Cell Phone Essays (Examples)

Studyspark

Study Document Study Document

Cyberbullying

Pages: 7 (2781 words) Sources: 6 Document Type:Essay Document #:823825

… bully.

B. Bullying is more than just isolated incidents of negative behavior; it requires repetitive behavior.

C. Cyberbullying occurs electronically, via the internet, cell phone, and social media.

II. Imbalance of power

A. Bullies have some type of power over victims.

B. There are different ways that bullies … to be considered part of a repetitive pattern of bullying.  

IV. Cyberbullying occurs electronically.

A. Cyberbullying can occur several ways:

1. Internet

2. cell phone

3. Social Media

B. Cyberbullying may occur only online or can be combined with in-person bullying.

V. Conclusion

A. Cyberbullying occurs electronically.

B. … it is important to first develop a thorough understanding of what cyberbullying does.  Cyberbullying is a form of bullying that uses the internet, cell phone, and social media to target its victims.  Unlike more traditional in-person bullying, this means that the victims of cyberbullying never get a respite ……

References

Bazarova, Natalie.  (14 May 2018).  Key Questions in the Fight Against Cyberbullying.  Psychology Today.   https://www.psychologytoday.com/us/blog/social-media-stories/201805/key-questions-in-the-fight-against-cyberbullying .  Accessed 16 July 2020.  

Ben-Joseph, Elena Pearl.  (April 2018).  Cyberbullying.  TeensHealth.   https://kidshealth.org/en/teens/cyberbullying.html .  Accessed 16 July 2020.

Scheff, Sue.  (29 November 2019).  Adult Cyberbullying Is More Common Than You Think. Psychology Today.   https://www.psychologytoday.com/us/blog/shame-nation/201911/adult-cyberbullying-is-more-common-you-think .  Accessed 16 July 2020.  

John, Ann et al.,  (2018).  Self-Harm, Suicidal Behaviors, and Cyberbullying in Children and Young People: Systematic Review.  Journal of Medical Internet Research, 20(4): e129 DOI: 10.2196/jmir.9044.

Oakes, Kelly.  (15 September 2019).  Why Children Become Bullies at School.  BBC.com.   https://www.bbc.com/future/article/20190913-why-some-children-become-merciless-bullies .  Accessed 16 July 2020.  

Studyspark

Study Document Study Document

Technology Divorce And The Impact Of Social Inequality On Marital

Pages: 10 (2883 words) Sources: 7 Document Type:Essay Document #:95594472

Part 1
Technologies that parents use to look after their children include baby monitors, cell phone and GPS locators. Baby monitors are used to allow parents to be in another part of the house while the child is asleep … with some other activity without fear or worry of abandoning the child because the parent is still connected via the baby monitor.
The cell phone can be used to reach out and call the older child or to post on social media or see what content the child … to reach out and call the older child or to post on social media or see what content the child is posting. The cell phone allows for both a quick and convenient way to contact the child and a way to monitor the child from a distance by ……

References

References

BLS. (2013). Marriage and divorce: patterns by gender, race, and educational attainment. Retrieved from  https://www.bls.gov/opub/mlr/2013/article/marriage-and-divorce-patterns-by-gender-race-and-educational-attainment.htm 

Hamilton, L. & Armstrong, E. (2019). Shifting the Center: Understanding Contemporary Families. Thousand Oaks.

Jones, E. M. (2000). Libido Dominandi: Sexual Liberation and Political Control. IN: St. Augustine’s Press.

Marsee, S. (2019). Which couples are most likely to divorce? Retrieved from  https://www.marseelaw.com/which-couples-are-most-likely-to-divorce/ 

Nelson, M. K. (2010). Parenting out of control: Anxious parents in uncertain times. NYU Press.

Pew Research Center. (2015). Parenting in America. Retrieved from  https://www.pewsocialtrends.org/2015/12/17/1-the-american-family-today/ 

Wilkinson & Finkbeiner. (2019). Divorce statistics. Retrieved from  https://www.wf-lawyers.com/divorce-statistics-and-facts/ 

Studyspark

Study Document Study Document

FBI Drugs And WMDs

Pages: 11 (3378 words) Sources: 13 Document Type:Research Paper Document #:66505511

… was hit in Aden harbor, the FBI began focusing on suspects who would later be tied to 9/11 and the spread of terror cell throughout the Middle East.[footnoteRef:2] It was not, of course, the only incident to spark that focus—but it was an important factor in the … and enemy groups has always been a mainstay of U.S. intelligence. From COINTELPRO to today, covert action is an important process in preventing cell or groups from taking steps to undermine or attack the interests of America. [8: The Commission to Assess the Organization of the Federal ……

References

Bibliography

Arnold, Aaron and Daniel Salisbury, “The Long Arm,” Belfer Center, 2019. https://www.belfercenter.org/publication/long-arm

Carter, Ashton B. "Overhauling counterproliferation." Technology in Society 26, no. 2-3 (2004): 257-269.

The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. “Combating Proliferation of Weapons of Mass Destruction,” Washington, D.C., 1999.

FBI. “COINTELPRO.”  https://vault.fbi.gov/cointel-pro 

FBI Counterproliferation Center. “About.”  https://www.fbi.gov/about/leadership-and-structure/national-security-branch/fbi-counterproliferation-center 

Fischer, Rowena Rege. “Guide to the Study of Intelligence: Counterproliferation,” Journal of U.S. Intelligence Studies 21, no. 1 (Winter 2014-15), 78-82.

Liow, Joseph Chinyong. "The Mahathir administration's war against Islamic militancy: operational and ideological challenges." Australian Journal of International Affairs 58, no. 2 (2004): 241-256.

Manchikanti, Laxmaiah, Jaya Sanapati, Ramsin M. Benyamin, Sairam Atluri, Alan D. Kaye, and Joshua A. Hirsch. "Reframing the prevention strategies of the opioid crisis: focusing on prescription opioids, fentanyl, and heroin epidemic." Pain physician 21, no. 4 (2018): 309-326.

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… increasingly globalized marketplace (Schaffhauser, 2018).
Some of the most important features of IoT applications include the fact that conventional mobile devices such as phone, various types of personal computers, video systems and other handheld devices as well as objects that have traditionally not been viewed as being … networks in meaningful ways. As Kaushik (2019) points out, “In the context of internet of things (IoT), the things may be anything like cell phone, iPods, mobile devices, resources, services, education, people, animal, any physical objects etc.” (p. 2).
Moreover, the IoT has made it possible to create ……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Race And Incarceration Rates

Pages: 5 (1649 words) Sources: 8 Document Type:Research Paper Document #:97402010

… in exchange for a lighter sentence. Of course, there is no such thing as a light sentence because once in prison, the jail cell follows one all his life. From that point on the African American male is stuck…[break]…exploit cheap labor overseas. It is all about exploiting ……

References

References

Aguirre, A., & Baker, D. V. (Eds.). 2008. Structured inequality in the United States: Critical discussions on the continuing significance of race, ethnicity, and gender. New York: Pearson Prentice Hall.

Alexander, Michelle. 2012. The New Jim Crow. New York: New Press.

Davis, Angela. 2012. The Meaning of Freedom. San Francisco: City Light Books.

James, Lois. 2018. The stability of implicit racial bias in police officers. Police Quarterly 21(1):0-52.

Lopez, German. 2018. There are huge racial disparities in how US police use force. Retrieved July 30, 2019 ( https://www.vox.com/identities/2016/8/13/17938186/police-shootings-killings-racism-racial-disparities ).

O’Sullivan, John. 1845. Annexation. United States Magazine and Democratic Review 17(1):5-10.

Pettit, Becky, and Bruce Western. 2004. Mass imprisonment and the life course: Race and class inequality in US incarceration." American sociological review 69(2):151-169.

Plessy v. Ferguson. 1896. Retrieved July 30, 2019 ( https://www.oyez.org/cases/1850-1900/163us537 ).

Studyspark

Study Document Study Document

Intelligence Oversight Ethics

Pages: 11 (3311 words) Sources: 15 Document Type:Research Paper Document #:23829007

… now are likely to accept the following as par for the course, a matter of fact, a price that is paid to have cell phone and instant communication—but at the time, the Snowden revelations were controversial to say the least because they begged the question of just what … they begged the question of just what kind of IO was in place in the intelligence community when it came to Big Data: “phone companies were sharing their consumer data with the NSA; private conversations were data mined and monitored by the NSA with the collaboration of ……

References

References

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Brown, William F., and Americo R. Cinquegrana. \\\\\\\\\\\\"Warrantless Physical Searches for Foreign Intelligence Purposes: Executive Order 12,333 and the Fourth Amendment.\\\\\\\\\\\\" Cath. UL Rev. 35 (1985): 97.

Cantarella, Michele. \\\\\\\\\\\\"Intelligence ethics in the digital age.\\\\\\\\\\\\" (2016).

Congressional Research Service, “CIA Ethics Education: Background and Perspectives” (2018).

Ferrari, Rachel. \\\\\\\\\\\\"Moral Relativism and Dangerous Ethical Dilemmas in the US Intelligence Community.\\\\\\\\\\\\" (2018).

Ford, Christopher M. \\\\\\\\\\\\"Intelligence Demands in a Democratic State: Congressional Intelligence Oversight.\\\\\\\\\\\\" Tul. L. Rev. 81 (2006): 721.

Goldman, Jan. \\\\\\\\\\\\"Teaching About Intelligjence and Ethics.\\\\\\\\\\\\" Journal of US Intelligence Studies 20, no. 2 (2013): 79.

Hayes, Jonathan. \\\\\\\\\\\\"The Cinema of Oliver Stone: Art, Authorship and Activism by Ian

Studyspark

Study Document Study Document

Using DoorDash To Promote A Restaurant Brand

Pages: 7 (2131 words) Sources: 4 Document Type:Research Paper Document #:85037477

… getting low and to expect new orders.
Customers on the go are going to want to be able to place orders using their cell phone and are likely to be more appreciative of a pub that is mobile friendly on their site. Sites that have not been updated … possible so as to be able to explain why performance is lacking in some areas (such as food delivery or food preparation) and cell in other areas (such as customer service). Surveys are important to conduct with customers in order for Six Sigma to work, but surveys ……

References

References

Gallardo-Echenique, E. E., Marqués-Molías, L., Bullen, M., & Strijbos, J. W. (2015). Let’s talk about digital learners in the digital era. International Review of Research in Open and Distributed Learning, 16(3), 156-187.

Gibson, C., & Homan, S. (2004). Urban redevelopment, live music and public space: Cultural performance and the re?making of Marrickville. International Journal of Cultural Policy, 10(1), 67-84.

Lawson, C. (2007). Victorian Young Planners: News and Views-Pot, Parma and Trivia Night. Planning News, 33(6), 12.

Queensland. (2020). Key components of a digital strategy. Retrieved from https://www.business.qld.gov.au/running-business/it/digital-strategy/key-components

Studyspark

Study Document Study Document

The Militarization Of Social Distancing In America

Pages: 4 (1152 words) Sources: 2 Document Type:Essay Document #:75058932

...Cell phone Socialization into Militarization
Life definitely seems a lot more militarized now that social distancing norms have become common place and the National Guard is doing its part to make sure people are adhering to stay at home orders. All the workers at the grocery store are now wearing masks (even though they were not two months ago—so it does not make sense why all of a sudden now it is important that they all wear masks as though it is somehow keeping everyone safer or as though the mask itself was a threat to the virus and the virus was going to back away because it saw a mask). The ridiculousness with which people are simply obeying all these insane rules and orders looks very much to me like how a truly militarized nation would act. Orders come, they are not questioned, and no one says anything. Of course, if……

References

References

Farberov, S. (2020). Moment Idaho mom arrested. Retrieved from  https://www.dailymail.co.uk/news/article-8245221/Idaho-mom-arrested-protesting-coronavirus-lockdown-closed-playground.html 

WDRB. (2020). Louisville woman arrested at Kroger for violating self-quarantine order after COVID-19 diagnosis. Retrieved from  https://www.wdrb.com/news/louisville-woman-arrested-at-kroger-for-violating-self-quarantine-order-after-covid-19-diagnosis/article_ed19df76-8978-11ea-afd8-33dd85093a5e.html 

 

Studyspark

Study Document Study Document

Strategic

Pages: 10 (2886 words) Sources: 3 Document Type:Marketing Plan Document #:99752177

… Concentrated targeting is…[break]…can play a big part in supporting CRM primarily because so many people are actively using technology already today. Technology like cell phone and iPads are ubiquitous and every person has them nowadays and moms are almost never without theirs. Thus it is a good idea ……

References

References

Kim, W. & Mauborgne, R. (2005). Blue ocean strategy: From theory to practice. California Management Review, 47(3), 105-121.

Mangold, W. G., & Smith, K. T. (2012). Selling to Millennials with online reviews.  Business Horizons, 55(2), 141-153.

Neely, M. E., Schallert, D. L., Mohammed, S. S., Roberts, R. M., & Chen, Y. J. (2009). Self-kindness when facing stress: The role of self-compassion, goal regulation, and support in college students’ well-being. Motivation and Emotion, 33(1), 88-97.

Studyspark

Study Document Study Document

Marketing Strategy Creation For OPG

Pages: 6 (1941 words) Sources: 4 Document Type:Essay Document #:63904043

...Cell phone Marketing Driven Strategy
In a market driven strategy the customer is the focal point, which means that everything the bar and grill does should be oriented towards benefiting the customer in some way. To know what OPG can do to benefit the customer, it has to determine its distinctive capabilities. These would be the strengths it possesses as identified in its SWOT analysis. It would also include opportunities identified in the same analysis. Then comes the step of matching customer value with the bar and grill’s capabilities and to ask whether leveraging the pub’s resources would help to create customer value. If there is a match and the pub can do it, the steps should lead to superior performance and a successful marketing driven strategy.
Positioning is key to this process and as Trout and Rivkin (2006) argue, a company must differentiate or die, which is what OPG aims to……

References

References

Dhar, V., & Chang, E. A. (2009). Does chatter matter? The impact of user-generated content on music sales. Journal of Interactive Marketing, 23(4), 300-307.

Lim, X. J., Radzol, A. M., Cheah, J. H., & Wong, M. W. (2017). The impact of social media influencers on purchase intention and the mediation effect of customer attitude. Asian Journal of Business Research, 7(2), 19-36.

Lin, C. F. (2002). Segmenting customer brand preference: demographic or psychographic. Journal of Product & Brand Management, 11(4), 249-268.

Trout, J. & Rivkin, S., (2006). Differentiate or die. In The marketing Gurus (ed. Murray). NY: Penguin.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".