Taking Risks Essays (Examples)

Studyspark

Study Document Study Document

Counterintelligence Issues Within The United States

Pages: 18 (5457 words) Sources: 29 Document Type:Research Paper Document #:72238996

... risks Why Ethical Egoism is a Problematic Framework for Intelligence
CI Literature Review
Introduction
The aim of this examination of the literature is to fill the wide gap that remains in counterintelligence research regarding an appropriate ethical standard that can guide and foster an ethical culture, as called for by Bellaby (2012) and Valentine (2016). The purpose of this review is to identify the lessons that have been learned and presented by researchers on this topic, and to identify an appropriate theoretical framework for assessing the way forward. The research question for this study is: How can the US counterintelligence enterprise support collaboration among the various USIC members and the private sector in an ethical and productive manner? The ultimate purpose of this study is to propose a standardized ethical framework for guiding the counterintelligence program as it works to collaborate with the private sector in the 21st century. Therefore, the……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. "The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles." Bachelor's thesis, Università Ca'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Cohen, Shlomo. 2016. "Are There Moral Limits to Military Deception?." Philosophia 44 (4): 1305-1318.

Coyne, John, Peter Bell, and Shannon Merrington. 2013. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2 (10): 27-37.

Erskine, Toni. 2004. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. "Strategic denial and deception." International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Studyspark

Study Document Study Document

How Interest Rates Compare Over The Last Decade Within The United

Pages: 6 (1728 words) Sources: 6 Document Type:Essay Document #:11480675

... risks Interest rates form the basis for valuation models around the world. They are used in almost every industry, country, and geography. Interest rates can also influence corporate and consumer behaviors. For example, depending on the inherent risk of a consumer, credit card rates determine how much an individual must pay on a month basis to the financial institution. Corporations looking to borrow funds to expand their market share must consider the variable interest rates being changed and their ability to service the debt. Even governments must be mindful of the extent of their borrowers and the corresponding impact of interest rates on their ability to services the debt. Due primarily to their importance in key elements of human civilization, interest rates are a closely watched tool by individual investors, general consumers, and corporations. Banks in particular are heavily influenced by the change in interest rates as they operate as financial……

References

References

1. Goodhard, C and E Perotti, 2008 “Maturity mismatch stretching: Banking has taken a wrong turn”, CEPR Policy Insight 81, 6-July

2. Holston, Laubach, and Williams. 2017. “Measuring the Natural Rate of Interest: International Trends and Determinants,” Journal of International Economics 108, supplement 1 (May): S39–S75

3. Laubach and Williams. 2003. “Measuring the Natural Rate of Interest,” Review of Economics and Statistics 85, no.4 (November): 1063-70.

4. Rachel, L. and Smith, T.D., 2017. Are low real interest rates here to stay?. International Journal of Central Banking, 13(3), pp.1-42.

5. Schularick, M, and A M Taylor, (2009), “Credit Booms Gone Bust: Monetary Policy, Leverage Cycles and Financial Crises, 1870-2008”, NBER DP 15512

6. Stock, J.H. and Watson, M.W., 2007. Why has US inflation become harder to forecast?. Journal of Money, Credit and banking, 39, pp.3-33

Studyspark

Study Document Study Document

Gangs Formation And Functioning

Pages: 9 (2774 words) Sources: 15 Document Type:Essay Document #:94080589

... risks Introduction
A far greater number of US citizens become victims of gang-initiated violence as compared to mass shootings or terrorist attacks. Gang members contribute to a disproportionately high percentage of the violence and crimes witnessed in the nation. Roughly two-thousand gang-linked murders are reported across the country per annum, which makes up 13% of overall murders in the nation. America's gang-connected murder rate alone (approximately 2 for every 100,000 individuals) goes beyond the overall rate of murders in almost every nation in the EU (Pyrooz & Densley, 2018). The FBI (Federal Bureau of Investigation) claims that as many as 33,000 motorcycle gangs, prison gangs, and aggressive street gangs are currently offending across the country (FBI, n.d.), several of them being highly organized and advanced. Further, they all resort to violence for maintaining their control over localities and boosting their illicit commercial activities, such as theft, firearms and illegal drug trafficking,……

References

References

Alleyne, E., & Wood, J. L. (2013). Gang-related crime: The social, psychological, and behavioral correlates. Psychology, Crime & Law, 19(7), 611-627.

FBI, (n.d.). Gangs. Retrieved from  https://www.fbi.gov/investigate/violent-crime/gangs#The-Gang%20Threat  on 12 June 2020

Finelli, G. A. (2019). Slash, Shoot, Kill Gang Recruitment of Children, and the Penalties Gangs Face. Family Court Review, 57(2), 243-257.

Hesketh, R. F. (2018). A critical exploration of why some individuals with similar backgrounds do or do not become involved in deviant street groups and the potential implications for their future life choices. (Doctoral dissertation, University of Chester, United Kingdom).

Hesketh, R.F. (2019). Joining gangs: living on the edge?. Journal of Criminological Research, Policy and Practice, Vol. 5 No. 4; 280-294.

Higginson, A., Benier, K., Shenderovich, Y., Bedford, L., Mazerolle, L., & Murray, J. (2018). Factors associated with youth gang membership in low?and middle?income countries: a systematic review. Campbell Systematic Reviews, 14(1), 1-128.

Howell, J. C. (2010). Gang Prevention: An Overview of Research and Programs. Juvenile Justice Bulletin. Office of Juvenile Justice and Delinquency Prevention.

Klein, M.W. (1995). The American street gang: Its nature, prevalence, and control. New York: Oxford University Press.

Studyspark

Study Document Study Document

Brazilian Market Entry Pricing Strategy

Pages: 11 (3155 words) Sources: 11 Document Type:Reaction Paper Document #:56127693

... risks Entering the Brazilian Market
Problem Statement
Peak must decide on a pricing strategy for entering the Brazilian market. It has narrowed its options down to three: penetration pricing, skim pricing and cost-plus pricing. This report will evaluate the company, the market and each of these three options in order to determine the best choice of pricing strategy when entering the Brazilian market.
Concept/Theory: SWOT Analysis
The SWOT analysis is a tool whereby the company analyzes its internal strengths and weaknesses, and its external threats and opportunities, in order to provide some context for the decision that it is facing. The strategy that the company chooses should in some way reflect either leveraging strengths to take advantage of opportunities or to shore up weaknesses in order to defend against threats. In this case, where the company is determining a strategy for entering a new market, it will probably take into account……

References

References

Chappelow, J. (2019) Monopolistic competition. Investopedia. Retrieved March 28, 2020 from https://www.investopedia.com/terms/m/monopolisticmarket.asp

CIA World Factbook. (2020) Brazil. Central Intelligence Agency. Retrieved March 28, 2020 from https://www.cia.gov/library/publications/the-world-factbook/geos/br.html

Decker, A. (2020) The ultimate guide to pricing strategies HubSpot. Retrieved March 28, 2020 from  https://blog.hubspot.com/sales/pricing-strategy 

Dourado, A., Canabrava, L, Spadano, L, Alvarenga, P., Salles, R., Advogados, F., Lourencao, M. & Trung, T. (2019) Doing business in Brazil: An overview. Thomson Reuters Practical Law. Retrieved March 28, 2020 from  https://uk.practicallaw.thomsonreuters.com/0-503-8385?__lrTS=20180603124715781&transitionType=Default&contextData= (sc.Default)&firstPage=true&bhcp=1#co_anchor_a102539

Downey, L. (2019) Brazilian real. Investopedia. Retrieved March 28, 2020 from https://www.investopedia.com/terms/forex/a/brl-brazilian-real.asp

Furgison, L. (2019) SWOT analysis, step 5: developing actionable strategies. BPlans.com. Retrieved March 28, 2020 from  https://articles.bplans.com/swot-analysis-challenge-day-5-turning-swot-analysis-actionable-strategies/ 

Kokemuller, N. (2020) Entry pricing strategy. Houston Chronicle. Retrieved March 28, 2020 from  https://smallbusiness.chron.com/entry-pricing-strategy-61428.html 

Riley, C. (2019) Jair Bolsinaro says Brazil is open for business. CNN Business. Retrieved March 28, 2020 from https://www.cnn.com/2019/01/22/business/bolsonaro-brazil-davos-foreign-investment/index.html

Studyspark

Study Document Study Document

Child Protection

Pages: 6 (1880 words) Sources: 7 Document Type:Case Study Document #:91826674

... risks NRS311 – Life Stage Considerations: Child, Adolescent & Family Health
Assessment Task Two: Child Protection Case Study
Introduction
Young people and children are the most vulnerable groups in society. As a Registered nurse in NSW, I can identify, consult others, and respond to situations where a young person or a child is at risk of harm. Some of the common reasons that predispose young people and children to risk include family and domestic violence, sexual, emotional, and physical neglect. In Fiona's case, the important risk of harm is neglect (NSW Government, 2018b). Fiona burnt part of her feet on the heater three days ago. Susanna, on noticing, cleaned the wound using tap water. She applied papaw ointment and covered it with an adhesive bandage. In this case, the most significant risk is neglect. Under the circumstances, a question suffices to ask where the mother was when Fiona, a three-year-old, got……

References

References

Australian Law Reform Commission (ALRC). (2010). Family violence: A national legal response. Canberra: ALRC.

Child Family Community Australia (CFCA). (2016). Australian legal definitions: When is a child in need of protection? (CFCA Resource Sheet). Melbourne: Australian Institute of Family Studies.

New South Wales Government. (1998). Children and Young Persons (Care and Protection) Act 1998.

NSW Government, (2018a). Child wellbeing and child protection fact sheet for NSW Health workers. Retrieved from https://www.health.nsw.gov.au/parvan/childprotect/Pages/child-wellbeing.aspx

NSW Government, (2018b). About child protection and wellbeing. Retrieved from https://www.health.nsw.gov.au/parvan/childprotect/Pages/default.aspx

WHO (2002). \\\\\\\\\\\\"Chapter 3: Child abuse and neglect by parents and other caregivers.\\\\\\\\\\\\" World report on violence and health. Retrieved from https://www.who.int/violence_injury_prevention/violence/global_campaign/en/chap3.pdf

World Health Organization. (2006). Preventing child maltreatment: a guide to taking action and generating evidence. Geneva, WHO.

Studyspark

Study Document Study Document

Diabetes Diagnosis And Plan Of Care

Pages: 3 (753 words) Sources: 4 Document Type:Essay Document #:55505580

... risks Diagnosis and Plan of Care
The patient’s blood pressure in this case (i.e. 148/92) could be described as elevated. Further, the patient’s blood sugar (at 154 mg/dl) is high. It has also been indicated that the patient in this particular case has a BMI of 37 and waist of 42 inches. In basic terms, a person with a BMI of above 30 is considered obese. According to the National Heart, Lung, and Blood Institute (2019), “the higher your BMI, the higher your risk for certain diseases such as heart disease, high blood pressure, type 2 diabetes.” Also, in as far as waist circumference is concerned, the patient’s waist size is 40 in this case. The National Heart, Lung, and Blood Institute (2019) points out that men who have a waist size exceeding 40 are at an increased risk of type 2 diabetes and heart disease. It is also important to……

References

References

National Heart, Lung, and Blood Institute (2019). Assessing Your Weight and Health Risk. Retrieved from  https://www.nhlbi.nih.gov/health/educational/lose_wt/risk.htm 

National Institute of Diabetes and Digestive and Kidney Diseases (2017). Type 2 Diabetes. Retrieved from https://www.niddk.nih.gov/health-information/diabetes/overview/what-is-diabetes/type-2-diabetes

Nordstrom, A., Hadrevi, J., Olsson, T., Franks, P.W. & Nordstrom, P. (2016). Higher Prevalence of Type 2 Diabetes in Men Than in Women Is Associated With Differences in Visceral Fat Mass. The Journal of Clinical Endocrinology & Metabolism, 101(10), 3740-3746.

Schilling W.H. & Crook M.A. (2014). Cutaneous Stigmata Associated With Insulin Resistance and Increased Cardiovascular Risk. Int J Dermatol, 53, 1062-1069.

Studyspark

Study Document Study Document

Weapons Of Mass Destruction WMD Antifa

Pages: 13 (3787 words) Sources: 12 Document Type:Research Paper Document #:67320498

… ports so that an attack by an organization like Antifa in collaboration with ISIS using a WMD could be reduced. Otherwise, the US risks facing a major catastrophe. Collaboration and communication are essential tools in the effort to prevent attacks on the US infrastructure, as so many ……

References

References

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Christenson, G. (2015). CBRN response. National Guard Bureau.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from  https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat 

Jennings, P. (2006). Miami port poses serious risks. Retrieved from  https://abcnews.go.com/WNT/story?id=131634&page=1 

Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from  http://www.johnstonsarchive.net/terrorism/chembioattacks.html 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Maras, M-H. (2014). Transnational Security. Florida: CRC Press.

Studyspark

Study Document Study Document

Weapons Of Mass Destruction

Pages: 9 (2563 words) Sources: 10 Document Type:Research Paper Document #:76982977

... risks Countering the Threat of Weapons of Mass Destruction (WMDs)
Purpose Statement
Chemical, biological, radiological, and nuclear (CBRN) weapons of mass destruction (WMD) area a threat that can completely disrupt an entire nation’s way of life. The current situation in China is a perfect illustration of what can happen when a biological weapon is used to destabilize a nation’s economy. China is currently grinding to a halt as the Covin-19 virus spreads like wildfire through China. The example shows how devastating a WMD can be when used in an attack. The purpose of this study is to examine ways to prevent or reduce the risk of a CBRN WMD attack. By looking at the use of international treaties, the rise of terrorism, and counter-proliferation strategies, this paper will assess the measures available for achieving the aim.
Research Question
What can nations do to prevent or reduce the risk of CBRN WMD……

References

References

Asada, M. (2008). Security Council Resolution 1540 to combat WMD terrorism: effectiveness and legitimacy in international legislation. Journal of Conflict & Security Law, 13(3), 303-332.

Carter, A. B. (2004). Overhauling counterproliferation. Technology in Society 26(2-3), 257-269.

CBS. (2011). Clinton on Qaddafi: We came, we saw, he died. Retrieved from  https://www.youtube.com/watch?v=mlz3-OzcExI 

The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. (1999). Combating Proliferation of Weapons of Mass Destruction. Washington, D.C.

Forest, J.J.F. (2012, Winter). Framework for Analyzing the Future Threat of WMD Terrorism. Journal of Strategic Security 5, 4. Retrieved from  http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1193&context=jss 

Hochman, D. (2006). Rehabilitating a rogue: Libya's WMD reversal and lessons for US policy. Parameters, 36(1), 63.

Lang, C. G. (1937). Archbishop's Appeal: Individual Will and Action; Guarding Personality. London Times, 28.

Stone, O., & Kuznick, P. (2013). The untold history of the United States. Simon and Schuster.

Studyspark

Study Document Study Document

Depression In The Military

Pages: 11 (3156 words) Sources: 11 Document Type:Research Paper Document #:55497619


The military provides an opportunity for men and women to serve their country. However, in the conduct of that service there are certain risks that can damage the mental health of military servicemen. Those risks can be associated with PTSD incurred from situations in combat, abuse, drug addiction, or lack of a positive value system that causes a ……

References

References

Bonde, J. P., Utzon-Frank, N., Bertelsen, M., Borritz, M., Eller, N. H., Nordentoft, M., ... & Rugulies, R. (2016). Risk of depressive disorder following disasters and military deployment: systematic review with meta-analysis. The British Journal of Psychiatry, 208(4), 330-336.

Bonelli, R., Dew, R. E., Koenig, H. G., Rosmarin, D. H., & Vasegh, S. (2012). Religious and spiritual factors in depression: review and integration of the research. Depression research and treatment, 2012.

Casey Jr, G. W. (2011). Comprehensive soldier fitness: A vision for psychological resilience in the US Army. American Psychologist, 66(1), 1.

Dolphin, K. E., Steinhardt, M. A., & Cance, J. D. (2015). The role of positive emotions in reducing depressive symptoms among Army wives. Military Psychology, 27(1), 22-35.

Griffith, J., & West, C. (2013). Master resilience training and its relationship to individual well-being and stress buffering among Army National Guard soldiers. The journal of behavioral health services & research, 40(2), 140-155.

Kang, H. K., Bullman, T. A., Smolenski, D. J., Skopp, N. A., Gahm, G. A., & Reger, M. A. (2015). Suicide risk among 1.3 million veterans who were on active duty during the Iraq and Afghanistan wars. Annals of epidemiology, 25(2), 96-100.

Maslow, A. H. (1943). A theory of human motivation. Psychological Review, 50(4), 370.

Reivich, K. J., Seligman, M. E., & McBride, S. (2011). Master resilience training in the US Army. American Psychologist, 66(1), 25.

Studyspark

Study Document Study Document

Counterintelligence

Pages: 12 (3490 words) Sources: 6 Document Type:question answer Document #:11133529

... risks Question 1: Construct an assessment of ONCIX strategy, prevention and detection concerning either insider threats, or, economic threats.
Preventing and detecting insider threats is one of the core aspects of the ONCIX strategy. As a new premier counterintelligence and security agency in the U.S. government, ONCIX needs a strong understanding of how to identify and deter insider threats. According to its strategy, “the most effective safeguard against insider threats is a knowledgeable, trusted workforce which is confident that their privacy and civil liberties are respected.”[footnoteRef:2] Making sure that its employees are trustworthy and invested is the first line of defense against insider threats. Gathering data from multiple sources is another line of defense in the ONCIX strategy to mitigate the risk of malicious insiders. The basis of the approach is to use a whole-person, whole-of-career concept that so as to analyze data and to identify anomalies that present themselves. Anomalies……

References

Bibliography

Counter intelligence for National Security, CIA, 1993. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol2no4/html/v02i4a10p_0001.htm

Johnston, David and James Risen, “U.S.had evidence of espionage,” New York Times, 2001. https://www.nytimes.com/2001/02/23/us/us-had-evidence-of-espionage-but-fbi-failed-to-inspect-itself.html

National Counterintelligence Strategy of the United States of America 2016 (Strategy).  https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf 

Prunckun, Hank. 2012. Counterintelligence Theory and Practice, Lanham: Rowman&Littlefield Publishers Inc. Read the following: Chapters 8 to 14, pages 131 to 217. Appendices A to D, pages 219 to 231.

Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September 17). National Security Archive. Accessed January 19, 2017.  http://nsarchive.gwu.edu/NSAEBB/NSAEBB230/ .

Van Cleave, Michelle. “Strategic Counterintelligence: What Is It and What Should We Do About It ?” 2007. CIA Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".