Theory Essays (Examples)

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

...Theory Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber warfare, helps to establish appropriate countermeasures against cyberattacks and potential threats in cyberspace, and enhances intelligence gathering. While the study provides significant insights on this topic, future studies should examine the……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… well as its potential for expansion, especially into use by SMEs. To this end, this chapter describes more fully the study’s guiding Unified Theory of Acceptance and Use of Technology theoretical/conceptual framework followed by an overview of the Internet of Things (IoT) and an analysis of current … fresh applicable insights that can be applied to similar situations involving the uptake of new technologies. This comprehensive model was termed the Unified Theory of Acceptance and Use of Technology (UTAUT) which was regarded as highly relevant for the purposes of this study as well. As noted ……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Sexual Behavior And Sexual Morality

Pages: 5 (1605 words) Sources: 5 Document Type:Essay Document #:69548980

… conclusion, meta-ethics is a fruitful base of analyzing a morality as it delves deeper into understanding its origin, like in the Nagel's Secular Theory to gain clarity on the moral judgments. For the Aquinas's Natural Law argument which poses a challenge to Nagel's Secular Theory can be countered by Christine Gudorf which analyzes that the presence of clitoris in females has no purpose of procreation and is simply ……

References

References

Goldman, A. H. (2019, February 12). Why Sexual Morality Doesn\\\\\\'t Exist. iai News.

Haidt, J., & Hersh, M. A. (2001). Sexual Morality: The Cultures and Emotions of Conservatives and Liberals. Journal of Applied Social Psychology, 191-221.

Halwani, R. (2018, October 19). Sex and Sexuality. Stanford Encyclopedia of Philosophy.

Haqiqatjou, D. (2005, September 17). Ashley Madison and the Problem of Liberal Sexual Ethics. Public Discourse.

McCord, G. S. (2012, January 26). Metaethics. Stanford Encyclopedia of Philosophy.

Primoratz, I. (2001). Sexual Morality: Is Consent Enough? Ethical Theory and Moral Practise.

Primoratz, I. (2013, February 01). Sexual Morality. Wiley Online Library.

Soble, A. (n.d.). Philosophy of Sexuality. Internet Encyclopedia of Philosophy.

Studyspark

Study Document Study Document

Self Care Action Plan

Pages: 13 (3787 words) Sources: 12 Document Type:Essay Document #:82496671

… going to be able to take care of others.
This approach to self-care is based on the Dorothea Orem model of self-care. Her theory of self-care was published in 1971 and it is founded on the idea that people should be self-reliant first of all if they … action plan allows one to do that.
Support for the Action Plan
Support for the Action Plan can be found in Maslow’s (1943) theory of the hierarchy of needs. Maslow theorized that people cannot reach their potential, the level of self-actualization that allows them to be their … ideal level of selfhood. However, if the lower level needs are not satisfied first, one’s potential will never be reached. From Maslow’s (1943) theory one can see that every person needs to take time to engage in self-care so that one can develop fully and attain the ……

References

References

Baumeister, R. F., Campbell, J. D., Krueger, J. I., &Vohs, K. D. (2003). Does high self-esteem cause better performance, interpersonal success, happiness, or healthier lifestyles? Psychological Science in the Public Interest, 4(1), 1–44.

Cosentino, B. W. (2020). Loving Yourself. How to raise your self-esteem.

Dall’Ora, C., Griffiths, P. & Ball, J. (2016). 12-hour shifts: burnout or job satisfaction? Nursing Times, 112(12/13), 1-2.

Maslow, A. H. (1943). A theory of human motivation. Psychological Review, 50(4), 370.

National Academy of Medicine. (2019). Valid and Reliable Survey Instruments to Measure Burnout, Well-Being, and Other Work-Related Dimensions. Retrieved from  https://nam.edu/valid-reliable-survey-instruments-measure-burnout-well-work-related-dimensions/ 

Nursing Theories. (2012). Retrieved from  http://currentnursing.com/nursing_theory/self_care_deficit_theory.html 

Orem, D.E. (1991). Nursing: Concepts of practice (4th ed.). St. Louis, MO: Mosby-Year Book Inc.

Robinson, R. B., & Frank, D. I. (1994). The relation between self-esteem, sexual activity, and pregnancy. Adolescence, 29(113), 27–35.

Studyspark

Study Document Study Document

Evaluating The Ideology Of The IRA

Pages: 9 (2717 words) Sources: 15 Document Type:Essay Document #:29993032

...Theory The Tactics of the British Intelligence against the IRA
History of the IRA
The Provisional IRA formed in response to a war between the Irish Republican Army and the British state in Northern Ireland from 1969 to 1998. The IRA or what is commonly referred to as the IRA in the West was actually a breakaway from the Army and is better known as PIRA in Ireland. However, because it stood as the fighting force and face of the Irish resistance, it is typically referred to as IRA for short. The IRA was a formal fighting force up until the 1970s when fears of British infiltration caused the IRA to become a secret organization with a cell structure. The IRA published its Green Book, which laid out the rules of being an IRA volunteer. Meanwhile, on the political front was Sinn Fein, which negotiated behind the scenes with the British……

References

References

Bamford, B. (2005). The Role and Effectiveness of Intelligence in Northern Ireland. Intelligence and National Security, 20(4), 581-607.

Branch, S., Shallcross, L., Barker, M., Ramsay, S., & Murray, J. P. (2018). Theoretical Frameworks That Have Explained Workplace Bullying: Retracing Contributions Across the Decades. Concepts, Approaches and Methods, 1-44.

Coogan, T. P. (2002). The IRA. New York: Palgrave.

Hilton, J. L., & Von Hippel, W. (1996). Stereotypes. Annual review of psychology, 47(1), 237-271.

IRA Green Book. (1977). Accessed 14 Dec 2015 from https://tensmiths.files.wordpress.com/2012/08/15914572-ira-green-book-volumes-1-and-2.pdf

Lumen. (2019). Theoretical perspectives on deviance. Retrieved from  https://courses.lumenlearning.com/sociology/chapter/theoretical-perspectives-on-deviance/ 

Maloney, E. (2010). Voices from the Grave: Two Men’s War in Ireland. NY: Faber, Faber.

McLeod, S. (2008) Social Identity Theory. Simply Psychology. Retrieved from http://www.simplypsychology.org/social-identity-theory.html

Studyspark

Study Document Study Document

Impact Of Culture On Domestic Violence

Pages: 12 (3547 words) Sources: 21 Document Type:Research Paper Document #:31105337

Representations of Black Culture in the Media
Introduction
Culture theory is one theory that can be used to explain domestic violence. As Serrat (2017) notes, culture is the set of “distinctive ideas, beliefs, values, and knowledge” … notes, culture is the set of “distinctive ideas, beliefs, values, and knowledge” that define the way people behave and think (p. 31). This theory suggests that the way people act is based on the inputs they receive from their environment; and peers, groups, and media all go … others. The reason for this is that they have a sense of pride in their group (Hilton & Von Hippel, 1996). Social Identity Theory (SIT) posits that individuals develop a sense of who they are based on their group membership. So if a person belongs to a ……

References

References

Adorno, T. & Horkheimer, M. (2007). The culture industry: Enlightenment as mass deception. Stardom and celebrity: A reader, 34, 2007.

Bandura, A. (2018). Toward a psychology of human agency: Pathways and reflections.  Perspectives on Psychological Science, 13(2), 130-136.  https://doi.org/10.1177/1745691617699280 

Breger, M. L. (2017). Reforming by re-norming: How the legal system has the potential to change a toxic culture of domestic violence. J. Legis., 44, 170.

Cashmore, E. (2006). The Black culture industry. Routledge.

Coleman, L. (1974). Carl Van Vechten Presents the New Negro. Studies in the Literary Imagination, 7(2), 85.

Cramer, E. P., Choi, Y. J., & Ross, A. I. (2017). Race, Culture, and Abuse of Persons with Disabilities. In Religion, Disability, and Interpersonal Violence (pp. 89-110). Champaign, IL: Springer.

Davis, A. (2012). The Meaning of Freedom. San Francisco, CA: City Light Books.

Decker, J. L. (1993). The state of rap: Time and place in hip hop nationalism. Social Text, (34), 53-84.

Studyspark

Study Document Study Document

Organizational Situations

Pages: 6 (1663 words) Sources: 8 Document Type:Essay Document #:92019167

… employee morale is sinking and workers are beginning to slack. Management wonders what it can do to motivate employees.
Two Lenses
Maslow’s (1943) theory of human motivation and the hierarchy of needs stipulates that people are motivated and become self-actualizing when all their needs are met. These … satisfied and the person is self-motivated out of a sense of self-worth and a desire to do good and be successful.
Rogers’ (1951) theory of congruence is based on the idea that there is a self-image and an ideal self conception that people have. Rogers (1951) states … this way to gauge temperament, which can be a good indicator of whether the employee will make a good leader. The Five Factor theory classifies the personality types as:
1. Extraverted
2. Agreeable
3. Open
4. Conscientious, and
5. Neurotic (Canadas-De la Fuente et al., 2015)
This … classifies the personality types as:……

References

References

Cañadas-De la Fuente, G. A., Vargas, C., San Luis, C., García, I., Cañadas, G. R., &

Emilia, I. (2015). Risk factors and prevalence of burnout syndrome in the nursing profession. International Journal of Nursing Studies, 52(1), 240-249.

Meacham, W. (2017). History of industrial and organizational psychology. Retrieved from  https://owlcation.com/social-sciences/History-of-Industrial-and-Organizational-Psychology 

Studyspark

Study Document Study Document

Ethical Issues In Criminal Justice

Pages: 4 (1197 words) Sources: 4 Document Type:Essay Document #:16567736

...Theory Epistemology and Duty Ethics in Criminal Justice
Ethical Issues
1 Ethics in Law Enforcement Agencies
As Roufa (2019) notes, ethics in law enforcement are essential to prevent behaviors from going unchecked and bad reputations from being developed. Ethics in law enforcement agencies can provide guidelines, identify values that should be promoted, and dictate what sort of actions, behaviors and attitudes law enforcement agents should demonstrate. The Law Enforcement Oath of Office focuses on protecting, upholding and defending the Constitution of the US. It also contains terms regarding how officers should conduct themselves: soberly, honorably and honestly.
Law enforcement agencies tend to codify the ethics they want their officers to follower. The reason for this is that they want their officers to engage in ethical decision making, which means making the right decision morally. Sometimes officers can have an unconscious or implicit bias and this can affect their decision making (Hehman,……

References

References

Cahn, S. & Markie, P. (2011). Ethics: History, Theory and Contemporary Issues, 5th Edition. UK: Oxford University Press.

Hehman, E., Flake, J. K., & Calanchini, J. (2018). Disproportionate use of lethal force in policing is associated with regional racial biases of residents. Social psychological and personality science, 9(4), 393-401.

Holmes, A. (2007). Ethics: Approaching moral decisions. Downers Grove, IL: InterVarsity Press.

Roufa, T. (2019). Ethics in law enforcement. Retrieved from  https://www.thebalancecareers.com/ethics-in-law-enforcement-and-policing-974542 

Studyspark

Study Document Study Document

Depression Among Older Immigrant African Women In Metro West Massachusetts

Pages: 12 (3684 words) Sources: 20 Document Type:Capstone Project Document #:21927346

...Theory Prevalence of Depression in Massachusetts
Prospectus: Depression Among Older Immigrant African Women in Metro West Massachusetts
Abstract
In West Massachusetts United States, the most common health disorders are anxiety and depression. These health disorders are prevalent in elderly immigrant women aged between 50 and 79 years (Agbemenu, 2016). Despite a variety of efficacious interventions for depression and anxiety, elderly immigrant women experience mental health care disparities in their access to mental health services and the quality of treatment they receive (Sánchez et al., 2014). Researchers have determined that African American heterogeneity influences access to depression and anxiety treatment. In addition, African Americans are becoming an increasingly visible minority within the United States, especially in West Massachusetts. The intention in this current study is to understand the causes and prevalence of depression among older immigrant African American women in Metro West Massachusetts as well as how the older immigrants cope with……

References

References

Agbemenu, K. (2016). Acculturation and Health Behaviors of African Immigrants Living in the United States: An Integrative Review. ABNF Journal, 27(3).

Alegría, M., Álvarez, K., & DiMarzio, K. (2017). Immigration and mental health. Current epidemiology reports, 4(2), 145-155.

Baldwin-Clark, T., Ofahengaue Vakalahi, H. F., & Anderson, B. (2016). What about African American older women and depressive symptoms? Educational Gerontology, 42(5), 310-320.

Cassel, J. (1995). The contribution of the social environment to host resistance: the fourth wade Hampton frost lecture. American journal of epidemiology, 141(9), 798-814.

Cobb, S. (1976). Social support as a moderator of life stress. Psychosomatic medicine.

Delara, M. (2016). Social determinants of immigrant women’s mental health. Advances in Public Health, 2016.

Dow, H. D. (2011). An overview of stressors faced by immigrants and refugees: A guide for mental health practitioners. Home Health Care Management & Practice, 23(3), 210-217.

Emadpoor, L., Lavasani, M. G., & Shahcheraghi, S. M. (2016). Relationship between perceived social support and psychological well-being among students based on mediating role of academic motivation. International Journal of Mental Health and Addiction, 14(3), 284-290.

Join thousands of other students and

"spark your studies".