History Of The Internet Essays (Examples)

Studyspark

Study Document Study Document

Enforcing Standards And Discipline In The United States Army

Pages: 6 (1880 words) Sources: 3 Document Type:Capstone Project Document #:79311678

The United States Army has a history of instilling and enforcing discipline within its ranks. However, with every passing year come changes in the way society thinks and acts. New … of the challenges that require leaders to be proactive in their approach to army standards and its enforcement. Soldiers have access to the internet in a deployed environment and use this platform in positive ways but also use social media in ways that bring harm to the ……

References

References

Allen, C. D. (2012). Back to Basics: The Army Must Reinforce Standards of Discipline. Carlisle, PA: Army War College Carlisle Barracks.

Frost, M. (2018). Back to the basics with pride and discipline. Retrieved from  https://www.ausa.org/articles/back-basics-pride-and-discipline 

Wardynski, C., Lyle, D. S., & Colarusso, M. J. (2009). Towards a US Army officer corps strategy for success: A proposed human capital model focused upon talent (Vol. 1). Carlisle, PA: Strategic Studies Institute.

Studyspark

Study Document Study Document

Healthcare Advocacy For The Elderly

Pages: 8 (2541 words) Sources: 6 Document Type:Essay Document #:36286528

...History internet Introduction
Ageism, isolation, and misconceptions about gerontology are all issues that the vulnerable elderly population faces (Brojeni, Ilali, Taraghi & Mousavinasab, 2019). As Yamada et al. (2015) point out, however, the issue of healthcare disparity and healthcare inequality of the elderly is one of the biggest issues because it underlines all the others: if the elderly population does not even have sufficient access to care, it is unlikely to be able to battle the effects of ageism, isolation or ignorance about gerontology. Healthcare costs have doubled since the 1990s (Yamada et al., 2015), and this puts an added burden on the elderly population, whose resources are finite. Yamada et al. (2015) put it this way: “as healthcare costs rises, more of the increasing costs are transferred to certain disadvantaged populations, and patients would have to spend a considerable share of their healthcare costs out-of-pocket” (p. 1745). In other words, the……

References

References

Brojeni, S. A., Ilali, E. S., Taraghi, Z., & Mousavinasab, N. (2019). Lifestyle and its related factors in elderly. Journal of Nursing and Midwifery Sciences, 6(1), 32.

Community Health Advocates. (2015). Helping New Yorkers get, keep, and use health coverage. Retrieved from:  http://www.cssny.org/programs/entry/community-health-advocates 

Davoodvand, S., Abbaszadeh, A., & Ahmadi, F. (2016). Patient advocacy from the clinical nurses' viewpoint: A qualitative study. Journal of Medical Ethics & History of Medicine, 9(5), 1-8.

Maryland, M. A., & Gonzalez, R. I. (2012). Patient advocacy in the community and legislative arena. Online Journal of Issues in Nursing, 17(1), 2.

Stainton, H. (2016). Horizon to fund new NJ healthcare advocacy organization. News, Issues, andIinsight for New Jersey. Retrieved from:  http://www.njspotlight.com/stories/16/11/21/horizon-to-fund-new-nj-healthcare-advocacy-organization/ 

Yamada, T., Chen, C. C., Murata, C., Hirai, H., Ojima, T., & Kondo, K. (2015). Access disparity and health inequality of the elderly: unmet needs and delayed healthcare. International journal of environmental research and public health, 12(2), 1745-1772.

Studyspark

Study Document Study Document

Directors Remuneration And Its Impact On Share Repurchases

Pages: 7 (2133 words) Sources: 11 Document Type:Research Proposal Document #:29089677

… be synthesized and the final report will be written, allowing for time for revision.
Resource Requirements
Resource requirements will include access to the internet and a digital lockbox for securing interview recordings and transcripts for the purpose of security. Recording equipment will be required but is available ……

References

References

Bendix, R. (1974). Inequality and social structure: a comparison of Marx and Weber.  American Sociological Review, 149-161.

Chan, R., & Hoy, M. (1991). East—West joint ventures and buyback contracts. Journal of International Economics, 30(3-4), 331-343.

Choi, C. J., & Maldoom, D. (1992). A simple model of buybacks. Economics Letters, 40(1), 77-82.

Durkheim, E. (1997). The Division of Labor in Society. NY: The Free Press.

Egan, M. (2018). Tax cut triggers $437 billion explosion of stock buybacks. Retrieved from  https://money.cnn.com/2018/07/10/investing/stock-buybacks-record-tax-cuts/index.html 

Goldsmith, J. M. (1994). The case against GATT. Multinational Monitor, 15(10), 20-24.

Lee, P. (2018). Share Buybacks and Redemptions: Legal Update - Companies Act 2014. Retrieved from  https://www.lexology.com/library/detail.aspx?g=30c07ac8-c29c-4f99-b17d-7844d09888ea 

Mill, J. S. (1859). On Liberty. London: John W. Parker and Son, West Strand.

Studyspark

Study Document Study Document

Security In Communication Challenges

Pages: 10 (2871 words) Sources: 11 Document Type:Research Paper Document #:73429324

… percent of the world’s populace. Furthermore, the statistics indicate that more than 60 percent of the population in the world has accessibility to internet (GSMA, 2019).
In delineation, wireless communication takes into account the transmission of message signals through minimal energy radio frequency waves by utilizing open ……

References

References

Bagheri-Karam, G. (2010). Physical-Layer Security in Wireless Communication Systems. Ontario: Waterloo.

Chang, Z. (2019). Physical Layer Security in Wireless Communications. University Of Jyväskylä. Retrieved from:  http://users.jyu.fi/~timoh/TIES327/WPLS.pdf 

Chen, Q., Zhang, C., & Zhang, S. (2008). Secure transaction protocol analysis: models and applications. Springer-Verlag.

GSMA. (2019). Number of Mobile Subscribers Worldwide Hits 5 Billion. Retrieved from:  https://www.gsma.com/newsroom/press-release/number-mobile-subscribers-worldwide-hits-5-billion/ 

Gu, X., & Hunt, R. (2005). Wireless LAN attacks and vulnerabilities. the proceeding of IASTED Networks and Communication Systems.

Ijemaru, G. K., Adeyanju, I. A., Olusunyi, K. O., Ofusori, T. J., Ngharamike, E. T., Sobowale, A. A. (2018). Security Challenges of Wireless Communications Networks: A Survey. International Journal of Applied Engineering Research, 13 (8): 5680 – 5692.

IJEMARU, G. K., UDUNWA, A. I., NGHARAMIKE, E. T., & OLEKA, E. U. (2015). Evaluating the Challenging Issues in the Security of Wireless Communication Networks in Nigeria. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 3, Issue 12, pp. 1-5, 2014.

Jain, A. (2013). Network Security-The Biggest Challenge in Communication. Advance in Electronic and Electric Engineering. Research India Publications.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".