Conflict Essays (Examples)

Studyspark

Study Document Study Document

Elder Abuse

Pages: 7 (2239 words) Sources: 4 Document Type:Term Paper Document #:22335640

… and identify elder abuse (Lachs, Teresi, Ramirez, et al., 2016). Nurses have a responsibility to protect their patients from abuse, but may encounter conflicts when they suspect family members, other residents, or other healthcare workers are perpetrating some form of elder abuse. Misreading cues, misunderstanding cultural communication ……

References

References

Falk, N. L., Baigis, J., Kopac, C., (August 14, 2012) \\\\\\\\\\\\"Elder Mistreatment and the Elder Justice Act\\\\\\\\\\\\" OJIN: The Online Journal of Issues in Nursing 17(3).

Forum on Global Violence Prevention; Board on Global Health; Institute of Medicine; National Research Council (2014). Ethical considerations. Washington (DC): National Academies Press (US); 2014 Mar 18.

Lacher, S., Wettstein, A., Senn, O., et al. (2016). Types of abuse and risk factors associated with elder abuse. Swiss Medical Weekly 2016(146): 1-10.

Lachs, M.S., Teresi, J.A., Ramirez, M., et al. (2016). The prevalence of ersident-to-resident elder mistreatment in nursing homes. Annals of Internal Medicine 165(4):229-236.

Malmedal, W., Iversen, M.H. & Kilvik, A. (2014). Sexual abuse of older nursing home residents: A literature review. Nursing Research and Practice 2015(Article 902515):  http://dx.doi.org/10.1155/2015/902515 

Roberto, K.A. (2016). The complexities of elder abuse. American Psychologist 71(4): 302-311.

Saghafi, A., Bahramnezhad, F., Poormollamirza, A., et al. (2019). Examining the ethical challenges in managing elder abuse: a systematic review. Journal of Medical Ethics and History of Medicine 2019(12):  https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6642445/ 

Wangmo, T., Nordstrom, K. & Kressig, R.W. (2017). Preventing elder abuse and neglect in geriatric institutions: Solutions from nursing care providers. Geriatric Nursing 38(5): 385-392.

Studyspark

Study Document Study Document

Gender And Veterans Differences In Access To Mental Health Care Services

Pages: 10 (2880 words) Sources: 8 Document Type:literature review Document #:16426783

… depression care as well. So, per person, the medical costs of women are higher than men in general.
If women are deployed in conflict areas of war while being in the army, the medical costs might be higher (high outpatient and pharmacy costs) due to resulting mental … Definite Need for Mental Health Care for Military Veterans
Various studies have now emerged which prove that military veterans who have served in conflict seas like Iraq and Afghanistan need special mental health care. The reason for this being that they suffer from severe mental impacts of … might not be deployed directly to the war field they work in the same area in assisting roles and are close to the conflict area.
The negative impacts on their mental health are quite noticeable and are important to be dealt with as soon as possible, as ……

References

References

Adams, R.E., Urosevich, T.G., Hoffman, S.N., Kirchner, H.L., Figley, C.R., Withey, C.A., Boscarino, J.J., Dugan, R.J. & Boscarino, J.A. (2019). Social and psychological risk and protective factors for veteran well-being: The role of veteran identity and its implications for intervention. Military Behavioral Health, 7(3), 304-314.  https://doi.org/10.1080/21635781.2019.1580642 

Allore, H.G., Ning, Y., Brandt, C.A., & Goulet, J.L. (2013). Accounting for the hierarchical structure in veterans’ health administration data: Differences in healthcare utilization between men and women veterans. International Journal of Statistics in Medical Research, 2(2), 94-103. DOI: 10.6000/1929-6029.2013.02.02.03

Brooks, C. & Chopik, W. (2010, June 17). Research finds deployment affects mental health of veterans differently. Michigan State University.  https://msutoday.msu.edu/news/2020/research-finds-deployment-affects-mental-health-of-veterans-differently/ 

Duggal, M., Goulet, J.L., Womack, J., Gordon, K., Mattocks, K., Haskell, S.G., Justice, A.C. & Brandt, C.A. (2010). Comparison of outpatient health care utilization among returning women and men veterans from Afghanistan and Iraq. BMS Health Services Research, 10 (175).  https://doi.org/10.1186/1472-6963-10-175 

Harpaz-Rotem, I. & Rosenheck, R.A. (2011). Serving those who served: Retention of newly returning veterans from Iraq and Afghanistan in mental health treatment. Psychiatric Services, 62(1), 22-27. DOI: 10.1176/ps.62.1.pss6201_0022.

Haskel, S.G., Brandt, C.A., Krebs, E.E., Skanderson, M., Kerns, R.D., & Goulet, J.L. (2009). Pain among veterans of operations enduring freedom and Iraqi freedom: Do women and men differ? Pain Medicine, 10(7), 1167-1173.  https://doi.org/10.1111/j.1526- 4637.2009.00714.x

Kaur, S., Stechuchak, K.M., Coffman, C.J., Allen, K.D., & Bastain, L.A. (2007). Gender differences in health care utilization among veterans with chronic pain. Journal of General Internal Medicine, 22(2), 228-233. DOI: 10.1007/s11606-006-0048-5

Koo, K.H., Madden, E. & Maguen, S. (2015). Race, ethnicity, and gender differences in V.A. health care service utilization among U.S. veterans of recent conflicts. Psychiatric Services, 66(5), 507-513.  https://doi.org/10.1176/appi.ps.201300498

Studyspark

Study Document Study Document

Employee Treatment In The Workplace

Pages: 6 (1926 words) Sources: 10 Document Type:Essay Document #:40062919

… that age was the but-for-cause of the challenged adverse action taken by the employer (U.S. Equal Employment Opportunity Commission, n.d.).
When federal legislature conflicts with State laws, the federal law preempts or displaces state law based on the doctrine of preemption and Supremacy Clause of the Constitution … the Constitution unless the federal law is unconstitutional. In such instances, a federal court may require the state to cease particular behavior that conflicts or interferes with the federal law.
Employment…[break]…resources required to participate in the compensation system (Patronis, 2011). Florida laws differ with federal immigration law ……

References

References

Coble, C. (2015, June 11). Can Undocumented Immigrants Get Workers’ Comp? Retrieved March 12, 2020, from  https://blogs.findlaw.com/injured/2015/06/can-undocumented-immigrants-get-workers-compensation.html 

Grabell, M. & Berkes, H. (2018, February 7). Florida Bill Seeks to Stop Arrests of Injured Immigrant Workers. National Public Radio. Retrieved March 12, 2020, from  https://www.npr.org/sections/thetwo-way/2018/02/07/583995647/florida-bill-seeks-to-stop-arrests-of-injured-immigrant-worker s

Jennings, M. (2018). Business: Its Legal, Ethical, and Global Environment (11th ed.). Mason, OH: Cengage Learning.

Lenard, P.M. (1987). Unjust Dismissal of Employees at Will: Are Disclaimers a Final Solution? Fordham Urban Law Journal, 15(2), 533-565.

Lindsay, D.C. & Moore, L.M. (2011). State and Federal Leave Laws: How Recent Legislative Changes Have Complicated Leave Administration. Employment Relations Today, 38(1), 77-90.

Macgillivray, E.D., Beecher, H.J.M. & Golden, D. (2010, December). Legal Developments – Recent Action, Federally and in the Workplace. Global Business and Organizational Excellence, 73-81.

Mello, J.A. (2019, August 9). Why the Equal Pay Act and Laws Which Prohibit Salary Inquiries of Job Applicants Can Not Adequately Address Gender-Based Pay Inequity. SAGE Open, 9(3),  https://doi.org/10.1177/2158244019869106 

Muhl, C.J. (2001, January). The Employment-at-will Doctrine: Three Major Exceptions. Monthly Labor Review, 3-11. Retrieved from Bureau of Labor Statistics website:  https://www.bls.gov/opub/mlr/2001/01/art1full.pdf

Studyspark

Study Document Study Document

Psychology

Pages: 5 (1482 words) Sources: 8 Document Type:question answer Document #:99253146


Question 2
What does dissonance do to a person, and what can they do the reduce it?
Cognitive dissonance being a state of confliction between a person’s belief and outward actions or expressions results in varying degrees of discomfort and uneasiness, depending on the degree of conflict within the person (Van Kampen, 2019. p. 7). The discomfort associated with cognitive dissonance is usually in form of anxiety, shame or guilt … in form of anxiety, shame or guilt (Legg, 2019). Since a person can only tolerate an inconvenient cognitive state for a period, the conflicted person attempts to reduce their dissonance by equally reducing the conflict within them. This motivation to escape from the mental cage of cognitive dissonance is termed “the principle of cognitive consistency” (Van Kampen, 2019. … & Murayama, 2019). As prescribed by the principle of cognitive consistency, the human mind continuously tries to harmonize itself……

References

References

Cherry, K. (2020). The Incentive Theory of Motivation. Retrieved from:  https://www.verywellmind.com/the-incentive-theory-of-motivation-2795382 

Festinger, L., & Carlsmith, J. M. (1959). Thoughts out of tune. Journal of Abnormal and Social Psychology, 58, 203-210.

Izuma, K., & Murayama, K. (2019). The neural basis of cognitive dissonance. In E. Harmon-Jones (Ed.), Cognitive dissonance: Reexamining a pivotal theory in psychology (p. 227–245). American Psychological Association.  https://doi.org/10.1037/0000135-011 

Legg, T. (2019). Cognitive dissonance: What to know. Retrieved from:  https://www.medicalnewstoday.com/articles/326738#overview 

McLeod, S. (2018). Cognitive dissonance. Retrieved from  https://www.simplypsychology.org/cognitive-dissonance.html 

Northrup, C. (2018). 4 ways to reduce cognitive dissonance. Retrieved from:  https://www.drnorthrup.com/4-ways-to-reduce-cognitive-dissonance/ 

Silverman, K., Jarvis, B. P., Jessel, J., & Lopez, A. A. (2016). Incentives and motivation. Translational Issues in Psychological Science, 2(2), 97–100. DOI:10.1037/tps0000073 Retrieved from:  https://sci-hub.tw/10.1037/tps0000073 

Van Kampen, H. S. (2019). The principle of consistency and the cause and function of behaviour. Behavioural processes, 159, 42-54. Retrieved from:  https://scihub.tw/https://doi.org/10.1016/j.beproc.2018.12.013

Studyspark

Study Document Study Document

Polands Solidarity Movement 1980 1989

Pages: 5 (1353 words) Sources: 4 Document Type:Essay Document #:29966337

… larger society found a way of embracing consolidation and coordinated efforts. In itself, Solidarity was founded in August 1980 (International Center on Nonviolent Conflict – ICNC, 2020). In essence, the new movement was firmly rooted in trade unionism. To a large extent, Solidarity was able to uncover ……

References

References

Howlett, C.F. (1984). Nicholas Murray Butler\\\\\\'s Crusade for a Warless World. The Wisconsin Magazine of History, 67(2), 99-120.

International Center on Nonviolent Conflict – ICNC (2020). Czechoslovakia’s Velvet Revolution (1989). Retrieved from  https://www.nonviolent-conflict.org/czechoslovakias-velvet-revolution-1989/ 

International Center on Nonviolent Conflict – ICNC (2020, January 13). A Force More Powerful - English - Denmark / Poland / Chile (high definition) [Video]. YouTube.  https://www.youtube.com/watch?v=cM695veBSUU 

Studyspark

Study Document Study Document

Culture Analysis At A Software Company

Pages: 5 (1573 words) Sources: 5 Document Type:Research Paper Document #:44019185

...Conflict Culture Analysis Paper
Company Overview
I’m studying a software company that shall be known as K. K is not based in Silicon Valley, but elsewhere in the US, with offices around the world. K sells SaaS products in the B2B market and has sales in the hundreds of millions, and over 1000 employees. This company has also acquired several small firms in recent years. Integrating all of those individual cultures into a cohesive one has been one of the organization’s biggest challenges. This paper will outline the culture at K via primary sources, supplemented with secondary source material on organizational culture theory.
Primary research consisting of several employee interviews revealed some challenges, especially the domains of underlying assumptions and values. There is a lack of artifacts that provide meaning, which is another problem that will need to be resolved.
Primary Research
As I know people who work in this company……

References

References

Chambers, K. & Honeycutt, A. (2009) Telecommunications mega-mergers: Impact on employee morale and turnover intention. Journal of Business & Economics Research. Vol. 7 (2) 43-52.

Dencker, J., Joshi, A, & Martocchio, J. (2007) Employee benefits as context for intergenerational conflict Human Resource Management Review. Vol. 17 (2) 208-220.

Lund, D. (2003) Organizational culture and job satisfaction. Journal of Business and Industrial Marketing. Vol. 18 (3) 219-236.

North, M. & Fiske, S. (2015) Intergenerational resource tensions in the workplace and beyond: Individual, interpersonal, institutional and international. Research in Organizational Behavior. Vol. 35 (2015) 159-179.

Yamanoi, J. & Sayama, H. (2013). Post-merger cultural integration from a social network perspective: A computational modeling approach. Computational and Mathematical Organization Theory Vol. 19 (2013) 516-537.

Studyspark

Study Document Study Document

Veteran Benefits Administration

Pages: 8 (2465 words) Sources: 3 Document Type:Implementation Paper Document #:56829115

...Conflict Technology Proposal/Implementation Paper
A: Introduction
The Department of Veterans Affairs (VA) remains a vital entity in as far as the provision of key services to veterans in the country is concerned. The Veteran Benefits Administration (VBA), to a large extent, concerns itself with the administration of U.S. Department of Veteran Affairs’ programs. This is more so the case with regard to the provision or advancement of various forms of support to not only veterans and survivors, but also their dependents. Towards this end, some of the main programs that VBA administers include, but they are not limited to; pension and compensation, rehabilitation and employment, loan guaranty, and insurance. In the year 2016, the National Archives and Records Administration (2016) released a records management inspection report which was categorical that “the VA Records Management Program lacks several basic records management fundamentals.” The relevance of VA records cannot be overstated when it……

References

References

Aziz, A.A., Mohammad Y., Mokhtar, U.A. & Ambari, D.I. (2017). Establishing Policy for the Implementation of Electronic Document and Records Management System in Public Sector in Malaysia: The Influencing Factors. Advanced Science Letters, 23(11), 10732-10736.

National Archives and Records Administration (2016). Department of Veterans Affairs Records Management Program: Records Management Inspection Report. Retrieved from  https://www.archives.gov/files/records-mgmt/pdf/va-2016-inspection.pdf 

U.S. Department of Veteran Affairs (2020). About VBA. Retrieved from  https://www.benefits.va.gov/BENEFITS/about.a sp

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

...Conflict Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage,……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Test1

Pages: 8 (2254 words) Sources: 7 Document Type: Document #:19731108

… to other youth populations. Akin to several other homeless youths, LGBTC youth more often than not report abuse, neglect, as well as family conflict as the basis for fleeing from home. Notably, rejection on the basis of their gender identity or sexual orientation is considered to be … from home. Notably, rejection on the basis of their gender identity or sexual orientation is considered to be the foundation for the family conflict. Notably, family conflict is deemed to be the most underlying reason for all youth homelessness. 50 percent of all teenagers experience a negative reaction from their … practice is because it encounters emotional suffering and anguish, depression, seclusion, internalized homophobia or transphobia, violence and victimization, substance abuse, depression, suicide, pregnancy, conflict with the family, poor performances in the school setting and also sexually transmitted diseases (Morrow, 2004).
Identify, Discuss, compare and contrast the special ……

References

References

Bilodeau, B. L., & Renn, K. A. (2005). Analysis of LGBT identity development models and implications for practice. New directions for student services, 2005(111), 25-39.

Cray, A., Miller, K., & Durso, L. E. (2013). Seeking shelter: The experiences and unmet needs of LGBT homeless youth. Washington, DC: Center for American Progress.

Cunningham, M., Pergamit, M., Astone, N., & Luna, J. (2014). Homeless LGBTQ youth. Washington, DC: Urban Institute.

Dank, M., Yahner, J., Madden, K., Bañuelos, I., Yu, L., Ritchie, A., ... & Conner, B. (2015). Surviving the Streets of New York: Experiences of LGBTQ Youth, YMSM and YWSW Engaged in Survival Sex. Washington, DC: Urban Institute.

D'augelli, A. R. (2006). Developmental and contextual factors and mental health among lesbian, gay, and bisexual youths. American Psychological Association.

Durso, L. E., & Gates, G. J. (2012). Serving our youth: Findings from a national survey of services providers working with lesbian, gay, bisexual and transgender youth who are homeless or at risk of becoming homeless. Los Angeles: The Williams Institute with True Colors and the Palatte Fund.

Foss, S. (2017). A Guide to Social Work Advocacy for Transgender Adolescents and Young Adults. Texas State University.

Higa, D., Hoppe, M. J., Lindhorst, T., Mincer, S., Beadnell, B., Morrison, D. M., ... & Mountz, S. (2014). Negative and positive factors associated with the well-being of lesbian, gay, bisexual, transgender, queer, and questioning (LGBTQ) youth. Youth & Society, 46(5), 663-687.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

...Conflict Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage,……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Join thousands of other students and

"spark your studies".