Mobile Device Essays (Examples)

Studyspark

Study Document Study Document

Swapping The Studio Based Pedagogy For Online Learning

Pages: 6 (1926 words) Sources: 5 Document Type:Research Paper Document #:33333539

...Mobile device Why to Adopt Pedagogy Based on Digital Online Interactions with Students
Introduction
With the arrival of the digital age has come a shift in the way information is pursued, transacted, shared, discussed, obtained, and processed. Students who have grown up in the digital age are digital natives and are more comfortable using digital technology than being without it. For design educators who are used to the studio-based pedagogy that has been in use for a century, shifting to embrace a digital-based pedagogy can seem like a transition that is too great of a leap for them to welcome. After all, the pedagogy of the studio-based design education has its own special uniqueness that cannot be replicated in a digitalized format. However, what design educators need to realize is that it is not about replication but rather it is about improving the pedagogy by way of innovation. The pedagogy of the……

References

References

Fleischmann, K. (2013). Big Bang Technology: What's Next in Design Education, Radical Innovation or Incremental Change?. Journal of Learning Design, 6(3), 1-17.

Justice, L. (2019). The Future of Design Education. Design Management Review, 30(1), 33-37.

Mayadas, A. F., Bourne, J., & Bacsich, P. (2009). Online education today.  Science, 323(5910), 85-89.

Souleles, N. (2015). Elearning in art and design: the elephant in the room. In 9th International Technology, Education and Development Conference (pp. 6659-6665).

Vaughan, S., Austerlitz, N., Blythman, M., Grove-White, A., Jones, B. A., Jones, C. A.,... & Shreeve, A. (2008). Mind the gap: Expectations, ambiguity and pedagogy within art and design higher education. In The student experience in art and design higher education: Drivers for change (pp. 125-148). Jill Rogers Associates Limited.

Studyspark

Study Document Study Document

Internet Influence On Adolescents

Pages: 5 (1568 words) Sources: 6 Document Type:Essay Document #:37510468

… engagement is not moderated.
This research is important because more and more studies are showing that teenagers are getting addicted to technology, to mobile device, to social media, and that they have not developed important communication skills needed for the real world. Thus, they are unable to develop ……

References

References

Agarwal, A. K., Verma, A., & Agarwal, M. (2017). Internet victimization and depression among adolescents, 14(3), 60-62.

Cheung, J. C. S., Chan, K. H. W., Lui, Y. W., Tsui, M. S., & Chan, C. (2018). Psychological well-being and adolescents’ internet addiction: A school-based cross-sectional study in Hong Kong. Child and Adolescent Social Work Journal, 35(5), 477-487.

Festinger, D. S., Dugosh, K. L., Clements, N., Flynn, A. B., Falco, M., McLellan, A. T.,& Arria, A. M. (2016). Use of the internet to obtain drugs without a prescription among treatment-involved adolescents and young adults. Journal of child & adolescent substance abuse, 25(5), 480-486.

Görzig, A. (2016). Adolescents’ viewing of suicide-related web content and psychological problems: Differentiating the roles of cyberbullying involvement. Cyberpsychology, Behavior, and Social Networking, 19(8), 502-509.

Law, Y. M. (2019). Family factors and internet addiction among junior secondary school students in Hong Kong. Hong Kong Polytechnic University, Doctoral Dissertation.

Sajeev Kumar, P., Prasad, N., Raj, Z., & Abraham, A. (2015). Internet addiction and substance use disorders in adolescent students-a cross sectional study. J. Int. Med. Dent, 2, 172-179.

Studyspark

Study Document Study Document

Comparison Of Leadership Model And Styles

Pages: 5 (1542 words) Sources: 5 Document Type:Essay Document #:47234629

...Mobile device Part One
My Personal Model: Transformational Leadership
My own personal model of leadership is transformational leadership. This model focuses on giving following a vision of what they should work to become. The transformational leader identifies and explains the goal that the organization is trying to reach and how workers can help the organization to achieve that goal. It typically requires a change in the behavior and approaches of the workers, so logic and reason are used to show why this change is needed, which is a way of helping to break down resistance to the change (Nawaz & Khan, 2016). Communication is a key skill used in this model, and transformational leaders have to be able to relate well with followers, provide support along the way, and keep them focused on the vision and the mission. When it comes to organizational development, transformational leaders can be a very valuable asset……

References

References

Maslow, A. H. (1943). A theory of human motivation. Psychological Review, 50(4), 370.

Nawaz, Z. A. K. D. A., & Khan_ PhD, I. (2016). Leadership theories and styles: A literature review. Leadership, 16, 1-7.

Northouse, P. G. (2016). Leadership: Theory and practice (7th ed.). Thousand Oaks: CA: Sage Publications.

Reivich, K. J., Seligman, M. E., & McBride, S. (2011). Master resilience training in the US Army. American Psychologist, 66(1), 25.

Warrick, D. D. (2011). The urgent need for skilled transformational leaders: Integrating transformational leadership and organization development. Journal of Leadership, Accountability and Ethics, 8(5), 11-26

Studyspark

Study Document Study Document

Enhancing Communication Migration From 4G To 5G

Pages: 6 (1692 words) Document Type:Essay Document #:96575438

… bring various enhancements as compared to the 4G. These enhancements include low latencies, high speeds, low power consumption, enhanced reliability, and greater terminal device densities. Also, and perhaps the most important features of 5G is the new network capabilities that could allow several virtual networks with differential …
Review of the current status
Communication networks have made significant improvements in the last few years. In the last decade, networks, and especially mobile communication networks have developed from Bluetooth, WLAN, 2G, and 3G to 4G communication networks. With the specific focus to 4G, which is the … unprecedented and ever-increasing growth of users and demand for data traffic as well as the emergence of new technologies, applications, and technologies in mobile Communication. The development of 3G led to the advanced technological requirement for 4G with a data rate of 1Gbps downlink and uplink 500 … for 4G with a data……

References

References

Alkhazaali, N.H., 2017. Mobile Communication through 5G Technology (Challenges and Requirements). International Journal of Communications, Network and System Sciences, 10(05), p.202.

Gandotra, P., and Jha, R.K., 2016. Device-to-device communication in cellular networks: A survey. Journal of Network and Computer Applications, 71, pp.99-117.

Penttinen, Jyrki T. J., et al. 2019. "Deployment," in 5G Explained: Security and Deployment of Advanced Mobile Communications, Wiley, pp.271-291

Shen, Xuemin. "Device-to-device communication in 5G cellular networks." IEEE Network 29, no. 2 (2015): 2-3.

Tehrani, M.N., Uysal, M., and Yanikomeroglu, H., 2014. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), pp.86-92.

Zhang, A., and Lin, X., 2017. Security-aware and privacy-preserving D2D communications in 5G. IEEE Network, 31(4), pp.70-77.

Studyspark

Study Document Study Document

Security In Communication Challenges

Pages: 10 (2871 words) Sources: 11 Document Type:Research Paper Document #:73429324

… over the globe. Statistics indicate that by the culmination of 2018, there were approximately 5.1 billion individuals across the globe that subscribed to mobile services, and this signified approximately 67 percent of the world’s populace. Furthermore, the statistics indicate that more than 60 percent of the population … to incapacitate or deactivate firewall protection to attain accessibility to private and sensitive data and information that is conveyed between two wireless communication device, in the event that this sort of information is not properly safeguarded by strong and comprehensive encryption. As a result, this points out … severe challenging issues in the security of communication wireless systems and the applications in wireless communications settings.
Parenthetically, wireless communication networks and handheld device are subject to the similar level of susceptibilities and risks with that of conventional wired networks. Nevertheless, in this day and age, the … authentic transmissions. Yet again, impostors……

References

References

Bagheri-Karam, G. (2010). Physical-Layer Security in Wireless Communication Systems. Ontario: Waterloo.

Chang, Z. (2019). Physical Layer Security in Wireless Communications. University Of Jyväskylä. Retrieved from:  http://users.jyu.fi/~timoh/TIES327/WPLS.pdf 

Chen, Q., Zhang, C., & Zhang, S. (2008). Secure transaction protocol analysis: models and applications. Springer-Verlag.

GSMA. (2019). Number of Mobile Subscribers Worldwide Hits 5 Billion. Retrieved from:  https://www.gsma.com/newsroom/press-release/number-mobile-subscribers-worldwide-hits-5-billion/ 

Gu, X., & Hunt, R. (2005). Wireless LAN attacks and vulnerabilities. the proceeding of IASTED Networks and Communication Systems.

Ijemaru, G. K., Adeyanju, I. A., Olusunyi, K. O., Ofusori, T. J., Ngharamike, E. T., Sobowale, A. A. (2018). Security Challenges of Wireless Communications Networks: A Survey. International Journal of Applied Engineering Research, 13 (8): 5680 – 5692.

IJEMARU, G. K., UDUNWA, A. I., NGHARAMIKE, E. T., & OLEKA, E. U. (2015). Evaluating the Challenging Issues in the Security of Wireless Communication Networks in Nigeria. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 3, Issue 12, pp. 1-5, 2014.

Jain, A. (2013). Network Security-The Biggest Challenge in Communication. Advance in Electronic and Electric Engineering. Research India Publications.

Studyspark

Study Document Study Document

Data Security Using RFID Bands At Music Festivals

Pages: 5 (1616 words) Sources: 6 Document Type:Essay Document #:97930410

...Mobile device The radio frequency identification or RFID is the new technological method for quick identification of the user, especially if used for public events like music festivals. It makes data management easier, so that information about the attendees is managed technically by capturing data from scanners and transmitting it to the computer without the user's physical contact. This paper is about managing adult attendees at music festivals whose information would be stored in RFID wrist bands linked to their Twitter, Facebook, and credit/debit bank cards. The following sections would probe into its compliance issues and the related regulations that would impact the planned implementation.
Analysis
Description of the Chosen Use Case
RFID wrist bands would be used for managing adult attendees at a music festival at a hotel where bands would be linked to their Twitter and Facebook accounts and their bank credit/debit cards so that the buying of eatables is……

References

References

Event Tribe. (n.a.). The top 10 benefits of using RFID for events. Retrieved from  https://www.eventbrite.com/blog/academy/the-top-10-benefits-of-using-rfid-for-events/ 

ID&C. (n.a.). How to RFID wristbands work? Retrieved from  https://www.idcband.com/blog/how-do-rfid-wristbands-work/ 

Kacicki, T. (2019, July 15). 4 commonly overlooked facts about RFID wristbands. Intellitix. Retrieved from  https://intellitix.com/hub/four-commonly-overlooked-facts-rfid 

OECD. (2008). OECD policy guideline on RFID.  https://www.oecd.org/sti/ieconomy/40892347.pdf 

Quirk, R.E. & Borrello, S.J. (2005). RFID: Rapid deployment and regulatory challenges. Retrieved from  https://www.pharmamanufacturing.com/assets/Media/MediaManager/VenableRFIDpaper.pdf?SESSID=62935cf41f5a19909f5bb3ae3a598490 

Williamson, A., Tsay, L., Kateeb, I.A. & Burton, L. (2013). Solutions for RFID smart tagged card security vulnerabilities. AASRI Procedia, 4, 282-287. DOI: 10.1016/j.aasri.2013.10.042

Studyspark

Study Document Study Document

Telemedicine And Its Impact On Patient Care

Pages: 11 (3241 words) Sources: 10 Document Type:Essay Document #:26347879

… consult with medical experts from all over the world remotely. This has led to improved healthcare and has enhanced patent experience.
Furthermore, many mobile applications have been invented to help both patients and doctors specifically. Moreover, they are not only helping patients recover but also improving their … more advanced. There are high-technology televisions through which medical experts and specialists are engaging with other experts and specialists.
Moreover, there are peripheral device that help with communication of sound and with the examination of patients. All these things have made Telemedicine much more integral to modern … technologies are being used across the world for Telemedicine. While this is not in itself bad or wrong, experts are saying that the device or technologies that are used in such situations need to be standardized to improve Telemedicine and make it more acceptable.
Store and forward ……

References

References

Meyers, A. J., Pontarelli, E., Dutta, S. K., Grinberg, G., & Yenumula, P. R. (2018). Telemedicine Follow-up After Bariatric Surgery. Surgery for Obesity and Related Diseases, 14(11), S168.

Tiago, M. T. B., Tiago, F., Amaral, F. E. B., & Silva, S. (2016). Healthy 3.0: Healthcare digital dimensions. In Reshaping medical practice and care with health information systems (pp. 287-322). IGI Global.

Conklin, T. P. (2002). Health care in the United States: An evolving system. Michigan Family Review, 7(1).

Board on Health Care Services; Institute of Medicine. (2012). \\\\\\\\\\\\"3The Evolution of Telehealth: Where Have We Been and Where Are We Going?\\\\\\\\\\\\" in The Role of Telehealth in an Evolving Health Care Environment: Workshop Summary. National Academies Press, Washington (DC).

Sada, A., Asaad, M., Reidt, W. S., Kellogg, T. A., Kendrick, M. L., McKenzie, T. J., & Habermann, E. B. (2019). Are In-Person Post-operative Clinic Visits Necessary to Detect Complications Among Bariatric Surgery Patients?. Obesity Surgery, 1-4.

Krupka, D. C., Sandberg, W. S., & Weeks, W. B. (2012). The impact on hospitals of reducing surgical complications suggests many will need shared savings programs with payers. Health Affairs, 31(11), 2571-2578.

Fasano, P. (2013). Transforming health care: The financial impact of technology, electronic tools, and data mining. John Wiley & Sons.

Burch, S., Gray, D., & Sharp, J. (2017). The power and potential of telehealth what health systems should know: proposed legislation in Congress offers the promise that the nation\\\\\\\\\\\\'s healthcare policy will support the expansion of telehealth, allowing hospitals and health systems to fully realize the benefits of this important emerging approach to care. Healthcare Financial Management, 71(2), 46-50.

Studyspark

Study Document Study Document

The Transformation Of The US Into Oceania

Pages: 9 (2807 words) Sources: 7 Document Type:Essay Document #:33502677

… analyst emphasizes that, “With developments in technological security capability, employers can now monitor their employees’ activity on their computers and other company-provided electronic device” (Ethical issues facing businesses, 2020, para. 3). In fact, fully two-thirds (66%) of American companies currently monitor their employees internet activity, and…[break]…a blind … tens of millions of consumers being adversely affected (Karn, 2019). For instance, Karn (2019) notes that, “Today, with massive digitization of medical information, mobile data usage and massive system integration, everyday human errors can cause breaches that expose millions of people to potential harm” (para. 5). Of ……

References

References

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Cantor, M. D. (2006, Summer). No information about me without me: Technology, privacy, and home monitoring. Generations, 30(2), 49-55.

Ethical issues facing businesses. (2020). Florida Tech. Retrieved from https://www.floridatech online.com/blog/business/the-5-biggest-ethical-issues-facing-businesses/.

Haslag, C. (2018, Fall). Technology or privacy: Should you really have to choose only one? Missouri Law Review, 83(4), 1027-1033.

Karn, R. (2019). The biggest threat to data security? Humans, of course. The Privacy Advisor. Retrieved from  https://iapp.org/news/a/the-biggest-threat-to-data-security-humans-of-course/ .

Sharma, P. (2017, June). Organizational culture as a predictor of job satisfaction: The role of age and gender. Journal of Contemporary Management Issues, 22(1), 35-40.

Taslitz, A. E. (2009, Spring). The Fourth Amendment in the twenty-first century: Technology, privacy, and human emotions. Law and Contemporary Problems, 65(2), 125-131.

Studyspark

Study Document Study Document

MacBook Pro By Apple Inc Quality Management

Pages: 11 (3159 words) Sources: 5 Document Type:Essay Document #:17953236

… explicating the different versions that might have been leaked to the media. After that, the engineering program manager takes the beta MacBook Pro device with the intension of examination and feedback. Usually, numerous versions of the device are done and are not simply prototypes. After that, the phase that follows is the packaging. The company has completely committed an entire … prototypes. After that, the phase that follows is the packaging. The company has completely committed an entire department that is tasked with solely device packaging. The final step of the product development process is product launch (Menear, 2020).
Question 2
Design Guidelines for Improving Manufacturability
Design for ……

References

References

Hill, C. W., Jones, G. R., & Schilling, M. A. (2014). Strategic management: theory: an integrated approach. Cengage Learning.

Panzarino, M. (2012). This is how Apple\\\\\\'s top-secret product development process works. The Next Web. Retrieved from:  https://thenextweb.com/apple/2012/01/24/this-is-how-apples-top-secret-product-development-process-works/ 

Interaction Design Foundation. (2020). Apple\\\\\\'s Product Development Process – Inside the World\\\\\\'s Greatest Design Organization. Retrieved from:  https://www.interaction-design.org/literature/article/apple-s-product-development-process-inside-the-world-s-greatest-design-organizatio " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Optimizing Health Information Systems

Pages: 12 (3717 words) Sources: 16 Document Type:Research Paper Document #:99273225

… that are frequency experienced in attempting to access it (Abouzhar, 2009). Likewise, the term “interoperability” refers to “the ability of different information systems, device or applications to connect, in a coordinated manner, within and across organizational boundaries to access, exchange and cooperatively use data amongst stakeholders, with … and collaboration between team members.
IT specialist
? Ensuring data quality; information assurance constructs of confidentiality, integrity, and data availability
? Design of mobile app, database, and web portal
Data integration and analysis
? Customization of the open-source electronic health record
Health information system design, development and … the health information system
Advanced practice nurses (two)
? Designing of well-being assessments
? Personalized interventions
? Providing feedback on electronic health records, mobile app, and web portal
Specialty expertise in various areas of clinical medicine
Provides clinical information and feedback needed by the IT specialist to ……

References

References

Abouzhar, C. & Boerma, T. (2009, August). Health information systems: The foundations of public health. Bulletin of the World Health Organization, 83(8), 578-583.

Cresswell, K. & Aziz, S. (2013, May). Organizational issues in the implementation and adoption of health information technology innovations: An interpretative review. International Journal of Medical Informatics, 87(5), 73-86.

Drazen, E. L. (2006, February). Maximizing the benefits of health care information systems. Journal of Medical Systems, 10(1), 51-56.

Kruse, C. S. & Smith, D. (2017, July). Security techniques for the electronic health records. Journal of Medical Systems, 41(8), 127.

Kumar, V. (2011). Impact of health information systems on organizational health communication and behavior. The Internet Journal of Allied Health Sciences and Practice, 9(2), 37-44.

McGrail, K. M. & Black, C. (2009, August). Access to data in health information systems. Bulletin of the World Health Organization, 83(8), 563-569.

Murphy, M. L. (2019, March). Mastering accounting for business combinations: Mergers and acquisitions present challenges that finance can overcome by staying involved with the deal and preparing in advance of the closing. Journal of Accountancy, 227(3), 24-27.

NAHQ code of ethics for healthcare quality. (2019). National Association for Healthcare Quality. Retrieved from  https://nahq.org/about/code-of-ethics .

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".