Media Essays (Examples)

Studyspark

Study Document Study Document

Beginning A Public Health Campaign

Pages: 4 (1126 words) Sources: 4 Document Type:Essay Document #:70965381

… by their own daily experiences, and made aware that they can do something to turn this problem around. Using the power of social media to manage the scope of this problem and raise local support that can generate the kind of grassroots assistance required is exactly the ……

References

References

Nelson, L. S., Juurlink, D. N., & Perrone, J. (2015). Addressing the opioid epidemic.  Jama, 314(14), 1453-1454.

Manchikanti, L., Fellows, B., Janata, J. W., Pampati, V., Grider, J. S., & Boswell, M. V. (2012). Opioid epidemic in the United States. Pain Physician, 15(3 Suppl), ES9-38.

Murthy, V. H. (2016). Ending the opioid epidemic—a call to action. New England Journal of Medicine, 375(25), 2413-2415.

Smit-Kroner, C. & Brumby, S. (2015). Farmers sun exposure, skin protection, and public health campaigns: An Australian Perspective. Preventive Medicine Reports 2, 602-607.

Velasquez, A., & LaRose, R. (2015). Youth collective activism through social media: The role of collective efficacy. New Media & Society, 17(6), 899-918.

Winter, T. (2016). Addiction among different races. Retrieved from  https://sunrisehouse.com/addiction-demographics/different-races/ 

Studyspark

Study Document Study Document

Cyberbullying

Pages: 7 (2781 words) Sources: 6 Document Type:Essay Document #:823825

… more than just isolated incidents of negative behavior; it requires repetitive behavior.

C. Cyberbullying occurs electronically, via the internet, cell phones, and social media.

II.
Imbalance of power

A. Bullies have some type of power over victims.

B. There are different ways that bullies can exert power … of a repetitive pattern of bullying.  

IV. Cyberbullying occurs electronically.

A. Cyberbullying can occur several ways:

1. Internet

2. Cell phones

3. Social Media

B. Cyberbullying may occur only online or can be combined with in-person bullying.

V. Conclusion

A. Cyberbullying occurs electronically.

B. Cyberbullying involves a … setting, such as direct messages or emails, much cyberbullying occurs in a more public context.  Group texts, chatting applications, message boards, and social media are all popular public or semi-public venues where cyberbullying is common.  However, it can be difficult for bystanders to recognize and identify cyberbullying … understanding in-person bullying, detecting cyberbullying……

References

Bazarova, Natalie.  (14 May 2018).  Key Questions in the Fight Against Cyberbullying.  Psychology Today.   https://www.psychologytoday.com/us/blog/social-media-stories/201805/key-questions-in-the-fight-against-cyberbullying .  Accessed 16 July 2020.  

Ben-Joseph, Elena Pearl.  (April 2018).  Cyberbullying.  TeensHealth.   https://kidshealth.org/en/teens/cyberbullying.html .  Accessed 16 July 2020.

Scheff, Sue.  (29 November 2019).  Adult Cyberbullying Is More Common Than You Think. Psychology Today.   https://www.psychologytoday.com/us/blog/shame-nation/201911/adult-cyberbullying-is-more-common-you-think .  Accessed 16 July 2020.  

John, Ann et al.,  (2018).  Self-Harm, Suicidal Behaviors, and Cyberbullying in Children and Young People: Systematic Review.  Journal of Medical Internet Research, 20(4): e129 DOI: 10.2196/jmir.9044.

Oakes, Kelly.  (15 September 2019).  Why Children Become Bullies at School.  BBC.com.   https://www.bbc.com/future/article/20190913-why-some-children-become-merciless-bullies .  Accessed 16 July 2020.  

Studyspark

Study Document Study Document

Preventing Drug Use Among Teens

Pages: 5 (1380 words) Sources: 4 Document Type:Essay Document #:72171572

… among the most vulnerable population when it comes to substance abuse because they are most likely to be affected by peer pressure and media, where drug usage is most often displayed in not unfavorable lights (Bandura, 2018). There is clearly a preeminent need to address this issue … to happen through interviews.
Theory
The study by Das, Salam, Arshad, Finkelstein and Bhutta (2016) shows that school-based interventions, family-based interventions and mass media based interventions can all be effective in lowering the rates of unhealthy behaviors among teens. The researchers conducted a systematic review to obtain … The gap the study noted still needs to be closed is one regarding specific intervention components—such as delivery platforms (digital vs. non-digital, social media vs. traditional media and so on). This study will seek to close this gap by asking teachers about their perspectives on delivery platforms.
Methodology
In the … Reduction approach.……

Studyspark

Study Document Study Document

Effects Of Domestic Violence On African American Women

Pages: 5 (1381 words) Sources: 10 Document Type:Research Paper Document #:75342722

… is clearly trending in the wrong direction and the continued abandonment of families by fathers and the continued promotion of negative stereotypes in media do nothing to reduce the prevalence.
Literature Review
The literature on this issue shows startling findings. Bent-Goodley (2001) identifies the issue as stemming … violently—a theme found…[break]…end of the Civil Rights Movement, blacks have been persecuted by the criminal justice system. They have been exploited by Big Media and projected in a thuggish manner by the culture industry. This projection has been embraced by the population overall and so a mentality ……

References

References

Adorno, T., & Horkheimer, M. (2007). The culture industry: Enlightenment as mass deception. Stardom and celebrity: A reader, 34.

Bandura, A. (2018). Toward a psychology of human agency: Pathways and reflections.  Perspectives on Psychological Science, 13(2), 130-136.

Bent-Goodley, T.B. (2001). Eradicating domestic violence in the African American community: A literature review and action agenda. Trauma, Violence, and Abuse: A Review Journal, 2,316-330.

Franklin, D.L. (2000). What\\\\\\'s love got to do with it? Understanding and healing the rift Between Black men and women. New York: Simon and Schuster

NCADV. (2017). Statistics. Retrieved from  https://ncadv.org/statistics 

Institute for Women’s Policy Research. (2017). Violence Against Black Women – Many Types, Far-reaching Effects. Retrieved from https://iwpr.org/violence-black-women-many-types-far-reaching-effects/

Jones, F. (2014). Why Black Women Struggle More With Domestic Violence. Retrieved from  https://time.com/3313343/ray-rice-black-women-domestic-violence/ 

Lee, C. (2017). Inside Whitney Houston’s Violent Marriage to Bobby Brown. Retrieved from  https://www.thedailybeast.com/inside-whitney-houstons-violent-marriage-to-bobby-brown

Studyspark

Study Document Study Document

Childrens Amusement Park

Pages: 10 (3072 words) Sources: 10 Document Type:Marketing Plan Document #:62460752

… on children’s amusement features. There is an opportunity too for the company to increase its brand image and brand loyalty by using social media marketing to increase visibility and connectedness with consumers.
Threats are that because many of the jobs in the region are oil-related, a downturn … will be raised from private investors who will own shares in the company.
Promotional costs will include:
Sponsorships: Annual budget of $150,000
Social media marketing: $60,000 for salaried social media marketer employee
Improvements, Monitor, Control
Improvements will be made as needed and will be determined by implementing a strategy to obtain customer feedback ……

References

References

Andzulis, J. M., Panagopoulos, N. G., & Rapp, A. (2012). A review of social media and implications for the sales process. Journal of Personal Selling & Sales Management, 32(3), 305-316.

Appelbaum, S. H., Habashy, S., Malo, J. L., & Shafiq, H. (2012). Back to the future: revisiting Kotter's 1996 change model. Journal of Management Development, 31(8), 764-782.

Chyi, H. I. (2005). Willingness to pay for online news: An empirical study on the viability of the subscription model. Journal of Media Economics, 18(2), 131-142.

Douglas, E. (2019). Houston economy to grow bigger, slower than other Texas cities: analysis. Retrieved from https://www.houstonchronicle.com/business/economy/article/Houston-economy-to-grow-bigger-slower-than-other 13903941.php#targetText=The%20Austin%20metro%20area%2C%20which,pace%2C%20according%20to%20the%20projections.

Frederick, S., Novemsky, N., Wang, J., Dhar, R., & Nowlis, S. (2009). Opportunity cost neglect. Journal of Consumer Research, 36(4), 553-561.

Lin, C. F. (2002). Segmenting customer brand preference: demographic or psychographic. Journal of Product & Brand Management, 11(4), 249-268.

Mangold, W. G., & Faulds, D. J. (2009). Social media: The new hybrid element of the promotion mix. Business horizons, 52(4), 357-365.

Teece, D. J. (2010). Business models, business strategy and innovation. Long range planning, 43(2-3), 172-194.

Studyspark

Study Document Study Document

Violence Prevention Programs

Pages: 9 (2805 words) Sources: 6 Document Type:Essay Document #:52417572

Using Social Media to Build Out Support Systems
Introduction
Violence prevention programs focus on curtailing forms of violence in society, such as child abuse, domestic violence … or other negative risks.
To assist with the development of these programs, administrators can turn to communities for further funding by using social media campaigns to drum up support for the initiatives. These same campaigns can also be used to attract interest from volunteers and get people … self-control and refraining from violence or neglect.
Getting people connected and involved with one another is one of the great benefits of social media and volunteers can certainly help in this regard. The recommendation here is that program administrators look for ways to get community members involved … can certainly help in this regard. The recommendation here is that program administrators look for ways to get community members involved in social media through the program……

References

References

Altafim, E. R. P., & Linhares, M. B. M. (2016). Universal violence and childmaltreatment prevention programs for parents: A systematic review. Psychosocial Intervention, 25(1), 27-38.

Alternative Paths. (2020). Violence prevention. Retrieved from  https://www.alternativepaths.org/services/diversion-programs/violence-prevention-program 

Farrell, A. D., Meyer, A. L., Kung, E. M., & Sullivan, T. N. (2001). Development and evaluation of school-based violence prevention programs. Journal of clinical child psychology, 30(2), 207-220.

Johnson, D. W., & Johnson, R. T. (1995). Why violence prevention programs don't work--and what does. Educational Leadership, 52(5), 63-68.

Lee, C., & Wong, J. S. (2020). Examining the effects of teen dating violence prevention programs: a systematic review and meta-analysis. Journal of Experimental Criminology, 1-40.

Siegel, L. (2018). Criminology, 7th Ed. Cengage Learning.

Stagg, S. J., & Sheridan, D. (2010). Effectiveness of bullying and violence prevention programs: A systematic review. Aaohn Journal, 58(10), 419-424.

Studyspark

Study Document Study Document

Data Security Using RFID Bands At Music Festivals

Pages: 5 (1616 words) Sources: 6 Document Type:Essay Document #:97930410

… which ones cannot attract any attendees. Unlike the traditional ticketing method, RFID bands would have a unique identification system linked with his social media profiles, thus, making it impossible for fraud and duplication. Taking out wallets from their pockets from time to time and paying for drinks … improved customer experience as time reduction and standing in line are eliminated from all the processes at the event and integration of social media activities with the attendees' check-in function, enabling the event's enhanced promotion value-added marketing potential.
Description of Five or More Types of Personal/Private Information … would be eradicated from the process. The wrist bands are secured with a unique key to unlock the user profiles, such as social media profiles, that have an added benefit to be linked with the wristbands since the event's promotion would be done on the user's social … profiles, that have an added……

References

References

Event Tribe. (n.a.). The top 10 benefits of using RFID for events. Retrieved from  https://www.eventbrite.com/blog/academy/the-top-10-benefits-of-using-rfid-for-events/ 

ID&C. (n.a.). How to RFID wristbands work? Retrieved from  https://www.idcband.com/blog/how-do-rfid-wristbands-work/ 

Kacicki, T. (2019, July 15). 4 commonly overlooked facts about RFID wristbands. Intellitix. Retrieved from  https://intellitix.com/hub/four-commonly-overlooked-facts-rfid 

OECD. (2008). OECD policy guideline on RFID.  https://www.oecd.org/sti/ieconomy/40892347.pdf 

Quirk, R.E. & Borrello, S.J. (2005). RFID: Rapid deployment and regulatory challenges. Retrieved from  https://www.pharmamanufacturing.com/assets/Media/MediaManager/VenableRFIDpaper.pdf?SESSID=62935cf41f5a19909f5bb3ae3a598490 

Williamson, A., Tsay, L., Kateeb, I.A. & Burton, L. (2013). Solutions for RFID smart tagged card security vulnerabilities. AASRI Procedia, 4, 282-287. DOI: 10.1016/j.aasri.2013.10.042

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

… as good at hiding their digital footprints as they believe. So they can leave tracks behind that can be found. They may also immediately trigger red flags in systems that have been designed to identify criminal activity or suspicious behavior. Many organizations are monitoring what their employees ……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

Privacy In Social Networks Regarding Machine Learning

Pages: 8 (2537 words) Sources: 10 Document Type:Research Paper Document #:98311751

… data to form that is now sitting there waiting for machine learning algorithms to collect it, analyze it, and recognize individuals on social media (Oh, Benenson, Fritz & Schiele, 2016). Machine learning algorithms are thus being used more and more in social networks to collect data on … information—and in doing so they could soon be predicting someone’s recreational activities or political affiliation through a simple analysis of an individual’s social media use, such as posts on Twitter or the friends one has on Facebook (Lindsey, 2019). As a result, the privacy of individual social … use, such as posts on Twitter or the friends one has on Facebook (Lindsey, 2019). As a result, the privacy of individual social media users may be in jeopardy. This paper will review the findings of the related literature on this subject and discuss them and the … issue in the future.
Review……

References

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

Studyspark

Study Document Study Document

Role And Purpose Of Advocacy In The Health Care Delivery System

Pages: 5 (1453 words) Sources: 4 Document Type:Essay Document #:38970574

...Media Introduction
Advocacy in health care refers to the action of promoting and fostering social, economical, political and educational changes that reduce the risk of suffering of individuals and communities by implementing preventive strategies, increasing health literacy, and boosting access to care and health equity (Earnest, Wong & Federico, 2010). Health care advocacy agents can thus address health outcomes by advocating for changes to the current practices, environments, awareness, and access to care that populations face. This paper will discuss health care advocacy at the local, regional and international levels, the challenges and opportunities that exists in international healthcare advocacy and the ways these challenges can be addressed.
How Health Care Advocacy Agents Address Health Outcomes
The role and purpose of advocacy in the health care delivery system is to help to better ensure that the patient receives the type of quality care he or she needs no matter where he……

References

References

Ahmadinejad, F., Abbaszadeh, A., & Davoodvand, S. (2016). Patient advocacy from the clinical nurses\\\\' viewpoint: a qualitative study. Journal of medical ethics and history of medicine, 9(5).

Benatar, S. R. (2013). Global Health and Justice: R e?examining our Values. Bioethics,  27(6), 297-304.

Earnest, M. A., Wong, S. L., & Federico, S. G. (2010). Perspective: physician advocacy: what is it and how do we do it?. Academic medicine, 85(1), 63-67.

World Health Organization (WHO). (2015). Global Health Ethics Key issues Global Network of WHO Collaborating Centres for Bioethics. Retrieved from:  http://apps.who.int/iris/bitstream/handle/10665/164576/9789240694033_eng.pdf;jsessionid=BF56A5C93A3B735876DBBF060A0652FC?sequence=1 

World Health Organization. (2016). Online public hearing to help inform the scope of the forthcoming WHO guidelines on health policy and system support to optimize community based health worker programs. Retrieved from: http://www.who.int/hrh/news/2016/pico_form/en/

Join thousands of other students and

"spark your studies".