Social Security Essays (Examples)

Studyspark

Study Document Study Document

The FBI Counterproliferation And Weapons Of Mass Destruction

Pages: 6 (1839 words) Sources: 8 Document Type:Research Paper Document #:33590628

… second such directive the Administration had issued. The Quadrennial Defense Review in 2010 emphasized on how WMD’s proliferation was a threat to global security. In April of the same year, the Administration unclassified the Nuclear Posture Review for the first time and it was released alongside the … scenarios where the spread of such diseases is organic and not artificially created. These attacks have the potential to cause a lot of social and economic disruption and lead to the infection of humans…[break]…domestic and international security. Going forward, there is need for a more collaborative effort between all concerned agencies that stresses on consistency in both policy and actions. … by non-state actors (Jennings 2013, 6).
Methods of Evaluation
There is need to put in place frameworks that can integrate domestic and international security efforts more effectively. To this end, there will be a policy analysis to identify the alternatives……

References

References

Busch, Nathan, and Joyner, Daniel (ed). 2009. “Introduction: Nonproliferation at a Crossroads.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Athens, GA: The University of Georgia Press.

Reiss, Mitchell. 2009. “Foreword.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Edited by Nathan Busch, and Daniel Joyner. Athens, GA: The University of Georgia Press.

Cameron, Gavin, Pate, Jason & Vogel, Kathleen. (2001). “Planting Fear: How Real is the Threat of Agricultural Terrorism?” Bulletin of Atomic Scientists, 57(5), 38-44.

Jennings, Elain. 2013. U. S. proliferation policy and the campaign against transnational terror: Linking the U.S. non-proliferation regime to homeland security efforts. Master’s Thesis. Naval Postgraduate School.

Levi, Michael. 2009. “On Nuclear Terrorism.” Cambridge, MA: Cambridge University Press.

Mauroni, Albert. J. 2010. “A Counter-WMD Strategy for the Future.” Parameters, 58-73.

Ogilvie-White, Tanya. 2008. “Facilitating Implementation of Resolution 1540 in South- East Asia, and the South Pacific.” In Implementing Resolution 1540: The Role of Regional Organizations. Edited by Lawrence Scheinman. New York: United Nations Institute for Disarmament Research.

Pilat Joseph F. 2009. “Dealing with Proliferation and Terrorism.” In Combating Weapons of Mass Destruction: The Future of International Nonproliferation Policy, edited by Nathan E. Busch and Daniel H. Joyner. Athens, GA: University of Georgia Press.

Studyspark

Study Document Study Document

Evaluating The Ideology Of The IRA

Pages: 9 (2717 words) Sources: 15 Document Type:Essay Document #:29993032

… behind the scenes with the British state throughout the period known as the Troubles (1969-98) (O’Brien, 1999; Tonge, 2002).
The IRA struggled with security and with gaining control of any territory. Thus, whatever impact or effect it achieved through its use of snipers, bombing campaigns and guerilla … same sense as the Irish Republic.
The Provisional IRA targeted the UK’s economic infrastructure within Northern Ireland as well as politicians and the social order, too. The British forces cracked down hard on what it viewed as unlawful dissent, and in 1972 Bloody Sunday occurred when the … intelligence employed dubious methods uncovered during the later Stevens Enquiry. The Stevens report consisted of “three Enquiries into allegations of collusion between the security forces and loyalist paramilitaries in Northern Ireland” and it highlighted “the willful failure to keep records, the absence of accountability, the withholding of ……

References

References

Bamford, B. (2005). The Role and Effectiveness of Intelligence in Northern Ireland. Intelligence and National Security, 20(4), 581-607.

Branch, S., Shallcross, L., Barker, M., Ramsay, S., & Murray, J. P. (2018). Theoretical Frameworks That Have Explained Workplace Bullying: Retracing Contributions Across the Decades. Concepts, Approaches and Methods, 1-44.

Coogan, T. P. (2002). The IRA. New York: Palgrave.

Hilton, J. L., & Von Hippel, W. (1996). Stereotypes. Annual review of psychology, 47(1), 237-271.

IRA Green Book. (1977). Accessed 14 Dec 2015 from https://tensmiths.files.wordpress.com/2012/08/15914572-ira-green-book-volumes-1-and-2.pdf

Lumen. (2019). Theoretical perspectives on deviance. Retrieved from https://courses.lumenlearning.com/sociology/chapter/theoretical-perspectives-on-deviance/

Maloney, E. (2010). Voices from the Grave: Two Men’s War in Ireland. NY: Faber, Faber.

McLeod, S. (2008) Social Identity Theory. Simply Psychology. Retrieved from http://www.simplypsychology.org/social-identity-theory.html

Studyspark

Study Document Study Document

Counterintelligence

Pages: 12 (3490 words) Sources: 6 Document Type:question answer Document #:11133529

… economic threats.
Preventing and detecting insider threats is one of the core aspects of the ONCIX strategy. As a new premier counterintelligence and security agency in the U.S. government, ONCIX needs a strong understanding of how to identify and deter insider threats. According to its strategy, “the … and of monitoring for the sake and safety of the operation.
Question 2: Generate a plan which embeds effective counter-intelligence procedures to enhance security in one of the areas of recurring weakness: Inadequate Vetting; Employment Disgruntlement; Apathy / Reticence towards spendthrifts; Tolerance of alcoholics.
Effective counter-intelligence procedures … spendthrifts; Tolerance of alcoholics.
Effective counter-intelligence procedures include taking the offense and being proactive rather than reactive. Thus, the best way to enhance security in one of the areas of recurring weakness, such as tolerance of alcoholics, is to create an organizational culture that is prohibitive of … on both sides of the……

References

Bibliography

Counter intelligence for National Security, CIA, 1993. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol2no4/html/v02i4a10p_0001.htm

Johnston, David and James Risen, “U.S.had evidence of espionage,” New York Times, 2001. https://www.nytimes.com/2001/02/23/us/us-had-evidence-of-espionage-but-fbi-failed-to-inspect-itself.html

National Counterintelligence Strategy of the United States of America 2016 (Strategy).  https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf 

Prunckun, Hank. 2012. Counterintelligence Theory and Practice, Lanham: Rowman&Littlefield Publishers Inc. Read the following: Chapters 8 to 14, pages 131 to 217. Appendices A to D, pages 219 to 231.

Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September 17). National Security Archive. Accessed January 19, 2017.  http://nsarchive.gwu.edu/NSAEBB/NSAEBB230/ .

Van Cleave, Michelle. “Strategic Counterintelligence: What Is It and What Should We Do About It ?” 2007. CIA Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html

Studyspark

Study Document Study Document

Angleton S Counterintelligence Program And What Went Wrong

Pages: 9 (2657 words) Sources: 8 Document Type:Essay Document #:36485484

… his position as head of counterintelligence at the CIA, Colby inherited a Staff that was by that time a full-grown adult. Facing political, social, and economic pressures, the CIA was compelled to reorganize, and as the Church Committee reported, it was “an end of an era in … program were “how best to protect the United States, including the proper degree of compartmentation of CI information, methods of operation, approaches to security, research priorities, extent of liaison cooperation, and emphasis on deception activities” (Church Committee 1976, 172). One dominant issue the Senate uncovered was the … in the FBI meant that the bulk of the work was coordinated by the CIA.
William Evanina, director of the National Counterintelligence and security Center, has gone so far as to warn that the challenge of counterintelligence is no longer one the government can address on its … can address on its own,……

References

Reference List

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Bartos, C. and P. Wehr. 2002. Using conflict theory. UK: University of Cambridge.

Bellaby, Ross. "What's the Harm? The Ethics of Intelligence Collection." Intelligence and National Security 27, no. 1 (2012): 93-117.

Church Committee. “Final report of the Select committee to study governmental operations With respect to Intelligence activities United states senate Together with Additional, supplemental, and separate Views.” Intelligence.senate.gov, 1976. https://www.intelligence.senate.gov/sites/default/files/94755_I.pdf

Coyne, John, Peter Bell, and Shannon Merrington. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2, no. 10 (2013): 27-37.

Erskine, Toni. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19, no. 2 (2004): 359-381.

Nakashima, Ellen. “Top counterintelligence official challenges the private sector to step up defenses against foreign spying.” Washington Post, 2020.  https://www.washingtonpost.com/national-security/top-counterintelligence-official-challenges-the-private-sector-to-step-up-defenses-against-foreign-spying/2020/02/10/d842d83c-4c15-11ea-9b5c-eac5b16dafaa_story.html 

Pfaff, T., & Tiel, J. R. (2004). The ethics of espionage. Journal of Military Ethics, 3(1), 1-15.

Study Document Study Document

The Transformation Of The US Into Oceania

Pages: 9 (2807 words) Sources: 7 Document Type:Essay Document #:33502677

… commercial or other gain. This trend became even more accelerated following the terrorist attacks of September 11, 2001 when U.S. policymakers made national security a higher priority than personal privacy. In this regard, Cantor (2006) emphasizes that, “Privacy remains a very fluid concept that changes and evolves … changes and evolves as societal beliefs shift. [Following] that terrorist attack, individual privacy rights have been limited in the name of protecting the security of the country and reducing the risks of further attacks” (p. 50).
Not surprisingly, many of these privacy-limiting initiatives such as the USA … since these laws allow the government to actively monitor U.S. citizens in various ways (Cantor, 2006). Moreover, the disclosure that the U.S. National security Agency has wiretapped U.S. citizens outside of the normal channels that are required for these types of surveillance efforts have raised additional questions … where technological innovations have introduced……

References

References

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Cantor, M. D. (2006, Summer). No information about me without me: Technology, privacy, and home monitoring. Generations, 30(2), 49-55.

Ethical issues facing businesses. (2020). Florida Tech. Retrieved from https://www.floridatech online.com/blog/business/the-5-biggest-ethical-issues-facing-businesses/.

Haslag, C. (2018, Fall). Technology or privacy: Should you really have to choose only one? Missouri Law Review, 83(4), 1027-1033.

Karn, R. (2019). The biggest threat to data security? Humans, of course. The Privacy Advisor. Retrieved from  https://iapp.org/news/a/the-biggest-threat-to-data-security-humans-of-course/ .

Sharma, P. (2017, June). Organizational culture as a predictor of job satisfaction: The role of age and gender. Journal of Contemporary Management Issues, 22(1), 35-40.

Taslitz, A. E. (2009, Spring). The Fourth Amendment in the twenty-first century: Technology, privacy, and human emotions. Law and Contemporary Problems, 65(2), 125-131.

Studyspark

Study Document Study Document

Strategy For National Defense

Pages: 7 (2014 words) Sources: 7 Document Type:Essay Document #:59270793

Part I – Regional security Issue within the Indo-Asia-Pacific Region
The National security Strategy (NSS) focuses on promoting the security of the United States on the premise that a safe environment is critical toward enhancing the prosperity of the nation. This strategy goes … and potential opportunities across all regions. Such strategies become the premise of International Relations and U.S. foreign policy. [1: The White House, “National security Strategy of the United States of America”, The White House, December 2017, https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf]
Issue in Indo-Asia-Pacific Region
Indo-Asia-Pacific region is one of the … The White House, December 2017, https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf]
Issue in Indo-Asia-Pacific Region
Indo-Asia-Pacific region is one of the regions targeted by the United States National security Strategy. It extends from the west coast of India to the United States’ western shores and represent one of the most economically vibrant … visions of world order, dates back to the earliest days……

References

Bibliography

Davidson, P.S. “Statement of Admiral Philip S. Davidson, U.S. Navy Commander, U.S. Indo-Pacific Command Before the House Armed Services Committee on U.S. Indo-Pacific Command Posture.” United States Senate, March 27, 2019,  https://www.armed-services.senate.gov/imo/media/doc/Davidson_02-12-19.pdf 

Department of Defense. “Summary of the 2018 National Defense Strategy of the United States of America.” National Defense Strategy, 2018,  https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf 

Muller, K. “The Essence of Coercive Air Power: A Primer for Military Strategies.” Air University,  https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/mueller.pdf 

Pape, R.A. Bombing to Win: Air Power and Coercion in War, 1st ed. Ithaca, NY: Cornell University Press, 1996.

Tammen, R.L., Kugler, J. & Lemke, D. “Power Transition Theory.” International Relations, June 27, 2017, DOI: 10.1093/OBO/9780199743292-0038

The White House. “National Security Strategy of the United States of America.” The White House, December 2017, https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf

Withers, P. “Integrating Cyber with Air Power in the Second Century of the Royal Air Force.” Medium, March 4, 2019,  https://medium.com/raf-caps/integrating-cyber-with-air-power-in-the-second-century-of-the-royal-air-force-bca74b8d42ed 

 

Studyspark

Study Document Study Document

Formulating An Effective National Response To Ebola In Nigeria

Pages: 17 (5038 words) Sources: 20 Document Type:Research Paper Document #:83371879

...Social security Abstract
Today, there are dozens of deadly diseases in the world, but the Ebola virus disease (alternatively “EVD” or “Ebola”) is among the most virulent and lethal. Although intensive research is underway, there is no cure currently available for Ebola and the death toll attributable to this disease continues to increase. To date, there have been nearly 30,000 cases of Ebola infections that caused more than 11,000 deaths, primarily in West Africa, but the disease has the potential to spread worldwide unless first responders, emergency management managers and the health care community take aggressive steps to identify infections and contain outbreaks. The main purpose of this study is to provide a systematic and critical review of the relevant juried, scholarly and governmental literature about the Ebola virus disease to create an awareness manual that is targeted at educating Nigerian citizens concerning this disease. A secondary purpose of this study is……

References

References

Allam, M. F. (2014, September). Ebola hemorrhagic fever: Case fatality rate 90%? Central European Journal of Public Health 22(3), 207-210.

Allam, M. F. & Vonka, V. (2015, March). Ebola virus disease: Temperature checks for travelers? Central European Journal of Public Health, 23(1), 84.

Brand, J. E. & Stela, D. (2014, October). Ebola is here: Knowledge, identification, and appropriate infection control are key. American Nurse Today, 9(10), 37-39.

Brown, G. (2015, Winter). Ebola in America: An epidemic or a pandemic? ABNF Journal, 26(1), 3-5.

Ebola. (2019). Doctors without Borders. Retrieved from https://www.doctorswithout borders.org/what-we-do/medical-issues/ebola.

Ebola outbreak. (2019). U.S. Centers for Disease Control and Prevention. Retrieved from  https://www.cdc.gov/vhf/ebola/history/2014-2016-outbreak/index.html .

Ebola virus disease. (2019). U.S. Centers for Disease Control and Prevention. Retrieved from  https://www.cdc.gov/vhf/ebola/index.html .

Hancock, M. (2019, September). After Ebola. African Business, 422, 56-58.

Studyspark

Study Document Study Document

Intelligence Oversight Ethics

Pages: 11 (3311 words) Sources: 15 Document Type:Research Paper Document #:23829007

… read each others’ mail. Idealism aside, since antiquity virtually all major powers have maintained intelligence services for the basic purpose of ensuring their security and existence” (79). In short, Stimson’s point was that government service and security should be provided within an ethical framework, which means the government should not be in the business of spying on citizens or of … 1920s when Stimson made those remarks. Just in the past two decades the nation has undergone a serious transformation into more of a security state than was ever thought possible. 9/11 was the main impetus for this transformation, but the populace was not as aware of the … that privacy has served as the underlying foundation of all ethical guidelines related to intelligence oversight is that the very essence of information security is rooted in the concept of keeping information out of the hands of people who should……

References

References

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Brown, William F., and Americo R. Cinquegrana. \\\\\\\\\\\\"Warrantless Physical Searches for Foreign Intelligence Purposes: Executive Order 12,333 and the Fourth Amendment.\\\\\\\\\\\\" Cath. UL Rev. 35 (1985): 97.

Cantarella, Michele. \\\\\\\\\\\\"Intelligence ethics in the digital age.\\\\\\\\\\\\" (2016).

Congressional Research Service, “CIA Ethics Education: Background and Perspectives” (2018).

Ferrari, Rachel. \\\\\\\\\\\\"Moral Relativism and Dangerous Ethical Dilemmas in the US Intelligence Community.\\\\\\\\\\\\" (2018).

Ford, Christopher M. \\\\\\\\\\\\"Intelligence Demands in a Democratic State: Congressional Intelligence Oversight.\\\\\\\\\\\\" Tul. L. Rev. 81 (2006): 721.

Goldman, Jan. \\\\\\\\\\\\"Teaching About Intelligjence and Ethics.\\\\\\\\\\\\" Journal of US Intelligence Studies 20, no. 2 (2013): 79.

Hayes, Jonathan. \\\\\\\\\\\\"The Cinema of Oliver Stone: Art, Authorship and Activism by Ian

Studyspark

Study Document Study Document

Theory Practice Of Business Psychology In Johnson & Johnson Company

Pages: 12 (3695 words) Sources: 10 Document Type:Research Paper Document #:41420615

… established that human behavior is impacted by either the satisfaction factor or the dissatisfaction factor. He designated hygiene factors to be sources of social dissatisfaction, and on the other hand, motivator factors to be sources of motivation (Pardee, 1990; Herzberg, Mausner, & Snyderman, 1959).
Herzberg’s Two-Factor Principles … Rees, & Rumbles, 2011)
Hygiene factors consist of salary, remuneration, wages, and work benefits, working conditions, company policies, work supervision, and also job security. These are concerning the workplace context, which is indicative of a person’s workplace setting, and they are categorized as extrinsic factors. Imperatively, these ……

References

References

Asim, M., 2013. Impact of Motivation on Employee Performance with effect of training: Specific to Education Sector of Pakistan. International Journal of Scientific and Research Publications, 3(9), 1-9.

Heneman, H. G., & Schwab, D. P., 1972. Evaluation of research on expectancy theory predictions of employee performance. Psychological Bulletin, 78(1), 1.

Herzberg, F., 1987. One More Time: How Do You Motivate Employees? Harvard Business Review, 65, 5.

Herzberg, F., Mausner, B. & Snyderman, B. 1959. The motivation to work. New York. John Wiley.

Hilgert, R. L., Leonard, E. C., 2001. Supervision: Concepts and practices of management. New York: South-Western College Publication.

Johnson & Johnson., 2020. Wellness 360: 9 Innovative Johnson & Johnson Employee Benefits for Mind, Body, and Budget. Retrieved 25 February 2020 from  https://www.jnj.com/health-and-wellness/innovative-employee-benefits-and-wellness-programs-from-johnson-johnson 

Johnson & Johnson., 2020. Careers: Healthiest Finances. Retrieved 25 February 2020 from  https://www.careers.jnj.com/employee-benefits/financial-benefits .

Johnson & Johnson. , 2018. 2018 Health for Humanity Report: Creating Unique Career Opportunities. Retrieved 25 February 2020 from https://healthforhumanityreport.jnj.com/our-people/creating-unique-career-opportunities

Join thousands of other students and

"spark your studies".