Journal Article Essays (Examples)

Studyspark

Study Document Study Document

MacBook Pro By Apple Inc Quality Management

Pages: 11 (3159 words) Sources: 5 Document Type:Essay Document #:17953236

...Journal article Quality Management
Executive Summary
Quality management is pivotal in any product or service. One of the key aspects of ensuring this is through the product development process. The product taken into account is MacBook Pro by Apple Inc. Research indicates that the product goes through various steps in the production process, including designing, the formation of a new product team, Apple New product Process, product review, product redesign, assessment and feedback, and then finally product launching. Research also indicates that designing for manufacturing is a pivotal component of the product development cycle. It encompasses the optimization of the product's design for the different processes of manufacturing and assembly, assimilating the various product design needs and requirements with its production approach. In the case of television, the various DFM guidelines taken into consideration for improving manufacturability include a reduction in the number of parts, developing products designs that are modular, usage……

References

References

Hill, C. W., Jones, G. R., & Schilling, M. A. (2014). Strategic management: theory: an integrated approach. Cengage Learning.

Panzarino, M. (2012). This is how Apple\\\\\\'s top-secret product development process works. The Next Web. Retrieved from:  https://thenextweb.com/apple/2012/01/24/this-is-how-apples-top-secret-product-development-process-works/ 

Interaction Design Foundation. (2020). Apple\\\\\\'s Product Development Process – Inside the World\\\\\\'s Greatest Design Organization. Retrieved from:  https://www.interaction-design.org/literature/article/apple-s-product-development-process-inside-the-world-s-greatest-design-organizatio " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Peace Efforts Of The American Friends Committee War Relief USA

Pages: 5 (1635 words) Sources: 5 Document Type:Research Paper Document #:43488948

...Journal article How the Quakers Opposed the Detainment of Japanese Americans during WWII
The American Friends Service Committee (AFSC), the co-beneficiary of the Nobel Peace Prize in 1947, was established in Philadelphia by individuals from the Religious Society of Friends (i.e., the Quakers) in Spring 1917. The link between AFSC and the Religious Society of Friends was always tenuous, as the activism of the organization was something universal that many non-Quakers around the world could celebrate, while the actual tenets of Quakerism were not nearly as popular as the peace movement that the Religious Society of Friends took part in. Initially, the goals of the committee were limited; however, over the 20th century, the AFSC embraced pacifism and began taking part in the fight for peace (Ingle, 2016). The AFSC essentially helped to support and come to the aid of the victims of war, whether they were Jewish, Russian, European, African, etc.……

References

References.

Franklin, S. (2020). American Friends Service Committee. Retrieved from  https://www.mtsu.edu/first-amendment/article/1167/american-friends-service-committee 

Frost, J. W. (1992). " Our Deeds Carry Our Message": The Early History of the American Friends Service Committee. Quaker History, 81(1), 1-51.

Ingle, H.L., (2016). "Truly Radical, Non-violent, Friendly Approaches": Challenges to the American Friends Service Committee. Quaker History 105(1), 1-21. DOI:10.1353/qkh.2016.0004.

Mechling, E. W., & Mechling, J. (1992). Hot pacifism and cold war: The American friends service committee's witness for peace in 1950s America. Quarterly Journal of Speech, 78(2), 173-196.

The Nobel Prize. (2020). American Friends Service Committee. Retrieved from  https://www.nobelprize.org/prizes/peace/1947/friends-committee/facts/ 

Weir, A. (2014). Against Our Better Judgment. IN: CreateSpace.

Studyspark

Study Document Study Document

Positive Psychology And Its Link To Meditation

Pages: 8 (2260 words) Sources: 7 Document Type:Essay Document #:98938910

...Journal article Meditation
Introduction
The positive psychology arena has undergone swift expansion in the last ten years, with studies explicitly highlighting the significance of examining processes, conditions, and factors improving wellbeing, facilitating psychological prosperity, and optimizing human functioning (Gable & Haidt, 2005; Seligman & Csikszentmihalyi, 2000). Mindfulness is a factor that plays a part in psychological wellbeing and may be attained using meditation (Pepping, Donovan & Davis, 2013). The term 'meditation' is used to define a set of practices training awareness and focus, often aimed at promoting spiritual and mental growth and wellbeing. In meditation, the mind is trained, and mental processes brought under more conscious control, advantageously guiding them. Such control helps develop certain mental characteristics like calm, focus, and feelings like love, happiness, and empathy. Using increased awareness, an individual can get clearer insights into him/ herself as well as his/ her relationship with the world. Also, increased awareness is……

References

References

Gable, S. L., & Haidt, J. (2005). What (and why) is positive psychology? Review of General Psychology, 9, 103–110. DOI:10.1037/1089-2680.9.2.103

Hasenkamp, W., & Barsalou, L. (2012). Effects of meditation experience on functional connectivity of distributed brain networks. Front. Hum. Neurosci. Retrieved from  https://www.frontiersin.org/articles/10.3389/fnhum.2012.00038/full 

Kristeller, J. L., & Rikhye, K. (2008). Meditative traditions and contemporary psychology. In K. R. Rao, A. C. Paranjpe & A. K. Dalal (Eds.), Handbook of Indian psychology (pp. 506 –538). New Delhi, India: Cambridge University Press.

McGee, M. (2008). Meditation and psychiatry. Psychiatry, 5, 28 – 40.

Pepping, C. A., Donovan, A., & Davis, P. (2013). The positive effects of mindfulness on self-esteem. The Journal of Positive Psychology, 8(5), 376-386.

Sedlmeier, P., Eberth, J., Schwarz, M., Zimmerman, D., Haarig, F., Jaeger, S., & Kunze, S. (2012). The psychological effects of meditation: A meta-analysis. Psychological Bulletin, 138(6), 1139 –1171.

Seligman, M. E. P., & Csikszentmihalyi, M. (2000). Positive psychology: An introduction. American Psychologist, 55, 5–14. DOI:10.1037//0003-066X.55.1.5

Shapiro, S., Walsh, R., Britton, W., & Britton, B. (2003). An analysis of recent meditation research and suggestions for future directions. The Humanistic Psychology, 3(2-3), 69-90.

Studyspark

Study Document Study Document

Psychology

Pages: 5 (1482 words) Sources: 8 Document Type:question answer Document #:99253146

...Journal article Psychology
Question 1
What differentiated the control group from the two experimental groups and the two experimental groups from each other?
The aim of the experiment is key to differentiating all the groups involved: groups A, B, and control. Festinger and Carlsmith (1959) were trying to identify the occurrence of cognitive dissonance in the experiment through the motivations of the groups, thereby proving the validity of their theory over the behaviorist and reinforcement approach. The main difference between all the groups is the motivation/level of dissonance experienced. The control group experienced no dissonance, as they were not required to lie about the experimental procedure nor offered monetary compensation; the other groups were, however, motivated to lie via monetary compensation. Groups A and B are further differentiated by their level of “induced dissonance” through the amount of monetary compensation offered to them: group A received $1, which is significantly less than……

References

References

Cherry, K. (2020). The Incentive Theory of Motivation. Retrieved from:  https://www.verywellmind.com/the-incentive-theory-of-motivation-2795382 

Festinger, L., & Carlsmith, J. M. (1959). Thoughts out of tune. Journal of Abnormal and Social Psychology, 58, 203-210.

Izuma, K., & Murayama, K. (2019). The neural basis of cognitive dissonance. In E. Harmon-Jones (Ed.), Cognitive dissonance: Reexamining a pivotal theory in psychology (p. 227–245). American Psychological Association.  https://doi.org/10.1037/0000135-011 

Legg, T. (2019). Cognitive dissonance: What to know. Retrieved from:  https://www.medicalnewstoday.com/articles/326738#overview 

McLeod, S. (2018). Cognitive dissonance. Retrieved from  https://www.simplypsychology.org/cognitive-dissonance.html 

Northrup, C. (2018). 4 ways to reduce cognitive dissonance. Retrieved from:  https://www.drnorthrup.com/4-ways-to-reduce-cognitive-dissonance/ 

Silverman, K., Jarvis, B. P., Jessel, J., & Lopez, A. A. (2016). Incentives and motivation. Translational Issues in Psychological Science, 2(2), 97–100. DOI:10.1037/tps0000073 Retrieved from:  https://sci-hub.tw/10.1037/tps0000073 

Van Kampen, H. S. (2019). The principle of consistency and the cause and function of behaviour. Behavioural processes, 159, 42-54. Retrieved from:  https://scihub.tw/https://doi.org/10.1016/j.beproc.2018.12.013

Studyspark

Study Document Study Document

Cyberbullying

Pages: 7 (2781 words) Sources: 6 Document Type:Essay Document #:823825

...Journal article Cyberbullying Essay Outline

I. Introduction

A. Bullying involves an imbalance of power between the victim and the bully.

B. Bullying is more than just isolated incidents of negative behavior; it requires repetitive behavior.

C. Cyberbullying occurs electronically, via the internet, cell phones, and social media.

II. Imbalance of power

A. Bullies have some type of power over victims.

B. There are different ways that bullies can exert power over victims.

1. Social power

2. Financial power

3. Sexual power

4. Group power

C. Bullying cannot be mutual, but bullies and victims can switch roles over time.

III. Bullying is repetitive.

A. Not all mean actions are bullying.  

B. To qualify as bullying, behaviors have to be repetitive.

C. Not all acts of bullying have to be committed by one bully to be considered part of a repetitive pattern of bullying.  

IV. Cyberbullying occurs electronically.

A. Cyberbullying can occur several ways:……

References

Bazarova, Natalie.  (14 May 2018).  Key Questions in the Fight Against Cyberbullying.  Psychology Today.   https://www.psychologytoday.com/us/blog/social-media-stories/201805/key-questions-in-the-fight-against-cyberbullying .  Accessed 16 July 2020.  

Ben-Joseph, Elena Pearl.  (April 2018).  Cyberbullying.  TeensHealth.   https://kidshealth.org/en/teens/cyberbullying.html .  Accessed 16 July 2020.

Scheff, Sue.  (29 November 2019).  Adult Cyberbullying Is More Common Than You Think. Psychology Today.   https://www.psychologytoday.com/us/blog/shame-nation/201911/adult-cyberbullying-is-more-common-you-think .  Accessed 16 July 2020.  

John, Ann et al.,  (2018).  Self-Harm, Suicidal Behaviors, and Cyberbullying in Children and Young People: Systematic Review.  Journal of Medical Internet Research, 20(4): e129 DOI: 10.2196/jmir.9044.

Oakes, Kelly.  (15 September 2019).  Why Children Become Bullies at School.  BBC.com.   https://www.bbc.com/future/article/20190913-why-some-children-become-merciless-bullies .  Accessed 16 July 2020.  

Studyspark

Study Document Study Document

Weapons Of Mass Destruction WMD Antifa

Pages: 13 (3787 words) Sources: 12 Document Type:Research Paper Document #:67320498

...Journal article Weapons of Mass Destruction
1
An electro-magnetic pulse (EMP) attack could crash the American economy and bring virtually every industry to a standstill—such is the reliance of modern business upon the digital infrastructure. Thus, considering an EMP attack is something that government should take very seriously. As more and more of the world becomes dependent upon cyber infrastructure for the maintenance of other systems, the complexity of the security services of a country grows and intensifies. Is it possible therefore that there is an overreliance upon technology and that this overreliance can actually compromise a country’s progress and increase its risk of falling into ruin should a sudden attack like an EMP attack hit where it hurts most? Absolutely—and both state and non-state actors know that, which is why either one could conduct a high altitude EMP attack upon the US. The consequences would be devastating.
Non-state actors are just……

References

References

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Christenson, G. (2015). CBRN response. National Guard Bureau.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from  https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat 

Jennings, P. (2006). Miami port poses serious risks. Retrieved from  https://abcnews.go.com/WNT/story?id=131634&page=1 

Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from  http://www.johnstonsarchive.net/terrorism/chembioattacks.html 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Maras, M-H. (2014). Transnational Security. Florida: CRC Press.

Studyspark

Study Document Study Document

Private Security And Law

Pages: 2 (722 words) Sources: 4 Document Type:Essay Document #:32082314

...Journal article Private Security and the Law
Private security operatives are held liable for their actions based on existing federal and state laws. Potential liability for these operatives occur when attempting to stop or arrest criminals or when carrying out their daily operations. The most common potential liability issues for private security operatives are assault and battery. In addition, private security operatives can be found guilty under vicarious liability for the torts of another and for a violation of 42 U.S.C. 1983 (Reid, 2017). An example of a recent court case involving private security operatives accused or found liable for a 42 U.S.C. 1983 violation and under vicarious liability for the torts of another is State v. Santiago (2009).
In this case, the defendant Luis Santiago was involved in a verbal altercation at the Coronado Mall on July 20, 2005 in Albuquerque. Following the altercation, Santiago was stopped by security guards as……

References

References

FindLaw. (2010). State of New Mexico, Plaintiff-Petitioner, v. Luis SANTIAGO, Defendant-Respondent. Retrieved March 24, 2019, from  https://caselaw.findlaw.com/nm-supreme-court/1001193.html 

Reid, B. (2017, April 14). A Legal Overview of Section 1983 Civil Rights Litigation. The Huffington Post. Retrieved March 24, 2019, from  https://www.huffingtonpost.com/entry/a-legal-overview-of-section-1983-civil-rights-litigation_us_58f0e17ee4b048372700d793 

Wakefield, J. (2018, April 19). As Alberta’s Private Security Industry Surges, What Happens When Guards Behave Badly? Edmonton Journal. Retrieved March 24, 2019, from  https://edmontonjournal.com/news/crime/as-albertas-private-security-industry-surges-what-happens-when-guards-behave-badly 

Yee, M. (2018, June 24). Security Guard Liability. Retrieved March 24, 2019, from  https://www.legalmatch.com/law-library/article/security-guard-liability.html 

Studyspark

Study Document Study Document

The Transformation Of The US Into Oceania

Pages: 9 (2807 words) Sources: 7 Document Type:Essay Document #:33502677

… as enjoying this ability completely. Nevertheless, the universal right to privacy is enshrined in the United Nations Declaration of Human Rights (UDHR) 1948, article 12 which clearly states that: “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks ……

References

References

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Cantor, M. D. (2006, Summer). No information about me without me: Technology, privacy, and home monitoring. Generations, 30(2), 49-55.

Ethical issues facing businesses. (2020). Florida Tech. Retrieved from https://www.floridatech online.com/blog/business/the-5-biggest-ethical-issues-facing-businesses/.

Haslag, C. (2018, Fall). Technology or privacy: Should you really have to choose only one? Missouri Law Review, 83(4), 1027-1033.

Karn, R. (2019). The biggest threat to data security? Humans, of course. The Privacy Advisor. Retrieved from  https://iapp.org/news/a/the-biggest-threat-to-data-security-humans-of-course/ .

Sharma, P. (2017, June). Organizational culture as a predictor of job satisfaction: The role of age and gender. Journal of Contemporary Management Issues, 22(1), 35-40.

Taslitz, A. E. (2009, Spring). The Fourth Amendment in the twenty-first century: Technology, privacy, and human emotions. Law and Contemporary Problems, 65(2), 125-131.

Studyspark

Study Document Study Document

SEC Enforcement Of Goldman Sachs And AIG

Pages: 4 (1074 words) Sources: 7 Document Type:Research Paper Document #:97558750

...Journal article Goldman Sachs & Co. and Fabrice Tourre were charged by the SEC in 2010 with “Fraud In Connection With the Structuring and Marketing of a Synthetic CDO” from the 2007 subprime mortgage scandal at the heart of the financial crisis of 2007-2008 (SEC, 2010). The specific charge was that the bank and Tourre made material misstatements and omissions in connection with a synthetic collateralized debt obligation that the bank had structured, marketed and sold to investors. The synthetic CDOs were linked to the performance of the subprime housing mortgage market—i.e., the subprime mortgage-backed securities identified by Lewis (2010) as triggering the wave of financial distress that led to central banking intervention (unconventional monetary policy—also known as quantitative easing) and the inflation of asset bubbles currently seen today (Huston & Spencer, 2018). Goldman Sachs settled with the SEC and agreed to pay $550 million on the condition that the bank not……

References

References

Baer, J. (2014). Former Goldman Trader Tourre Won't Appeal Fraud Verdict. Retrieved from  https://www.wsj.com/articles/former-goldman-trader-tourre-wont-seek-appeal-of-securities-fraud-verdict-1401221556 

Huston, J. H., & Spencer, R. W. (2018). Quantitative easing and asset bubbles. Applied Economics Letters, 25(6), 369-374.

Lewis, M. (2010). The Big Short. NY: W. W. Norton.

McDonald, R., & Paulson, A. (2015). AIG in Hindsight. Journal of Economic Perspectives, 29(2), 81-106.

Murray, N., Manrai, A. K., & Manrai, L. A. (2018). The role of incentives/punishments, moral hazard, and conflicts of interests in the 2008 financial crisis. The bi-annual academic publication of Universidad ESAN, 22(43).

SEC. (2010). Litigation Release No. 21489 / April 16, 2010. Retrieved from  https://www.sec.gov/litigation/litreleases/2010/lr21489.htm 

Weisenthal, J. (2009). Goldman Sachs made billions shorting AIG. Retrieved from  https://www.businessinsider.com/goldman-sachs-made-billions-shorting-aig-2009-3 

Studyspark

Study Document Study Document

Identifying Key Characteristics Of A High Performance Project Team

Pages: 6 (1759 words) Sources: 3 Document Type:Research Paper Document #:33471333

Abstract
In this article, the problems at FEL are analyzed and assessed from the standpoint of what FEL should do to assign managers to project teams and ……

References

References

Lumsden, G., Lumsden, D., & Weithoff, C. (2010). Communicating in groups and teams: Sharing leadership (5th ed.). Boston, MA: Wadsworth Cengage Learning.

Muslihat, D. (2018). Why You Need Good Teamwork For Project Management Success. Retrieved from  https://zenkit.com/en/blog/why-you-need-good-teamwork-for-project-management-success/ 

Natvig, D., & Stark, N. L. (2016). A project team analysis using Tuckman's model of small-group development. Journal of Nursing Education, 55(12), 675-681.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".