Social Responsibility Essays (Examples)

Studyspark

Study Document Study Document

Bass Pro Management

Pages: 7 (2070 words) Sources: 7 Document Type:Capstone Project Document #:46716922

...Social responsibility Of Workforce Management
Introduction
Workforce management is one of the most important aspects of operating a business (Randolph Thomas & Horman, 2006). From a Workforce Management standpoint, Bass Pro Shops is strategically committed to the pursuit of quality over the long term. However, there are areas for improvement, as employee complaints of cutbacks, lack of job security, pay reduction, and so on, have led workers to view what was once a great place to work as now an organization that is more focused on customer service than it is on employee support. This paper will discuss the workforce environment of Bass Pro Shops, the nature of engagement and performance at Bass Pro, and how the workforce and leadership are being developed there. It will conclude with a discussion of the strengths and weaknesses of Bass Pro’s workforce management, opportunities for improvement, and proposed actions.
Field of inquiry #1: Workforce Environment……

References

References

Babin, B. J., & Attaway, J. S. (2000). Atmospheric affect as a tool for creating value and gaining share of customer. Journal of Business research, 49(2), 91-99.

Bass Pro Shops Employee Reviews. (2017). For manager. Retrieved from  https://www.indeed.com/cmp/Bass-Pro-Shops/reviews?fjobtitle=Manager&fcountry=ALL 

De Vries, M.F.K., 1998. Charisma in action: The transformational abilities of Virgin's Richard Branson and ABB's Percy Barnevik. Organizational Dynamics, 26(3), pp.7-21.

Klein, H. J., & Polin, B. (2012). Are organizations on board with best practices onboarding. The Oxford handbook of organizational socialization, 267-287.

Life at Bass Pro Shops. (2018). Careers. Retrieved from https://www.basspro.com/shop/en/careers-life

Orpen, C. (1997). The effects of formal mentoring on employee work motivation, organizational commitment and job performance. The Learning Organization, 4(2), 53-60.

Randolph Thomas, H., & Horman, M. J. (2006). Fundamental principles of workforce management. Journal of Construction Engineering and Management, 132(1), 97-104.

Studyspark

Study Document Study Document

The Transformation Of The US Into Oceania

Pages: 9 (2807 words) Sources: 7 Document Type:Essay Document #:33502677

… to the maximum extent possible in today’s uncertain world. For example, Karn (2019) emphasizes the need for organization-wide state-of-the-art security protocols that prevent social engineering and other so-called “phishing” attacks from compromising personal data.
This need has been quantitatively compounded by the enormous amounts of personal information … information they collect from their employees and consumers. In other words, personal privacy protections begin at the top and business leaders have the responsibility to protect personal data in every situation.
Conclusion
The research showed that although “Big Brother Is Watching,” most people are woefully unaware of ……

References

References

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Cantor, M. D. (2006, Summer). No information about me without me: Technology, privacy, and home monitoring. Generations, 30(2), 49-55.

Ethical issues facing businesses. (2020). Florida Tech. Retrieved from https://www.floridatech online.com/blog/business/the-5-biggest-ethical-issues-facing-businesses/.

Haslag, C. (2018, Fall). Technology or privacy: Should you really have to choose only one? Missouri Law Review, 83(4), 1027-1033.

Karn, R. (2019). The biggest threat to data security? Humans, of course. The Privacy Advisor. Retrieved from  https://iapp.org/news/a/the-biggest-threat-to-data-security-humans-of-course/ .

Sharma, P. (2017, June). Organizational culture as a predictor of job satisfaction: The role of age and gender. Journal of Contemporary Management Issues, 22(1), 35-40.

Taslitz, A. E. (2009, Spring). The Fourth Amendment in the twenty-first century: Technology, privacy, and human emotions. Law and Contemporary Problems, 65(2), 125-131.

Studyspark

Study Document Study Document

Substance Abuse And Addiction

Pages: 4 (1306 words) Sources: 2 Document Type:Essay Document #:86773180

… that the individual no longer wants to ever be without the drug. One who abuses substances is likely to get into legal or social trouble; one who is addicted is one who no longer cares about the repercussions and cares only for the high that the substances … can endure it” (1 Corinthians 10:13-14).
2
The causes of substance abuse and addiction can be internal and external. They can be genetic, social, emotional (trauma), environmental. One can be moved to try drugs or alcohol because of the peers one is associating with. One can be ……

References

References

Doweiko, H. E. (2015). Concepts of chemical dependency (9th ed.). Stamford, CT: Cengage Learning. ISBN: 9781285455136.

New International Version. (n.d.). Retrieved from  https://www.biblestudytools.com/1-peter/5-10.html 

Studyspark

Study Document Study Document

Counterintelligence

Pages: 12 (3490 words) Sources: 6 Document Type:question answer Document #:11133529

… can be respected at the same time the safety of the nation has to come first. Monitoring all digital activity should be the responsibility of counter-intelligence, and legislators at the federal level need to be made aware of that. Lobbying should be conducted to raise awareness on ……

References

Bibliography

Counter intelligence for National Security, CIA, 1993. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol2no4/html/v02i4a10p_0001.htm

Johnston, David and James Risen, “U.S.had evidence of espionage,” New York Times, 2001. https://www.nytimes.com/2001/02/23/us/us-had-evidence-of-espionage-but-fbi-failed-to-inspect-itself.html

National Counterintelligence Strategy of the United States of America 2016 (Strategy).  https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf 

Prunckun, Hank. 2012. Counterintelligence Theory and Practice, Lanham: Rowman&Littlefield Publishers Inc. Read the following: Chapters 8 to 14, pages 131 to 217. Appendices A to D, pages 219 to 231.

Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September 17). National Security Archive. Accessed January 19, 2017.  http://nsarchive.gwu.edu/NSAEBB/NSAEBB230/ .

Van Cleave, Michelle. “Strategic Counterintelligence: What Is It and What Should We Do About It ?” 2007. CIA Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html

Studyspark

Study Document Study Document

Project Management Plan To Upgrade Hospital Equipment

Pages: 13 (3960 words) Sources: 5 Document Type:response paper Document #:39596809

… work and the project activity (Pohjola, Suhonen, Mattila, & Meretoja, 2016). The quality management will be handled thus;

Quality Focus Area Minimum Grade responsibility

Outdated but critical equipment that cannot be changed until replacement is in place Chief nurse, Hospital MD, Project manager Identify and secure this ……

References

References

Healthcare Business. (2013, May 15). Report: Hospitals waste billions using outdated technology. Retrieved from Health Care Business Tech:  http://www.healthcarebusinesstech.com/outdated-technology-wastes-money/ 

Lee, J. (2016, April 14). Top five risks of using outdated technology. Retrieved from Meridian:  http://www.whymeridian.com/blog/top-5-risks-of-using-outdated-technology 

Moran, W. J. (2019). Hospital Fundraising Best Practices. Retrieved from The Moran Company:  https://morancompany.com/hospital-fundraising-best-practices/ 

Parand, A., Dopson, S., A. R., & Vincent, C. (2014). The role of hospital managers in quality and patient safety: a systematic review. BMJ Open.

Pohjola, T., Suhonen, M., Mattila, K., & Meretoja, R. (2016). The work done in healthcare projects . Journal of Nursing.

Ponemon Institute. (2013). The Economic and Productivity Impact of IT Security on Healthcare. Imprivata.

Studyspark

Study Document Study Document

Benefits And Advantages Of Learning Online At College Level

Pages: 4 (1313 words) Sources: 4 Document Type:Research Paper Document #:30385591

...Social responsibility Why Online Learning Works
Introduction
With the arrival of the Digital Age and the advent of distance learning, taking college level courses over the Internet has become a real possibility for today’s students seeking a higher education. But is it worth it? Does it provide the kind of quality education that learners need in order to excel in the real world? Or are their drawbacks to distance learning that outweigh the pros? This speech will go over the benefits and advantages of learning online at the college level while addressing some of the potential disadvantages that might make some hesitant to pursue distance learning as a viable option.
Why Learning Online is Useful for Adults
Adults tend to have busy schedules, which makes it hard for them to find the time to get to a traditional college for classes while making time for everything else that they have going on—whether……

References

References

Anderson, T. (Ed.). (2008). The theory and practice of online learning. Athabasca University Press.

Concannon, F., Flynn, A., & Campbell, M. (2005). What campus?based students think about the quality and benefits of e?learning. British journal of educational technology, 36(3), 501-512.

?enda?, S., & Odaba??, H. F. (2009). Effects of an online problem based learning course on content knowledge acquisition and critical thinking skills. Computers & Education, 53(1), 132-141.

Yang, Y. T. C., Newby, T. J., & Bill, R. L. (2005). Using Socratic questioning to promote critical thinking skills through asynchronous discussion forums in distance learning environments. The American Journal of Distance Education, 19(3), 163-181.

Studyspark

Study Document Study Document

Strategy For National Defense

Pages: 7 (2014 words) Sources: 7 Document Type:Essay Document #:59270793

… based on the Douhet model, which is based on the idea that inflicting severe pain on civilians can affect their morale and unravel social bias of resistance in order for citizens to pressure the government to vacate territorial ambitions.[footnoteRef:11] These attacks will be combined with destruction of ……

References

Bibliography

Davidson, P.S. “Statement of Admiral Philip S. Davidson, U.S. Navy Commander, U.S. Indo-Pacific Command Before the House Armed Services Committee on U.S. Indo-Pacific Command Posture.” United States Senate, March 27, 2019,  https://www.armed-services.senate.gov/imo/media/doc/Davidson_02-12-19.pdf 

Department of Defense. “Summary of the 2018 National Defense Strategy of the United States of America.” National Defense Strategy, 2018,  https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf 

Muller, K. “The Essence of Coercive Air Power: A Primer for Military Strategies.” Air University,  https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/mueller.pdf 

Pape, R.A. Bombing to Win: Air Power and Coercion in War, 1st ed. Ithaca, NY: Cornell University Press, 1996.

Tammen, R.L., Kugler, J. & Lemke, D. “Power Transition Theory.” International Relations, June 27, 2017, DOI: 10.1093/OBO/9780199743292-0038

The White House. “National Security Strategy of the United States of America.” The White House, December 2017, https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf

Withers, P. “Integrating Cyber with Air Power in the Second Century of the Royal Air Force.” Medium, March 4, 2019,  https://medium.com/raf-caps/integrating-cyber-with-air-power-in-the-second-century-of-the-royal-air-force-bca74b8d42ed 

 

Studyspark

Study Document Study Document

Jesse Imeson Criminal Behavior

Pages: 7 (2025 words) Sources: 8 Document Type:Research Paper Document #:27881804

… young adult. Upbringing and the nuclear family “have long been identified in criminology literature as a crucial factor in a child’s or adolescent’s social behavior,” (Bartol & Bartolp. 2016, p. 60). In fact, the string of events that occurred since his father’s suicide made for a precariously … p. 62). Upbringing and the nuclear family “have long been identified in criminology literature as a crucial factor in a child’s or adolescent’s social behavior,’ (Bartol & Bartolp. 2016, p. 60). Moreover, the mother’s behavior is even more important than that of the father when it comes … He was close with siblings and cousins even when he was arrested, too, showing that he does not fit the stereotype of an social loner (“LFP Archives: The hunt for, and truth about, spree killer Jesse Imeson,” 2018). However, his demeanor both before and after the arrest … cannot be considered a “natural……

References

References

Bartol, C. R., & Bartol, A, M. (2018). Criminal behavior: A psychological approach. Boston, MA: Pearson Learning Solutions.

“Jesse Imeson charged in death of Windsor man,” (2007). CTV News. Retrieved from:  https://www.ctvnews.ca/jesse-imeson-charged-in-death-of-windsor-man-1.251008 

Lessard, C. (2008). So, why did he do it? Grand Bend Strip. Retrieved from:  https://grandbendstrip.com/2008/11/so-why-did-he-do-it/ 

“LFP Archives: The hunt for, and truth about, spree killer Jesse Imeson,” (2018). The London Free Press. Retrieved from:  https://lfpress.com/news/local-news/lfp-archives-the-hunt-for-and-truth-about-spree-killer-jesse-imeson 

“Man who killed elderly couple and bartender has appeal rejected by Supreme Court,” (2019). CBC. Retrieved from:  https://www.cbc.ca/news/canada/london/man-who-killed-elderly-couple-and-bartender-has-appeal-rejected-by-supreme-court-1.5129542 

Mellor, L. (2013). Rampage. Toronto, Ontario: Dundurn

Paiva, M. (2019). Windsor murderer claims he was sexually abused. iHeart Radio. Retrieved from:  http://www.iheartradio.ca/purecountry/bc-north/windsor-murderer-claims-he-was-sexually-abused-1.9198384 

Perkel, C. (2018). Family of victims lash out as smirking killer gets life sentence. The Globe and Mail. Retrieved from:  https://www.theglobeandmail.com/news/national/family-of-victims-lash-out-as-smirking-killer-gets-life-sentence/article1350382/

Studyspark

Study Document Study Document

Counterterrorism Strategy For The Next U S Presidential Administration

Pages: 6 (1889 words) Sources: 6 Document Type:Term Paper Document #:70457523

...Social responsibility Introduction
One of the goals of the G. W. Bush Administration, which launched the War on Terrorism campaign, was to “end the state sponsorship of terrorism” (White House, 2003). The top goals of the Bush Administration, however, were to defeat Bin Laden and Al-Zarqawi, as well to identify terrorist organizations and demolish them. The first two goals have been accomplished. The latter is dependent upon eradicating state sponsorship of terrorism. Thus, as shall be seen in this strategy paper, ending the state sponsorship of terrorism should be the number one goal of this administration, as state sponsorship is the primary means by which terrorism continues to this day (Malzahn 2002).
Successes and Failures Since 2001
While the U.S. has been successful at defeating terrorists since 9/11, it has not done as well when it comes to defeating the idea of terrorism (Bipartisan Policy Center, 2017). Even though ISIS has been……

References

References

Bipartisan Policy Center. (2017). Defeating terrorists, not terrorism. Retrieved from  https://bipartisanpolicy.org/report/counterterrorism-policy-from-911-to-isis/ 

Englehardt, T. (2018). America’s war on terror. Retrieved from  https://www.thenation.com/article/americas-war-on-terror-has-cost-taxpayers-5-6-trillion/ 

Freeman, M. (2018). ISIS Is a US-Israeli Creation. Top Ten “Indications.” Retrieved from https://www.globalresearch.ca/isis-is-a-us-israeli-creation-top-ten-indications/5518627

Malzahn, S. M. (2002). State Sponsorship and Support of International Terrorism: Customary Norms of State Responsibility. Hastings Int'l & Comp. L. Rev., 26, 83.

Nordland, R. & Mashal, M. (2019). U.S. and Taliban Edge Toward Deal to End America’s Longest War. Retrieved from https://www.nytimes.com/2019/01/26/world/asia/afghanistan-taliban-peace-deal.html

White House. (2003). National strategy for combating terrorism. Retrieved from  https://georgewbush-whitehouse.archives.gov/news/releases/2003/02/20030214-7.html 

Studyspark

Study Document Study Document

Should High School Students Get Jobs

Pages: 1 (372 words) Sources: 2 Document Type:Essay Document #:45901948

… school are that it means one will have less time to spend on studies, reading assignments, and doing homework. If one factors in social time and the need to be with friends, the window of opportunity for actually focusing on school work in the after school hours ……

References

Works Cited

Hintze, Renae. “Should My Teen Work During High School?” Student Tutor,  https://student-tutor.com/blog/should-my-teen-work-during-high-school/ 

Walden University. “Should Students Hold Jobs While in High School?” Walden University, https://www.waldenu.edu/online-doctoral-programs/doctor-of-education/resource/pros-and-cons-of-working-a-job-in-high-school

 

Join thousands of other students and

"spark your studies".