Communication Essays (Examples)

Studyspark

Study Document Study Document

Symbolic Frame Of Organizational Analysis Walt Disney Company

Pages: 7 (2089 words) Sources: 7 Document Type:Case Study Document #:13456127

...Communication The Symbolic Frame
A novel approach to organizational behavior, Bolman & Deal’s (2013) model includes the structural, the human resources, the political, and the symbolic frames. The symbolic frame refers to the organization’s use of signs, symbols, and stories to create a brand identity and organizational culture, as well as justify its behaviors. Symbols create and propagate meaning, and encapsulate an organization’s written codes of ethics and values.
Therefore, symbols become one of the most powerful means by which to create and control organizational culture. Bolman & Deal (2013) explain the five assumptions underlying the symbolic frame. The first involves the salience of meaning. What matters most to an organization is not what happens, but what it means on a deeper symbolic level—how actions or facts are interpreted in light of the overarching stories, myths, or symbols that guide the organization and its members.
Second, the symbolic frame allows for……

References

References

“About the Walt Disney Company,” (2020). Retrieved from:  https://thewaltdisneycompany.com/about/ 

Boguszewicz-Kreft, M., Kreft, J. & Zurek, P. (2019). Myth and storytelling: The case of the Walt Disney Company. Myth in Modern Media Management and Marketing. DOI: 10.4018/978-1-5225-9100-9.ch002

Bohas, A. (2014). Transnational firms and the knowledge structure: The case of the Walt Disney Company. Global Society 29(1): 23-41.

Bolman, L.G. & Deal, T.E. (2013). Reframing organizations. John Wiley & Sons.

Di Giovanni, E. (2014). Cultural otherness and global communication in Walt Disney films at the turn of the century. The Translator 9(2): 207-223.

Forbes, W. & Watson, R. (n.d.). Destructive corporate leadership and board loyalty bias. Retrieved from:  https://www.city.ac.uk/__data/assets/pdf_file/0005/56372/2A_Forbes.pdf 

Wasko, J. (2001). Challenging Disney myths. Journal of Communication Inquiry 23(3): 237-257.

Studyspark

Study Document Study Document

Weapons Of Mass Destruction WMD Antifa

Pages: 13 (3787 words) Sources: 12 Document Type:Research Paper Document #:67320498

… organization like Antifa in collaboration with ISIS using a WMD could be reduced. Otherwise, the US risks facing a major catastrophe. Collaboration and communication are essential tools in the effort to prevent attacks on the US infrastructure, as so many stakeholders are included in the operation of ……

References

References

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Christenson, G. (2015). CBRN response. National Guard Bureau.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from  https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat 

Jennings, P. (2006). Miami port poses serious risks. Retrieved from  https://abcnews.go.com/WNT/story?id=131634&page=1 

Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from  http://www.johnstonsarchive.net/terrorism/chembioattacks.html 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Maras, M-H. (2014). Transnational Security. Florida: CRC Press.

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

...Communication Abstract
Cybercrime, data breaches, and fraud represent evils that significantly threaten businesses. Companies have, in the past, lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In this paper, the processes information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT security auditing constitutes a significant step in the safeguarding of corporate data against cybercrime, data breaches, and fraud. It must be performed from time to time in the form of a methodical analysis by an outside specialist on compliance, for identifying any chinks in the armor of the company's information technology system.
Introduction
ICT advancements have meant the availability of vast quantities of data, which also creates considerable risks to the data itself, computer systems, and critical infrastructures and operations it supports. Despite developments in information security,……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Telemedicine And Its Impact On Patient Care

Pages: 11 (3241 words) Sources: 10 Document Type:Essay Document #:26347879

… Bariatric Surgery.
Background
For over thirty years, health services researchers, clinicians, and other medical experts have been studying how computers and other advanced telecommunication technologies have been used to enhance health care. One of the most important technologies in health care since early in the 20th century … a combination of technologies that enables the delivery of health care in unique situations. More accurately, Telemedicine is defined as the utilization of communication technologies and electronic information to deliver or support health care in situations where there is a separation between the participants (Conklin, 2002; Tiago … high-technology televisions through which medical experts and specialists are engaging with other experts and specialists.
Moreover, there are peripheral devices that help with communication of sound and with the examination of patients. All these things have made Telemedicine much more integral to modern health care (Board on … of patients. All these things……

References

References

Meyers, A. J., Pontarelli, E., Dutta, S. K., Grinberg, G., & Yenumula, P. R. (2018). Telemedicine Follow-up After Bariatric Surgery. Surgery for Obesity and Related Diseases, 14(11), S168.

Tiago, M. T. B., Tiago, F., Amaral, F. E. B., & Silva, S. (2016). Healthy 3.0: Healthcare digital dimensions. In Reshaping medical practice and care with health information systems (pp. 287-322). IGI Global.

Conklin, T. P. (2002). Health care in the United States: An evolving system. Michigan Family Review, 7(1).

Board on Health Care Services; Institute of Medicine. (2012). \\\\\\\\\\\\"3The Evolution of Telehealth: Where Have We Been and Where Are We Going?\\\\\\\\\\\\" in The Role of Telehealth in an Evolving Health Care Environment: Workshop Summary. National Academies Press, Washington (DC).

Sada, A., Asaad, M., Reidt, W. S., Kellogg, T. A., Kendrick, M. L., McKenzie, T. J., & Habermann, E. B. (2019). Are In-Person Post-operative Clinic Visits Necessary to Detect Complications Among Bariatric Surgery Patients?. Obesity Surgery, 1-4.

Krupka, D. C., Sandberg, W. S., & Weeks, W. B. (2012). The impact on hospitals of reducing surgical complications suggests many will need shared savings programs with payers. Health Affairs, 31(11), 2571-2578.

Fasano, P. (2013). Transforming health care: The financial impact of technology, electronic tools, and data mining. John Wiley & Sons.

Burch, S., Gray, D., & Sharp, J. (2017). The power and potential of telehealth what health systems should know: proposed legislation in Congress offers the promise that the nation\\\\\\\\\\\\'s healthcare policy will support the expansion of telehealth, allowing hospitals and health systems to fully realize the benefits of this important emerging approach to care. Healthcare Financial Management, 71(2), 46-50.

Studyspark

Study Document Study Document

Career Counseling

Pages: 8 (2777 words) Sources: 7 Document Type:Essay Document #:22553329

… psychology and my interest in working in education. Teachers need an abundance of different skills and abilities, perhaps more than any other field. Communications skills help us to speak to a class collectively while also reaching individual students. We also need to interact regularly with administrators, colleagues, … a class collectively while also reaching individual students. We also need to interact regularly with administrators, colleagues, and parents. In addition to the communications skills teachers need, we also need organizational and planning abilities, so that we can prepare and execute lesson plans. Teachers need to be … required included administration and management, personnel and human resources, and customer and personal service. The abilities included various types of oral and written communication and comprehension, as well as deductive reasoning and speech clarity. Chief executives do need some of the same skills and abilities as school ……

References

References

Holland, J.L., Johnston, J.A. & Asama, F. (1994). More evidence for the relationship between Holland’s personality types and personality variables. Journal of Career Assessment 2(4): 331-340.

“Holland’s Six Personality Types.” Career Key. Retrieved online:  https://www.careerkey.org/choose-a-career/holland-personality-types.html#.WgEWKxNSyRt 

Occupational Information Network (ONet, 2017). Website;  https://www.onetonline.org/ 

Rogers, M.E. & Creed, P.A. (2011). A longitudinal examination of adolescent career planning and exploration using a social cognitive career theory framework. Journal of Adolescence 34(1): 163-172.

Rogers, M.E., Creed, P.A. & Glendon, A.I. (2008). The role of personality in adolescent career planning and exploration: A social cognitive perspective. Journal of Vocational Behavior 73(1): 132-142.

Savickas, M.L. (2004). The theory and practice of career construction. In Career Development and Counseling. John Wiley.

Walsh, B. W., & Holland, J. L. (1992). A theory of personality types and work environments. In W. B. Walsh, K. H. Craik, & R. H. Price (Eds.), Person–environment psychology: Models and perspectives (pp. 35-69). Hillsdale, NJ: Lawrence Erlbaum Associates.

Studyspark

Study Document Study Document

Culture Formation In The Internet Age

Pages: 3 (1044 words) Sources: 5 Document Type:Essay Document #:46746942

… Access and Culture
Access to the Internet has been linked to a number of different influences over culture. As a new means of communication, the Internet has transformed how culture is disseminated around the world, but it has also had a significant influence on how culture is ……

References

References

Bauer, J., Berne, M. & Maitland, C. (2002) Internet access in the European Union and in the United States. Telematics and Information. Vol. 19 (2) 117-137.

Castells, M. (2019) The impact of the Internet on society: A global perspective. Open Mind BBVA. Retrieved February 10, 2020 from  https://www.bbvaopenmind.com/en/articles/the-impact-of-the-internet-on-society-a-global-perspective/ 

DiMaggio, P. (2014) The Internet and cultural industries. MIT Technology Review. Retrieved February 10, 2020 from  https://www.technologyreview.com/s/531341/the-internet-and-the-cultural-industries/ 

Huizer, E., Shah, S., Arroyo, J., Okorafor, U. & MacKinnon, R. (2017) A brave new world: How the Internet affects societies. Chatham House. Retrieved February 11, 2020 from  https://www.internetsociety.org/wp-content/uploads/2017/08/MeetingSummary.BraveNewWorld.pdf 

Voiskounsky, A. (1998) Internet: Culture diversity and unification. Proceedings on Cultural Attitudes Towards Communication and Technology. Retrieved February 11, 2020 from  https://www.it.murdoch.edu.au/catac/catac98/pdf/07_voiskounsky.pdf 

Studyspark

Study Document Study Document

Ethics And Health Information

Pages: 8 (2462 words) Sources: 6 Document Type:Term Paper Document #:87876213

… a system—and most of them rely upon end user negligence or upon the end user not being trained to recognize suspicious activity (Vanguard Communications, 2015).…[break]…use of this technology can include team work exercises that focus on helping members to understand the importance of system security, protecting passwords, ……

References

References

Campbell, R. J. (2004). Database Design: What HIM Professionals Need to Know.

Perspectives in Health Information Management 2004, 1:6 (August 4, 2004). Retrieved from  http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_024637.hcsp?dDocName=bok1_024637 

Crossler, R. E., & Posey, C. (2017). Robbing Peter to Pay Paul: Surrendering Privacy for Security's Sake in an Identity Ecosystem. Journal of The Association for Information Systems, 18(7), 487-515.

Donovan, F. (2018). Judge Gives Final OK to $115M Anthem Data Breach Settlement. Retrieved from https://healthitsecurity.com/news/judge-gives-final-ok-to-115m-anthem-data-breach-settlement

HealthIT.gov. (2018). Health Information Privacy, Security, and Your EHR. Retrieved from  https://www.healthit.gov/providers-professionals/ehr-privacy-security 

The IMIA Code of Ethics for Health Information Professionals. (n.d.). Retrieved from http://www.imia medinfo.org/new2/pubdocs/Ethics_Eng.pdf

Jackson, R. (2018). Pulling strings. Retrieved from  https://iaonline.theiia.org/2018/Pages/Pulling-Strings.aspx 

Prince, B. (2013). Programming Languages Susceptible to Specific Security Flaws: Report. Eweek, 12.  Retrieved from  https://www.eweek.com/security/programming-languages-susceptible-to-specific-security-flaws-report

Studyspark

Study Document Study Document

Advantages And Disadvantages Of Interrelationships Between Organizational

Pages: 16 (4728 words) Sources: 28 Document Type:Essay Document #:81594345

...Communication 1. Advantages and Disadvantages of Interrelationships between Organizational Functions and Impact on Organisational Structure
Organizational Functions
The functions of an organization take into account the different aspects undertaken by the business including production or manufacturing, marketing, sales, accounting as well as research and development. In accordance to Sherman and Thompson (2019), the organizational structure delineates the relationship and interrelations between the functions of a business and ascertains the manner in which the chain of command operates through the various levels. The interrelationship between organizational functions and organizational structure is akin to a flow chart. This is in the sense that an entity can set up its business structure around the organizational functions. However, even if the entity fails to do so, the organizational functions and structure will have an impact on one another (Sherman and Thompson, 2019).
Functional Organizational Structure
A functional organizational structure creates distinct and separate departments. Plenty……

References

References

Air India. (2019). Board of Directors. Retrieved from:  http://www.airindia.in/board-of-directors.htm 

Aquinas, P. G. (2008). Organization structure and design. India: Excel Books India.

Burns, T., & Stalker, G. M. (2005). Mechanistic and organic systems. Organizational Behavior, 2, 214-25.

Choo, S., & Bowley, C. (2007). Emerald Article: Using training and development to affect job satisfaction. Journal of Small Business and Enterprise Development, 14(2),339 - 352.

Cichocki, P., & Irwin, C. (2014). Organization design: A guide to building effective organizations. Kogan Page Publishers.

Civil Aviation. (2019). About Us: Organizational Setup. Retrieved from:  http://www.civilaviation.gov.in/en/aboutus/orgsetup 

Cunliffe, A. L. (2008). Organization theory. New York: Sage.

Cunliffe, A. L., & Luhman, J. T. (2012). Key concepts in organization theory. New York: Sage.

Studyspark

Study Document Study Document

FBI Drugs And WMDs

Pages: 11 (3378 words) Sources: 13 Document Type:Research Paper Document #:66505511

… possess WMDs is a threat to the international community, which means that there must be a high level of interaction, cooperation, collaboration, and communication among the allied nations of the international community. A counterproliferation strategy that does not have this level of collaboration will not be an ……

References

Bibliography

Arnold, Aaron and Daniel Salisbury, “The Long Arm,” Belfer Center, 2019. https://www.belfercenter.org/publication/long-arm

Carter, Ashton B. "Overhauling counterproliferation." Technology in Society 26, no. 2-3 (2004): 257-269.

The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. “Combating Proliferation of Weapons of Mass Destruction,” Washington, D.C., 1999.

FBI. “COINTELPRO.”  https://vault.fbi.gov/cointel-pro 

FBI Counterproliferation Center. “About.”  https://www.fbi.gov/about/leadership-and-structure/national-security-branch/fbi-counterproliferation-center 

Fischer, Rowena Rege. “Guide to the Study of Intelligence: Counterproliferation,” Journal of U.S. Intelligence Studies 21, no. 1 (Winter 2014-15), 78-82.

Liow, Joseph Chinyong. "The Mahathir administration's war against Islamic militancy: operational and ideological challenges." Australian Journal of International Affairs 58, no. 2 (2004): 241-256.

Manchikanti, Laxmaiah, Jaya Sanapati, Ramsin M. Benyamin, Sairam Atluri, Alan D. Kaye, and Joshua A. Hirsch. "Reframing the prevention strategies of the opioid crisis: focusing on prescription opioids, fentanyl, and heroin epidemic." Pain physician 21, no. 4 (2018): 309-326.

Studyspark

Study Document Study Document

Role And Purpose Of Advocacy In The Health Care Delivery System

Pages: 5 (1453 words) Sources: 4 Document Type:Essay Document #:38970574

...Communication Introduction
Advocacy in health care refers to the action of promoting and fostering social, economical, political and educational changes that reduce the risk of suffering of individuals and communities by implementing preventive strategies, increasing health literacy, and boosting access to care and health equity (Earnest, Wong & Federico, 2010). Health care advocacy agents can thus address health outcomes by advocating for changes to the current practices, environments, awareness, and access to care that populations face. This paper will discuss health care advocacy at the local, regional and international levels, the challenges and opportunities that exists in international healthcare advocacy and the ways these challenges can be addressed.
How Health Care Advocacy Agents Address Health Outcomes
The role and purpose of advocacy in the health care delivery system is to help to better ensure that the patient receives the type of quality care he or she needs no matter where he……

References

References

Ahmadinejad, F., Abbaszadeh, A., & Davoodvand, S. (2016). Patient advocacy from the clinical nurses\\\\' viewpoint: a qualitative study. Journal of medical ethics and history of medicine, 9(5).

Benatar, S. R. (2013). Global Health and Justice: R e?examining our Values. Bioethics,  27(6), 297-304.

Earnest, M. A., Wong, S. L., & Federico, S. G. (2010). Perspective: physician advocacy: what is it and how do we do it?. Academic medicine, 85(1), 63-67.

World Health Organization (WHO). (2015). Global Health Ethics Key issues Global Network of WHO Collaborating Centres for Bioethics. Retrieved from:  http://apps.who.int/iris/bitstream/handle/10665/164576/9789240694033_eng.pdf;jsessionid=BF56A5C93A3B735876DBBF060A0652FC?sequence=1 

World Health Organization. (2016). Online public hearing to help inform the scope of the forthcoming WHO guidelines on health policy and system support to optimize community based health worker programs. Retrieved from: http://www.who.int/hrh/news/2016/pico_form/en/

Join thousands of other students and

"spark your studies".