Systems Analysis Essays (Examples)

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber … out through various exploitation methods or techniques on individual computers, networks or the Internet. It incorporates intentional activities to infiltrate or penetrate computer systems/networks used by a rival to obtain information within or transmitted through these networks or systems.[footnoteRef:3] Cyber espionage is used by different nations across the globe including the United States, China and Russia despite concerns regarding its legitimacy and … Cyber Espionage
Banks (2017) define cyber espionage as intentional activities used by an adversary to collect information resident on or transmitted through computer systems or networks.[footnoteRef:4] Cyber espionage has become common in the modern international relations framework due……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384


3.2 Data Collection Sources & Selection Plan 12
3.3 Proposed Interview Questions 13
3.4 Sample Population 13
3.5 Ethical Considerations 14
3.6 Data analysis Plan & Rationale 15
4 Contributions to Theory or Practice and their Significance 16
5 Ethical Issues and Methods to Address 17
6 … in the contemporary setting, companies and entrepreneurs in the accounting sector are no longer constantly installing software apps on their computers or computer systems situated within the premises to operate their businesses. Rather, they are opting for the cloud. Cloud computing is facilitating substantial agility for companies. … a significant topic in the accounting industry, owing to its ease in the level of flexibility, scalability, and simplicity of gaining access to systems across the world. Whereas customary IT structures can preclude an accounting organization’s capability of conducting business operations productively, cloud computing can facilitate a … party. Moreover, no financial incentives……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

CFOs Big Data Opportunities In Firms

Pages: 7 (2057 words) Sources: 6 Document Type:Research Paper Document #:26742092

… processes. The growth of Big Data has necessitated the development of computer algorithms and tools that can analyze the data at scale. Good analysis and interpretation of the data allow organizations to ‘co-create’ solutions alongside their target users and create new value that is highly tailored to … likely to see significant changes in the coming years. Nonetheless, it is notable that organizations are still facing some challenges in capturing, storage, analysis, and interpretation of huge volumes of data (Chen, Chiang & Storey, 2012).
Big Data Opportunities
Traditional data management tools and models have posed … acting in bad faith such as hackers have more opportunities to gain access to company data. The traditional models do not have the systems required to secure digital assets as hackers become more advanced by the day. Therefore, this security problem should be overcome as soon as … This data phenomenon is known……

References

References

Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and analytics: From big data to big impact. MIS quarterly, 36(4).

Jin, X., Wah, B. W., Cheng, X., & Wang, Y. (2015). Significance and challenges of big data research. Big Data Research, 2(2), 59-64.

Joshi, N. (2018). How Big Data Can Transform the Finance Industry. Retrieved October 7, 2019, from  https://www.bbntimes.com/en/technology/big-data-is-transforming-the-finance-industry .

Nath, T. I. (2019). How Big Data Has Changed Finance. Retrieved October 7, 2019, from  https://www.investopedia.com/articles/active-trading/040915/how-big-data-has-changed-finance.asp .

Turner, D., Schroeck, M., & Shockley, R. (2013). Analytics: The real-world use of big data in financial services. IBM Global Business Services, 27.

Yin, S., & Kaynak, O. (2015). Big data for modern industry: challenges and trends [point of view]. Proceedings of the IEEE, 103(2), 143-146.

Zhou, K., Fu, C., & Yang, S. (2016). Big data driven smart energy management: From big data to big insights. Renewable and Sustainable Energy Reviews, 56, 215-225.

Studyspark

Study Document Study Document

Application Of Quality And Safety Concepts

Pages: 11 (3179 words) Sources: 8 Document Type:Case Study Document #:72132391

… above challenges, mistakes and inefficiencies persist within the healthcare domain owing to the low-key technology utilized by the sector for management. Most healthcare systems across the globe continue to stick to a pen-and-paper system, including those in developed nations such as America. This is an obstacle on …
Description of the situation from a theoretical perspective
HIT has been conceptualized to cover information technology articles and associated nomological networks that encompass systems promoting the healthcare goal, including CDSS (clinical decision support systems), EHR/ EMR (electronic health/ medical records), CPOE (computerized physician order entry), PCHR (personally-controlled health record which can be accessed by patients as well … record which can be accessed by patients as well as their doctors in different ways), (Halamka, Mandl, & Tang, 2008) admin support functional systems, and other information management IT systems. HIT may be distinguished from general IT on account of its particular focus……

References

Bibliography

Alotaibi, Y. K., & Federico, F. (2017). The impact of health information technology on patient safety. Saudi Med J, 38(12), 1173–1180.

Amit, M. (2019, January 28). 5 Problems Which Healthcare Technology Can Solve for a Healthier World. Retrieved from Net Solutions:  https://www.netsolutions.com/insights/5-healthcare-problems-which-digital-technologies-can-solve-for-a-fit-and-healthy-world/ 

DeSanctis, G., & Poole, M. S. (1994). Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory. Organization Science, 5(2), 121-147.

Feldman, S. S., Buchalter, S., & Hayes, L. W. (2018). Health Information Technology in Healthcare Quality and Patient Safety: Literature Review. JMIR Med Inform, 6(2).

Halamka, J., Mandl, K., & Tang, P. (2008). Early Experiences with Personal Health Records. Journal of the American Medical Informatics Association, 15(1), 1-7.

IOM. (1999). To Err is Human: Building a Safer Health System. National Academy of Sciences.

Singh, H., & Sittig, D. (2016). Measuring and improving patient safety through health information technology: The Health IT Safety Framework. BMJ Quality & Safety, 25, 226-232.

Weigel, F., Hall, D. J., & Landrum, W. H. (2009). Human/Technology Adaptation Fit Theory for Healthcare. SAIS 2009 Proceedings.

Studyspark

Study Document Study Document

Supply Chain Management In Canada

Pages: 11 (3384 words) Sources: 2 Document Type:Case Study Document #:46307784

… address both the long and short term issues presented in the case. The report is organized in the following sections: Issues Identification, Environmental analysis, Root Cause analysis, Alternatives and Options, Recommendations, Implementation, and Monitor and Control. It covers the strategy and market position of the company, the supply chain decisions … strategy and market position of the company, the supply chain decisions that have to be made, evaluation criteria, possible alternatives, quantitative and non-quantitative analysis, how the best strategy can be implemented, and how the company be know whether the strategy has been successful.
The main points of … furniture like that which McCray can produce using its new CAD software. It will mean, however, reducing the footprint of Krebbler’s.
2. Environmental analysis reveals that margins are being squeezed by the low costs of competition from China, the customer base has shifted to bulk buyers from … income statement……

References

Bibliography

Channick, Robert. “Fallout from China Trade War,” Chicago Tribune, 2019.  https://www.chicagotribune.com/business/ct-biz-china-tariffs-illinois-impact-20190510-story.html 

Krebbler Furniture Case Study, Supply Chain Management Association. Digital File.

Studyspark

Study Document Study Document

Fiscal Health Of Public Administration

Pages: 8 (2386 words) Sources: 4 Document Type:response paper Document #:45658914

… the ability of individuals in public administration engage in fraud or deny people services that are their rightful due.
Third, using virtual learning systems can promote the application of free education and training for people in the community so that they can obtain skilled jobs for themselves. … will be useful in a trade, such as Information Technology, where a lot of jobs have been appearing in recent years.
Fourth, telehealth systems can provide virtual care to patients who receive medical benefits from the government but cannot drive long distances or overcome obstacles related to … government but cannot drive long distances or overcome obstacles related to time and distance to receive check-ups and other types of care. Telehealth systems allow doctors and nurses to check up on patients without patients have to leave their homes. Doctors and patients connect over the Internet … on. It can improve the……

References

RReferences

Abiad, A. & Khatiwada, S. (2019). 5 ways technology is improving governance, public service delivery in developing Asia. Retrieved from  https://blogs.adb.org/blog/5-ways-technology-improving-governance-public-service-delivery-developing-asia 

Florida Tech. (2019). Five global trends in public administration. Retrieved from  https://www.fit.edu/your-college-decision/trends-in-public-administration/ 

McDonald, B. (2017). Measuring the fiscal health of municipalities. Retrieved from  https://www.lincolninst.edu/sites/default/files/pubfiles/mcdonald_wp17bm1.pdf 

VCU. (2019). Public personnel administration. Retrieved from  https://commed.vcu.edu/IntroPH/Management/management/personnel.html 

Studyspark

Study Document Study Document

Evolution Of Forensic Science

Pages: 4 (1241 words) Sources: 7 Document Type:Research Paper Document #:57032460

… (Gaensslen & Larsen, 2019). Forensic science steadily evolved, in conjunctions with advancements in scientific instruments and the methods used for data collection and analysis. DNA evidence and analysis has made a huge impact on forensic science. Current concerns in forensic science include the need for increased reliability and validity of forensic … one of the most important issues in criminal justice.
Scientific Methods in Forensic Science
Forensic scientific methods are varied and complex,“ranging from DNA analysis to chemical composition to pattern recognition,” (Bell, Sah, Albright, et al., 2018, p. 4541). Big data has also contributed tremendously to the collation … recognition,” (Bell, Sah, Albright, et al., 2018, p. 4541). Big data has also contributed tremendously to the collation and methods used in forensic analysis. Interestingly, the methods that had been used in forensic science until relatively recently had yet to be vetted by the scientific community. Instead, … be……

References

References

Ballantyne, K. N., Edmond, G., & Found, B. (2017). Peer review in forensic science. Forensic Science International, 277, 66–76.  https://doi.org/10.1016/j.forsciint.2017.05.020 

Bell, S., Sah, S., Albright, T. D., Gates, S. J., Jr, Denton, M. B., & Casadevall, A. (2018). A call for more science in forensic science. Proceedings of the National Academy of Sciences of The United States of America, 115(18), 4541–4544.  https://doi.org//10.1073/pnas.1712161115 

Gaensslen, R. E., & Larsen, K. (2019). Introductory forensic science (2nd ed.). Retrieved from  http://content.ashford.edu/ 

Kaplan , A. B., & Puracal, J. C. (2018). It’s not a match: Why the law can’t let go of junk science. Albany Law Review, 81(3), 895–939. Retrieved from  http://www.albanylawreview.org/Pages/home.aspx 

National Research Council 2009. Strengthening Forensic Science in the United States: A Path Forward. Washington, DC: The National Academies Press.  https://doi.org/10.17226/12589 .

Redmayne, M., Roberts, P., Aitken, C., & Jackson, G. (2011). Forensic science evidence in question. Criminal Law Review 5, 347–356 Retrieved from https://www.researchgate.net/profile/Graham_Jackson6/publication/265654577_Forensic_Science_Evidence_in_Question/links/55006b8d0cf2aee14b548b62/Forensic-Science-Evidence-in-Question.pdf

Shelton, D. E. (2008, March). The ‘CSI effect:’ Does it really exist?. NIJ Journal, 259. Retrieved from  https://www.nij.gov/journals/259/pages/csi-effect.aspx#author 

Studyspark

Study Document Study Document

Depression Among Older Immigrant African Women In Metro West Massachusetts

Pages: 12 (3684 words) Sources: 20 Document Type:Capstone Project Document #:21927346

...Systems analysis Prevalence of Depression in Massachusetts
Prospectus: Depression Among Older Immigrant African Women in Metro West Massachusetts
Abstract
In West Massachusetts United States, the most common health disorders are anxiety and depression. These health disorders are prevalent in elderly immigrant women aged between 50 and 79 years (Agbemenu, 2016). Despite a variety of efficacious interventions for depression and anxiety, elderly immigrant women experience mental health care disparities in their access to mental health services and the quality of treatment they receive (Sánchez et al., 2014). Researchers have determined that African American heterogeneity influences access to depression and anxiety treatment. In addition, African Americans are becoming an increasingly visible minority within the United States, especially in West Massachusetts. The intention in this current study is to understand the causes and prevalence of depression among older immigrant African American women in Metro West Massachusetts as well as how the older immigrants cope with……

References

References

Agbemenu, K. (2016). Acculturation and Health Behaviors of African Immigrants Living in the United States: An Integrative Review. ABNF Journal, 27(3).

Alegría, M., Álvarez, K., & DiMarzio, K. (2017). Immigration and mental health. Current epidemiology reports, 4(2), 145-155.

Baldwin-Clark, T., Ofahengaue Vakalahi, H. F., & Anderson, B. (2016). What about African American older women and depressive symptoms? Educational Gerontology, 42(5), 310-320.

Cassel, J. (1995). The contribution of the social environment to host resistance: the fourth wade Hampton frost lecture. American journal of epidemiology, 141(9), 798-814.

Cobb, S. (1976). Social support as a moderator of life stress. Psychosomatic medicine.

Delara, M. (2016). Social determinants of immigrant women’s mental health. Advances in Public Health, 2016.

Dow, H. D. (2011). An overview of stressors faced by immigrants and refugees: A guide for mental health practitioners. Home Health Care Management & Practice, 23(3), 210-217.

Emadpoor, L., Lavasani, M. G., & Shahcheraghi, S. M. (2016). Relationship between perceived social support and psychological well-being among students based on mediating role of academic motivation. International Journal of Mental Health and Addiction, 14(3), 284-290.

Studyspark

Study Document Study Document

How Millon S Personality Theory Can Be Understood

Pages: 7 (2596 words) Sources: 12 Document Type:Essay Document #:95073083

… The primary personality designs established by Millon had been all variants from the Passive, Active along with Pleasure-Pain proportions. Over his years of analysis, Millon has produced a powerful theoretical design composed of 13 personality designs. One of the biggest benefits of Millon's theoretical design is the … Character is highlighting heritable as well as neurobiologically centered variations in behavioral conditioning, and personality characteristics highlighting each neurobiological as well as sociocultural systems of semantic and personal-conscious understanding. These areas are hypothesized to have interaction like a nonlinear powerful system controlling the creation of human psychological … tend to be pain-pleasure, passive-active, along with self-other. As advised by Strack, Millon's personality disorder model is maybe the most regularly used personality systems of this particular era. Millon has become a notable theorist within the personality disorder theorization. His specific hypothetical design, nevertheless, is one of ……

References

References

Pincus, A. L., & Krueger, R. F. (2015). Theodore Millon\\'s contributions to conceptualizing personality disorders. Journal of personality assessment, 97(6), 537-540.

Millon, T., Millon, C. M., Meagher, S. E., Grossman, S. D., & Ramnath, R. (2004). Personality disorders in modern life. John Wiley & Sons.

Rossi, G., & Derksen, J. (2015). International adaptations of the Millon Clinical Multiaxial Inventory: Construct validity and clinical applications. Journal of personality assessment, 97(6), 572-590.

O’Connor, B. P., & Dyce, J. A. (1998). A test of models of personality disorder configuration. Journal of Abnormal Psychology, 107(1), 3.

Lecic-Tosevski, D., Gavrilovic, J., Knezevic, G., & Priebe, S. (2003). Personality factors and posttraumatic stress: Associations in civilians one year after air attacks. Journal of Personality Disorders, 17, 537–549.

Strack, S., & Millon, T. (2007). Contributions to the dimensional assessment of personality disorders using Millon\\'s model and the Millon Clinical Multiaxial Inventory (MCMI–III). Journal of Personality Assessment, 89(1), 56-69.

Bajraktarov, S., Gudeva-Nikovska, D., Manuševa, N., & Arsova, S. (2017). Personality Characteristics as Predictive Factors for the Occurrence of Depressive Disorder. Open Access Macedonian Journal of Medical Sciences, 5(1), 48–53.  https://doi.org/10.3889/oamjms.2017.022 

Framingham, J. (2018). Millon Clinical Multiaxial Inventory (MCMI-III). Psych Central.

Join thousands of other students and

"spark your studies".