Context Essays (Examples)

Studyspark

Study Document Study Document

Sociology Law And Identity

Pages: 6 (1908 words) Sources: 1 Document Type:Essay Document #:83127915

… argued that culture affects law and identity, and to ensure that there is fairness and justice in any given society, then the cultural context of the people cannot be ignored. In her book, The Cultural Defense, Alison Dundes Renteln argues that \"Culture shapes individual identity in crucial ……

References

References

Renteln, A. D. (2004). The cultural defense. Oxford University Press.

Studyspark

Study Document Study Document

TikTok Platform And Application Walkthrough

Pages: 4 (1080 words) Sources: 5 Document Type:Essay Document #:92988115

… as the first most-downloaded Chinese app in the United States, TikTok has an approximate global userbase of over a billion people. In the context of its economic and infrastructural status and significance, TikTok is explored in this paper as regards its ownership, revenue (and source of the ……

References

Works-Cited List

Nieborg, David B., and Thomas Poell. "The platformization of cultural production: Theorizing the contingent cultural commodity." New Media & Society, vol. 20, no. 11, 2018, pp. 4275-4292.

Nieborg, David B., and Anne Helmond. "The political economy of Facebook’s platformization in the mobile ecosystem: Facebook Messenger as a platform instance." Media, Culture & Society, vol. 41, no. 2, 2018, pp. 196-218.

Plantin, Jean-Christophe, et al. "Infrastructure studies meet platform studies in the age of Google and Facebook." New Media & Society, vol. 20, no. 1, 2016, pp. 293-310.

Poell, Thomas and David Nieborg and José van Dijck. "Platformisation". Internet Policy Review 8.4 (2019). Web. 7 Mar. 2020.

Tiwana, Amrit. "The Value Proposition of Platforms." Platform Ecosystems, 2014, pp. 61-69.

Studyspark

Study Document Study Document

Global Issues And Diversity

Pages: 3 (915 words) Sources: 3 Document Type:Term Paper Document #:72179275

… it is fully global today, and that demands an entirely new skill set around understanding diversity and global issues, and working within those contexts to deliver exceptional business results.
Diversity
There are a few different ways to understand diversity. The first is to take sort of a ……

References

References

Dyllick, T. & Muff, K. (2015) Clarifying the meaning of sustainable business: Introducing a typology from business-as-usual to true business sustainability. Organization & Environment. Vol. 2015, 1-19.

Lozano, J. & Escrich, T. (2017) Cultural diversity in business: A critical reflection on the ideology of tolerance. Journal of Business Ethics. Vol. 142 (4) 679-696.

Maj, J. (2015) Diversity management’s stakeholders and stakeholders management. Proceedings of the 9th International Management Conference. Retrieved February 19, 2019 from https://www.researchgate.net/profile/Jolanta_Maj/publication/282848702_Diversity_management\\\\'s_stakeholders_and_stakeholders_management/links/561e400f08ae50795afd9360/Diversity-managements-stakeholders-and-stakeholders-management.pdf

Studyspark

Study Document Study Document

How Dehumanization Plays A Role In The Lucifer Effect

Pages: 5 (1524 words) Sources: 5 Document Type:Essay Document #:73082862

… pursued in “The Lucifer Effect” that Zimbardo describes as he recounts his own past experience with the Stanford Prison Experiment and in the context of the Abu Ghraib scandal.
What is Dehumanization?
Dehumanization is one of the most horrific experiences that can occur to a human being. ……

References

Works Cited

Hong, J. K. “The Lucifer Effect: Understanding how good people turn evil.” Army Lawyer, (2012), 55-58.

Maslow, Abraham. “A theory of human motivation.” Psychological Review, 50.4 (1943), 370.

Rogers, Carl. Client-Centered Therapy. MA: Riverside Press, 1951.

Unkefer, Dean. 90 Church.

Zimbardo, Philip. The Lucifer Effect. Random House, 2007.

Studyspark

Study Document Study Document

Culture Analysis At A Software Company

Pages: 5 (1573 words) Sources: 5 Document Type:Research Paper Document #:44019185

...Context Culture Analysis Paper
Company Overview
I’m studying a software company that shall be known as K. K is not based in Silicon Valley, but elsewhere in the US, with offices around the world. K sells SaaS products in the B2B market and has sales in the hundreds of millions, and over 1000 employees. This company has also acquired several small firms in recent years. Integrating all of those individual cultures into a cohesive one has been one of the organization’s biggest challenges. This paper will outline the culture at K via primary sources, supplemented with secondary source material on organizational culture theory.
Primary research consisting of several employee interviews revealed some challenges, especially the domains of underlying assumptions and values. There is a lack of artifacts that provide meaning, which is another problem that will need to be resolved.
Primary Research
As I know people who work in this company……

References

References

Chambers, K. & Honeycutt, A. (2009) Telecommunications mega-mergers: Impact on employee morale and turnover intention. Journal of Business & Economics Research. Vol. 7 (2) 43-52.

Dencker, J., Joshi, A, & Martocchio, J. (2007) Employee benefits as context for intergenerational conflict Human Resource Management Review. Vol. 17 (2) 208-220.

Lund, D. (2003) Organizational culture and job satisfaction. Journal of Business and Industrial Marketing. Vol. 18 (3) 219-236.

North, M. & Fiske, S. (2015) Intergenerational resource tensions in the workplace and beyond: Individual, interpersonal, institutional and international. Research in Organizational Behavior. Vol. 35 (2015) 159-179.

Yamanoi, J. & Sayama, H. (2013). Post-merger cultural integration from a social network perspective: A computational modeling approach. Computational and Mathematical Organization Theory Vol. 19 (2013) 516-537.

Studyspark

Study Document Study Document

Carl Rogers The Ideal Self And Animal Therapy

Pages: 6 (1743 words) Sources: 6 Document Type:Evidence Based Practice Document #:76426063

...Context Evidence-Based Programs and Practices
Part 1: Define and Refine
Evidence-Based Theories
Evidence-based programs are defined as a prevention or treatment practice, that is based on consistent scientific evidence providing proof that the practice improves client/patient outcomes. The practice should be supported by sufficient documentation and peer-reviewed research that shows its effectiveness (Operational Definition for Evidence-Based Practices Addictions and Mental Health Division, 2017).
Programs draw from theory in that the theoretical framework developed by researchers and professionals serve as a set of parameters or guidelines for how to interpret evidence and how to implement the recommendations based on the evidence into one’s practice. Theories serve as the lens through which to look at the evidence. Just as a microscope has a lens and a focus so that one can see all the details of the subject, the theory allows the data to be put into perspective, and that perspective is defined……

References

References

Asen, E. & Fonagy, P (2012) Handbook of Mentalizing in Mental Health Practice. Washington DC.

Kern-Godal, A., Arnevik, E. A., Walderhaug, E., &Ravndal, E. (2015). Substance use disorder treatment retention and completion: a prospective study of horse-assisted therapy (HAT) for young adults. Addiction science & clinical practice, 10(1), 21.

Rogers, C. (1951). Client-Centered Therapy. MA: Riverside Press. Evidence-Based Practice in Psychology. (2006). American Psychologist, May-June, 271-285.

Muela, A., Balluerka, N., Amiano, N., Caldentey, M. A., &Aliri, J. (2017). Animal-assisted psychotherapy for young people with behavioural problems in residential care. Clinical Psychology and Psychotherapy, 24(6), O1485 O1494. doi: http://fir.tesu.edu:2074/10.1002/cpp.2112 

Operational Definition for Evidence-Based Practices Addictions and Mental Health Division. (2017). Week 4 material.

Studyspark

Study Document Study Document

Digital Forensics Importance Of Hash Values

Pages: 5 (1350 words) Sources: 5 Document Type:Essay Document #:47872866

...Context Hash Values in Digital Forensics
Introduction
Hash values denote condensed representations of digitized or binary content within digital material; however, they offer no additional information pertaining to the contents of any material interpretable by an individual. Moreover, the hash function is algorithms that convert variable-sized text quantities into hash values (which are fixed-sized outputs). Also called “cryptographic hash functions,” they facilitate the development of digital signatures, short textual condensations, and hash tables for the purpose of analysis (Fang et al., 2011; Kumar et al., 2012). In this paper, hash functions and their significance will be addressed.
Description
H (hash function) represents a transformation taking variable-sized input „m? and returning fixed-sized strings (h or hash value; i.e., h = H (m)) (Kumar et al., 2012). The hash functions possessing only the above property can be put to various broad computational uses; however, when applied to cryptography, they normally possess a few……

References

References

Fang, J., Jiang, Z. L., Yiu, S. M., & Hui, L. C. (2011). An efficient scheme for hard disk integrity check-in digital forensics by hashing with combinatorial group testing. International Journal of Digital Content Technology and its Applications.

Kaya, M., & Eris, M. (2017). Hash-based block matching for digital evidence image files from forensic software tools. World Academy of Science, Engineering, and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 11(10), 1068-1071.

Kumar, K., Sofat, S., Jain, S. K., & Aggarwal, N. (2012). SIGNIFICANCE of hash value generation in digital forensic: A case study. International Journal of Engineering Research and Development, 2(5), 64-70.

Netherlands Forensic Institute, (2018a). Technical Supplement Forensic Use of Hash Values and Associated Hash Algorithms. Ministry of Justice and security.

Rasjid, Z. E., Soewito, B., Witjaksono, G., & Abdurachman, E. (2017). A review of collisions in cryptographic hash function used in digital forensic tools. Procedia computer science, 116, 381-392.

Studyspark

Study Document Study Document

Veteran Benefits Administration

Pages: 8 (2465 words) Sources: 3 Document Type:Implementation Paper Document #:56829115

...Context Technology Proposal/Implementation Paper
A: Introduction
The Department of Veterans Affairs (VA) remains a vital entity in as far as the provision of key services to veterans in the country is concerned. The Veteran Benefits Administration (VBA), to a large extent, concerns itself with the administration of U.S. Department of Veteran Affairs’ programs. This is more so the case with regard to the provision or advancement of various forms of support to not only veterans and survivors, but also their dependents. Towards this end, some of the main programs that VBA administers include, but they are not limited to; pension and compensation, rehabilitation and employment, loan guaranty, and insurance. In the year 2016, the National Archives and Records Administration (2016) released a records management inspection report which was categorical that “the VA Records Management Program lacks several basic records management fundamentals.” The relevance of VA records cannot be overstated when it……

References

References

Aziz, A.A., Mohammad Y., Mokhtar, U.A. & Ambari, D.I. (2017). Establishing Policy for the Implementation of Electronic Document and Records Management System in Public Sector in Malaysia: The Influencing Factors. Advanced Science Letters, 23(11), 10732-10736.

National Archives and Records Administration (2016). Department of Veterans Affairs Records Management Program: Records Management Inspection Report. Retrieved from  https://www.archives.gov/files/records-mgmt/pdf/va-2016-inspection.pdf 

U.S. Department of Veteran Affairs (2020). About VBA. Retrieved from  https://www.benefits.va.gov/BENEFITS/about.a sp

Studyspark

Study Document Study Document

Discriminating Between Phenomenology And Grounded Theory Qualitative

Pages: 7 (2226 words) Sources: 7 Document Type:Case Study Document #:86692193

… Qualitative research examples highlight the strengths and weaknesses in both of these major approaches and show how each can be judiciously used in context.
In
a dissertation presented to Liberty University, Norton (2013) uses phenomenological approaches to study the self-efficacy beliefs of teachers who persist in their ……

References

References

Baker, C., Wuest, J., & Stern, P. N. (1992). Method slurring: the grounded theory/phenomenology example. Journal of Advanced Nursing, 17(11), 1355–1360.doi:10.1111/j.1365-2648.1992.tb01859.x 

Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing among five approaches. eBook.

Norton, S.M. (2013). A phenomenological investigation into the self-efficacy beliefs of teachers who have presisted in the teaching profession. Liberty University Dissertation.

Starks, H., & Brown Trinidad, S. (2007). Choose Your Method: A Comparison of Phenomenology, Discourse Analysis, and Grounded Theory. Qualitative Health Research, 17(10), 1372–1380.doi:10.1177/1049732307307031 

Suddaby, R. (2006). From the Editors: What Grounded Theory is Not. Academy of Management Journal, 49(4), 633–642.doi:10.5465/amj.2006.22083020 

Wimpenny, P. & Gass, J. (2001). Interviewing in phenomenology and grounded theory: is there a difference? Journal of Advanced Nursing 31(6): 1485-1492.

Yalof, B. (2014). Marshaling resources. The Grounded Theory Review 13(1).

Studyspark

Study Document Study Document

How To Conduct A Policy Analysis

Pages: 7 (2176 words) Sources: 9 Document Type:Essay Document #:80712198

...Context Policy Analysis
Abstract
This paper focuses on a bill currently going through Congress that would restrict the right of Americans to voice their support for the oppressed and marginalized Palestinian people by joining in the BDS Movement. This paper discusses why this issue is important to social welfare policy and shows that the bill would deny people the right to advocate by using social, political and economic means. The opposition towards the Israeli settlement practices in Palestine has already been condemned by the UN, but the U.S. Congress is now seeking not only to condemn the UN for its 2016 resolution against Israel, but it is also seeking to condemn any American person engaged in interstate commerce who chooses to support the UN resolution by boycotting Israeli products. This bill therefore would marginalize and socially, politically and economically exclude Americans in a dangerous way. This policy analysis paper also shows……

References

References

Beinin, J. (2004). The new American McCarthyism: policing thought about the Middle East. Race & Class, 46(1), 101-115.

Corrigan, E. C. (2009). Is Anti?Zionism Anti?Semitic? Jewish Critics Speak. Middle East Policy, 16(4), 146-159.

Fischel, J. R. (2005). The new anti-Semitism. The Virginia Quarterly Review, 81(3), 225.

Greenwald, G. (2019). The House Democrats’ “Rebuke” of Rep. Ilhan Omar Is a Fraud for Many Reasons, Including Its Wild Distortion of Her Comments. Retrieved from  https://theintercept.com/2019/03/05/the-house-democrats-rebuke-of-rep-ilhan-omar-is-a-fraud-for-many-reasons-including-its-wild-distortion-of-her-comments/ 

Gutiérrez, A. M. L., & Campos, M. V. (2015). Subjective and Objective Aspects of Points of View. In Temporal Points of View (pp. 59-104). Springer, Cham.

H.R. 1697. (2018). Israel Anti-Boycott Act. Retrieved from  https://www.congress.gov/bill/115th-congress/house-bill/1697 

Moritz-Rabson, D. (2018). Teacher sues Texas after being fired for refusing to sign pro-Israel contract. Retrieved from https://www.newsweek.com/teacher-fired-refusing-sign-pro-israel-document-1262083

Stein, Y. (2003). Any name illegal and immoral. Ethics & International Affairs, 17(1), 127-137.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".