Study Document
… drivers of the lockdown. Governors across the US have used fear and hysteria, rather than common sense, as justification for locking down their states and putting 20 million people out of work. Sweden, on the other hand, has not embarked on a mission of economic suicide and ……
Works Cited
Allen v. Harrison (2016). https://law.justia.com/cases/oklahoma/supreme-court/2016/111877.html
Baker, Sinead. “The architect of Sweden's controversially lax coronavirus response says he thinks it's working, and that the capital city is already benefiting from herd immunity.” Business Insider, 2020. https://www.businessinsider.com/coronavirus-sweden-defends-plan-not-to-lock-down-immunity-2020-4
C&A Carbone, Inc. v. Town of Clarkstown, N.Y., 511 U.S. 383 (1994). https://www.oyez.org/cases/1993/92-1402
District of Columbia v. Heller (2008). Retrieved from https://www.oyez.org/cases/2007/07-290
Fox 2. “Alleged fraudulent COVID-19 treatments spark FBI raid of Shelby Twp medical spa.” Fox 2, 2020. https://www.fox2detroit.com/news/alleged-fraudulent-covid-19-treatments-spark-fbi-raid-of-shelby-twp-medical-spa
Jacobson v. Massachusetts, 197 U.S. 11 (1905). https://supreme.justia.com/cases/federal/us/197/11/
Roe v. Wade (1973). https://www.oyez.org/cases/1971/70-18
Zucht v. King (1922). https://supreme.justia.com/cases/federal/us/260/174/
Study Document
The Effects of Operation Desert Storm on Human Behaviors, Human Expression and Ethics
Introduction
In early 1991, the united states launched Operation Desert Storm in response to Saddam Hussein’s invasion and occupation of Kuwait while the American public held its collective breath to … able to live up to their leader’s claims, the political and social fallout from this successful prosecution of this regional war by the united states had long-term implications for American political and military leaders alike. This topic is important to analyze today because the Middle East remains a … Middle East remains a global hotspot with the very real potential to erupt in other conflicts with Western powers in general and the united states in particular. To determine the facts, the overarching purpose of this paper is to review the relevant literature to provide an analysis of … border awaiting the word from military leaders to……
References
Curtis, J. (2015, November). Reflecting on strategic results of Operation Desert Storm. Army, 65(11), 24-27.
Khan, H. (2011, July 1). An unbiased estimate of present American competitiveness from deontological and teleological perspectives of utilitarianism. Competition Forum, 9(2), 348-352.
Klotzer, C. L. (2002, October). A lesson for Americans: Desert Storm operation reports were full of lies and distortions. St. Louis Journalism Review, 32(250), 34-39.
Lindsey, J. M. & Smith, C. (2003, Summer). Rally 'round the flag: Opinion in the United States before and after the Iraq War. Brookings Review, 21(3), 20-24.
Operation Desert Storm. (2020). U.S. History. Retrieved from https://www.ushistory.org/ us/60a.asp.
Stilwell, B. (2015, September 12). 21 facts about the first Gulf War. Military.com. Retrieved from https://www.military.com/undertheradar/2015/09/21-facts-about-the-first-gulf-war .
Taylor, A. (2016, January 14). Operation Desert Storm: 25 years since the first Gulf War. The Atlantic. Retrieved from https://www.theatlantic.com/photo/2016/01/operation-desert-storm-25-years-since-the-first-gulf-war/424191/ .
Tilford, K. H., Jr. (1993, Summer). Review: The meaning of victory in Operation Desert Storm: A review essay. Political Science Quarterly, 108(2), 327-331.
Study Document
… the many alternative drinks recording, steady growth in energy drinks.
The energy drink market has seen steady growth since its launch in the united states in the year 1997. According to Kunst (2019), since energy drinks were launched in the united states in 1997, the market or segment has grown steadily at an annual rate of about 20 percent every year. The market is now … other energy drink products in the sense that it is healthier. This paper outlines the strategic marketing plan for the drink in the united states energy drinks market.
Mission Statement
The mission statement of the Lemon Thirst Beverage Company is to produce products that satisfy the needs of …
The vision of the Lemon Thirst Beverage Company is to become a leader in the manufacturing of healthy and nutritious drinks in the united states.
Values:
The Lemon Thirst Beverage Company has the following……
References
Ahmed, R. R., Vveinhardt, J., Streimikiene, D., & Awais, M. (2016). Mediating and Marketing factors influence the prescription behavior of Physicians: An Empirical Investigation. Amfiteatru Economic Journal, 18(41), 153-167.
Al-Shaar, L., Vercammen, K., Lu, C., Richardson, S., Tamez, M., & Mattei, J. (2017). Health effects and public health concerns of energy drink consumption in the United States: a mini-review. Frontiers in public health, 5, 225.
Barney, J. B., & Hesterly, W. S. (2010). Strategic management and competitive advantage: Concepts and cases (pp. 4-25). Upper Saddle River, NJ: Prentice-Hall.
Freeman, B., Kelly, B., Vandevijvere, S., & Baur, L. (2016). Young adults: beloved by food and drink marketers and forgotten by public health?. Health promotion international, 31(4), 954-961.
Hitt, M. A., Ireland, R. D., & Hoskisson, R. E. (2012). Strategic management cases: competitiveness and globalization. Cengage Learning.
Kotler, P., & Armstrong, G. (2010). Principles of marketing. Pearson education.
Kunst, A. (2019). Energy drinks consumption: consumers of energy drinks in the United States in 2018. Statista.
Mahajan, S. (2020). Sports And Energy Drinks Market Size & Share Analysis Report, 2019-2026.
Study Document
...United states Weapons of Mass Destruction
1
An electro-magnetic pulse (EMP) attack could crash the American economy and bring virtually every industry to a standstill—such is the reliance of modern business upon the digital infrastructure. Thus, considering an EMP attack is something that government should take very seriously. As more and more of the world becomes dependent upon cyber infrastructure for the maintenance of other systems, the complexity of the security services of a country grows and intensifies. Is it possible therefore that there is an overreliance upon technology and that this overreliance can actually compromise a country’s progress and increase its risk of falling into ruin should a sudden attack like an EMP attack hit where it hurts most? Absolutely—and both state and non-state actors know that, which is why either one could conduct a high altitude EMP attack upon the US. The consequences would be devastating.
Non-state actors are just……
References
Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).
Christenson, G. (2015). CBRN response. National Guard Bureau.
Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.
Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat
Jennings, P. (2006). Miami port poses serious risks. Retrieved from https://abcnews.go.com/WNT/story?id=131634&page=1
Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from http://www.johnstonsarchive.net/terrorism/chembioattacks.html
Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.
Maras, M-H. (2014). Transnational Security. Florida: CRC Press.
Study Document
...United states Gospel: John 11: 17-27
1. Contextual information about the community addressed:
Historical context: John’s Gospel was addressed to an Ephesian Gentile audience—modern day Turkey.
John 11:17-27 describes the meeting between Jesus, Mary and Martha after Lazarus has died. Jesus’ hour is prefigured in this text but the text should be considered in light of the whole, larger passage, which includes the miraculous resurrection of Lazarus (page 681).
2. Significant information:
Jesus knows of the death of Lazarus before Mary and Martha tell Him, indicating that he is Omniscient (page 687).
Martha indicates that she expected Jesus would have saved her brother but that now it is too late, even though she confesses her belief in a resurrection. This belief does not come across as holding much resignation to the will of God, however, for she is still upset that her brother is dead (page 688).
Jesus announces that He is the……
Study Document
… decision. However, the fact remains that enforcing regulations on the world’s stage is highly inconsistent and depends upon the good will of all states involved. The moment a state no longer wants to play by the rules of the UN, the effective force of the resolution is … no longer wants to play by the rules of the UN, the effective force of the resolution is null and void, and other states take immediate notice.
Additionally, the rising tension around the world between nations, from Russia to China to the US to the states in the Middle East has fueled a rise in demand for weapons. The US and Russia have ended their non-proliferation treaties and there ……
References
Asada, M. (2008). Security Council Resolution 1540 to combat WMD terrorism: effectiveness and legitimacy in international legislation. Journal of Conflict & Security Law, 13(3), 303-332.
Carter, A. B. (2004). Overhauling counterproliferation. Technology in Society 26(2-3), 257-269.
CBS. (2011). Clinton on Qaddafi: We came, we saw, he died. Retrieved from https://www.youtube.com/watch?v=mlz3-OzcExI
The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. (1999). Combating Proliferation of Weapons of Mass Destruction. Washington, D.C.
Forest, J.J.F. (2012, Winter). Framework for Analyzing the Future Threat of WMD Terrorism. Journal of Strategic Security 5, 4. Retrieved from http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1193&context=jss
Hochman, D. (2006). Rehabilitating a rogue: Libya's WMD reversal and lessons for US policy. Parameters, 36(1), 63.
Lang, C. G. (1937). Archbishop's Appeal: Individual Will and Action; Guarding Personality. London Times, 28.
Stone, O., & Kuznick, P. (2013). The untold history of the United States. Simon and Schuster.
Study Document
Part I – Regional Security Issue within the Indo-Asia-Pacific Region
The National Security Strategy (NSS) focuses on promoting the security of the united states on the premise that a safe environment is critical toward enhancing the prosperity of the nation. This strategy goes beyond promoting the interests … This strategy goes beyond promoting the interests of America and includes safeguarding the interests of partners/allies around the world. Through the strategy, the united states responds to the increasing military, political and economic competitions encountered worldwide. As part of ensuring suitable response to these competitions, NSS includes a … and economic competitions encountered worldwide. As part of ensuring suitable response to these competitions, NSS includes a regional context strategy through which the united states tailors it approaches to various regions worldwide to protect her national interests.[footnoteRef:1] The united states requires integrated regional strategies that acknowledge the nature and extent of threats, intensity……
Bibliography
Davidson, P.S. “Statement of Admiral Philip S. Davidson, U.S. Navy Commander, U.S. Indo-Pacific Command Before the House Armed Services Committee on U.S. Indo-Pacific Command Posture.” United States Senate, March 27, 2019, https://www.armed-services.senate.gov/imo/media/doc/Davidson_02-12-19.pdf
Department of Defense. “Summary of the 2018 National Defense Strategy of the United States of America.” National Defense Strategy, 2018, https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf
Muller, K. “The Essence of Coercive Air Power: A Primer for Military Strategies.” Air University, https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/mueller.pdf
Pape, R.A. Bombing to Win: Air Power and Coercion in War, 1st ed. Ithaca, NY: Cornell University Press, 1996.
Tammen, R.L., Kugler, J. & Lemke, D. “Power Transition Theory.” International Relations, June 27, 2017, DOI: 10.1093/OBO/9780199743292-0038
The White House. “National Security Strategy of the United States of America.” The White House, December 2017, https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf
Withers, P. “Integrating Cyber with Air Power in the Second Century of the Royal Air Force.” Medium, March 4, 2019, https://medium.com/raf-caps/integrating-cyber-with-air-power-in-the-second-century-of-the-royal-air-force-bca74b8d42ed
Study Document
… The U.S. counterterrorism strategy up to now has thus led to some successes but considerably more failures in terms of lives lost and states destabilized or destroyed altogether, creating hotbeds for future terrorist breeding ground. The failure of the War on Terror can also be quantified in … from being shipped to the U.S. Terrorism should not be conceived narrowly any longer: it is not just jihadis who use terror—other nation states and non-state-actors use it as well in different ways, such as China with drugs and Anonymous with cyber terrorism. The U.S. should be … counterterrorism should be to end the state sponsorship of terrorism. The only way to effectively do this is to end all foreign aid. states like Saudi Arabia and Israel will no longer be able to provide funds to terrorist groups as proxy agents to wage their own ……
References
Bipartisan Policy Center. (2017). Defeating terrorists, not terrorism. Retrieved from https://bipartisanpolicy.org/report/counterterrorism-policy-from-911-to-isis/
Englehardt, T. (2018). America’s war on terror. Retrieved from https://www.thenation.com/article/americas-war-on-terror-has-cost-taxpayers-5-6-trillion/
Freeman, M. (2018). ISIS Is a US-Israeli Creation. Top Ten “Indications.” Retrieved from https://www.globalresearch.ca/isis-is-a-us-israeli-creation-top-ten-indications/5518627
Malzahn, S. M. (2002). State Sponsorship and Support of International Terrorism: Customary Norms of State Responsibility. Hastings Int'l & Comp. L. Rev., 26, 83.
Nordland, R. & Mashal, M. (2019). U.S. and Taliban Edge Toward Deal to End America’s Longest War. Retrieved from https://www.nytimes.com/2019/01/26/world/asia/afghanistan-taliban-peace-deal.html
White House. (2003). National strategy for combating terrorism. Retrieved from https://georgewbush-whitehouse.archives.gov/news/releases/2003/02/20030214-7.html
Study Document
Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores … has emerged as an international problem because of increased reliance on cyberspace by state and non-state actors. Nations across the globe including the united states, China and Russia are using cyberspace to commit…[break]…of the acceptability of cyber espionage. Semi-structured interviews will be conducted on a representative sample from ……
Bibliography
Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf
Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).
Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).
Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).
Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017. https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">
Study Document
Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores … has emerged as an international problem because of increased reliance on cyberspace by state and non-state actors. Nations across the globe including the united states, China and Russia are using cyberspace to commit cyber espionage. However, the legitimacy of this practice remains questionable amidst the proposition that it … illegal practices that result in information theft that could be used to attack an adversary. It poses threats and risks to relations between states and has become a complex international problem in the modern world. Cyber espionage is largely viewed as a new intelligence gathering approach and ……
Bibliography
Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf
Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).
Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).
Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).
Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017. https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">
We have over 150,000+ study documents to help you.
Sign Up for FREE