Contemporary Issues Essays (Examples)

Studyspark

Study Document Study Document

6th Grade History Instructional Unit

Pages: 8 (2360 words) Sources: 5 Document Type:Capstone Project Document #:22116043

… integrate diversity and social justice components with respect to mandated curricular content. This instructional 3-week unit for 6th grade history class leverages a contemporary educational theme in diversity and social justice.
Unit Background and contemporary Educational Theme
As they continue to progress in their learning, sixth grade students are generally ready to enhance their understanding of history. The … to provide social studies instruction as a component of world history in relation to district instructional goals and common core standards.
The relevant contemporary educational theme in diversity and social justice that will be incorporated in this unit is inclusivity. Inclusivity is a relevant theme in this … study is 6th grade World History, Geography and Ancient Civilization. This is an important discipline of study since a deeper understanding of historical issues helps to develop a deeper understanding of social justice standards and issues facing African American/minority community. In this……

References

References

Archdiocese of Santa Fe. (2011). Social Studies Curriculum. Retrieved April 27, 2020, from  https://asfcatholicschools.org/documents/2016/1/Social%20Studies%206th.pdf 

This publication provides an overview of world history and geography as part of social studies curriculum for 6th grade students. It provides an outline of learning outcomes and assessments/strategies that can be employed in a 6th grade history class. These strategies, assessments, and learning outcomes are developed in line with common standards and based on what students at this grade level should achieve by the end of the unit. It was utilized to determine suitable strategies, assessments and learning outcomes to incorporate for the success of this unit.

Blake, C. (2020). Teaching Social Justice in Theory and Practice. Retrieved April 27, 2020, from  https://resilienteducator.com/classroom-resources/teaching-social-justice/ 

This article examines the process of teaching social justice in relation to existing theory and best practices. The author examines how classrooms are designed to be avenues for social change by promoting learning of new ideas. This article was used to identify a contemporary educational theme in diversity and social justice. The identified theme was utilized to shape the unit content and teaching strategies.

California Department of Education. (2000). History – Social Science Content Standards for California Public Schools: Kindergarten Through Grade Twelve. Retrieved from California Department of Education website:  https://www.cde.ca.gov/be/st/ss/documents/histsocscistnd.pdf 

The publication provides an overview of standards relating to the study of history and social science from kindergarten to grade twelve. Standards are used as the premise for shaping learning content, expectations, and outcomes for students in different grades. Insights from this publication was used to shape learning content, expectation, outcomes, and strategies for this instructional unit.

edCount. (2014). World History and Geography: Mesopotamia, Ancient Egypt, and Ancient Israel. Retrieved from Tennessee State Government website:  https://www.tn.gov/content/dam/tn/education/tcap/TCAP_ALT_SS_module_grade6_module1_wld_hist_geo_meso_egypt_israel.pdf 

The article examines grade 6 topic on world history and geography in relation to common standards. The author reviews different subject areas relating to this topic including ancient Egypt, Mesopotamia and ancient Israel. Through this review, the publication seeks to enhance knowledge of grade-appropriate social studies concepts, skills, and knowledge. The publication was used to identify relevant knowledge, skills and social studies concepts relating to this instructional unit.

Studyspark

Study Document Study Document

CEOs And Presidents

Pages: 11 (3242 words) Sources: 13 Document Type:Essay Document #:96542123

… he communicates to the public at large. Leveraging Twitter is a way to influence stakeholders (Malhotra & Malhotra, 2016).
Role of Influence in contemporary Leadership
Influence is highly important when it comes to contemporary leadership because it impacts the way leaders motivate workers, empower them and get them to achieve their potential. Leadership is about having the … and guide but that they be able to communicate the vision of the end goal. This is the essence of effective influence in contemporary leadership. Indeed, communicating a vision is one of the central skills of transformational leadership (Bromley, 2007). For example, in an organization, a CEO ……

References

References

Bromley, H. R. (2007). Are you a transformational leader?. Physician Executive, 33(6), 54.

Brown, M. E., & Treviño, L. K. (2014). Do role models matter? An investigation of role modeling as an antecedent of perceived ethical leadership. Journal of Business Ethics, 122(4), 587-598.

Chamers, M.M. (2014). An Integrative Theory of Leadership (4thed.). New York, NY: Psychology Press.

De Vries, M.F.K. (1998). Charisma in action: The transformational abilities of Virgin's Richard Branson and ABB's Percy Barnevik. Organizational Dynamics, 26(3), 7-21.

Healthcare Technology Report. (2019). Alex Gorsky is the all-American CEO. Retrieved from  https://thehealthcaretechnologyreport.com/alex-gorsky-is-the-all-american-ceo/ 

Holmes, A. (2007). Ethics: Approaching moral decisions. Downers Grove, IL: InterVarsity Press.

Kameda, T., Ohtsubo, Y., & Takezawa, M. (1997). Centrality in sociocognitive networks and social influence: An illustration in a group decision-making context. Journal of personality and social psychology, 73(2), 296.

Kolodny, L. (2018). Elon Musk’s extreme micromanagement has wasted time and money at Tesla, insiders say. Retrieved from  https://www.cnbc.com/2018/10/19/tesla-ceo-elon-musk-extreme-micro-manager.html

Studyspark

Study Document Study Document

John Lewis Gaddis

Pages: 8 (2280 words) Sources: 9 Document Type:Essay Document #:77530466

… a Master’s in 1965, and a Doctorate in 1968 at the age of 27. He taught at Indiana University, Ohio University, founded the contemporary History Institute, and became a Visiting Professor of Strategy at Naval War College in the mid-70s. He was also a Visiting Professor at … Cold War. It was this interest in his own people and his own time that led him to dedicate his life to studying contemporary history and in particular the Cold War.
At Yale he became known as the “dean of the Cold War” among his students.[footnoteRef:3] One … a peace movement en force than a war among nations.[footnoteRef:4] [3: Mark Alden Branch, “Days of Duck and Cover,” Yale Alumni Magazine, 2000. http://archives.yalealumnimagazine.com/issues/00_03/gaddis.html] [4: Anders Stephanson, \"Rethinking Cold War History.\" Review of International Studies 24, no. 1 (1998), 119.]
Gaddis adopted a diplomatic approach to diplomatic history and ……

References

Bibliography

Alpha History, “Cold War Historiography.”  https://alphahistory.com/coldwar/cold-war-historiography/ 

Branch, Mark Alden. “Days of Duck and Cover,” Yale Alumni Magazine, 2000.  http://archives.yalealumnimagazine.com/issues/00_03/gaddis.html 

Encyclopedia. “John Lewis Gaddis,” 2020.  https://www.encyclopedia.com/arts/educational-magazines/gaddis-john-lewis-1941 

Gaddis, John Lewis. We Now Know: Rethinking Cold War History. Oxford University Press, 1997.

Kaplan, Fred. “America’s Cold War Sage and His Discontents,” NYTimes, 2007. https://www.nytimes.com/2011/11/23/books/george-f-kennan-by-john-lewis-gaddis-review.html

Lundestad, Geir. "The Cold War According to John Gaddis." Cold War History 6, no. 4 (2006): 535-542.

National Endowment for the Humanities. “John Lewis Gaddis,” 2005.  https://www.neh.gov/about/awards/national-humanities-medals/john-lewis-gaddis 

Paxton, Robert. Anatomy of Fascism. New York: Vintage, 2012.

Studyspark

Study Document Study Document

Gestalt Therapy Counseling Psychology History And Interventions

Pages: 7 (2051 words) Sources: 8 Document Type:Research Paper Document #:37769060

… art therapy are also methods used in Gestalt psychology.
Although the phrase may seem out of vogue, Gestalt psychology underwrites a lot of contemporary psychotherapies and therapeutic interventions, particularly those with a humanistic outlook. Gestalt psychology started off with firm empirical grounding in the science of perception … Gestalt therapists work with children, such as confluence, projection, and introjection. These disturbances can also arise when working with adults, especially when unresolved issues come to the fore.
Developmental Scheme and Etiological Assumptions in Gestalt
Gestalt psychology has no formal developmental model, but does imply that psychological ……

References

References

Brownell, P. (2016). Contemporary Gestalt therapy. In D. J. Cain, K. Keenan, & S. Rubin (Eds.), Humanistic psychotherapies: Handbook of research and practice (p. 219–250). American Psychological Association.  https://doi.org/10.1037/14775-008 

Cherry, K. (2019). Gestalt psychology overview. Very Well Mind. Retrieved from:  https://www.verywellmind.com/what-is-gestalt-psychology-2795808 

Covey, G. (2017). Theory and practice of counseling and psychotherapy, enhanced, 10th edition. Cengage.

Jacobs, L. (1989). Dialogue in Gestalt theory and therapy. The Gestalt Journal 12(1): 1-25. Retrieved from:  http://www.gestaltpsychotherapie.de/jacobs1.pdf 

Kepner, E. (n.d.). Gestalt group processes. Retrieved from:  http://www.elementsuk.com/libraryofarticles/gestalt.pdf 

Oaklander, V. (1994). Gestalt play therapy. In O’Connor, K.J. & Schaefer, C.E. (Eds.). Handbook of play therapy. John Wiley & Sons, pp. 143-156.

Rock, I. & Palmer, S. (1990). The legacy of Gestalt psychology. Scientific American 263(6): 84-91.

Yontef, G. & Jacobs, L. (n.d.). Gestalt therapy. Retrieved from:  https://pdfs.semanticscholar.org/1211/3bf06e5fa3208fea4330873403ae65b0891c.pdf

Studyspark

Study Document Study Document

Government Politics And Political Corruption Values

Pages: 4 (1102 words) Sources: 5 Document Type:Annotated Bibliography Document #:94706420

… sources used in my research and adds to them by providing an alternative point of view.
Annotation 3
Newell, J.L. (2018). Corruption in contemporary politics. Manchester University Press.
In this book, Newell discusses the relationship between political corruption and wealth disparity. Newell also shows how power and … and also how to analyze the causal variables implicated in government corruption. In fact, Newell offers case study examples from different types of contemporary governments including both democratic and non-democratic regimes. One of the unique features of the book is the section on minimum trust necessary to … some situations, fostering corruption. This is one of the more thorough sources used in my research, as it covers a wide range of issues related to government corruption. However, it integrates well with the other sources and will become a valuable source of information.
Annotation 4
Prato … Case Studies from Europe. In:……

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384


3.5 Ethical Considerations 14
3.6 Data Analysis Plan & Rationale 15
4 Contributions to Theory or Practice and their Significance 16
5 Ethical issues and Methods to Address 17
6 Conclusion 17
Introduction
Background
Corporations of all sizes in the accounting industry, in addition to other industries … accounting applications in addition to enterprise resource management and customer relationship management, play a pivotal role in everyday business operations. Significantly, in the contemporary setting, companies and entrepreneurs in the accounting sector are no longer constantly installing software apps on their computers or computer systems situated within … Information as a Service. In this particular case, the vendor of cloud services partake in the…[break]…is tasked with responsibilities that are related to issues such as investment, application, and implementation decisions linked to cloud computing.
Ethical Considerations
Research ethics is pivotal in promoting the fundamental aims of ……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

Depression Status Among Empty Nest Elderly In China

Pages: 3 (909 words) Sources: 8 Document Type:Essay Document #:16492845

… et al. (2018) states that depressive symptoms and empty phenomenon of elderly people in rural areas is one of the major public health issues in China, which has one of the largest elderly population in the world. It is estimated that elderly people aged 60 years and … of the major psychosocial problems faced by this population include anxiety disorders, loneliness, and depression. Depression is generally one of the major psychiatric issues facing elderly people and has severe impacts on their health status and wellbeing (Zhang et al., 2019). Empty nesters in China are increasingly ……

References

References

Gong, F., Zhao, D., Zhao, Y., Lu, S., Qian, Z. & Sun, Y. (2018). The Factors Associated With Geriatric Depression in Rural China: Stratified by Household Structure. Psychology, Health & Medicine, 23(5), 593-603.

Liang, Y. & Wu, W. (2014). Exploratory Analysis of Health-related Quality of Life Among the Empty-nest Elderly in Rural China: An Empirical Study in Three Economically Developed Cities in Eastern China. Health and Quality of Life Outcomes, 12(59). doi:10.1186/1477-7525-12-59

Lu, J., Zhang, C., Xue, Y., Mao, D., Zheng, X., Wu, S. & Wang, X. (2019). Moderating Effect of Social Support on Depression and Health Promoting Lifestyle for Chinese Empty Nesters: A Cross-sectional Study. Journal of Affective Disorders, 256, 495-508.

Wang, L., Liu, W., Liang, Y. & Wei, Y. (2019). Mental Health and Depressive Feeling of Empty-Nest Elderly People in China. American Journal of Health Behavior, 43(6), 1171-1185.

Xie, L., Zhang, J., Peng, F. & Jiao, N. (2010). Prevalence and Related Influencing Factors of Depressive Symptoms for Empty-nest Elderly Living in the Rural Area of YongZhou, China. Archives of Gerontology and Geriatrics, 50, 24-29.

Zhai, Y., Yi, H., Shen, W., Xiao, Y., Fan, H., He, F., Li, F., Wang, X., Shang, X. & Lin, J. (2015). Association of Empty Nest with Depressive Symptom in a Chinese Elderly Population: A Cross-sectional Study. Journal of Affective Disorders, 187, 218-223.

Zhang, C., Xue, Y., Zhao, H., Zheng, X., Zhu, R., Du, Y., Zheng, J. & Yang, T. (2019). Prevalence and Related Influencing Factors of Depressive Symptoms Among Empty-nest Elderly in Shanxi, China. Journal of Affective Disorders, 245, 750-756.

Zhou, J., Xiao, L., Zhou, Y., Rui, G. & Ni, X. (2019). The Depression Status of Empty Nesters in Eastern Rural China. Social Behavior and Personality: An International Journal, 47(2), 1-9.

Studyspark

Study Document Study Document

God Of Old Testament Versus God Of New Testament

Pages: 4 (1301 words) Sources: 10 Document Type:Essay Document #:50480355

References

References

Astika, Made. \\\\\\\\\\\\"The Relationship Between Old And New Testament: A Study On Contemporary Debate Of Methodology Of The Old Testament Theology.\\\\\\\\\\\\" Jurnal Jaffray 11, no. 1 (2013): 129-149.

Baah-Odoom, Dinah, and Frimpong Wiafe. \\\\\\\\\\\\"The Importance Of The Old Testament To The Christian Spirituality.\\\\\\\\\\\\" The International Journal of Social Sciences and Humanities Invention, Vol. 3 iss. 7, (2016); 2414-2425.

Baker, David L. Two Testaments, One Bible: The Theological Relationship between the Old and New Testaments. InterVarsity Press, 2010.

Jasper, F. N. \\\\\\\\\\\\"The Relation of the Old Testament to the New: Part I.\\\\\\\\\\\\" The Expository Times 78, no. 9 (1967): 228-232.

Lamb, David T. God Behaving Badly: Is the God of the Old Testament Angry, Sexist and Racist?. InterVarsity Press, 2011.

Longman, Tremper III. Making Sense of the Old Testament (Three Crucial Questions): Three Crucial Questions. Baker Books, 1999.

Mathewson, Dave. \\\\\\\\\\\\"Reading Heb 6: 4-6 in light of the Old Testament.\\\\\\\\\\\\" Westminster theological journal 61, no. 2 (1999): 209-226.

Newman, Kelly D. \\\\\\\\\\\\"To Know the One True God: Reconciling the God of the Old Testament with the God of the New Testament.\\\\\\\\\\\\" Masters of Arts in Religious Education, Brigham Young University. (2006).

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

… and approached to participate in the study based on their knowledge and expertise on the phenomenon being studied. Some of the potential ethical issues that could emerge include privacy of research participants and confidentiality. These issues will be addressed through ensuring participation is voluntary and participants will not be required to provide any personal identification information. Additionally, data obtained ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf 

National Counterintelligence and Security Center. “Foreign Economic Espionage in Cyberspace.” Office of the Director of National Intelligence, 2018.  https://www.dni.gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf 

Rubenstein, D. “Nation State Cyber Espionage and its Impacts.” Washington University in St. Louis, December 2014.  https://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/ 

Weissbrodt, D. “Cyber-Conflict, Cyber-Crime, and Cyber-Espionage.” Minnesota Journal of International Law 22, no. 2 (2013).

Studyspark

Study Document Study Document

Security In Communication Challenges

Pages: 10 (2871 words) Sources: 11 Document Type:Research Paper Document #:73429324

… network. Imperatively, data security is the key element of secure transmission of data over communication networks that are undependable (Jain, 2013). In the contemporary, security is a challenging aspect of data communications that encompasses numerous areas comprising of safe and secure communication challenges, strong data encryption techniques, … the protection mechanism of wireless communications and toughness or strength against attacks and failure of network components or communication in its own. These issues comprise of the Wireless Sensor Network gateway forming a sole point of interruption for the back-to-back sensor network infrastructure. Secondly, subsequent to the … roaming proficiencies and numerous more, the security aspect of wireless communication networks has continued to be of massive challenge and worry. In the contemporary setting, wireless communication susceptibilities are on the rise as a result of greater demand levels for greater data rates, the necessity for advanced … services and that of roaming,……

References

References

Bagheri-Karam, G. (2010). Physical-Layer Security in Wireless Communication Systems. Ontario: Waterloo.

Chang, Z. (2019). Physical Layer Security in Wireless Communications. University Of Jyväskylä. Retrieved from:  http://users.jyu.fi/~timoh/TIES327/WPLS.pdf 

Chen, Q., Zhang, C., & Zhang, S. (2008). Secure transaction protocol analysis: models and applications. Springer-Verlag.

GSMA. (2019). Number of Mobile Subscribers Worldwide Hits 5 Billion. Retrieved from:  https://www.gsma.com/newsroom/press-release/number-mobile-subscribers-worldwide-hits-5-billion/ 

Gu, X., & Hunt, R. (2005). Wireless LAN attacks and vulnerabilities. the proceeding of IASTED Networks and Communication Systems.

Ijemaru, G. K., Adeyanju, I. A., Olusunyi, K. O., Ofusori, T. J., Ngharamike, E. T., Sobowale, A. A. (2018). Security Challenges of Wireless Communications Networks: A Survey. International Journal of Applied Engineering Research, 13 (8): 5680 – 5692.

IJEMARU, G. K., UDUNWA, A. I., NGHARAMIKE, E. T., & OLEKA, E. U. (2015). Evaluating the Challenging Issues in the Security of Wireless Communication Networks in Nigeria. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 3, Issue 12, pp. 1-5, 2014.

Jain, A. (2013). Network Security-The Biggest Challenge in Communication. Advance in Electronic and Electric Engineering. Research India Publications.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".