College Admission Essays (Examples)(Examples)

Studyspark

Study Document Study Document

Incident Command System ICS

Pages: 9 (2818 words) Sources: 7 Document Type:Essay Document #:51934248

...College admission Introduction to the Incident Command System (ICS)
The Incident Command System (ICS) is a standardized organization model or method for incident response and management during disasters. The system is made up of standard management and leadership hierarchy procedures, including processes meant to support various types of incidents. It does not just respect jurisdictional and agency authority, but also supports synchronized efforts among different disaster response and management teams and agencies. ICS supports fast, effective and efficient development of universal planning processes and management of facilities, personnel, communication, and equipment within a common structure of organization and operations. Based on pre-determined standards that involved authorities agree upon, personnel are trained in a common language and processes, and tasks assigned to each. The ICS system ensures that disaster response teams experience increased organization from the initial phases of a disaster all the way to its conclusion (Lutz and Lindell, 2008).
The ICS……

References

References

AmeriCorps St. Louis. (2016). “Missouri Winter Flooding 2016.” Retrieved from https://www. americorps-stl.org/our-teams/emergency-response-team/disaster-deployment-archive/missouri-winter-flooding-2016/.

Buck, Dick A., Joseph E. Trainor, and Benigno E. Aguirre. (2006). “A Critical Evaluation of the Incident Command System and NIMS.” Journal of Homeland Security and Emergency Management, 3(3).

Bigley, Gregory A. and Karlene H. Roberts. (2001). “The Incident Command System: High-Reliability Organizing for Complex and Volatile Task Environments.” Academy of Management Journal, 44(6): 1281-1299.

Butterfield, Karen. (2016, January 21). “AmeriCorps Helping Flood Victims Find Place to Stay.” The Missourian. Retrieved from http://www.emissourian.com/local_news/washington/americorps-helping-flood-victims-find-place-to-stay/article_56f75bab-87de-5198-843e-bdfdb8229b5a.html.

Cardwell, Michael D. and Patrick T. Cooney. (2000). “Nationwide Application of the Incident Command System: Standardization Is the Key.” FBI Law Enforcement Bulletin 69.10: 10-16.

Cole, Dana. (2000). The Incident Command System: A 25-Year Evaluation by California Practitioners. National Fire Academy.

Corporation for National and Community Service (CNCS). (2014). “Disaster Response Framework.” Retrieved from  http://www.nationalservice.gov/sites/default/files/documents/CNCS%20DSU%20  Disaster%20Response%20Framework.pdf.

Dynes, Russell Rowe. (1970). Organized Behavior in Disaster. Lexington, MA: Heath Lexington.

Studyspark

Study Document Study Document

Fruit Science Report Washington Navel Oranges

Pages: 8 (2282 words) Sources: 7 Document Type:Research Paper Document #:72788378

...College admission Fruit Science Report
Washington Navel Oranges
Introduction
In as far as appearances are concerned, the Washington Navel orange happens to have a rounded shape and is small to medium in size. One of the many distinguishing features of this particular tree are the white flowers which are scented. The canopy of the tree also appears droopy. In mid winder, the tree supplies seedless oranges that are rather tasty – making this particular variety ideal as either a commercial venture or as a past-time activity in a home orchid setting. It is important to note that the flesh of the fruit is firm and has a distinguishing deep color. The taste of the fruit could also be described as tangy and distinctly sweet. The Washington Navel orange, according to Ramsey and Markell (1920) “originated at Bahia, Brazil, apparently as a bud variation from the Portuguese orange variety, Laranja Selecta” (22). As……

References

References

Boule, D. (2017). A Brief History of the Navel Orange in California – From the Sacramento Bee. Retrieved from  http://www.merlofarminggroup.com/brief-history-navel-orange-california-%E2%80%93-sacramento-bee 

Considine, D.M. & Considine, G.D. (2012). Foods and Food Production Encyclopedia. New York, NY: VNR.

El-Boray, M.S., Mostafa, M., Salem, E. & Sawwah, O. (2015). Improving Yield and Fruit Quality of Washington Navel Orange Using Foliar Applications of Some Natural Biostimulants. J. Plant Production, 6(8), 1317-1332.

Ferguson, L. & Grafton-Cardwell, E.E. (2014). Citrus Production Manual. Richmond, CA: UCANR Publications.

Geiger, P. & Dunkan, S. (2007). Farmers\\\\\\' Almanac. Mason, OH: Almanac Publishing Company.

Ramsey, H.J. & Markell, E.L. (1920). The Handling and Precooling of Florida Lettuce and Celery. Washington, DC: Government Printing Office.

Susser, A. (1997). The Great Citrus Book. New York, NY: Ten Speed Press.

Studyspark

Study Document Study Document

Jesse Imeson Criminal Behavior

Pages: 7 (2025 words) Sources: 8 Document Type:Research Paper Document #:27881804

...College admission Background and Biographical Data
The case of Jesse Norman Imeson reveals the possible connections between childhood upbringing, childhood trauma, and psychological characteristics on criminal behavior. While childhood experiences can never be used to condone violence or criminality, understanding the correlation between these factors may help identify early warning signs or risk factors that can then be used in crime prevention strategies. The story of Jesse Imeson gripped Canada because it involved the heinous killing of three individuals in the summer of 2007. Imeson was apprehended at age 22, pled guilty to all three counts of second-degree murder in 2008, and was sentenced to life in prison.
Jesse was the oldest of three children in the Imeson family. Until the first known traumatic event that occurred in Imeson’s early life, he was described by babysitters and friends as being “likeable,” “adventurous,” “happy,” and “wide-eyed...always smiling” boy who just wanted “to have……

References

References

Bartol, C. R., & Bartol, A, M. (2018). Criminal behavior: A psychological approach. Boston, MA: Pearson Learning Solutions.

“Jesse Imeson charged in death of Windsor man,” (2007). CTV News. Retrieved from:  https://www.ctvnews.ca/jesse-imeson-charged-in-death-of-windsor-man-1.251008 

Lessard, C. (2008). So, why did he do it? Grand Bend Strip. Retrieved from:  https://grandbendstrip.com/2008/11/so-why-did-he-do-it/ 

“LFP Archives: The hunt for, and truth about, spree killer Jesse Imeson,” (2018). The London Free Press. Retrieved from:  https://lfpress.com/news/local-news/lfp-archives-the-hunt-for-and-truth-about-spree-killer-jesse-imeson 

“Man who killed elderly couple and bartender has appeal rejected by Supreme Court,” (2019). CBC. Retrieved from:  https://www.cbc.ca/news/canada/london/man-who-killed-elderly-couple-and-bartender-has-appeal-rejected-by-supreme-court-1.5129542 

Mellor, L. (2013). Rampage. Toronto, Ontario: Dundurn

Paiva, M. (2019). Windsor murderer claims he was sexually abused. iHeart Radio. Retrieved from:  http://www.iheartradio.ca/purecountry/bc-north/windsor-murderer-claims-he-was-sexually-abused-1.9198384 

Perkel, C. (2018). Family of victims lash out as smirking killer gets life sentence. The Globe and Mail. Retrieved from:  https://www.theglobeandmail.com/news/national/family-of-victims-lash-out-as-smirking-killer-gets-life-sentence/article1350382/

Studyspark

Study Document Study Document

Privacy In Social Networks Regarding Machine Learning

Pages: 8 (2537 words) Sources: 10 Document Type:Research Paper Document #:98311751

...College admission Abstract
This paper discusses the issue of privacy in social networks with respect to advances in machine learning. It shows how machine learning protocols have been developed both to enhance and secure privacy as well as to invade privacy and collect, analyze, predict data based on users’ information and experience online. The conflict between these two directions in machine learning is likely to lead to a system wherein machine learning algorithms are actively engaged in the subversion of one another, with one attempting to conceal data and the other attempting to uncover it. This paper concludes with recommendations for social networks and the issue of privacy regarding machine learning.
Introduction
Social networks have allowed an ocean of personal data to form that is now sitting there waiting for machine learning algorithms to collect it, analyze it, and recognize individuals on social media (Oh, Benenson, Fritz & Schiele, 2016). Machine learning……

References

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

Studyspark

Study Document Study Document

Violence Prevention Programs

Pages: 9 (2805 words) Sources: 6 Document Type:Essay Document #:52417572

...College admission Using Social Media to Build Out Support Systems
Introduction
Violence prevention programs focus on curtailing forms of violence in society, such as child abuse, domestic violence and sexual assault. These programs often emphasize personal responsibility, information about what constitutes violence (it is often the case that offenders do not even realize they are being abusive), why long-term solutions are better than quick-fixes, and how to engage in respectful rather than abusive communication (Alternative Paths, 2020). This paper will discuss this topic, explain it from the theoretical perspective of strain theory, describe the present literature, and make recommendations based on the problems with violence prevention programs from a strain theory perspective and what can be done to solve those issues.
Violence Prevention Programs
Violence prevention programs are programs designed to address the needs of the community afflicted with violence issues, such as child abuse, sexual assault or domestic violence. For the……

References

References

Altafim, E. R. P., & Linhares, M. B. M. (2016). Universal violence and childmaltreatment prevention programs for parents: A systematic review. Psychosocial Intervention, 25(1), 27-38.

Alternative Paths. (2020). Violence prevention. Retrieved from  https://www.alternativepaths.org/services/diversion-programs/violence-prevention-program 

Farrell, A. D., Meyer, A. L., Kung, E. M., & Sullivan, T. N. (2001). Development and evaluation of school-based violence prevention programs. Journal of clinical child psychology, 30(2), 207-220.

Johnson, D. W., & Johnson, R. T. (1995). Why violence prevention programs don't work--and what does. Educational Leadership, 52(5), 63-68.

Lee, C., & Wong, J. S. (2020). Examining the effects of teen dating violence prevention programs: a systematic review and meta-analysis. Journal of Experimental Criminology, 1-40.

Siegel, L. (2018). Criminology, 7th Ed. Cengage Learning.

Stagg, S. J., & Sheridan, D. (2010). Effectiveness of bullying and violence prevention programs: A systematic review. Aaohn Journal, 58(10), 419-424.

Studyspark

Study Document Study Document

Moral Reasoning Human Trafficking

Pages: 6 (1654 words) Sources: 5 Document Type:Essay Document #:37285983

...College admission Introduction
Human trafficking is defined as “the acquisition of people by improper means such as force, fraud or deception, with the aim of exploiting them” (UNODC, 2015). However, as with any definition or label, there is a subjective interpretation that exists alongside the objective viewpoint. While in most cases of trafficking, the human being involved can easily be depicted as a victim, in some cases the of trafficking the “victim” wants to be trafficked as it provides an opportunity for the individual to have a better life even if it is outside the normal or accepted means of society (Beatson & Hanley, 2017; Brock& Teixeira, 2014). Included in these cases can be situations of labor trafficking and sex trafficking. The point is that not every person feels the same about human trafficking or that it is necessarily immoral in every case. As there are numerous ethical perspectives from which one……

References

References

Beatson, J., & Hanley, J. (2017). The intersection of exploitation and coercion in cases of Canadian labour trafficking. Journal of law and social policy, 26, 137.

Brock, D., & Teixeira, R. (2014). Beyond exploitation and trafficking: Canadian critical perspectives on sex work. Labour: Journal of Canadian Labour Studies/Le Travail: revue d’Études Ouvrières Canadiennes, 74.

De Shalit, A., Heynen, R., & van der Meulen, E. (2014). Human trafficking and media myths: Federal funding, communication strategies, and Canadian anti-trafficking programs. Canadian Journal of Communication, 39(3).

Holmes, A. (2007). Ethics: Approaching moral decisions. Downers Grove, IL: InterVarsity Press.

Lam, E., & Lepp, A. (2019). Butterfly: Resisting the harms of anti-trafficking policies and fostering peer-based organising in Canada. Anti-trafficking review, (12), 91-107.

UNODC. (2015). UNODC on human trafficking and migrant smuggling. United Nations Office on Drugs and Crime. Retrieved from  https://www.unodc.org/unodc/en/human-trafficking/ 

Studyspark

Study Document Study Document

Change Management At Nike

Pages: 8 (2482 words) Sources: 8 Document Type:Essay Document #:61161012

...College admission Why Nike Needs to Cut Colin Kaepernick
Executive Summary
Nike’s decision to tap into “woke culture” and turn the out of work former NFL quarter Colin Kaepernick into a brand ambassador has been a controversial one since the sportswear company launched its Colin ad campaign in 2018. Nike needs to change the way it approaches its consumer base in America while simultaneously addressing the supply chain issues that have arisen as a result of COVID-19, which has caused major production problems for Nike in Asia. While Nike has been active in promoting the ultimate Trump antagonist in Colin Kaepernick, it is now time to bury the hatch and put America first but cutting ties with Kaepernick and opening up production in the US so as to 1) bring manufacturing back to America and solve the supply chain problems caused by the virus, and 2) to help put Americans back to……

References

Bibliography and References

Balaji, S., & Murugaiyan, M. S. (2012). Waterfall vs. V-Model vs. Agile: A comparative study on SDLC. International Journal of Information Technology and Business Management, 2(1), 26-30.

Boehm, B. (2002). Get ready for agile methods, with care. Computer, (1), 64-69.

Boehm, B. (2007). A survey of agile development methodologies. Laurie Williams, 45, 119.

Fernandez, D. J., & Fernandez, J. D. (2008). Agile project management—agilism versus traditional approaches. Journal of Computer Information Systems, 49(2), 10-17.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Cameron, E. and Green, M. (2015), Making Sense of Change Management: A complete Guide to the Models, Tools and Techniques of Organizational Change. Kogan Page: London

Kotter, J. P. (2012). Leading Change. Harvard Business Review Press.

TMZ. (2018). Kaep Deal Adds Up... WE GOT NIKE'S CUSTOMER BREAKDOWN. Retrieved from  https://www.tmz.com/2018/09/06/colin-kaepernick-nike-contract-urban-consumers-market-research/

Studyspark

Study Document Study Document

Role And Purpose Of Advocacy In The Health Care Delivery System

Pages: 5 (1453 words) Sources: 4 Document Type:Essay Document #:38970574

...College admission Introduction
Advocacy in health care refers to the action of promoting and fostering social, economical, political and educational changes that reduce the risk of suffering of individuals and communities by implementing preventive strategies, increasing health literacy, and boosting access to care and health equity (Earnest, Wong & Federico, 2010). Health care advocacy agents can thus address health outcomes by advocating for changes to the current practices, environments, awareness, and access to care that populations face. This paper will discuss health care advocacy at the local, regional and international levels, the challenges and opportunities that exists in international healthcare advocacy and the ways these challenges can be addressed.
How Health Care Advocacy Agents Address Health Outcomes
The role and purpose of advocacy in the health care delivery system is to help to better ensure that the patient receives the type of quality care he or she needs no matter where he……

References

References

Ahmadinejad, F., Abbaszadeh, A., & Davoodvand, S. (2016). Patient advocacy from the clinical nurses\\\\' viewpoint: a qualitative study. Journal of medical ethics and history of medicine, 9(5).

Benatar, S. R. (2013). Global Health and Justice: R e?examining our Values. Bioethics,  27(6), 297-304.

Earnest, M. A., Wong, S. L., & Federico, S. G. (2010). Perspective: physician advocacy: what is it and how do we do it?. Academic medicine, 85(1), 63-67.

World Health Organization (WHO). (2015). Global Health Ethics Key issues Global Network of WHO Collaborating Centres for Bioethics. Retrieved from:  http://apps.who.int/iris/bitstream/handle/10665/164576/9789240694033_eng.pdf;jsessionid=BF56A5C93A3B735876DBBF060A0652FC?sequence=1 

World Health Organization. (2016). Online public hearing to help inform the scope of the forthcoming WHO guidelines on health policy and system support to optimize community based health worker programs. Retrieved from: http://www.who.int/hrh/news/2016/pico_form/en/

Studyspark

Study Document Study Document

Violent Crime Control And Law Enforcement Act Of 1994

Pages: 6 (1724 words) Sources: 8 Document Type:Research Paper Document #:26986613

...College admission Crimes in the U.S.
Introduction
Contrary to US civil law, the nation’s criminal law represents a legal system which deals with penalizing those who perpetrate criminal offenses. Among the many criminal laws of the nation is its 1994 Violent Crime Control and Law Enforcement Act or, simply, crime bill. The bill’s enactment was, in a number of ways, characteristic of the tough-on-criminals bipartisan campaign of the latter part of the past century. The bill included numerous positive provisions like greater law enforcement accountability and fresh protections for those victimized by perpetrators of sexual abuse/assault and domestic violence; however, it was believed to worsen the racial gap in involvement in the criminal justice arena (Moore, 2017). Hence, this paper attempts at ascertaining the desired impact of the aforementioned crime bill, as well as court interpretation of the act through examining different aspects of the bill.
History of crime bill
The 1994 Violent……

References

References

Raymond Derrial Madden, Petitioner-appellant, v. United States of America, Respondent-appellee, 64 F.3d 669 (10th Cir. 1995)

Sepulveda v. United States, 69 F. Supp. 2d 633 (D.N.J. 1999)

United States of America, Plaintiff-appellee, v. Joanne Kwi Ye Estes, Defendant-appellant, 166 F.3d 1218 (9th Cir. 1998)

United States v. Madden, No. 92-6206 (10th Cir. Apr. 20, 1993), WL 332262 Books and article

Moore, R. (2017). The new Jim Crow: Mass incarceration in the age of colorblindness. Macat Library.

United States Congress. (1994). Violent Crime Control and Law Enforcement Act of 1994. Public law, (103-322).

Websites

The Establishment. (2016, April 12). About That Controversial 1994 Crime Bill. A Medium Corporation. Retrieved from  https://medium.com/the-establishment/about-that-controversial-1994-crime-bill-c17ccfcc25fa

Studyspark

Study Document Study Document

COVID 19 Effect On Health And Economic Issues For Latinos

Pages: 5 (1629 words) Sources: 5 Document Type:Essay Document #:89327444

… and religious tie among Latino populations. Even though not all younger generations of Latino communities take up the mantle of the faith, there is…[break]…college are going to online formats, which means that more people are going to be taking classes from home. This will put strain on ……

References

References

Despres, Cliff. “Coronavirus Case Rates and Death Rates for Latinos in the UnitedStates.” Salud America, 20 Apr 2020.  https://salud-america.org/coronavirus-case-rates-and-death-rates-for-latinos-in-the-united-states/ 

Garcia, J. & Hellerstein, E. (2020). Undocumented workers face obstacles qualifying for benefits during the pandemic. Retrieved from  https://calmatters.org/california-divide/2020/04/undocumented-workers-benefits-coronavirus/ 

Labor Council for Latin American Advancement. “The Impact of COVID 19 on Latinos in the US.”  https://assets.website-files.com/5e5f2e17e96a34dcf9b586b4/5e984eab4dd4ffba712e7906_COVID%20_%20Report%20%5BFinal%5D%20for%20web.pdf 

Manuel, Jens M. et al. “U.S. Latinos among hardest hit by pay cuts, job losses due to coronavirus.” PewResearch, 3 Apr 2020.  https://www.pewresearch.org/fact-tank/2020/04/03/u-s-latinos-among-hardest-hit-by-pay-cuts-job-losses-due-to-coronavirus/ 

Tappe, Anneken. “30 million Americans have filed initial unemployment claims since mid-March.” CNN, 30 Apr 2020.  https://www.cnn.com/2020/04/30/economy/unemployment-benefits-coronavirus/index.html 

Join thousands of other students and

"spark your studies".