Technology Essays (Examples)

Studyspark

Study Document Study Document

Human Capital Needs In An Army Unit

Pages: 1 (318 words) Sources: 1 Document Type:Essay Document #:28909985

… are relatively effective. However, the Army unit could improve these current strategies through adopting technological measures to enhance workforce readiness and organizational adaptability. Technology has proven effective in enhancing organizational flexibility and resilience in light of the changing global landscape.
Reference
U.S. Army War College. (2015, August). ……

References

Reference

U.S. Army War College. (2015, August). 2015-2016: How the Army Runs – A Senior Leader Reference Handbook. Retrieved November 22, 2019, from  https://www.g8.army.mil/references/htar_how_the_army_runs.pdf 

 

Studyspark

Study Document Study Document

Brown V Board Of Education And Civil Rights Moment By Michael Klarman

Pages: 6 (1764 words) Sources: 3 Document Type:Essay Document #:64441378

… out without interference from the Court. However, that is the argument made about slavery, too—that it would have ended on its own as technology advanced and slavery no longer became economically viable. These are speculative ideas and it is hard to judge them by looking back through ……

References

Bibliography

Cripps, Thomas and and David Culbert. “The Negro Soldier (1944): Film Propaganda in Black and White.” American Quarterly Vol. 31, No. 5, Special Issue: Film and American Studies (Winter, 1979), pp. 616-640: The Josh Hopkins University Press.

German, Kathleen M. Promises of Citizenship: Film Recruitment of African Americans in World War 2. University Press of Mississippi, 2017.

Klarman, Michael. Brown v Board of Education and the Civil Rights Moment. New York, NY: Oxford University Press, 2007.

Studyspark

Study Document Study Document

Investing Overseas Market Entry Decision Making

Pages: 8 (2428 words) Sources: 10 Document Type:Term Paper Document #:23626142

...Technology International Acquisition
EU or not EU?
On the question of whether to expand into the European Union or not, there are a few different considerations for an American firm. While the EU has a fairly complex regulatory environment that could prove challenging, the decision as to where to expand internationally still has to be more of a market-based decision. That means looking at an ROI or net present value type of calculation, weighing the cost of entering the market against the size of the market opportunity. That calculation might show that the EU is the best choice for international expansion, or it might not.
There is a lot of information available about expanding into Europe, so at least the decision to enter the EU market or not can be made with a fairly robust set of information guiding it. Each of the 28 member nations publishes material for exporters, and……

References

References

CE Intelligence. (2019) EU – market entry strategies. CE Intelligence.com. Retrieved December 5, 2019 from  http://www.ceintelligence.com/content_manager/contentPages/view/eu-market-entry-strategies 

Chapman, K. & Edmond, H. (2010) Mergers/acquisitions and restructuring in the EU chemical industry: Patterns and implications. Regional Studies. Vol. 34 (8) 753-767

Conyon, M., Girma, S., Thompson, S. & Wright, P. (2003) The productivity and wage effects of foreign acquisitions in the United Kingdom. The Journal of Industrial Economics. Vol. 50 (1) 85-102.

EF.com (2019) English proficiency index. EF.com. Retrieved December 5, 2019 from  https://www.ef.com/wwen/epi/ 

Export.gov (2019) European Union – market entry strategy. Export.gov. Retrieved December 5, 2019 from  https://www.export.gov/article?id=European-union-Market-Entry-Strategy 

Girma, S. (2002) The process of European integration and the determinants of entry by non-EU multinationals in UK manufacturing. DOI:10.1111/1467-9957.00305

Girma, S. (2005) Technology transfer from acquisition FDI and the absorptive capacity of domestic firms: An empirical investigation. Open Economies Review. Vol. 16 (2) 175-187.

Lamson, M. (2016) 5 things you need to know before doing business in Europe. Inc. Magazine. Retrieved December 5, 2019 from  https://www.inc.com/melissa-lamson/5-things-you-need-to-know-before-doing-business-in-europe.html

Studyspark

Study Document Study Document

Intercultural Situations

Pages: 6 (1787 words) Document Type:Essay Document #:84659463

Intercultural Situations: Describing a Person from a Different Culture
My friend Pio is an information technology consultant who was born and raised in India. He spent ten years in a Catholic seminary in India before leaving and getting a ……

Studyspark

Study Document Study Document

Depression And Social Media

Pages: 8 (2464 words) Sources: 13 Document Type:Research Paper Document #:12318199

...Technology Introduction
Loneliness is defined as “a subjective, unwelcome feeling of lack or loss of companionship. It happens when we have a mismatch between the quantity and quality of social relationships that we have, and those that we want” (Office for National Satistics).  As Horne notes, loneliness and depression play off one another. Loneliness is not necessarily isolation from people as it is the feeling of being alone (Horne). Van Winkel et al. show that loneliness often is both a predictor and symptom of depression. Depression in other words is typically an underlying current in loneliness.
In recent years there has been a significant increase in the rate of depression among young adults (National Institute of Mental Health). Twenge, Cooper, Joiner, Duffy and Binau show that over the past decade, the number of adolescents who are depressed has more than doubled. This coincides with the rise of social media and the……

References

Works Cited

Andreassen, Cecilie Schou, Ståle Pallesen, and Mark D. Griffiths. \\\\\\\\\\\\"The relationship between addictive use of social media, narcissism, and self-esteem: Findings from a large national survey.\\\\\\\\\\\\" Addictive behaviors 64 (2017): 287-293.

Bandura, A. “Toward a psychology of human agency: Pathways and reflections.”  Perspectives on Psychological Science 13.2 (2018): 130-136.

Chester, Jeff, and Kathryn Montgomery. \\\\\\\\\\\\"No escape: Marketing to kids in the digital age.\\\\\\\\\\\\" Multinational Monitor 29.1 (2008): 11.

Greenberg, P. The Growing Economic Burden of Depression in the U.S. 2015. Retrieved from  https://blogs.scientificamerican.com/mind-guest-blog/the-growing-economic-burden-of-depression-in-the-u-s/ 

Klinenberg, Eric. \\\\\\\\\\\\"Is loneliness a health epidemic?.\\\\\\\\\\\\" New York Times (2018): SR8.

Lim, Xin Jean, et al. \\\\\\\\\\\\"The impact of social media influencers on purchase intention and the mediation effect of customer attitude.\\\\\\\\\\\\" Asian Journal of Business Research 7.2 (2017): 19-36.

Lohmann, R. What\\\\\\\\\\\\'s Driving the Rise in Teen Depression? 2019. https://health.usnews.com/wellness/for-parents/articles/2019-04-22/teen-depression-is-on-the-rise

Mayo Clinic. “Depression.” MayoClinic, 2019.  https://www.mayoclinic.org/diseases-conditions/teen-depression/symptoms-causes/syc-20350985

Studyspark

Study Document Study Document

Effect Of Training And Re Education On Employee Performance

Pages: 8 (2326 words) Sources: 11 Document Type:Research Paper Document #:51360721

...Technology In the present day intensely competitive marketplace, businesses must incessantly enhance the level of quality of their products and services in order to gain competitive advantages. Corporations have to attain and capitalize on their resources in an efficacious manner. As a result, it is of the best interest for the corporations to improve the job performances of their staff by carrying out training and education as one of the fundamental measures to increase productivity. Training and education is a significant component in human resource growth and development for enhancement of performance and organizational efficacy. In addition, training and education is a wide ranging aspect necessitated to attain most output and productivity from the human assets as it is utilized to enhance or increase activity that is linked with general performance requirements of the staff and the organization in its entirety.
The main objective of the research is to determine whether……

References

References

Becker, B. E., Huselid, M. A., & Beatty, R. W. (2009). The differentiated workforce: Translating talent into strategic impact. Harvard Business Press.

Brayfield, A.H. and Crockett, W.H. (1955). Employee attitudes and employee performance. Psychological bulletin, 52(5), p.396.

Dessler, G. and Varrkey, B. (2005). Human Resource Management, 15e. India: Pearson Education India.

Falola, H.O., Osibanjo, A.O. and Ojo, I.S. (2014). Effectiveness of training and development on employees' performance and organisation competitiveness in the nigerian banking industry. Bulletin of the Transilvania University of bra?ov, 7(1), p.161.

Halidu, S.G. (2015). The Impact of Training and Development on Workers’ Productivity. Review Public Administration Management, 3(160).

Keep, E. (2014). Corporate training strategies: the vital component? New Perspectives, pp.109-125.

Kothari, C. R. (2004). Research methodology: Methods and techniques. New Age International.

Lussier, R. N. (2010). Human relations in organizations: Applications and skill building. McGraw-Hill.

Studyspark

Study Document Study Document

Healthcare Marketing

Pages: 11 (3219 words) Sources: 3 Document Type:Essay Document #:80789957

… of health care by altering where patients go for information about health and healing. In this new complex landscape of regulations and changing technology, healthcare marketing faces new challenges. Fortunately, old formulas can still apply. This paper will describe the strategies and tools that can still be ……

References

References

Arnold, D. G., & Oakley, J. L. (2013). The politics and strategy of industry self-regulation: the pharmaceutical industry's principles for ethical direct-to-consumer advertising as a deceptive blocking strategy. Journal of Health Politics, Policy and Law, 38(3), 505-544.

Blythe, J. (2009). Key Concepts in Marketing. Los Angeles: SAGE Publications Ltd.

Chand, S. (2019). Target Marketing: Four Generic Target Marketing Strategies. Retrieved from  http://www.yourarticlelibrary.com/marketing/target-marketing-four-generic-target-marketing-strategies/13400 

Dolliver, M. (2009). Take care when targeting the younger generations. Retrieved from  https://www.adweek.com/digital/take-care-when-targeting-the  younger generations-online-113643/

Goi, C. L. (2009). A review of marketing mix: 4Ps or more?. International journal of marketing studies, 1(1), 2.

Hartley, K. & Rudelius, W. (2001). Marketing, The Core, 4th Ed., McGraw-Hill.

Hawn, C. (2009). Take two aspirin and tweet me in the morning: how Twitter, Facebook, and other social media are reshaping health care. Health affairs, 28(2), 361-368.

Lane, T. (2019). Healthcare marketing laws. Retrieved from  https://smallbusiness.chron.com/healthcare-marketing-laws-67307.html

Studyspark

Study Document Study Document

Death Of Kobe Bryant

Pages: 8 (2415 words) Sources: 4 Document Type:Essay Document #:606401

...Technology Abstract

The untimely death of Kobe Bryant, a well-known basketball player and philanthropist, sent shock waves through the community.  The impact of the death was magnified by the fact that the accident that killed him also took the life of his daughter, Gianna Bryant.  While he was mourned by people from all walks of life, his death seemed to hit the African American community the hardest, as he had long been considered a role model for African American men, especially in terms of fatherhood.  However, while many people mourned his death, others found it disturbing that posthumous coverage of his death did not address the fact that Bryant had been the subject of credible rape allegations, leading to heated discussions about when it is appropriate to discuss the possible wrongdoings of someone who has passed. This article covers Kobe Bryant’s life, his career, his personal life, and the allegations against……

References

Badenhausen, Kurt.  “Kobe Bryant’s $600 Million Fortune: How He Won On- And Off-The Court.”  Forbes.  28 January 2020.   https://www.forbes.com/sites/kurtbadenhausen/2020/01/28/kobes-600-million-fortune-how-he-scored-onand-offthe-court/#75edd8766d36 .  Accessed 15 March 2020.

Biography.com Editors.  “Kobe Bryant Biography.” A&E Television Networks.  25 February 2020.  https://www.biography.com/athlete/kobe-bryant  .  Accessed 15 March 2020.

CBS News.  “Kobe Loses McDonald’s Deal.”  CBS News.  23 January 2004.   https://www.cbsnews.com/news/kobe-loses-mcdonalds-deal/ .  Accessed 15 March 2020.

Sanchez, Ray.  “Kobe Bryant Was a Living Legend.  In His Final Hours, He Was an Ordinary Dad and Friend.”  CNN. 3 February 2020.  https://www.cnn.com/2020/02/02/us/kobe-bryant-final-hours/index.html.  Accessed 15 March 2020.

Wikipedia. “Kobe Bryant.”  Wikipedia.  8 March 2020.   https://en.wikipedia.org/wiki/Kobe_Bryant .  Accessed 15 March 2020.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

...Technology Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage,……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf 

National Counterintelligence and Security Center. “Foreign Economic Espionage in Cyberspace.” Office of the Director of National Intelligence, 2018.  https://www.dni.gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf 

Rubenstein, D. “Nation State Cyber Espionage and its Impacts.” Washington University in St. Louis, December 2014.  https://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/ 

Weissbrodt, D. “Cyber-Conflict, Cyber-Crime, and Cyber-Espionage.” Minnesota Journal of International Law 22, no. 2 (2013).

Studyspark

Study Document Study Document

Critical Information Literacy

Pages: 1 (280 words) Sources: 2 Document Type:Essay Document #:59120688

...Technology Cybercrime how to defend against social engineering
There are several attack vectors for cybercriminals, which means that people need to have an equal number or more of ways to defend these attacks. Social engineering is one tactic, and it works in part because the attackers essentially bypass formal defenses such as firewalls or antivirus. Instead, social engineering is “the art of exploiting the human flaws to achieve a malicious objective” (Breda, Barbosa & Morais, 2017). A typical social engineering attack would be a phishing scam, but others would include hackers tricking people into providing information, which is then used against them (Kaspersky, 2020).
Protecting personal information online where social engineering attacks are concerned means training people in how social engineering attacks work, what the attackers need you to do, and how to spot typical scams. This training can often be done with courses, or online, and many security providers offer……

References

References

Breda, F., Barbosa, H., Morais, T. (2017) Social engineering and cyber security. Conference Paper.

Kaspersky (2020) What is social engineering? Kaspersky Labs. Retrieved April 15, 2020 from  https://usa.kaspersky.com/resource-center/definitions/social-engineering 

Join thousands of other students and

"spark your studies".