Online Essays (Examples)

Studyspark

Study Document Study Document

Domestic Terrorism And Extremist Groups

Pages: 13 (3981 words) Sources: 12 Document Type:Research Paper Document #:80039324

… the main tool of indoctrination—social media—is difficult to police and the wider Internet with its various platforms where extremists can meet and gather online is even more difficult to monitor and control. Digital technology has allowed for unprecedented growth in communications, and the more connected people become, … one really ever knows what the doctrine of the group actually is (DeCook, 2018). To some degree, members of these groups simply post online in order to rile up the opposition: it is a form of trolling that people do on social media, such as Twitter, so … be arbitrarily applied to everyone—but people in extremist groups fail to realize this because they are indoctrinated from a young age by others online who want to advance their ideological ambitions and create a world in which terror is an acceptable form of vengeance (Hamm & Spaaj, ……

References

References

Barnett, B. A. (2015). 20 Years Later: A Look Back at the Unabomber Manifesto.  Perspectives on Terrorism, 9(6), 60-71.

Beinart, P. (2017). The rise of the violent left. Retrieved from  https://www.theatlantic.com/magazine/archive/2017/09/the-rise-of-the-violent-left/534192/ 

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Costello, M., & Hawdon, J. (2018). Who are the online extremists among us? Sociodemographic characteristics, social networking, and online experiences of those who produce online hate materials. Violence and gender, 5(1), 55-60.

DeCook, J. R. (2018). Memes and symbolic violence:# proudboys and the use of memes for propaganda and the construction of collective identity. Learning, Media and Technology, 43(4), 485-504.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Hamm, M &Spaaj, R. (2015). Lone wolf terrorism in America: Using knowledge of radicalization pathways to forge prevention strategies. U.S. Department of Justice. Retrieved from  https://www.ncjrs.gov/pdffiles1/nij/grants/248691.pdf 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Studyspark

Study Document Study Document

Culture Formation In The Internet Age

Pages: 3 (1044 words) Sources: 5 Document Type:Essay Document #:46746942

Online Access and Culture
Access to the Internet has been linked to a number of different influences over culture. As a new means of … disseminated around the world, but it has also had a significant influence on how culture is created. All told, the influence of the online access to culture is far-reaching, and there are few touchpoints of culture that have not been subject to the influence of the Internet. … has had on culture, and cultures. This paper will provide an overview of some of the most important among the complex interactions between online access and culture.
Autonomy
One of the major themes in the discussion of the influence of the Internet on culture is the outcome … geographies and cultural boundaries. While there are still some boundaries – language, regulatory environments and in some instances access to the Internet – online access has transformed the way……

References

References

Bauer, J., Berne, M. & Maitland, C. (2002) Internet access in the European Union and in the United States. Telematics and Information. Vol. 19 (2) 117-137.

Castells, M. (2019) The impact of the Internet on society: A global perspective. Open Mind BBVA. Retrieved February 10, 2020 from  https://www.bbvaopenmind.com/en/articles/the-impact-of-the-internet-on-society-a-global-perspective/ 

DiMaggio, P. (2014) The Internet and cultural industries. MIT Technology Review. Retrieved February 10, 2020 from  https://www.technologyreview.com/s/531341/the-internet-and-the-cultural-industries/ 

Huizer, E., Shah, S., Arroyo, J., Okorafor, U. & MacKinnon, R. (2017) A brave new world: How the Internet affects societies. Chatham House. Retrieved February 11, 2020 from  https://www.internetsociety.org/wp-content/uploads/2017/08/MeetingSummary.BraveNewWorld.pdf 

Voiskounsky, A. (1998) Internet: Culture diversity and unification. Proceedings on Cultural Attitudes Towards Communication and Technology. Retrieved February 11, 2020 from  https://www.it.murdoch.edu.au/catac/catac98/pdf/07_voiskounsky.pdf 

Studyspark

Study Document Study Document

Fero Beauty Boutiques

Pages: 6 (1862 words) Sources: 4 Document Type:Marketing Plan Document #:30588715

… the company. It will be pivotal for the company to ensure that…[break]…advancement of technology, Fero Beauty has the opportunity to sell its products online. By opening a website, it will be easier for consumers to purchase the store products and also increase the scope of the store's … at a quick pace. It will be essential for the company to keep up with these changes to avoid losing potential clients.
2. Online retail and delivery
Being a physical retail store, Fero Beauty will experience major competition from online stores that sell and deliver products to clients through online transactions. This is becoming a progressively preferable option for consumers.
3. Product Substitution
Fero Beauty will also face the significant threat of product ……

References

References

Boone, L. E., & Kurtz, D. L. (2013). Contemporary marketing. Cengage learning.

Jeannet, J. P., & Hennessey, H. D. (2005). Global marketing strategies. New York: Dreamtech Press.

Menon, R. V., Sigurdsson, V., Larsen, N. M., Fagerstrøm, A., & Foxall, G. R. (2016). Consumer attention to price in social commerce: Eye-tracking patterns in retail clothing. Journal of Business Research, 69(11), 5008-5013.

 

Studyspark

Study Document Study Document

Discriminating Between Phenomenology And Grounded Theory Qualitative

Pages: 7 (2226 words) Sources: 7 Document Type:Case Study Document #:86692193

… teachers who persist in their profession. In “Marshaling Resources,” Yalof (2014) uses grounded theory to explore peer support systems used among students in online learning environments. A comparison of these two studies can be helpful for illustrating the differences between grounded theory and phenomenology in education research.
… secondary school teachers…[break]…the phenomena in question.
Role of the Researcher
In this study, Yalof (2014) functions mainly as an observer. The researcher used online discussion groups, serving as moderator and facilitator to stimulate the types of discussions that would yield viable data for the grounded theory research.
… in that it draws attention to socially constructed realities.
Data Collection
The researcher collects data from eighteen undergraduate and graduate student-participants in fourteen online universities. Data was also collected via online forums and discussions.
Ethical Issues
The researcher does not indicate whether or not, or how, informed consent was given to the participants.……

References

References

Baker, C., Wuest, J., & Stern, P. N. (1992). Method slurring: the grounded theory/phenomenology example. Journal of Advanced Nursing, 17(11), 1355–1360.doi:10.1111/j.1365-2648.1992.tb01859.x 

Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing among five approaches. eBook.

Norton, S.M. (2013). A phenomenological investigation into the self-efficacy beliefs of teachers who have presisted in the teaching profession. Liberty University Dissertation.

Starks, H., & Brown Trinidad, S. (2007). Choose Your Method: A Comparison of Phenomenology, Discourse Analysis, and Grounded Theory. Qualitative Health Research, 17(10), 1372–1380.doi:10.1177/1049732307307031 

Suddaby, R. (2006). From the Editors: What Grounded Theory is Not. Academy of Management Journal, 49(4), 633–642.doi:10.5465/amj.2006.22083020 

Wimpenny, P. & Gass, J. (2001). Interviewing in phenomenology and grounded theory: is there a difference? Journal of Advanced Nursing 31(6): 1485-1492.

Yalof, B. (2014). Marshaling resources. The Grounded Theory Review 13(1).

Studyspark

Study Document Study Document

Elite Business Solutions EBS Worldwide Inc Field Report

Pages: 8 (2504 words) Sources: 5 Document Type:Essay Document #:33805230

...Online Elite Business Solutions (EBS) Worldwide, Inc.
Introduction
Change management is a crucial part of any business because, given the ever-shifting economy and the relevant economic forces, a business must change to adapt to the prevailing market forces (Doppelt 2017). The process of change management can either be successful or a failure, and its success or failure can significantly affect the continuation of the business. It is not always that failure of change management will translate to failure of the business, but it can significantly affect growth. This paper focuses on the Indian business environment by analyzing a Small and Medium Enterprise (SME) and an Entrepreneur who has experience of managing change. The analysis of the business will be done through Lewin's Change Management Model. Therefore, this paper analyses EBS Worldwide Inc., formerly known as EasyBuyMusic and the entrepreneur Chris George.
Overview of the Company
EBS Worldwide is an international full-service……

References

References

Doppelt, B., 2017. Leading change toward sustainability: A change-management guide for business, government, and civil society. Routledge.

EBS Worldwide Inc., 2009. Retrieved from http://www.ebsworldwide.biz/index.php

Financial Express, 2002. EasyBuyMusic renames itself, expands product range. Retrieved from  https://www.financialexpress.com/archive/easybuymusic-renames-itself-expands-product-range/37717/ 

Rodrigues, M., 2012. Five entrepreneurs tell us how they reinvented themselves. India Today. Retrieved from  https://www.indiatoday.in/magazine/supplement/story/20120813-business-entrepreneurs-stock-vinay-gupta-nikhil-velpanur-759294-2012-08-01 

Shirey, M. R. (2013). Lewin\\\\\\\\\\\\'s theory of planned change as a strategic resource. JONA: The Journal of Nursing Administration, 43(2), 69-72.

Studyspark

Study Document Study Document

Twitter External Internal Analysis Report To CEO

Pages: 15 (4857 words) Sources: 1 Document Type:Essay Document #:23822356

… similar high-profiles use the platform (C-142)
· Platform allows businesses and content creators to extend reach and have the potential of billions of online impressions of tweets (C-141)
· Immediate data generator, every time a tweet is published, data is created(C-142)
2.2. Weaknesses
· Financial weaknesses - ……

References

References

Thompson, Arthur A.,. (2015). Crafting and Executing Strategy: Concepts and Readings..New York: McGraw-Hill Education, (pp. 138-148)

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

… until the personal computer began to hit the market in the 1970s (Computer Hope, 2019). As businesses and organizations began to more operations online, individuals began to see an opportunity to exploit weak supports to gain access over company data, individual personal information, or access to financial ……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

Effect Of Digital Marketing On Competitiveness Of Automobile Companies

Pages: 7 (2171 words) Sources: 8 Document Type:Research Paper Document #:71991463

… companies in Kenya. The digital marketing strategies included in the study are search engine marketing (SEM), email marketing, social media marketing (SMM), and online advertising. The study population was staff working in the marketing departments of major motor vehicle dealers in Kenya, and a sample of 101 … that are to be covered in the literature review, which h include; how email marketing affects competitiveness in the Kenyan automobile industry, How online advertising affects competitiveness of automobile dealers in Kenya, how SEM affects competitiveness of automobile dealers in Kenya, and how social media marketing affects ……

References

References

Evans, M.P., 2007. Analysing Google rankings through search engine optimization data. Internet research, 17(1), pp.21-37.

Galvan, J.L. and Galvan, M.C., 2017. Writing literature reviews: A guide for students of the social and behavioral sciences. Routledge.

Kaplan, A.M. and Haenlein, M., 2010. Users of the world, unite! The challenges and opportunities of Social Media. Business horizons, 53(1), pp.59-68.

Kigunda, E. N. 2017. Effect of Digital Marketing on Competitiveness of Automobile Companies in Kenya (Doctoral dissertation, United States International University-Africa).

Kimani, B., 2012. When social media does the marketing. Management magazine, (36-37).

Machi, L.A. and McEvoy, B.T., 2016. The literature review: Six steps to success. Corwin Press.

Ngulube, P., Mathipa, E.R. and Gumbo, M.T., 2015. Theoretical and conceptual frameworks in the social and management sciences. Addressing research challenges: Making headway in developing researchers, pp.43-66.

Wong, L.L.C., 2016. Challenges and expectations: Preparing postgraduate students to write literature reviews. In International Conference of the Spanish Association of Applied Linguistics (AESLA), 2016. University of Alicante.

Studyspark

Study Document Study Document

Recruitment And Retention Human Resource Policies

Pages: 11 (3188 words) Sources: 15 Document Type:question answer Document #:13270710

… application for the job will start streaming in. the application period will be bound to time. Applications will be required to be made online, and no hard copies will be accepted. To do away with storing the expectedly bulky applications and the possibility of misplacing any application, … no hard copies will be accepted. To do away with storing the expectedly bulky applications and the possibility of misplacing any application, only online applications will be accepted. All application(s) that is/are made through a hard copy will not be accepted and, thus, not screened for this … the state level is to attract the best human capital available for the position (Flynn et al., 2016; Kehoe & Bentley, 2019). The online applications that will be accepted conform to the required and right email subject to be sent to the right recipient, i.e., the H.R. ……

References

References

Arthur, D. (2012). Recruiting, interviewing, selecting & orienting new employees. AMACOM Div American Mgmt Assn.

Avery, D. R., McKay, P. F., & Volpone, S. D. (2013). \\\\\\"Diversity staffing: Inclusive personnel recruitment and selection practices.\\\\\\" In Q. M. Roberson (Ed.), Oxford library of psychology. The Oxford handbook of diversity and work (p. 282–299). Oxford University Press.

Becker, W. J., Connolly, T., & Slaughter, J. E. (2010). The effect of job offer timing on offer acceptance, performance, and turnover. Personnel Psychology, 63(1), 223-241.

Breaugh, J. (2016). Talent acquisition: A guide to understanding and managing the recruitment process. Society of Human Resource Management.

Compton, R. L. (2009). Effective recruitment and selection practices. CCH Australia Limited.

Flynn, W. J., Mathis, R. L., Jackson, J. H., & Valentine, S. R. (2016). Healthcare human resource management, 3rd Edition. Cengage Learning, U.S.

Garner, E. (2012). Recruitment and Selection. Bookboon.

Gusdorf, M. L. (2008). Recruitment and Selection: Hiring the right person. USA: Society for Human Resource Management.

Studyspark

Study Document Study Document

Demographic Profile And Motivation Of Suicide Bombers

Pages: 5 (1591 words) Sources: 6 Document Type:Essay Document #:63328521

...Online Suicide Terrorism: Driven to Death
Introduction
Who are the terrorists engaging in suicide bombings? What motivates them to act? These are some of the questions Merari (2010) tackles in Driven to Death. They are not entirely new questions, as other researchers have asked them as well—but Merari (2010) does provide new insight into the phenomenon of suicide bombing by conducting field work and independent research to uncover more information on this particular subject. This paper explores some of the findings of Merari (2010) and compares them with what other researchers have had to say, particularly on the subject of what motivates terrorists to act.
Demographics
While many scholars argue that there is no demographic profile of the suicide bomber, Merari (2010) disagrees and presents his own demographic profile based on his own research. The argument of general scholarship is that anyone can be a suicide bomber, young or old, rich……

References

References

Bandura, A. (2018). Toward a psychology of human agency: Pathways and reflections. Perspectives on Psychological Science, 13(2), 130-136.

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Costello, M., & Hawdon, J. (2018). Who are the online extremists among us? Sociodemographic characteristics, social networking, and online experiences of those who produce online hate materials. Violence and gender, 5(1), 55-60.

DeCook, J. R. (2018). Memes and symbolic violence:# proudboys and the use of memes for propaganda and the construction of collective identity. Learning, Media and Technology, 43(4), 485-504.

Koch, A. (2018). Trends in Anti-Fascist and Anarchist Recruitment and Mobilization. Journal for Deradicalization, (14), 1-51.

Merari, A. (2010). Driven to death. Oxford University Press.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".