018). Formal institutions, informal institutions, and red tape: A comparative study. Public Administration, 96(2), 386-403. https://doi.org/10.1111/padm.12397

Meluch, A.L. (2016, August). Understanding the organizational and institutional origins of social support in a cancer support center. (Unpublished doctoral dissertation). Retrieved from https://etd.ohiolink.edu/!etd.send_file?accession=kent1466944822&disposition=inline

Torniainen, T.J. & Sasstamoinen, O.J. (2007). Formal and informal institutions and their hierarchy in the regulation of the forest lease in Russia. Forestry: An International Journal of Forest Research, 80(5), 489-501.  https://doi.org/10.1093/forestry/cpm033 

Studyspark

Study Document Study Document

Counterintelligence Issues Within The United States

Pages: 18 (5457 words) Sources: 29 Document Type:Research Paper Document #:72238996

… Wirtz (2000) help to make the problem of morality in CI even more complicated by asking if deception should have any part in policy. They represent one side of the ethical spectrum and Cohen (2016) represents the other side. Kent (2019) and Godson and Wirtz (2000) represent ……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. "The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles." Bachelor's thesis, Università Ca'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Cohen, Shlomo. 2016. "Are There Moral Limits to Military Deception?." Philosophia 44 (4): 1305-1318.

Coyne, John, Peter Bell, and Shannon Merrington. 2013. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2 (10): 27-37.

Erskine, Toni. 2004. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. "Strategic denial and deception." International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Studyspark

Study Document Study Document

Impact Of Culture On Domestic Violence

Pages: 12 (3547 words) Sources: 21 Document Type:Research Paper Document #:31105337

… it does and why nearly half of all black women will experience domestic violence at some point in their lives (Institute for Women’s policy Research, 2017). This paper will discuss the impact of culture on domestic violence in the black community and what the implications of this … paper will discuss the impact of culture on domestic violence in the black community and what the implications of this issue are for policy, practice and research.
Background
Every minute in America approximately 20 people experience a domestic violence situation (NCADV, 2017). The majority of those who … a domestic violence situation (NCADV, 2017). The majority of those who experience this type of violence, are, according to the Institute for Women’s policy Research (2017), black women: the Institute shows that 40% of black women experience domestic violence, which is defined as the problem of abusive … which is defined as the……

References

References

Adorno, T. & Horkheimer, M. (2007). The culture industry: Enlightenment as mass deception. Stardom and celebrity: A reader, 34, 2007.

Bandura, A. (2018). Toward a psychology of human agency: Pathways and reflections.  Perspectives on Psychological Science, 13(2), 130-136.  https://doi.org/10.1177/1745691617699280 

Breger, M. L. (2017). Reforming by re-norming: How the legal system has the potential to change a toxic culture of domestic violence. J. Legis., 44, 170.

Cashmore, E. (2006). The Black culture industry. Routledge.

Coleman, L. (1974). Carl Van Vechten Presents the New Negro. Studies in the Literary Imagination, 7(2), 85.

Cramer, E. P., Choi, Y. J., & Ross, A. I. (2017). Race, Culture, and Abuse of Persons with Disabilities. In Religion, Disability, and Interpersonal Violence (pp. 89-110). Champaign, IL: Springer.

Davis, A. (2012). The Meaning of Freedom. San Francisco, CA: City Light Books.

Decker, J. L. (1993). The state of rap: Time and place in hip hop nationalism. Social Text, (34), 53-84.

Studyspark

Study Document Study Document

Twitter External Internal Analysis Report To CEO

Pages: 15 (4857 words) Sources: 1 Document Type:Essay Document #:23822356

Appendix
External Analysis
1. PESTEL Analysis
1.1. Political
1.1.1.Global leaders use of social media impacts the political landscape and is able to influence operations. (C-142)
1.1.2. Several high-profile world leaders utilize social media platforms to address their followers, the most notable being U.S. President Donald Trump who tweets regularly to announce global interactions with other … million followers as at June 2018 (C-142)
1.1.3. Depending on the political climate in various countries, governments may censor content and access to social media platforms.
1.2. Economics
1.2.1. Generated revenues through advertising, data licensing and other products. products. In 2017, total revenue generated was $2,443, 299, … In 2017, total revenue generated was $2,443, 299, 000 (C-142)
1.2.2. Fluctuating exchange rates and inflation rates can affect overall profit-margins. (C-147)
1.3. social
1.3.1. The expectation of the population is that they are able to post whatever they please on social media platforms. That explains……

References

References

Thompson, Arthur A.,. (2015). Crafting and Executing Strategy: Concepts and Readings..New York: McGraw-Hill Education, (pp. 138-148)

Studyspark

Study Document Study Document

Angleton S Counterintelligence Program And What Went Wrong

Pages: 9 (2657 words) Sources: 8 Document Type:Essay Document #:36485484

… his position as head of counterintelligence at the CIA, Colby inherited a Staff that was by that time a full-grown adult. Facing political, social, and economic pressures, the CIA was compelled to reorganize, and as the Church Committee reported, it was “an end of an era in ……

References

Reference List

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Bartos, C. and P. Wehr. 2002. Using conflict theory. UK: University of Cambridge.

Bellaby, Ross. "What's the Harm? The Ethics of Intelligence Collection." Intelligence and National Security 27, no. 1 (2012): 93-117.

Church Committee. “Final report of the Select committee to study governmental operations With respect to Intelligence activities United states senate Together with Additional, supplemental, and separate Views.” Intelligence.senate.gov, 1976. https://www.intelligence.senate.gov/sites/default/files/94755_I.pdf

Coyne, John, Peter Bell, and Shannon Merrington. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2, no. 10 (2013): 27-37.

Erskine, Toni. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19, no. 2 (2004): 359-381.

Nakashima, Ellen. “Top counterintelligence official challenges the private sector to step up defenses against foreign spying.” Washington Post, 2020.  https://www.washingtonpost.com/national-security/top-counterintelligence-official-challenges-the-private-sector-to-step-up-defenses-against-foreign-spying/2020/02/10/d842d83c-4c15-11ea-9b5c-eac5b16dafaa_story.html 

Pfaff, T., & Tiel, J. R. (2004). The ethics of espionage. Journal of Military Ethics, 3(1), 1-15.

Study Document Study Document

Gangs Formation And Functioning

Pages: 9 (2774 words) Sources: 15 Document Type:Essay Document #:94080589

… the existence of gangs in the neighborhood proved to be major gang crime predictors. Against the expectations of authors, the perceived significance of social standing, negative attitudes towards authority, and ethical disengagement weren't predictive of gang-connected offending. But additional analyses revealed greater ethical disengagement and perceived societal … are comprehensively provided to a specific number of identified persons based on information garnered during evaluation.
Law enforcement contributes significantly to suppression (called "social control" within the model's context). Ideally, every project partner will collaborate to ensure the accountability of gang members targeted.
Evaluation for success: The ……

References

References

Alleyne, E., & Wood, J. L. (2013). Gang-related crime: The social, psychological, and behavioral correlates. Psychology, Crime & Law, 19(7), 611-627.

FBI, (n.d.). Gangs. Retrieved from  https://www.fbi.gov/investigate/violent-crime/gangs#The-Gang%20Threat  on 12 June 2020

Finelli, G. A. (2019). Slash, Shoot, Kill Gang Recruitment of Children, and the Penalties Gangs Face. Family Court Review, 57(2), 243-257.

Hesketh, R. F. (2018). A critical exploration of why some individuals with similar backgrounds do or do not become involved in deviant street groups and the potential implications for their future life choices. (Doctoral dissertation, University of Chester, United Kingdom).

Hesketh, R.F. (2019). Joining gangs: living on the edge?. Journal of Criminological Research, Policy and Practice, Vol. 5 No. 4; 280-294.

Higginson, A., Benier, K., Shenderovich, Y., Bedford, L., Mazerolle, L., & Murray, J. (2018). Factors associated with youth gang membership in low?and middle?income countries: a systematic review. Campbell Systematic Reviews, 14(1), 1-128.

Howell, J. C. (2010). Gang Prevention: An Overview of Research and Programs. Juvenile Justice Bulletin. Office of Juvenile Justice and Delinquency Prevention.

Klein, M.W. (1995). The American street gang: Its nature, prevalence, and control. New York: Oxford University Press.

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… data assets and create trust among interested entities. Accompanying it is the ISO 27002 standard (Almatari et al., 2018), setting down…[break]…For guaranteeing security policy adherence and ascertaining the minimum control set needed for the reduction of risks to a satisfactorily low level, security audits ought to be … may encompass automated audit instruments such as off-the-rack security auditing systems or auditor-developed instruments, or even manual review methods like auditing checklists and social engineering attack checklists.
Audit processes involve several steps. According to 3D Networks, auditing is a 7-step process (Suduc et al., 2010), the steps … company's security baseline, (6) risk/threat analysis – evaluation of the many threats and risks the information systems of the organization encounter, and (7) policy auditing – which is an audit of the firm's security policy for making sure it is aligned with the firm's business aims.
In the course of, as well as,……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

The FBI Counterproliferation And Weapons Of Mass Destruction

Pages: 6 (1839 words) Sources: 8 Document Type:Research Paper Document #:33590628

… nation and the world against weapons of mass destruction (WMD) in 2009 and 2010. The Obama Administration, in December 2009, gave a presidential policy directive aimed at countering biological threats with a focus on infectious illnesses whether such threats were manmade or natural. It was the second … scenarios where the spread of such diseases is organic and not artificially created. These attacks have the potential to cause a lot of social and economic disruption and lead to the infection of humans…[break]…domestic and international security. Going forward, there is need for a more collaborative effort … and international security. Going forward, there is need for a more collaborative effort between all concerned agencies that stresses on consistency in both policy and actions. The filling of such gaps will help nations curb most of the threats posed by non-state actors (Jennings 2013, 6).
Methods … need to put in place……

References

References

Busch, Nathan, and Joyner, Daniel (ed). 2009. “Introduction: Nonproliferation at a Crossroads.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Athens, GA: The University of Georgia Press.

Reiss, Mitchell. 2009. “Foreword.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Edited by Nathan Busch, and Daniel Joyner. Athens, GA: The University of Georgia Press.

Cameron, Gavin, Pate, Jason & Vogel, Kathleen. (2001). “Planting Fear: How Real is the Threat of Agricultural Terrorism?” Bulletin of Atomic Scientists, 57(5), 38-44.

Jennings, Elain. 2013. U. S. proliferation policy and the campaign against transnational terror: Linking the U.S. non-proliferation regime to homeland security efforts. Master’s Thesis. Naval Postgraduate School.

Levi, Michael. 2009. “On Nuclear Terrorism.” Cambridge, MA: Cambridge University Press.

Mauroni, Albert. J. 2010. “A Counter-WMD Strategy for the Future.” Parameters, 58-73.

Ogilvie-White, Tanya. 2008. “Facilitating Implementation of Resolution 1540 in South- East Asia, and the South Pacific.” In Implementing Resolution 1540: The Role of Regional Organizations. Edited by Lawrence Scheinman. New York: United Nations Institute for Disarmament Research.

Pilat Joseph F. 2009. “Dealing with Proliferation and Terrorism.” In Combating Weapons of Mass Destruction: The Future of International Nonproliferation Policy, edited by Nathan E. Busch and Daniel H. Joyner. Athens, GA: University of Georgia Press.

Studyspark

Study Document Study Document

Government Transparency

Pages: 2 (684 words) Sources: 5 Document Type:Essay Document #:90421039

The Importance of Transparency in Government
We live in an age where government, more and more, appears to be transparent and responsive on social media. It is possible to communicate with public figures through a series of clicks on Twitter or Facebook, and to read moment-by-moment accounts … to increase the knowledge of the public about their governments. For example, the Association of Southeast Asian Nations (ASEAN) recently reported upon a policy conference designed to promote awareness of policy and dialogue about the creation of micro enterprises to fuel economic growth, and the need for government support of such emerging economic entities … poverty on a macro level are indissolubly linked, and the more people know how information is collected and analyzed by the government regarding social justice issues, the greater the likelihood of arriving at a solution. In the past, it may have been difficult for such small enterprises……

References

References

ASEAN holds policy dialogue on formalisation of micro enterprises. 2019. Accessed June 30,2109 at:  https://asean.org/asean-holds-policy-dialogue-formalisation-micro-enterprises/ 

Government transparency. 2019. Ballotpedia. Accessed June 30, 2109 at:  https://ballotpedia.org/Government_transparency 

An honest and responsive government. 2014. UN SDG Action. Accessed June 30, 2109 at:  https://sdgactioncampaign.org/2014/10/24/an-honest-and-responsive-government-the - role-of-citizen-voice/

Krastev, T. 2019. Does more transparency mean more trust? Open Government Partnership. Accessed June 30, 2109 at:

 https://www.opengovpartnership.org/trust/does-more-transparency-mean-more-trust/ 

Transparency in the age of social media influence. 2017. Bookmark This. Accessed June 30, 2109 at: https://bookmarkcontent.com/blog/content/transparency-age-social-media - influence/#

Join thousands of other students and

"spark your studies".