Systems Theory Essays (Examples)

Studyspark

Study Document Study Document

Intelligence Oversight Ethics

Pages: 11 (3311 words) Sources: 15 Document Type:Research Paper Document #:23829007

… be wholly determined by moral objectivists, subjectivists or nihilists, which gives support to the argument by Bailey and Galich (2012) that multiple ethical systems are likely to be needed for each different intelligence agency. There are many points among the three ethical perspectives that must be considered ……

References

References

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Brown, William F., and Americo R. Cinquegrana. \\\\\\\\\\\\"Warrantless Physical Searches for Foreign Intelligence Purposes: Executive Order 12,333 and the Fourth Amendment.\\\\\\\\\\\\" Cath. UL Rev. 35 (1985): 97.

Cantarella, Michele. \\\\\\\\\\\\"Intelligence ethics in the digital age.\\\\\\\\\\\\" (2016).

Congressional Research Service, “CIA Ethics Education: Background and Perspectives” (2018).

Ferrari, Rachel. \\\\\\\\\\\\"Moral Relativism and Dangerous Ethical Dilemmas in the US Intelligence Community.\\\\\\\\\\\\" (2018).

Ford, Christopher M. \\\\\\\\\\\\"Intelligence Demands in a Democratic State: Congressional Intelligence Oversight.\\\\\\\\\\\\" Tul. L. Rev. 81 (2006): 721.

Goldman, Jan. \\\\\\\\\\\\"Teaching About Intelligjence and Ethics.\\\\\\\\\\\\" Journal of US Intelligence Studies 20, no. 2 (2013): 79.

Hayes, Jonathan. \\\\\\\\\\\\"The Cinema of Oliver Stone: Art, Authorship and Activism by Ian

Studyspark

Study Document Study Document

Application Of Quality And Safety Concepts

Pages: 11 (3179 words) Sources: 8 Document Type:Case Study Document #:72132391

… above challenges, mistakes and inefficiencies persist within the healthcare domain owing to the low-key technology utilized by the sector for management. Most healthcare systems across the globe continue to stick to a pen-and-paper system, including those in developed nations such as America. This is an obstacle on …
Description of the situation from a theoretical perspective
HIT has been conceptualized to cover information technology articles and associated nomological networks that encompass systems promoting the healthcare goal, including CDSS (clinical decision support systems), EHR/ EMR (electronic health/ medical records), CPOE (computerized physician order entry), PCHR (personally-controlled health record which can be accessed by patients as well … record which can be accessed by patients as well as their doctors in different ways), (Halamka, Mandl, & Tang, 2008) admin support functional systems, and other information management IT systems. HIT may be distinguished from general IT on account of its particular focus……

References

Bibliography

Alotaibi, Y. K., & Federico, F. (2017). The impact of health information technology on patient safety. Saudi Med J, 38(12), 1173–1180.

Amit, M. (2019, January 28). 5 Problems Which Healthcare Technology Can Solve for a Healthier World. Retrieved from Net Solutions:  https://www.netsolutions.com/insights/5-healthcare-problems-which-digital-technologies-can-solve-for-a-fit-and-healthy-world/ 

DeSanctis, G., & Poole, M. S. (1994). Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory. Organization Science, 5(2), 121-147.

Feldman, S. S., Buchalter, S., & Hayes, L. W. (2018). Health Information Technology in Healthcare Quality and Patient Safety: Literature Review. JMIR Med Inform, 6(2).

Halamka, J., Mandl, K., & Tang, P. (2008). Early Experiences with Personal Health Records. Journal of the American Medical Informatics Association, 15(1), 1-7.

IOM. (1999). To Err is Human: Building a Safer Health System. National Academy of Sciences.

Singh, H., & Sittig, D. (2016). Measuring and improving patient safety through health information technology: The Health IT Safety Framework. BMJ Quality & Safety, 25, 226-232.

Weigel, F., Hall, D. J., & Landrum, W. H. (2009). Human/Technology Adaptation Fit Theory for Healthcare. SAIS 2009 Proceedings.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing … use of malicious software and computer viruses like Trojan horses and spyware. This practice basically entails intentional activities to infiltrate or penetrate computer systems or networks used by a rival to obtain information within or transmitted through these networks or systems.[footnoteRef:3] Cyber espionage has emerged as an international problem because of increased reliance on cyberspace by state and non-state actors. Nations across the globe ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Depression Among Older Immigrant African Women In Metro West Massachusetts

Pages: 12 (3684 words) Sources: 20 Document Type:Capstone Project Document #:21927346

...Systems theory Prevalence of Depression in Massachusetts
Prospectus: Depression Among Older Immigrant African Women in Metro West Massachusetts
Abstract
In West Massachusetts United States, the most common health disorders are anxiety and depression. These health disorders are prevalent in elderly immigrant women aged between 50 and 79 years (Agbemenu, 2016). Despite a variety of efficacious interventions for depression and anxiety, elderly immigrant women experience mental health care disparities in their access to mental health services and the quality of treatment they receive (Sánchez et al., 2014). Researchers have determined that African American heterogeneity influences access to depression and anxiety treatment. In addition, African Americans are becoming an increasingly visible minority within the United States, especially in West Massachusetts. The intention in this current study is to understand the causes and prevalence of depression among older immigrant African American women in Metro West Massachusetts as well as how the older immigrants cope with……

References

References

Agbemenu, K. (2016). Acculturation and Health Behaviors of African Immigrants Living in the United States: An Integrative Review. ABNF Journal, 27(3).

Alegría, M., Álvarez, K., & DiMarzio, K. (2017). Immigration and mental health. Current epidemiology reports, 4(2), 145-155.

Baldwin-Clark, T., Ofahengaue Vakalahi, H. F., & Anderson, B. (2016). What about African American older women and depressive symptoms? Educational Gerontology, 42(5), 310-320.

Cassel, J. (1995). The contribution of the social environment to host resistance: the fourth wade Hampton frost lecture. American journal of epidemiology, 141(9), 798-814.

Cobb, S. (1976). Social support as a moderator of life stress. Psychosomatic medicine.

Delara, M. (2016). Social determinants of immigrant women’s mental health. Advances in Public Health, 2016.

Dow, H. D. (2011). An overview of stressors faced by immigrants and refugees: A guide for mental health practitioners. Home Health Care Management & Practice, 23(3), 210-217.

Emadpoor, L., Lavasani, M. G., & Shahcheraghi, S. M. (2016). Relationship between perceived social support and psychological well-being among students based on mediating role of academic motivation. International Journal of Mental Health and Addiction, 14(3), 284-290.

Studyspark

Study Document Study Document

Self Care Action Plan

Pages: 13 (3787 words) Sources: 12 Document Type:Essay Document #:82496671

… going to be able to take care of others.
This approach to self-care is based on the Dorothea Orem model of self-care. Her theory of self-care was published in 1971 and it is founded on the idea that people should be self-reliant first of all if they … action plan allows one to do that.
Support for the Action Plan
Support for the Action Plan can be found in Maslow’s (1943) theory of the hierarchy of needs. Maslow theorized that people cannot reach their potential, the level of self-actualization that allows them to be their … ideal level of selfhood. However, if the lower level needs are not satisfied first, one’s potential will never be reached. From Maslow’s (1943) theory one can see that every person needs to take time to engage in self-care so that one can develop fully and attain the ……

References

References

Baumeister, R. F., Campbell, J. D., Krueger, J. I., &Vohs, K. D. (2003). Does high self-esteem cause better performance, interpersonal success, happiness, or healthier lifestyles? Psychological Science in the Public Interest, 4(1), 1–44.

Cosentino, B. W. (2020). Loving Yourself. How to raise your self-esteem.

Dall’Ora, C., Griffiths, P. & Ball, J. (2016). 12-hour shifts: burnout or job satisfaction? Nursing Times, 112(12/13), 1-2.

Maslow, A. H. (1943). A theory of human motivation. Psychological Review, 50(4), 370.

National Academy of Medicine. (2019). Valid and Reliable Survey Instruments to Measure Burnout, Well-Being, and Other Work-Related Dimensions. Retrieved from  https://nam.edu/valid-reliable-survey-instruments-measure-burnout-well-work-related-dimensions/ 

Nursing Theories. (2012). Retrieved from  http://currentnursing.com/nursing_theory/self_care_deficit_theory.html 

Orem, D.E. (1991). Nursing: Concepts of practice (4th ed.). St. Louis, MO: Mosby-Year Book Inc.

Robinson, R. B., & Frank, D. I. (1994). The relation between self-esteem, sexual activity, and pregnancy. Adolescence, 29(113), 27–35.

Studyspark

Study Document Study Document

Angleton S Counterintelligence Program And What Went Wrong

Pages: 9 (2657 words) Sources: 8 Document Type:Essay Document #:36485484

… insight into what went wrong with counterintelligence and how those problems can be prevented in the future. It uses a combination of conflict theory, structural functionalism and critical theory to explore the dimensions of counterintelligence in the 1950s, 1960s, and 1970s. The research design is qualitative with the case study approach to … always included work within private industry, but in many cases…[break]…problems that arose within the counterintelligence program from the 1950s to the 1970s. Conflict theory was posited as a response to structural functionalism, and critical theory arose out of the failure of conflict theory to fully account for the failure of the Marxist prophecy, so by itself it is an inadequate theory—but in combination with others, and with a focus on how ethics play a part in decision-making—it can help to explain the complex nature ……

References

Reference List

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Bartos, C. and P. Wehr. 2002. Using conflict theory. UK: University of Cambridge.

Bellaby, Ross. "What's the Harm? The Ethics of Intelligence Collection." Intelligence and National Security 27, no. 1 (2012): 93-117.

Church Committee. “Final report of the Select committee to study governmental operations With respect to Intelligence activities United states senate Together with Additional, supplemental, and separate Views.” Intelligence.senate.gov, 1976. https://www.intelligence.senate.gov/sites/default/files/94755_I.pdf

Coyne, John, Peter Bell, and Shannon Merrington. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2, no. 10 (2013): 27-37.

Erskine, Toni. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19, no. 2 (2004): 359-381.

Nakashima, Ellen. “Top counterintelligence official challenges the private sector to step up defenses against foreign spying.” Washington Post, 2020.  https://www.washingtonpost.com/national-security/top-counterintelligence-official-challenges-the-private-sector-to-step-up-defenses-against-foreign-spying/2020/02/10/d842d83c-4c15-11ea-9b5c-eac5b16dafaa_story.html 

Pfaff, T., & Tiel, J. R. (2004). The ethics of espionage. Journal of Military Ethics, 3(1), 1-15.

Study Document Study Document

Traditional Medicine Usage In African Nations

Pages: 12 (3615 words) Sources: 30 Document Type:Essay Document #:38085332

...Systems theory Overview of Africa’s Post-Conflict History
Historical Formal Institutions
Colonial legacies persist in Africa in spite of a post-colonial era (Austin, 2010). These legacies have continued in post-conflict Africa’s history. In Africa, there has been no real unifying factor bringing individuals together, primarily because of the communal aspect of society throughout the continent. Community exists and can be found everywhere in Africa. Structural, dramaturgic and institutional factors in formal institutionalization in Africa of health care has come about as a result of investment, development, and political stability (Ratcliffe, 2013). The relationship among cultural traditions, laws of society, and the symbolic boundaries have served to create the structural meanings behind formal institutions; the expressive dimension, communicative properties and interaction of these elements have made up the dramaturgic, and the actors and organizations themselves have manifested the institutional. An example of this can be seen in Nigeria.
Structurally, dramaturgically and institutionally, Africa has……

References

References

Afro-centric Alliance, A. (2001). Indigenisingorganizational change: Localisation in Tanzania and Malawi. Journal of Managerial Psychology, 16(1), 59-78.

Asiseh, F., Owusu, A., & Quaicoe, O. (2017). An analysis of family dynamics on high school adolescent risky behaviors in Ghana. Journal of Child & Adolescent Substance Abuse, 26(5), 425-431.

Austin, G. (2010). African economic development and colonial legacies (Vol. 1, No. 1, pp. 11-32). Institut de hautes études internationales et du développement.

Brager, G., Specht, H., Torczyner, J. L., &Torczyner, J. (1987). Community organizing. Columbia University Press.

Bratton, M., & Van de Walle, N. (1997). Democratic experiments in Africa: Regime transitions in comparative perspective. Cambridge university press.

Burnham, G. M., Pariyo, G., Galiwango, E., & Wabwire-Mangen, F. (2004). Discontinuation of cost sharing in Uganda. Bulletin of the World Health Organization, 82, 187-195.

Dillard, C., Duncan, K. L., & Johnson, L. (2017). Black History Full Circle: Lessons from a Ghana Study Abroad in Education Program. Social Education, 81(1), 50-53.

Ehui, S. (2020). Protecting food security in Africa. Retrieved from https://www.brookings.edu/blog/africa-in-focus/2020/05/14/protecting-food-security-in-africa-during-covid-19/

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384


3.3 Proposed Interview Questions 13
3.4 Sample Population 13
3.5 Ethical Considerations 14
3.6 Data Analysis Plan & Rationale 15
4 Contributions to theory or Practice and their Significance 16
5 Ethical Issues and Methods to Address 17
6 Conclusion 17
Introduction
Background
Corporations of all sizes … in the contemporary setting, companies and entrepreneurs in the accounting sector are no longer constantly installing software apps on their computers or computer systems situated within the premises to operate their businesses. Rather, they are opting for the cloud. Cloud computing is facilitating substantial agility for companies. … a significant topic in the accounting industry, owing to its ease in the level of flexibility, scalability, and simplicity of gaining access to systems across the world. Whereas customary IT structures can preclude an accounting organization’s capability of conducting business operations productively, cloud computing can facilitate a … literature carried out in the……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

Strengths Based Approach For Depression

Pages: 6 (1931 words) Sources: 7 Document Type:Case Study Document #:65081861

… as opposed to what must be resolved, and concentrates on what works as against what doesn't.
The relationship between strengths-focused care and resilience theory within the context of nursing literature has been expounded upon further by Gottlieb (2014, p. 26), whose work describes a comprehensive strengths-based nursing ……

References

References

Ditton, L. (2015). Depression Treatment: Strengths-based Approaches. Available at  http://www.esteempsychology.com.au 

Gan, C., & Ballantyne, M. (2016). Brain injury family intervention for adolescents: A solution-focused approach. NeuroRehabilitation, 38(3), 231-241.

Gottlieb, L. (2014). Strengths-based nursing: A holistic approach to care, grounded in eight core values. American Journal of Nursing, 114(8), 24-32.

Liu, R. T., Kleiman, E., Nestor, B., Cheek, S. (2015). The Hopelessness Theory of Depression: A Quarter Century in Review. Clin Psychol, 22(4), 345-365. DOI:10.1111/cpsp.12125.

Swartz, M. K. (2017). A Strength-Based Approach to Care. J Pediatr Health Care, 31, 1-1. Available at https://www.jpedhc.org/article/S0891-5245(16)30281-4/pdf

World Health Organization. (1998). Health Promotion Glossary. World Health Organization. Available at  https://www.who.int/healthpromotion/about/HPR%20Glossary%201998.pdf?ua=1 

Xie, H. (2013). Strengths-Based Approach for Mental Health Recovery. Iran J Psychiatry Behav Sci, 7(2), 5-10. Available at  https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3939995/ 

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

… discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing … use of malicious software and computer viruses like Trojan horses and spyware. This practice basically entails intentional activities to infiltrate or penetrate computer systems or networks used by a rival to obtain information within or transmitted through these networks or systems.[footnoteRef:3] Cyber espionage has emerged as an international problem because of increased reliance on cyberspace by state and non-state actors. Nations across the globe ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Join thousands of other students and

"spark your studies".