Discussion Essays (Examples)

Studyspark

Study Document Study Document

Platos Republic And Justice

Pages: 3 (1016 words) Sources: 2 Document Type:Essay Document #:77363231

...Discussion Plato’s Republic: A Definition of Justice
According to Plato, “justice is the excellence of the soul, and injustice the defect of the soul” (20). Another definition of it, however, is that justice is “the repayment of a debt” (4). This is a rather narrow definition of justice, and it is one that Socrates unpacks—but it to can get to the heart of the underlying meaning. The just man is one who pursues the good, while the unjust man is one who pursues evil. Of course, as is always the case with Socrates, everything must come around eventually to a definition of the good, which Plato defines in the dialogue as transcendental ideals that objectively exist as universals: to know justice is, as Socrates explains in the Allegory of the Cave, to pursue the ultimate reality, which exists high above, where the source of all good is to be found—in God.……

References

Works Cited

Plato. The Republic.

Plato. The Dialouges, vol. 1. Online Library of Liberty. Retrieved from http://lf-oll.s3.amazonaws.com/titles/111/Plato_0131-01_EBk_v6.0.pdf

Studyspark

Study Document Study Document

Discriminating Between Phenomenology And Grounded Theory Qualitative

Pages: 7 (2226 words) Sources: 7 Document Type:Case Study Document #:86692193

… school teachers…[break]…the phenomena in question.
Role of the Researcher
In this study, Yalof (2014) functions mainly as an observer. The researcher used online discussion groups, serving as moderator and facilitator to stimulate the types of discussions that would yield viable data for the grounded theory research.
Applying the Principles of Grounded Theory
Grounded theory is based on a process … Collection
The researcher collects data from eighteen undergraduate and graduate student-participants in fourteen online universities. Data was also collected via online forums and discussions.
Ethical Issues
The researcher does not indicate whether or not, or how, informed consent was given to the participants. This is ethically problematic, ……

References

References

Baker, C., Wuest, J., & Stern, P. N. (1992). Method slurring: the grounded theory/phenomenology example. Journal of Advanced Nursing, 17(11), 1355–1360.doi:10.1111/j.1365-2648.1992.tb01859.x 

Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing among five approaches. eBook.

Norton, S.M. (2013). A phenomenological investigation into the self-efficacy beliefs of teachers who have presisted in the teaching profession. Liberty University Dissertation.

Starks, H., & Brown Trinidad, S. (2007). Choose Your Method: A Comparison of Phenomenology, Discourse Analysis, and Grounded Theory. Qualitative Health Research, 17(10), 1372–1380.doi:10.1177/1049732307307031 

Suddaby, R. (2006). From the Editors: What Grounded Theory is Not. Academy of Management Journal, 49(4), 633–642.doi:10.5465/amj.2006.22083020 

Wimpenny, P. & Gass, J. (2001). Interviewing in phenomenology and grounded theory: is there a difference? Journal of Advanced Nursing 31(6): 1485-1492.

Yalof, B. (2014). Marshaling resources. The Grounded Theory Review 13(1).

Studyspark

Study Document Study Document

The FBI Counterproliferation And Weapons Of Mass Destruction

Pages: 6 (1839 words) Sources: 8 Document Type:Research Paper Document #:33590628

...Discussion The FBI, Counterproliferation, and Weapons of Mass Destruction
The United States government significantly increased activities in programs involved in the protection of the nation and the world against weapons of mass destruction (WMD) in 2009 and 2010. The Obama Administration, in December 2009, gave a presidential policy directive aimed at countering biological threats with a focus on infectious illnesses whether such threats were manmade or natural. It was the second such directive the Administration had issued. The Quadrennial Defense Review in 2010 emphasized on how WMD’s proliferation was a threat to global security. In April of the same year, the Administration unclassified the Nuclear Posture Review for the first time and it was released alongside the Strategic Arms Reduction Treaty. The treaty was aimed at lowering the number of deployable US and Russian weapons. Representatives drawn from all over the world met in May with a goal of renewing the……

References

References

Busch, Nathan, and Joyner, Daniel (ed). 2009. “Introduction: Nonproliferation at a Crossroads.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Athens, GA: The University of Georgia Press.

Reiss, Mitchell. 2009. “Foreword.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Edited by Nathan Busch, and Daniel Joyner. Athens, GA: The University of Georgia Press.

Cameron, Gavin, Pate, Jason & Vogel, Kathleen. (2001). “Planting Fear: How Real is the Threat of Agricultural Terrorism?” Bulletin of Atomic Scientists, 57(5), 38-44.

Jennings, Elain. 2013. U. S. proliferation policy and the campaign against transnational terror: Linking the U.S. non-proliferation regime to homeland security efforts. Master’s Thesis. Naval Postgraduate School.

Levi, Michael. 2009. “On Nuclear Terrorism.” Cambridge, MA: Cambridge University Press.

Mauroni, Albert. J. 2010. “A Counter-WMD Strategy for the Future.” Parameters, 58-73.

Ogilvie-White, Tanya. 2008. “Facilitating Implementation of Resolution 1540 in South- East Asia, and the South Pacific.” In Implementing Resolution 1540: The Role of Regional Organizations. Edited by Lawrence Scheinman. New York: United Nations Institute for Disarmament Research.

Pilat Joseph F. 2009. “Dealing with Proliferation and Terrorism.” In Combating Weapons of Mass Destruction: The Future of International Nonproliferation Policy, edited by Nathan E. Busch and Daniel H. Joyner. Athens, GA: University of Georgia Press.

Studyspark

Study Document Study Document

Diabetes

Pages: 5 (1464 words) Sources: 2 Document Type:Article Critique Document #:12075448

… Diabetes Research. This paper will critique the two articles by evaluating information pertaining to their titles, abstracts, introductions, background sections and the authors’ discussion of their respective studies’ significance. Information pertaining to the studies’ statement of problem, research questions or hypotheses, literature review, theoretical framework, ethical considerations ……

References

References

Lynch, E. B., Mack, L., Avery, E., Wang, Y., Dawar, R., Richardson, D., … Fogelfeld, L. (2019). Randomized Trial of a Lifestyle Intervention for Urban Low-Income African Americans with Type 2 Diabetes. JGIM: Journal of General Internal Medicine, 34(7), 1174–1183.  https://doi-org.ezproxy.loyno.edu/10.1007/s11606-019-04894-y 

Protheroe, J., Rathod, T., Bartlam, B., Rowlands, G., Richardson, G., & Reeves, D. (2016). The Feasibility of Health Trainer Improved Patient Self-Management in Patients with Low Health Literacy and Poorly Controlled Diabetes: A Pilot Randomised Controlled Trial. Journal of Diabetes Research, 1–11.  https://doi.org/10.1155/2016/6903245 

Studyspark

Study Document Study Document

Program Logic Model

Pages: 6 (1769 words) Sources: 8 Document Type:question answer Document #:91645810

… backgrounds, religious beliefs, and family values. Not every teen is going to come from the same type of household and in some homes, discussions about sex may even be strongly forbidden while in other homes it might be something quite freely and openly discussed or accepted. Thus, ……

References

References

Bandura, A. (2018). Toward a psychology of human agency: Pathways and reflections.  Perspectives on Psychological Science, 13(2), 130-136.

Bickel, R., Weaver, S., Williams, T., & Lange, L. (1997). Opportunity, community, and teen pregnancy in an Appalachian state. The Journal of Educational Research, 90(3), 175-181.

Chapin, J. (2001). It won't happen to me: The role of optimistic bias in African American teens' risky sexual practices. Howard Journal of Communication, 12(1), 49-59.

Damon, W. (1984). Peer education: The untapped potential. Journal of applied developmental psychology, 5(4), 331-343.

Kerpelman, J. L., McElwain, A. D., Pittman, J. F., & Adler-Baeder, F. M. (2016). Engagement in risky sexual behavior: Adolescents’ perceptions of self and the parent–child relationship matter. Youth & Society, 48(1), 101-125.

Sciolla, A., Ziajko, L. A., & Salguero, M. L. (2010). Sexual health competence of international medical graduate psychiatric residents in the United States. Academic Psychiatry, 34(5), 361-368.

Stakic, S., Zielony, R., Bodiroza, A., & Kimzeke, G. (2003). Peer education within a frame of theories and models of behaviour change. Entre Nous: The European Magazine for Sexual and Reproductive Health, 56, 4-6.

Walsh-Buhi, E. R., Marhefka, S. L., Wang, W., Debate, R., Perrin, K., Singleton, A., ... & Ziemba, R. (2016). The impact of the Teen Outreach Program on sexual intentions and behaviors. Journal of Adolescent Health, 59(3), 283-290.

Studyspark

Study Document Study Document

Privacy In Social Networks Regarding Machine Learning

Pages: 8 (2537 words) Sources: 10 Document Type:Research Paper Document #:98311751

...Discussion Abstract
This paper discusses the issue of privacy in social networks with respect to advances in machine learning. It shows how machine learning protocols have been developed both to enhance and secure privacy as well as to invade privacy and collect, analyze, predict data based on users’ information and experience online. The conflict between these two directions in machine learning is likely to lead to a system wherein machine learning algorithms are actively engaged in the subversion of one another, with one attempting to conceal data and the other attempting to uncover it. This paper concludes with recommendations for social networks and the issue of privacy regarding machine learning.
Introduction
Social networks have allowed an ocean of personal data to form that is now sitting there waiting for machine learning algorithms to collect it, analyze it, and recognize individuals on social media (Oh, Benenson, Fritz & Schiele, 2016). Machine learning……

References

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

Studyspark

Study Document Study Document

Human Capital Needs In An Army Unit

Pages: 1 (318 words) Sources: 1 Document Type:Essay Document #:28909985

Discussion Response #1
The effectiveness of any Army unit is partly affected by the size and capability of the existing workforce. Leaders in Army … growth and development of the workforce in order to enhance their capabilities and overall effectiveness of the respective unit. As shown in your discussion, workforce capabilities in Army units are sometimes affected by the size of the workforce. An inadequate number of personnel contributes to gaps between … be addressed through hiring an adequate number of personnel as well as employing various strategies toward employee engagement, training/retraining, and organizational adaptability. Your discussion correctly demonstrates that identification of gaps in the workforce and human capital needs should be based on the structure of the Army force ……

References

Reference

U.S. Army War College. (2015, August). 2015-2016: How the Army Runs – A Senior Leader Reference Handbook. Retrieved November 22, 2019, from  https://www.g8.army.mil/references/htar_how_the_army_runs.pdf 

 

Studyspark

Study Document Study Document

Counterintelligence Issues Within The United States

Pages: 18 (5457 words) Sources: 29 Document Type:Research Paper Document #:72238996

… the ethical spectrum and Cohen (2016) represents the other side. Kent (2019) and Godson and Wirtz (2000) represent the absolutist side of the discussion; Cohen (2016) represents the relativistic side.
The absolutist side of the discussion has a much better argument than the relativistic side. The reason for this is that there is an escalation problem involved, from a ……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. "The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles." Bachelor's thesis, Università Ca'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Cohen, Shlomo. 2016. "Are There Moral Limits to Military Deception?." Philosophia 44 (4): 1305-1318.

Coyne, John, Peter Bell, and Shannon Merrington. 2013. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2 (10): 27-37.

Erskine, Toni. 2004. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. "Strategic denial and deception." International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Studyspark

Study Document Study Document

Grade Six Mathematics

Pages: 6 (2529 words) Sources: 2 Document Type:Lesson Plan Document #:85325876

… for learning
· Adoption of a strong behavior management plan
b. Instruction methods
· Direct instruction
· Questions and answer
· Practice
· Discussion
· Inquiry
B. Learning Environment
The teacher will use proactive strategies to create and maintain a positive learning environment that accommodates all students ……

References

References

Spooner, F., Baker, J. N., Harris, A. A., Ahlgrim-Delzell, L., & Browder, D. M. (2007). Effects of training in universal design for learning on lesson plan development. Remedial and special education, 28(2), 108-116.

Wiggins, G. P., & McTighe, J. (2012). The Understanding by design guide to advanced concepts in creating and reviewing units. ASCD.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".