Study Document
...Argument In ancient Athens, it was customary for women to be kept indoors. They were not supposed to be out in public places or mixing with the men. That was considered immodest and bad manners. Though they could come out for social reasons, such as to help family and friends or to attend festivals, their sphere was essentially domestic and in the home was where they were supposed to be.[footnoteRef:2] The famous Greek playwright Euripides had a line in his play The Trojan Women: “What causes women a bad reputation is not remaining inside.”[footnoteRef:3] In ancient Sparta, however, it was just the opposite: women there held positions of power and even ruled the city-state. Spartan women could own land and had other rights that Athenian women did not have.[footnoteRef:4] This difference should not be surprising, however, because these same differences still exist today. The differences that lead to some women staying……
Bibliography
Cauce, Ana Mari, and Melanie Domenech-Rodriguez. "Latino families: Myths and
realities." Latino children and families in the United States: Current research and future directions (2002): 3-25.
Euripides. The Trojan Women. http://classics.mit.edu/Euripides/troj_women.html
Fleck, Robert K., and F. Andrew Hanssen. "“Rulers ruled by women”: an economic analysis of the rise and fall of women’s rights in ancient Sparta." Economics of Governance 10, no. 3 (2009): 221-245.
Friedan, Betty. The Feminine Mystique. NY: W. W. Norton, 1963.
Lewis, Sian. The Athenian Woman: an iconographic handbook. Routledge, 2013.
Rice, Joy K. "Reconsidering research on divorce, family life cycle, and the meaning of family." Psychology of Women Quarterly 18, no. 4 (1994): 559-584.
Study Document
...Argument Homelessness is an issue that has persisted in the United States because of the ever-changing demographic factors and economic circumstances. The composition and size of the homeless population in the country continues to change due to these varying factors. Over the past decade, homelessness has attracted public attention given the dramatic increase in the number and composition of victims. While numerous efforts have been undertaken to address the issue, homelessness remains a major problem for policymakers and the public. An important element in dealing with the problem of homelessness is understanding victimization and its contributing factors. Through understanding victimization, policymakers and other stakeholders will develop suitable policies and approaches to address homelessness. This paper explores street crime victimization of homeless women and children.
Importance of the Issue
According to Stanley et al. (2016), homelessness is an ongoing problem facing the United States as the size of the homeless population continues……
References
Bachega, H. (2018, October 8). Homeless in US: A Deepening Crisis on the Streets of America. BBC. Retrieved November 22, 2019, from https://www.bbc.co.uk/news/world-us-canada-45442596
Bendix, A. (2019, November 18). The 9 States with the Worst Homelessness Crises Reveal How Bad the Housing Crunch Has Gotten in US Cities. Business Insider. Retrieved November 22, 2019, https://www.businessinsider.com/photos-homelessness-states-worst-crises-2018-11?IR=T
Ellsworth, J.T. (2018, December 3). Street Crime Victimization Among Homeless Adults: A Review of the Literature. Victims & Offenders: An International Journal of Evidence-based Research, Policy and Practice, 14(1), 96-118.
Family & Youth Services Bureau. (2016, June 24). Domestic Violence and Homelessness: Statistics (2016). Retrieved from U.S. Department of Health and Human Services website: https://www.acf.hhs.gov/fysb/resource/dv-homelessness-stats-2016
Norris, S. (2019, September 9). Women Fleeing Abuse Are Being ‘re-traumatized’ by the Housing System. City Metric. Retrieved November 22, 2019, from https://www.citymetric.com/politics/women-fleeing-abuse-are-being-re-traumatised-housing-system-4769
Stanley, J.L., Jansson, A.V., Akinyemi, A.A. & Mitchell, C.S. (2016, November). Characteristics of Violent Deaths Among Homeless People in Maryland, 2003-2011. American Journal of Preventive Medicine, 51(5), S260-S266.
Turner, M.M., Funge, S.P. & Gabbard, W.J. (2018). Victimization of the Homeless: Perceptions, Policies, and Implications for Social Work Practice. Journal of Social Work in the Global Community, 3(1), 1-12.
Tyler, K.A. & Beal, M.R. (2010). The High-risk Environment of Homeless Young Adults: Consequences for Physical and Sexual Victimization. Violence and Victims, 25(1), 101-115.
Study Document
...Argument Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber warfare, helps to establish appropriate countermeasures against cyberattacks and potential threats in cyberspace, and enhances intelligence gathering. While the study provides significant insights on this topic, future studies should examine the……
Bibliography
Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018. https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf
Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf
Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).
Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).
Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).
Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017. https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf
Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.
Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015. http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/
Study Document
… In the theory, Carl focused more on the changing the social elements of war and downplayed the technological ones. In this paper, my argument is that the technological advances and innovations in the airpower, cyberspace, and space industries will alter the future of war and lead to ……
References
Bender, Willaim J., and William D. Bryant. Assuring the USAF core missions in the information age. Office of the Secretary of the Air Force Washington United States, 2016.
Clodfelter, Mark. "Back from the future: The impact of change on airpower in the decades ahead." Strategic Studies Quarterly 3, no. 3 (2009): 104-122.
Grissom, Adam. "The future of military innovation studies." Journal of strategic studies 29, no. 5 (2006): 905-934.
JOINT CHIEFS OF STAFF-JCS. "Joint Operating Environment JOE 2035: The Joint Force in a Contested and Disordered World. US Joint Chiefs of Staff, J7, Joint Force Development [cit. 2016-07-01]." (2016).
Study Document
...Argument Introduction
Corruption weakens the strength of a democracy, undermining public trust, and leading to a downward spiral of apathy and discontent. Low voter participation itself becomes a major factor perpetuating the possibility of corruption. A feeling of powerlessness pervades even the most robust of the world’s democracies. If democratic governments are to be responsive to the people they serve, corruption needs to be uprooted whenever it manifests. Reforming corruption and reducing the likelihood of corrupt individuals maintaining their positions of power requires a multifaceted approach taking into account variables like ethical culture and political climate. Public perceptions of the reliability and accountability of government are also important factors, influenced in part by the media but also by social norms, ethics, and values. The importance of exposing corruption and uprooting it through effective dialogue and awareness cannot be underestimated because of the fact that democratic governments depend on transparency, openness, and……
Study Document
...Argument Abstract
This paper discusses the issue of privacy in social networks with respect to advances in machine learning. It shows how machine learning protocols have been developed both to enhance and secure privacy as well as to invade privacy and collect, analyze, predict data based on users’ information and experience online. The conflict between these two directions in machine learning is likely to lead to a system wherein machine learning algorithms are actively engaged in the subversion of one another, with one attempting to conceal data and the other attempting to uncover it. This paper concludes with recommendations for social networks and the issue of privacy regarding machine learning.
Introduction
Social networks have allowed an ocean of personal data to form that is now sitting there waiting for machine learning algorithms to collect it, analyze it, and recognize individuals on social media (Oh, Benenson, Fritz & Schiele, 2016). Machine learning……
References
Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.
Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.
Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.
Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.
Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/
Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.
Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.
Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.
Study Document
… poor lending practices, which bring about a ballooned portfolio of defaulted and unpaid loans. Furthermore, a study conducted by Bashir (2000) makes the argument that the ownership structure of a financial institution is a key determining factor of credit risk. The study outcomes demonstrated that foreign-owned banking ……
References
Bhattarai, Y. R. (2016). Effect of credit risk on the performance of Nepalese commercial banks. NRB Economic Review, 28(1), 41-64.
Das, A. and Ghosh, S. (2007). Determinants of Credit Risk in Indian State-owned Banks: An Empirical Investigation. Economic Issues, 12(2): 48-66.
Derelio?lu, G., & Gürgen, F. (2011). Knowledge discovery using neural approach for SME’s credit risk analysis problem in Turkey. Expert Systems with Applications, 38(8), 9313-9318
Garr, D. K. (2013). Determinants of credit risk in the banking industry of Ghana. Developing Country Studies, 3(11), 64-77.
Gizaw, M., Kebede, M., & Selvaraj, S. (2015). The impact of credit risk on profitability performance of commercial banks in Ethiopia. African Journal of Business Management, 9(2), 59-66.
Johnson, B., & Christensen, L. (2008). Educational research: Quantitative, qualitative, and mixed approaches. New York: Sage.
Kithinji, A. M. (2010). Credit risk management and profitability of commercial banks in Kenya. (Doctoral dissertation, University of Nairobi).
Limam, I. (2001). Measuring technical efficiency of Kuwaiti banks. Kuwait: Arab Planning Institute.
Study Document
… opened up a giant can of worms that probably would have worked itself out without interference from the Court. However, that is the argument made about slavery, too—that it would have ended on its own as technology advanced and slavery no longer became economically viable. These are ……
Bibliography
Cripps, Thomas and and David Culbert. “The Negro Soldier (1944): Film Propaganda in Black and White.” American Quarterly Vol. 31, No. 5, Special Issue: Film and American Studies (Winter, 1979), pp. 616-640: The Josh Hopkins University Press.
German, Kathleen M. Promises of Citizenship: Film Recruitment of African Americans in World War 2. University Press of Mississippi, 2017.
Klarman, Michael. Brown v Board of Education and the Civil Rights Moment. New York, NY: Oxford University Press, 2007.
Study Document
...Argument Introduction
Paulo Freire rejected the traditional method of teaching, which consists mainly of passive learning, and advocated a more active learning approach. The style of learning he said worked best at shaping students was something similar to the Socratic method of dialogue and inquiry. This made students more engaged. Instead of sitting in their desks like passive receptacles waiting for information to be downloaded into their brains, they become more like participants in their own education, taking ownership of the educative process (Micheletti). The focus on active learning and the Socratic Method is what high schools need now more than ever. Considering that the U.S. Department of Education has found that every 26 seconds a student drops out of high school for a total of 7,000 students per day quitting school before they graduate, one can see that there is a veritable mass exodus of children from the education system (DoSomething.org).……
Works Cited
Adorno, Theodor and Max Horkheimer. The culture industry: Enlightenment as mass deception. Stardom and celebrity: A reader, 34, 2007.
DoSomething.org. “11 Facts about High School Dropout Rates.” https://www.dosomething.org/us/facts/11-facts-about-high-school-dropout-rates#fn1
Freire, Paulo. Pedagogy of the oppressed. Bloomsbury Publishing USA, 2018.
Kristjánsson, Kristján. \\\\\\\\\\\\"There is Something About Aristotle: The Pros and Cons of Aristotelianism in Contemporary Moral Education.\\\\\\\\\\\\" Journal of philosophy of education 48.1 (2014): 48-68.
Lickona, Thomas. \\\\\\\\\\\\"The return of character education.\\\\\\\\\\\\" Educational leadership 51.3 (1993): 6-11.
Micheletti, Gabrielle. “Re-Envisioning Paulo Freire\\\\\\\\\\\\'s “Banking Concept of Education’.” Inquiries Journal 2.2 (2010): 1. http://www.inquiriesjournal.com/articles/171/re-envisioning-paulo-freires-banking-concept-of-education
Plato. Allegory of the Cave. https://web.stanford.edu/class/ihum40/cave.pdf
Study Document
...Argument Common Assessment
In today’s multicultural workforce, gender remains an area where power disparity occurs. While other barriers are being broken down, there remains stereotypical views regarding gender roles that can influence the modern workplace. This paper will examine some of the prevailing research on the subject to determine the current state of gender norms within the workplace.
Diversity is typically considered a benefit to the workplace, but the way in which diversity manifests should nevertheless be taken into account. Diverse environments still retain some elements of bias, and these should be understood in order to get the best out of diverse environments. If the point of diversity is to improve overall organizational functioning, then the way that diversity works in the workforce needs to be understood complete. Ely and Thomas (2001) note that diverse organizations achieve mixed results, and have sought to understand the underlying factors behind those mixed results.……
References
Ely, R. & Thomas, D. (2001) Cultural diversity at work: The effects of diversity perspectives on work group processes and outcomes. Administrative Science Quarterly. Vol. 46 (2) 229-273.
Hesmondhalgh, D. & Baker, S. (2015) Sex, gender and work segregation in the cultural industries. The Sociological Review. Vol. 63 (S51) 23-36.
MacLeod, A. (1992) Hegemonic relations and gender resistance: The new veiling as accommodating protect in Cairo. . Signs: Journal of Women in Culture and Society. Vol. 17 (3) 533-557.
Nathan, R. (no date). As others see us. No publication, in possession of the author.
Sargent, C. & Corse, S. (2013) Picture my gender(s): Using interactive media to engage students in theories of gender construction. Teaching Sociology. Vol. 41 (3) 242-256.
We have over 150,000+ study documents to help you.
Sign Up for FREE