Workplace Safety Essays (Examples)

Studyspark

Study Document Study Document

Purchasing And Supply Management

Pages: 9 (2780 words) Sources: 8 Document Type:Essay Document #:73672529

… gives is fundamentally in line with the risk management tool given by Harland et al., (2003). Benton (2013) examines the cost, quality, delivery, safety and morale as drivers of lean manufacturing. The issue that Harland et al. (2003) fail to focus on is morale.
What this indicates … focus on is morale.
What this indicates is that in order to properly assess supply network risk, some attention should be given to workplace morale, as it will likely impact performance and weigh on the supply network. If performance is affected by a low morale, the supply ……

References

References

BDC. (2019). 6 ways the purchasing department can improve your business. Retrieved from  https://www.bdc.ca/en/articles-tools/operations/purchasing/pages/purchasing-department-objectives.aspx 

Benton, W. C. (2013). Supply chain focused manufacturing planning and control. Nelson Education.

Burt, D. N. (2010). Supply Management, 8th Edition. Devry.

Harland, C., Brenchley, R., & Walker, H. (2003). Risk in supply networks. Journal of Purchasing and Supply management, 9(2), 51-62. Retrieved from  http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.471.2910&rep=rep1&type=pdf 

Holmlund, M. & Strandvik, T. (1999) Perception configuration in business relationship, Management Decision, 37(9), 686-696

MacNeil/Lehrer Productions (Producer). (1999). Your computer, your way: Dell and thedirect sales model [Video file]. Retrieved from https://libraryresources.columbiasouthern.edu/login

Monczka, R. & Handfield, R. (2016). Purchasing and supply chain management. Boston, MA: Cengage.

NC State University. (2003). Negotiating for success. Retrieved from  https://scm.ncsu.edu/scm-articles/article/negotiating-for-success

Studyspark

Study Document Study Document

Political Correctness In Modern Politics An Assessment Of The Trump

Pages: 10 (3132 words) Sources: 5 Document Type:Essay Document #:47385332

… ideals closely linked to equality and diversity. It therefore follows that as per this school of thought, political correctness not only threatens the safety and wellbeing of individual citizens, but also that of the entire nation. Marron (2019) is of the opinion that political correctness stifles self-expression. … upon to air all their private thoughts in public. It would be unwise to mouth what you think of each collogue at the workplace. It could, thus, be argued that these basic standards of language and interaction ought not to be sacrificed at the altar……

References

References

Conway, L.C. (2020). How a cultural revolt against “political correctness” helped launch Trump into the presidency. Retrieved from https://blogs.lse.ac.uk/usappblog/2018/02/28/how-a-cultural-revolt-against-political-correctness-helped-launch-trump-into-the-presidency/

Hart, R.P. (2020). Trump and Us: What He Says and Why People Listen. New York, NY: Cambridge University Press.

Morini, M. (2020). Lessons from Trumps Political Communication: How to Dominate the Media Environment. Belmont, CA: Springer Nature.

Marron, M.B. (2019). Misogyny and Media in the Age of Trump. New York, NY: Rowman & Littlefield.

Mooney, A. & Evans, B. (2015). Language, Society and Power. New York, NY: Routledge.

NPR (2016). \\\\\\'Politically Correct\\\\\\': The Phrase Has Gone From Wisdom To Weapon. Retrieved from  https://www.npr.org/sections/codeswitch/2016/12/14/505324427/politically-correct-the-phrase-has-gone-from-wisdom-to-weapo n

Travers, M. (2019). In New Research, Psychologists Explore The Upside Of Political Incorrectness. Retrieved from  https://www.forbes.com/sites/traversmark/2019/10/09/in-new-research-psychologists-explore-the-upside-of-political-incorrectness/#7935b4c252af 

Studyspark

Study Document Study Document

Autoethnography On Life In Quarantine

Pages: 9 (2825 words) Sources: 3 Document Type:Essay Document #:69295105

… going on outside in the world.
However, as I would soon come to learn, even at home you can lose that sense of safety and start to feel entombed. I will explain how this happened, but first I have to describe my situation at home.
I live ……

References

Works Cited

Branch, S., Shallcross, L., Barker, M., Ramsay, S., & Murray, J. P. (2018). Theoretical Frameworks That Have Explained Workplace Bullying: Retracing Contributions Across the Decades. Concepts, Approaches and Methods, 1-44.

Hilton, J. L., & Von Hippel, W. (1996). Stereotypes. Annual review of psychology,  47(1), 237-271.

McLeod, S. (2008) Social Identity Theory. Simply Psychology. Retrieved from  http://www.simplypsychology.org/social-identity-theory.html 

Studyspark

Study Document Study Document

Coronavirus COVID 19

Pages: 9 (2907 words) Sources: 4 Document Type:Essay Document #:604304

… people suffer from economic depression or from psychological damage, whether people develop neuroses regarding the fear of the spread of germs, or whether workplace are reorganized and structured so that employees must work virtually from home, whether face masks become required in public places, whether digital monitoring … monitoring using chip implants becomes a staple of American life, whether more freedoms and civil rights are given up in the name of safety and security, and whether the divide between the Right and Left reaches a point where all-out civil war become inevitable—these are all crisis ……

References

References

Chen, N., Zhou, M., Dong, X., Qu, J., Gong, F., Han, Y., ... & Yu, T. (2020).  Epidemiological and clinical characteristics of 99 cases of 2019 novel coronavirus pneumonia in Wuhan, China: a descriptive study. The Lancet, 395(10223), 507-513.

Kekatos, M. (2020). Ventilating too soon. Retrieved from  https://www.dailymail.co.uk/health/article-8201783/Some-doctors-moving-away-ventilators-virus-patients.html 

Myers, S. L. (2020). China Spins Tale That the U.S. Army Started the Coronavirus Epidemic. Retrieved from https://www.nytimes.com/2020/03/13/world/asia/coronavirus-china-conspiracy-theory.html

National Academies of Sciences, Engineering, and Medicine. (2015). Improving diagnosis in health care. National Academies Press.

Oliver, D. (2020). Coronavirus genetic material stayed on surfaces for up to 17 days on Diamond Princess cruise, CDC says. Retrieved from  https://www.usatoday.com/story/travel/cruises/2020/03/24/coronavirus-diamond-princess-cabin-surfaces-contaminated-cdc-report/2905924001/ 

Studyspark

Study Document Study Document

Security In Communication Challenges

Pages: 10 (2871 words) Sources: 11 Document Type:Research Paper Document #:73429324

… with cybercriminal actions, bearing in mind that at the present moment, progressively more individuals are utilizing wireless communication networks in the home and workplace settings (Ijemaru et al., 2018).
Chapter 2: Literature Review
The enormous worldwide infrastructure does not have any fundamental security mechanisms that are embedded … communication network security is mounting on a day to day basis. The fundamental reasons for such security include conducting business, proper communication and safety in prospectively unsafe environments and also the development and execution of enterprise-wide communication security policies (Jain, 2013). The purpose of this paper is ……

References

References

Bagheri-Karam, G. (2010). Physical-Layer Security in Wireless Communication Systems. Ontario: Waterloo.

Chang, Z. (2019). Physical Layer Security in Wireless Communications. University Of Jyväskylä. Retrieved from:  http://users.jyu.fi/~timoh/TIES327/WPLS.pdf 

Chen, Q., Zhang, C., & Zhang, S. (2008). Secure transaction protocol analysis: models and applications. Springer-Verlag.

GSMA. (2019). Number of Mobile Subscribers Worldwide Hits 5 Billion. Retrieved from:  https://www.gsma.com/newsroom/press-release/number-mobile-subscribers-worldwide-hits-5-billion/ 

Gu, X., & Hunt, R. (2005). Wireless LAN attacks and vulnerabilities. the proceeding of IASTED Networks and Communication Systems.

Ijemaru, G. K., Adeyanju, I. A., Olusunyi, K. O., Ofusori, T. J., Ngharamike, E. T., Sobowale, A. A. (2018). Security Challenges of Wireless Communications Networks: A Survey. International Journal of Applied Engineering Research, 13 (8): 5680 – 5692.

IJEMARU, G. K., UDUNWA, A. I., NGHARAMIKE, E. T., & OLEKA, E. U. (2015). Evaluating the Challenging Issues in the Security of Wireless Communication Networks in Nigeria. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 3, Issue 12, pp. 1-5, 2014.

Jain, A. (2013). Network Security-The Biggest Challenge in Communication. Advance in Electronic and Electric Engineering. Research India Publications.

Join thousands of other students and

"spark your studies".