Media Essays (Examples)

Studyspark

Study Document Study Document

People Who Do Not Socially Distance Are Considered Deviant In The

Pages: 1 (315 words) Sources: 1 Document Type:Essay Document #:58358066

Deviance
Currently, not social distancing is considered deviant. People will take pictures of others and put them on social media to shame them and they will call them names like “Covidiot” because they are not following the social distancing guidelines that the US … and that state governments are making mandatory in some cases. They are deviant because they are being labeled as such in the news media and on social media, and according to labeling theory labels are a way to ostracize, to marginalize and to prevent groups of people from being legitimized or … change has occurred in large part thanks to the second wave, third wave and fourth wave feminism. The activism of feminism in the media and in universities has helped to make these formerly taboo issues more acceptable, and it has had something to do with the alteration … whereas the culture of 50 years……

References

References

Lumen. (2019). Theoretical perspectives on deviance. Retrieved from  https://courses.lumenlearning.com/sociology/chapter/theoretical-perspectives-on-deviance/ 

 

Studyspark

Study Document Study Document

Alexander The Great War Tactics

Pages: 6 (1804 words) Sources: 6 Document Type:Essay Document #:14983431

… be their command over technology. They have grown up as digital natives (Prensky, 2001). They are familiar with communications technology, such as social media, and are capable of sharing and disseminating information instantly. They can develop networks of contacts, which is just as valuable as any phalanx … develop networks of contacts, which is just as valuable as any phalanx of Alexander in today’s digital age, for the phalanx of social media networked followers is strong, lightning fast and capable of delivering blows to an enemy’s credibility in an instant. Uprisings have been conducted thanks … is strong, lightning fast and capable of delivering blows to an enemy’s credibility in an instant. Uprisings have been conducted thanks to social media, like the Arab Spring in the Middle East, and social media has been a huge tool in events like Occupy Wall Street and Black Lives Matter. The high school……

References

References

Archeology. (2013). Kamehameha. Retrieved from  https://www.archaeology.org/issues/95-1307/features/1094-kamehameha-moku-ula-maui-oahu 

Classics Dissertation. (n.d.). The Military Revolution: What were Philip II’s Reforms of the Macedonian Military and how Revolutionary were they? Retrieved from  https://www.ed.ac.uk/files/atoms/files/the_military_revolution_-_what_were_philip_iis_reforms_of_the_macedonian_military_and_how_revolutionary_were_they.pdf 

Hughes, T. (2018). Was Alexander’s army destined to conquer? Retrieved from  http://turningpointsoftheancientworld.com/index.php/2018/08/02/why-alexander-was-destined-to-conquer/ 

Prensky, M. (2001). Digital natives, digital immigrants part 1. On the horizon, 9(5), 1-6.

Roos, D. (2019). How Alexander the Great Conquered the Persian Empire. Retrieved from  https://www.history.com/news/alexander-the-great-defeat-persian-empire 

Studyspark

Study Document Study Document

Demographic Profile And Motivation Of Suicide Bombers

Pages: 5 (1591 words) Sources: 6 Document Type:Essay Document #:63328521

… for the most part indicates a clear demographic trend.
Yet Merari has gone even beyond the published records of bombers—for example, the Israeli media may list a girl’s name, age and marital status, but to obtain information about the bomber’s socioeconomic status one must engage in investigative … in some cases. The point is that there is no one factor that can be identified as the primary motivating factor: groups, peers, media, education, culture, religious conviction, region, age and gender all play a part in determining who becomes a terrorist and whether one will end ……

References

References

Bandura, A. (2018). Toward a psychology of human agency: Pathways and reflections. Perspectives on Psychological Science, 13(2), 130-136.

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Costello, M., & Hawdon, J. (2018). Who are the online extremists among us? Sociodemographic characteristics, social networking, and online experiences of those who produce online hate materials. Violence and gender, 5(1), 55-60.

DeCook, J. R. (2018). Memes and symbolic violence:# proudboys and the use of memes for propaganda and the construction of collective identity. Learning, Media and Technology, 43(4), 485-504.

Koch, A. (2018). Trends in Anti-Fascist and Anarchist Recruitment and Mobilization. Journal for Deradicalization, (14), 1-51.

Merari, A. (2010). Driven to death. Oxford University Press.

Studyspark

Study Document Study Document

Coronavirus And The Courts

Pages: 8 (2481 words) Sources: 4 Document Type:Term Paper Document #:21023640

… raised by professionals, doctors, scientists, researchers and people with extensive backgrounds in epidemiology and health care that are not promoted in the mainstream media because those questions and points do not provoke fear and hysteria, which are the main drivers of the lockdown. Governors across the US … in the air. It is a mistake to believe that people naturally and legally give up their rights as US citizens because social media users, or politicians, or media personalities, or the governor’s office is in a panic about a flu about which speculation has run wild and the health care system, … with this conclusion: “the people” is not an expression that changes meaning from one Amendment to the next but rather…[break]…the obvious since the media is not doing its job and the lawmakers are not doing their job. The hysteria must be brought to heel and it must ……

References

Works Cited

Allen v. Harrison (2016).  https://law.justia.com/cases/oklahoma/supreme-court/2016/111877.html 

Baker, Sinead. “The architect of Sweden's controversially lax coronavirus response says he thinks it's working, and that the capital city is already benefiting from herd immunity.” Business Insider, 2020.  https://www.businessinsider.com/coronavirus-sweden-defends-plan-not-to-lock-down-immunity-2020-4 

C&A Carbone, Inc. v. Town of Clarkstown, N.Y., 511 U.S. 383 (1994).  https://www.oyez.org/cases/1993/92-1402 

District of Columbia v. Heller (2008). Retrieved from  https://www.oyez.org/cases/2007/07-290 

Fox 2. “Alleged fraudulent COVID-19 treatments spark FBI raid of Shelby Twp medical spa.” Fox 2, 2020.  https://www.fox2detroit.com/news/alleged-fraudulent-covid-19-treatments-spark-fbi-raid-of-shelby-twp-medical-spa 

Jacobson v. Massachusetts, 197 U.S. 11 (1905).  https://supreme.justia.com/cases/federal/us/197/11/ 

Roe v. Wade (1973).  https://www.oyez.org/cases/1971/70-18 

Zucht v. King (1922).  https://supreme.justia.com/cases/federal/us/260/174/

Studyspark

Study Document Study Document

Internet Influence On Adolescents

Pages: 5 (1568 words) Sources: 6 Document Type:Essay Document #:37510468


This research is important because more and more studies are showing that teenagers are getting addicted to technology, to mobile devices, to social media, and that they have not developed important communication skills needed for the real world. Thus, they are unable to develop real world relationships … rely on Internet-based relationships, which are superficial and not sufficient for real sociality.
Adolescents are the primary population affected by Internet and social media addictions—but these addictions can last into adulthood.
The traditional thoughts on the topic are that social media and the Internet are new media and teens turn to them because their peers are there and they can communicate and share information on these virtual platforms more easily. ……

References

References

Agarwal, A. K., Verma, A., & Agarwal, M. (2017). Internet victimization and depression among adolescents, 14(3), 60-62.

Cheung, J. C. S., Chan, K. H. W., Lui, Y. W., Tsui, M. S., & Chan, C. (2018). Psychological well-being and adolescents’ internet addiction: A school-based cross-sectional study in Hong Kong. Child and Adolescent Social Work Journal, 35(5), 477-487.

Festinger, D. S., Dugosh, K. L., Clements, N., Flynn, A. B., Falco, M., McLellan, A. T.,& Arria, A. M. (2016). Use of the internet to obtain drugs without a prescription among treatment-involved adolescents and young adults. Journal of child & adolescent substance abuse, 25(5), 480-486.

Görzig, A. (2016). Adolescents’ viewing of suicide-related web content and psychological problems: Differentiating the roles of cyberbullying involvement. Cyberpsychology, Behavior, and Social Networking, 19(8), 502-509.

Law, Y. M. (2019). Family factors and internet addiction among junior secondary school students in Hong Kong. Hong Kong Polytechnic University, Doctoral Dissertation.

Sajeev Kumar, P., Prasad, N., Raj, Z., & Abraham, A. (2015). Internet addiction and substance use disorders in adolescent students-a cross sectional study. J. Int. Med. Dent, 2, 172-179.

Studyspark

Study Document Study Document

Formulating An Effective National Response To Ebola In Nigeria

Pages: 17 (5038 words) Sources: 20 Document Type:Research Paper Document #:83371879

… and the risk the disease represents to them personally. To its credit, the Nigerian government, in collaboration with the World Health Organization, took immediate steps to not only effectively contain this potential outbreak, but to provide accurate information to citizens concerning warning signs of the disease and ……

References

References

Allam, M. F. (2014, September). Ebola hemorrhagic fever: Case fatality rate 90%? Central European Journal of Public Health 22(3), 207-210.

Allam, M. F. & Vonka, V. (2015, March). Ebola virus disease: Temperature checks for travelers? Central European Journal of Public Health, 23(1), 84.

Brand, J. E. & Stela, D. (2014, October). Ebola is here: Knowledge, identification, and appropriate infection control are key. American Nurse Today, 9(10), 37-39.

Brown, G. (2015, Winter). Ebola in America: An epidemic or a pandemic? ABNF Journal, 26(1), 3-5.

Ebola. (2019). Doctors without Borders. Retrieved from https://www.doctorswithout borders.org/what-we-do/medical-issues/ebola.

Ebola outbreak. (2019). U.S. Centers for Disease Control and Prevention. Retrieved from  https://www.cdc.gov/vhf/ebola/history/2014-2016-outbreak/index.html .

Ebola virus disease. (2019). U.S. Centers for Disease Control and Prevention. Retrieved from  https://www.cdc.gov/vhf/ebola/index.html .

Hancock, M. (2019, September). After Ebola. African Business, 422, 56-58.

Studyspark

Study Document Study Document

Recruitment Of Talented Employees

Pages: 4 (1315 words) Sources: 4 Document Type:Research Paper Document #:52942441

… company would launch a product is not necessarily a bad idea, particularly in regards to young employees who are regular consumers of social media. According to one HR expert, “Social media profiles have become standard tools for researching and evaluating talent. Instead of looking only at candidates’ résumés, thoroughly vet…[break]…are increasingly transient but good ……

References

References

Bajic, E. (2013). The 6 steps for retaining good employees. Forbes. Retrieved from:

https://www.forbes.com/sites/elenabajic/2013/07/15/the-6-steps-for-retaining-good- employees/#63a92aa5721f

Fallon, N. (2016). 6 steps for learning how to recruit the best talent. Business News Daily.

Retrieved from:  https://www.businessnewsdaily.com/6252-tips-for-recruiters.html 

Keller, S. & Meaney, (2017). Attracting and retaining the right talent. McKinsey. Retrieved

from:  https://www.mckinsey.com/business-functions/organization/our-insights/attracting - and-retaining-the-right-talent

Williams, D. & Scott, M. (2012). Five ways to retain employees forever. Harvard Business

Review Retrieved from:  https://hbr.org/2012/11/five-ways-to-retain-employees

Studyspark

Study Document Study Document

Feminism In Popular Culture

Pages: 5 (1477 words) Sources: 10 Document Type:Annotated Bibliography Document #:46863850

… “post-feminism pop culture,” “feminist studies current,” and “feminist post-feminist popular culture”
Baer, H. (2016). Redoing feminism: digital activism, body politics, and neoliberalism.  Feminist Media Studies, 16(1), 17-34.
This study looks at the influence of digital platforms in projecting feminism in the 21st century. The author discusses subjects such … author makes is that neoliberal societies are still oppressive towards women and that feminism is both needed and alive on social and digital media. This source comes from a peer-reviewed journal and is relevant to my topic of interest because it discusses whether feminism is still possible … Ladyboss” and its weakness is that it does not discuss at great length a pro-argument for “lean in” Feminism.
Gill, R. (2007). Postfeminist media culture: Elements of a sensibility. European Journal of Cultural Studies, 10(2), 147-166.
This study examines the way in which women present themselves in media today and what it shows about perceptions……

Studyspark

Study Document Study Document

Technology Divorce And The Impact Of Social Inequality On Marital

Pages: 10 (2883 words) Sources: 7 Document Type:Essay Document #:95594472

… via the baby monitor.
The cell phone can be used to reach out and call the older child or to post on social media or see what content the child is posting. The cell phone allows for both a quick and convenient way to contact the child … and convenient way to contact the child and a way to monitor the child from a distance by looking at the child’s social media content. This is a window into the child’s soul, and the parent will use it to obtain an understanding of what sorts of … marriages of mixed religions, mixed races, mixed socioeconomic backgrounds, and so on. Equality in a marriage tends to smooth out some of the immediate rough bumps and allows a closer meeting of the minds of all sides of the marriage to be possible. Inequality can create upset ……

References

References

BLS. (2013). Marriage and divorce: patterns by gender, race, and educational attainment. Retrieved from  https://www.bls.gov/opub/mlr/2013/article/marriage-and-divorce-patterns-by-gender-race-and-educational-attainment.htm 

Hamilton, L. & Armstrong, E. (2019). Shifting the Center: Understanding Contemporary Families. Thousand Oaks.

Jones, E. M. (2000). Libido Dominandi: Sexual Liberation and Political Control. IN: St. Augustine’s Press.

Marsee, S. (2019). Which couples are most likely to divorce? Retrieved from  https://www.marseelaw.com/which-couples-are-most-likely-to-divorce/ 

Nelson, M. K. (2010). Parenting out of control: Anxious parents in uncertain times. NYU Press.

Pew Research Center. (2015). Parenting in America. Retrieved from  https://www.pewsocialtrends.org/2015/12/17/1-the-american-family-today/ 

Wilkinson & Finkbeiner. (2019). Divorce statistics. Retrieved from  https://www.wf-lawyers.com/divorce-statistics-and-facts/ 

Studyspark

Study Document Study Document

Security In Communication Challenges

Pages: 10 (2871 words) Sources: 11 Document Type:Research Paper Document #:73429324

… any extent, the most rapidly growing section of the communications sector. For this reason, it has seized the consideration and responsiveness of the media and the imaginings of the general public (Ijemaru et al., 2018). In the past decade, cellular communications systems have faced exponential growth and … delineation, wireless communication takes into account the transmission of message signals through minimal energy radio frequency waves by utilizing open air, with the media aspect including both a transmitter and a receiver. The message signal is conveyed to the nearby antenna spot and is transported via optic-fiber … of the signal can be employed at terminal T1 to preclude terminal T3 from gaining a clear comprehension of the content within the media being conveyed. Cryptographic security solutions executed at application layer entirely disregard these effects and function as though the eavesdropper channel is channel that ……

References

References

Bagheri-Karam, G. (2010). Physical-Layer Security in Wireless Communication Systems. Ontario: Waterloo.

Chang, Z. (2019). Physical Layer Security in Wireless Communications. University Of Jyväskylä. Retrieved from:  http://users.jyu.fi/~timoh/TIES327/WPLS.pdf 

Chen, Q., Zhang, C., & Zhang, S. (2008). Secure transaction protocol analysis: models and applications. Springer-Verlag.

GSMA. (2019). Number of Mobile Subscribers Worldwide Hits 5 Billion. Retrieved from:  https://www.gsma.com/newsroom/press-release/number-mobile-subscribers-worldwide-hits-5-billion/ 

Gu, X., & Hunt, R. (2005). Wireless LAN attacks and vulnerabilities. the proceeding of IASTED Networks and Communication Systems.

Ijemaru, G. K., Adeyanju, I. A., Olusunyi, K. O., Ofusori, T. J., Ngharamike, E. T., Sobowale, A. A. (2018). Security Challenges of Wireless Communications Networks: A Survey. International Journal of Applied Engineering Research, 13 (8): 5680 – 5692.

IJEMARU, G. K., UDUNWA, A. I., NGHARAMIKE, E. T., & OLEKA, E. U. (2015). Evaluating the Challenging Issues in the Security of Wireless Communication Networks in Nigeria. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 3, Issue 12, pp. 1-5, 2014.

Jain, A. (2013). Network Security-The Biggest Challenge in Communication. Advance in Electronic and Electric Engineering. Research India Publications.

Join thousands of other students and

"spark your studies".