Theories Essays (Examples)

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

...Theories Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber warfare, helps to establish appropriate countermeasures against cyberattacks and potential threats in cyberspace, and enhances intelligence gathering. While the study provides significant insights on this topic, future studies should examine the……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… decisions are made by organizations today. The Venkatesh et al. (2003) theoretical model draws on a number of key elements from eight previous theories or models in order to produce a more robust overview concerning the effects of different motivational factors on the technology-related decision-making process to ……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

...Theories Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage,……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Sexual Behavior And Sexual Morality

Pages: 5 (1605 words) Sources: 5 Document Type:Essay Document #:69548980

… to think rationally in the moment of arousal, has created a wide perceptive arena to take insight from. There are so many other theories that pose a challenge to the optimist view, which doesn't necessarily mean that the optimist view is not a reasonable philosophy for sexual ……

References

References

Goldman, A. H. (2019, February 12). Why Sexual Morality Doesn\\\\\\'t Exist. iai News.

Haidt, J., & Hersh, M. A. (2001). Sexual Morality: The Cultures and Emotions of Conservatives and Liberals. Journal of Applied Social Psychology, 191-221.

Halwani, R. (2018, October 19). Sex and Sexuality. Stanford Encyclopedia of Philosophy.

Haqiqatjou, D. (2005, September 17). Ashley Madison and the Problem of Liberal Sexual Ethics. Public Discourse.

McCord, G. S. (2012, January 26). Metaethics. Stanford Encyclopedia of Philosophy.

Primoratz, I. (2001). Sexual Morality: Is Consent Enough? Ethical Theory and Moral Practise.

Primoratz, I. (2013, February 01). Sexual Morality. Wiley Online Library.

Soble, A. (n.d.). Philosophy of Sexuality. Internet Encyclopedia of Philosophy.

Studyspark

Study Document Study Document

Self Care Action Plan

Pages: 13 (3787 words) Sources: 12 Document Type:Essay Document #:82496671

… the idea that people should be self-reliant first of all if they have any inclination to help themselves or to help others (Nursing Theories, 2012). Orem believed that modern society tended to make people dependent upon others to take care of them. This dependency led to powerlessness ……

References

References

Baumeister, R. F., Campbell, J. D., Krueger, J. I., &Vohs, K. D. (2003). Does high self-esteem cause better performance, interpersonal success, happiness, or healthier lifestyles? Psychological Science in the Public Interest, 4(1), 1–44.

Cosentino, B. W. (2020). Loving Yourself. How to raise your self-esteem.

Dall’Ora, C., Griffiths, P. & Ball, J. (2016). 12-hour shifts: burnout or job satisfaction? Nursing Times, 112(12/13), 1-2.

Maslow, A. H. (1943). A theory of human motivation. Psychological Review, 50(4), 370.

National Academy of Medicine. (2019). Valid and Reliable Survey Instruments to Measure Burnout, Well-Being, and Other Work-Related Dimensions. Retrieved from  https://nam.edu/valid-reliable-survey-instruments-measure-burnout-well-work-related-dimensions/ 

Nursing Theories. (2012). Retrieved from  http://currentnursing.com/nursing_theory/self_care_deficit_theory.html 

Orem, D.E. (1991). Nursing: Concepts of practice (4th ed.). St. Louis, MO: Mosby-Year Book Inc.

Robinson, R. B., & Frank, D. I. (1994). The relation between self-esteem, sexual activity, and pregnancy. Adolescence, 29(113), 27–35.

Studyspark

Study Document Study Document

Evaluating The Ideology Of The IRA

Pages: 9 (2717 words) Sources: 15 Document Type:Essay Document #:29993032

...Theories The Tactics of the British Intelligence against the IRA
History of the IRA
The Provisional IRA formed in response to a war between the Irish Republican Army and the British state in Northern Ireland from 1969 to 1998. The IRA or what is commonly referred to as the IRA in the West was actually a breakaway from the Army and is better known as PIRA in Ireland. However, because it stood as the fighting force and face of the Irish resistance, it is typically referred to as IRA for short. The IRA was a formal fighting force up until the 1970s when fears of British infiltration caused the IRA to become a secret organization with a cell structure. The IRA published its Green Book, which laid out the rules of being an IRA volunteer. Meanwhile, on the political front was Sinn Fein, which negotiated behind the scenes with the British……

References

References

Bamford, B. (2005). The Role and Effectiveness of Intelligence in Northern Ireland. Intelligence and National Security, 20(4), 581-607.

Branch, S., Shallcross, L., Barker, M., Ramsay, S., & Murray, J. P. (2018). Theoretical Frameworks That Have Explained Workplace Bullying: Retracing Contributions Across the Decades. Concepts, Approaches and Methods, 1-44.

Coogan, T. P. (2002). The IRA. New York: Palgrave.

Hilton, J. L., & Von Hippel, W. (1996). Stereotypes. Annual review of psychology, 47(1), 237-271.

IRA Green Book. (1977). Accessed 14 Dec 2015 from https://tensmiths.files.wordpress.com/2012/08/15914572-ira-green-book-volumes-1-and-2.pdf

Lumen. (2019). Theoretical perspectives on deviance. Retrieved from  https://courses.lumenlearning.com/sociology/chapter/theoretical-perspectives-on-deviance/ 

Maloney, E. (2010). Voices from the Grave: Two Men’s War in Ireland. NY: Faber, Faber.

McLeod, S. (2008) Social Identity Theory. Simply Psychology. Retrieved from http://www.simplypsychology.org/social-identity-theory.html

Studyspark

Study Document Study Document

Impact Of Culture On Domestic Violence

Pages: 12 (3547 words) Sources: 21 Document Type:Research Paper Document #:31105337

...Theories Representations of Black Culture in the Media
Introduction
Culture theory is one theory that can be used to explain domestic violence. As Serrat (2017) notes, culture is the set of “distinctive ideas, beliefs, values, and knowledge” that define the way people behave and think (p. 31). This theory suggests that the way people act is based on the inputs they receive from their environment; and peers, groups, and media all go into shaping their perception of themselves and those around them (Bandura, 2018). If the culture in which they grow up signals to them that treating people in an inhumane way is acceptable, then those individuals are likely to engage in domestic violence acts as they feel or believe that it is an acceptable mode of behavior, sanctioned by the culture in which they live. The culture of media, friends, family, schools, churches and other organizations may all play a……

References

References

Adorno, T. & Horkheimer, M. (2007). The culture industry: Enlightenment as mass deception. Stardom and celebrity: A reader, 34, 2007.

Bandura, A. (2018). Toward a psychology of human agency: Pathways and reflections.  Perspectives on Psychological Science, 13(2), 130-136.  https://doi.org/10.1177/1745691617699280 

Breger, M. L. (2017). Reforming by re-norming: How the legal system has the potential to change a toxic culture of domestic violence. J. Legis., 44, 170.

Cashmore, E. (2006). The Black culture industry. Routledge.

Coleman, L. (1974). Carl Van Vechten Presents the New Negro. Studies in the Literary Imagination, 7(2), 85.

Cramer, E. P., Choi, Y. J., & Ross, A. I. (2017). Race, Culture, and Abuse of Persons with Disabilities. In Religion, Disability, and Interpersonal Violence (pp. 89-110). Champaign, IL: Springer.

Davis, A. (2012). The Meaning of Freedom. San Francisco, CA: City Light Books.

Decker, J. L. (1993). The state of rap: Time and place in hip hop nationalism. Social Text, (34), 53-84.

Studyspark

Study Document Study Document

Organizational Situations

Pages: 6 (1663 words) Sources: 8 Document Type:Essay Document #:92019167

...Theories The Situation
Workers at the company of Kroger do not appear motivated since the outbreak of COVID-19 has increased their workload. They are grumbling about not getting paid more even though more is now expected of them. They are stocking shelves more, cleaning the store more, disinfecting carts, and generally working non-stop from start time to finish, whereas they are used to having some down time and things being more leisurely at work. Management is beginning to notice that employee morale is sinking and workers are beginning to slack. Management wonders what it can do to motivate employees.
Two Lenses
Maslow’s (1943) theory of human motivation and the hierarchy of needs stipulates that people are motivated and become self-actualizing when all their needs are met. These needs include the basic human needs of food, shelter, safety, love and affection, a sense of belonging and esteem, and at the top of……

References

References

Cañadas-De la Fuente, G. A., Vargas, C., San Luis, C., García, I., Cañadas, G. R., &

Emilia, I. (2015). Risk factors and prevalence of burnout syndrome in the nursing profession. International Journal of Nursing Studies, 52(1), 240-249.

Meacham, W. (2017). History of industrial and organizational psychology. Retrieved from  https://owlcation.com/social-sciences/History-of-Industrial-and-Organizational-Psychology 

Studyspark

Study Document Study Document

Ethical Issues In Criminal Justice

Pages: 4 (1197 words) Sources: 4 Document Type:Essay Document #:16567736

… the system to evolve.
Epistemology relates to how knowledge is derived, and in the criminal justice system researchers will use epistemology to develop theories of crime, to construct programs and processes for how to police—i.e., community policing, and so on. Forensics, law, and bail reform will all … the sense that officers will want to understand how free will plays a part in their actions and the actions of others. Developing theories for why people commit crimes will depend on this aspect of philosophy as well. The human will is at the heart of all……

References

References

Cahn, S. & Markie, P. (2011). Ethics: History, Theory and Contemporary Issues, 5th Edition. UK: Oxford University Press.

Hehman, E., Flake, J. K., & Calanchini, J. (2018). Disproportionate use of lethal force in policing is associated with regional racial biases of residents. Social psychological and personality science, 9(4), 393-401.

Holmes, A. (2007). Ethics: Approaching moral decisions. Downers Grove, IL: InterVarsity Press.

Roufa, T. (2019). Ethics in law enforcement. Retrieved from  https://www.thebalancecareers.com/ethics-in-law-enforcement-and-policing-974542 

Studyspark

Study Document Study Document

Depression Among Older Immigrant African Women In Metro West Massachusetts

Pages: 12 (3684 words) Sources: 20 Document Type:Capstone Project Document #:21927346

...Theories Prevalence of Depression in Massachusetts
Prospectus: Depression Among Older Immigrant African Women in Metro West Massachusetts
Abstract
In West Massachusetts United States, the most common health disorders are anxiety and depression. These health disorders are prevalent in elderly immigrant women aged between 50 and 79 years (Agbemenu, 2016). Despite a variety of efficacious interventions for depression and anxiety, elderly immigrant women experience mental health care disparities in their access to mental health services and the quality of treatment they receive (Sánchez et al., 2014). Researchers have determined that African American heterogeneity influences access to depression and anxiety treatment. In addition, African Americans are becoming an increasingly visible minority within the United States, especially in West Massachusetts. The intention in this current study is to understand the causes and prevalence of depression among older immigrant African American women in Metro West Massachusetts as well as how the older immigrants cope with……

References

References

Agbemenu, K. (2016). Acculturation and Health Behaviors of African Immigrants Living in the United States: An Integrative Review. ABNF Journal, 27(3).

Alegría, M., Álvarez, K., & DiMarzio, K. (2017). Immigration and mental health. Current epidemiology reports, 4(2), 145-155.

Baldwin-Clark, T., Ofahengaue Vakalahi, H. F., & Anderson, B. (2016). What about African American older women and depressive symptoms? Educational Gerontology, 42(5), 310-320.

Cassel, J. (1995). The contribution of the social environment to host resistance: the fourth wade Hampton frost lecture. American journal of epidemiology, 141(9), 798-814.

Cobb, S. (1976). Social support as a moderator of life stress. Psychosomatic medicine.

Delara, M. (2016). Social determinants of immigrant women’s mental health. Advances in Public Health, 2016.

Dow, H. D. (2011). An overview of stressors faced by immigrants and refugees: A guide for mental health practitioners. Home Health Care Management & Practice, 23(3), 210-217.

Emadpoor, L., Lavasani, M. G., & Shahcheraghi, S. M. (2016). Relationship between perceived social support and psychological well-being among students based on mediating role of academic motivation. International Journal of Mental Health and Addiction, 14(3), 284-290.

Join thousands of other students and

"spark your studies".