Cell Phone Essays (Examples)

Studyspark

Study Document Study Document

The Transformation Of The US Into Oceania

Pages: 9 (2807 words) Sources: 7 Document Type:Essay Document #:33502677

...Cell phone The Greatest Issue Facing 21st Century Ethical Leadership
Big Brother is Watching You. -- George Orwell, 1984
The chilling but fictitious epigraph above is becoming all too real for many people around the world today. Indeed, a growing number of authorities believe that threats to the fundamental right to privacy have become the greatest issue facing 21st century ethical leadership. Indeed, public and private sector organizations of all types routinely collect consumers’ personal information and use it in ways that are violative of the spirit if not the letter of the law, and the proliferation of the so-called Internet of Things has introduced yet more ways that individual privacy can be violated. The purpose of this paper is to provide a review and analysis of the relevant literature concerning this threat to ethical leadership, including recent and current trends in global leadership. In addition, a discussion concerning the various ways……

References

References

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Cantor, M. D. (2006, Summer). No information about me without me: Technology, privacy, and home monitoring. Generations, 30(2), 49-55.

Ethical issues facing businesses. (2020). Florida Tech. Retrieved from https://www.floridatech online.com/blog/business/the-5-biggest-ethical-issues-facing-businesses/.

Haslag, C. (2018, Fall). Technology or privacy: Should you really have to choose only one? Missouri Law Review, 83(4), 1027-1033.

Karn, R. (2019). The biggest threat to data security? Humans, of course. The Privacy Advisor. Retrieved from  https://iapp.org/news/a/the-biggest-threat-to-data-security-humans-of-course/ .

Sharma, P. (2017, June). Organizational culture as a predictor of job satisfaction: The role of age and gender. Journal of Contemporary Management Issues, 22(1), 35-40.

Taslitz, A. E. (2009, Spring). The Fourth Amendment in the twenty-first century: Technology, privacy, and human emotions. Law and Contemporary Problems, 65(2), 125-131.

Studyspark

Study Document Study Document

Hurricane Maria And Puerto Rico S Emergency Management

Pages: 11 (3177 words) Sources: 5 Document Type:Research Paper Document #:67675163

… stretch of land unscathed: the devastation was total. 150 mph winds slammed into the island and tore across it completely. Radar, weather stations, cell phone towers, and electrical power were all wiped out (de Arzola, 2018). Only a single radio tower remained, but in order to use it ……

References

References

Acevedo, N. (2018). Puerto Rico lacked disaster planning, communications strategy, hurricane study found. Retrieved from https://www.nbcnews.com/storyline/puerto-rico-crisis/puerto-rico-lacked-disaster-planning-communications-strategy-hurricane-study-found-n904866

Achenbach, J. & Hernandez, A. (2017). FEMA administrator: Puerto Rico’s politics, lack of unity, hindering hurricane response. Retrieved from https://www.washingtonpost.com/national/fema-administrator-puerto-ricos-politics-lack-of-unity-hindering-hurricane-response/2017/10/09/f1711996-ad10-11e7-9e58-e6288544af98_story.html?noredirect=on&utm_term=.eef2e6bc0e3e

Amnesty International. (2018). Puerto Rico a year after Hurricane Maria. Retrieved from  https://www.amnesty.org/en/latest/research/2018/09/puerto-rico-a-year-after-hurricane-maria/ 

Bomey, N. (2017). Hurricane Maria halts crucial drug manufacturing in Puerto Rico, may spur shortages. Retrieved from  https://www.usatoday.com/story/money/2017/09/22/hurricane-maria-pharmaceutical-industry-puerto-rico/692752001/ 

CDC. (2019). PHEP. Retrieved from https://www.cdc.gov/cpr/epf/docs/PuertoRico.pdf de Arzola, O. R. (2018). Emergency Preparedness and Hurricane Maria: The Experience of a Regional Academic Medical Center in Southwest Puerto Rico. Journal of Graduate Medical Education,10(4), 477-480. Florido, A. (2018). Government Lawyer Says Puerto Rico's Hurricane Response Plan 'Does Not Exist'. Retrieved from  https://www.npr.org/2018/10/30/662345336/government-lawyer-says-puerto-ricos-hurricane-response-plan-does-not-exist 

McMahon, C. (2018). Double down on the Jones Act? Journal of Maritime Law & Commerce, 49(2), 153-195.

Samaan, J. L., & Verneuil, L. (2009). Civil–Military Relations in Hurricane Katrina: a case study on crisis management in natural disaster response. Humanitarian Assistance: Improving US-European Cooperation, Center for Transatlantic Relations/Johns Hopkins University, Baltimore, MD/Global Public Policy Institute, Berlin, 413-432.

Studyspark

Study Document Study Document

The Supreme Court And The Constitution

Pages: 3 (1029 words) Document Type:Essay Document #:67413964

… the 14th Amendment somehow applies in that case—though it does not apply to keeping other people’s eyes off what’s on your laptop or cell phone.
This is the type of insanity that has come along: the Constitution is basically whatever those in power want it to be. So ……

Studyspark

Study Document Study Document

The Ethics Of Clandestine Operations

Pages: 11 (3151 words) Sources: 14 Document Type:literature review Document #:69864024

...Cell phone Ethics of Clandestine Intelligence Operations
Introduction
One of the most common yet least understood methods of operations in the art of statecraft is the clandestine operation (Sheldon 1997). Though popularized in pulp fiction and film, such as the James Bond series franchise and numerous other spy thrillers, clandestine operations remain relatively unknown in the public consciousness—and when they are discussed it is generally with distaste, distrust and vilification (Sheldon 1997). Yet as Sheldon (1997) shows, clandestine operations are not new or unique to the modern world and in fact ancient Rome used them whenever military operations were impractical. Thus, “political influence operations, seeding, propaganda, political patronage, safe havens, political assassination, and paramilitary operations” can all be traced back more or less to similar operations implemented by the ancient Romans (Sheldon 1997, 299). Today, there are many different facets to clandestine operations, and many agencies that use them—from the CIA to……

References

Bibliography

Arnold, A. and D. Salisbury. The Long Arm, 2019. Retrieved from https://www.belfercenter.org/publication/long-arm

Barker, Michael J. \\\\\\"Democracy or polyarchy? US-funded media developments in Afghanistan and Iraq post 9/11.\\\\\\" Media, Culture & Society 30, no. 1 (2008): 109-130.

Best, Richard A. Intelligence to Counter Terrorism: Issues for Congress. Congressional Research Service: CRS Report for Congress, 2002.

Carter, Ashton B. \\\\\\"Overhauling counterproliferation.\\\\\\" Technology in Society 26, no. 2-3

(2004): 257-269.

Crumpton, Henry A. The art of intelligence: lessons from a life in the CIA\\\\\\'s clandestine service. Penguin, 2013.

Hersh, Seymour. Selective Intelligence. The New Yorker, 2003.  http://www.newyorker.com/magazine/2003/05/12/selective-intelligence 

McCormick, G. H., & Owen, G. “Security and coordination in a clandestine organization.” Mathematical and Computer Modelling, 31, no. 6-7 (2000), 175-192.

Studyspark

Study Document Study Document

Including Deaf And Hard Of Hearing Students In The General Education

Pages: 15 (4479 words) Sources: 12 Document Type:Research Paper Document #:71231641

… one another to look away from one another when speaking, to break or even avoid eye contact, or to use technology such as phone to communicate. Deaf culture is much more dependent upon face-to-face communication and the use of signs—pictures—to convey meaning, whereas in hearing culture, people … Ear (Hill, 2019). These implants consist of an electronic element that is surgically implanted into the ear: it comes with a small, exterior phone that goes around the ear, along with a speech processor, a transmitter and a sender/receiver.
The primary means of communication for the deaf, ……

References

References

Arizona Office for Americans with Disabilities. (2007). Retrieved from  https://know-the-ada.com/t4/history-deafness.html 

Centers for Disease Control and Prevention. (2019). Retrieved from  https://www.cdc.gov/ncbddd/hearingloss/language.html 

Curhan, G., & Curhan, S. (2016). Epidemiology of hearing impairment. In Hearing Aids (pp. 21-58). Springer, Cham.

Gallaudet University. (2019). Retrieved from  https://www3.gallaudet.edu/clerc-center/info-to-go/national-resources-and-directories/schools-and-programs.html 

Hill, M. (2019). Embryology Sensory - Hearing Abnormalities. Retrieved from  https://embryology.med.unsw.edu.au/embryology/index.php/Sensory_-_Hearing_Abnormalities 

Hyde, M., Nikolaraizi, M., Powell, D., & Stinson, M. (2016). Critical factors toward the Inclusion of deaf and hard-of-hearing students in higher education. Diversity in deaf education, 441-472.

Individuals with Disabilities Education Act. (2006). Retrieved from  https://sites.ed.gov/idea/ 

Padden, C. A. & Humphries, T. (2005). Inside Deaf Culture. Cambridge, MA: Harvard University Press.

Studyspark

Study Document Study Document

Evaluating The Ideology Of The IRA

Pages: 9 (2717 words) Sources: 15 Document Type:Essay Document #:29993032

… a formal fighting force up until the 1970s when fears of British infiltration caused the IRA to become a secret organization with a cell structure. The IRA published its Green Book, which laid out the rules of being an IRA volunteer. Meanwhile, on the political front was … was to cripple the economy of Belfast through a terror campaign (Maloney, 2010). Five years later, the Provisional IRA converted itself into a cell structure as mass arrests were occurring and the ranks of the IRA were being dismantled by British intelligence. Co-founder and devout Catholic Sean … British protected informants and looked the other way when those informants committed crimes, as it was important to be able to penetrated IRA cell and this meant that a certain discretion had to be allowed in terms of operating within the realm of the criminal underworld. Eventually ……

References

References

Bamford, B. (2005). The Role and Effectiveness of Intelligence in Northern Ireland. Intelligence and National Security, 20(4), 581-607.

Branch, S., Shallcross, L., Barker, M., Ramsay, S., & Murray, J. P. (2018). Theoretical Frameworks That Have Explained Workplace Bullying: Retracing Contributions Across the Decades. Concepts, Approaches and Methods, 1-44.

Coogan, T. P. (2002). The IRA. New York: Palgrave.

Hilton, J. L., & Von Hippel, W. (1996). Stereotypes. Annual review of psychology, 47(1), 237-271.

IRA Green Book. (1977). Accessed 14 Dec 2015 from https://tensmiths.files.wordpress.com/2012/08/15914572-ira-green-book-volumes-1-and-2.pdf

Lumen. (2019). Theoretical perspectives on deviance. Retrieved from https://courses.lumenlearning.com/sociology/chapter/theoretical-perspectives-on-deviance/

Maloney, E. (2010). Voices from the Grave: Two Men’s War in Ireland. NY: Faber, Faber.

McLeod, S. (2008) Social Identity Theory. Simply Psychology. Retrieved from http://www.simplypsychology.org/social-identity-theory.html

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".