Technology Essays (Examples)

Studyspark

Study Document Study Document

Military History

Pages: 7 (2223 words) Sources: 11 Document Type:Essay Document #:42630182

The Past Present and Future of Warfare Impact of Technology and Strategy
Introduction
Military tactics and strategies are essential in warfare. Without the right tactics and strategy, it is impossible to win wars. ……

References

Bibliography

Grieco, K. A. (2018). The 2018 national defense strategy: continuity and competition. Strategic Studies Quarterly, 12(2), 3-8.

Henry, R. S. (2016). “First With the Most” Forrest. Pickle Partners Publishing.

Hundley, R. O. (1999). Past Revolutions, Future Transformations. What Can the History of Revolutions in Military Affairs Tell us about Transforming the US Military? (No. RAND-MR-1029-DARPA). RAND CORP SANTA MONICA CA.

Noel, E. (1905). Gustaf Adolf (King of Sweden): The Father of Modern War. Bale & Danielsson.

Parrot, D. A. (1985). Strategy and Tactics in the Thirty Years\\\\\\\\\\\\' War: The\\\\\\\\\\\\" Military Revolution.\\\\\\\\\\\\" Militärgeschichtliche Zeitschrift, (2), 7.

Phifer, M. (2012). A Handbook of Military Strategy and Tactics. Vij Books India Pvt Ltd.

RisCassi, R. W. (1997). Doctrine for joint operations in a combined environment: A necessity. Military Review, 77(1), 103.

Steele, B. (2005). Military Reengineering Between the World Wars. RAND NATIONAL DEFENSE RESEARCH INST SANTA MONICA CA.

Studyspark

Study Document Study Document

Enhancing Communication Migration From 4G To 5G

Pages: 6 (1692 words) Document Type:Essay Document #:96575438

… this paper aims to determine how Communication will be enhanced.
2. To identify some of the challenges of 5G
Experience has shown that technology, however, how advanced, has some peculiar limitations that make it vulnerable. As a result, this dissertation will seek to identify challenges that are … of wireless systems. Evert wireless has specific roles and features. To determine the best wireless system can only be done for a specific technology at a specific time and place and given the QoS requirements for the consumer (). In the process of migrating to 5G, this ……

References

References

Alkhazaali, N.H., 2017. Mobile Communication through 5G Technology (Challenges and Requirements). International Journal of Communications, Network and System Sciences, 10(05), p.202.

Gandotra, P., and Jha, R.K., 2016. Device-to-device communication in cellular networks: A survey. Journal of Network and Computer Applications, 71, pp.99-117.

Penttinen, Jyrki T. J., et al. 2019. "Deployment," in 5G Explained: Security and Deployment of Advanced Mobile Communications, Wiley, pp.271-291

Shen, Xuemin. "Device-to-device communication in 5G cellular networks." IEEE Network 29, no. 2 (2015): 2-3.

Tehrani, M.N., Uysal, M., and Yanikomeroglu, H., 2014. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), pp.86-92.

Zhang, A., and Lin, X., 2017. Security-aware and privacy-preserving D2D communications in 5G. IEEE Network, 31(4), pp.70-77.

Studyspark

Study Document Study Document

Project Management Plan To Upgrade Hospital Equipment

Pages: 13 (3960 words) Sources: 5 Document Type:response paper Document #:39596809

… OF PROJECT CHARTER

Hospitals in the U.S. lose a total of $8.3 billion a year because of older and outdated communication methods and technology, according to a recent study published by the Ponemon Institute and Imperva (Healthcare Business, 2013). The primary cause for those losses was decreased … care and speed up care delivery. Among the clinicians surveyed, each wastes an average of 45 minutes per day because of outdated communication technology. These were the biggest time wasters identified in the poll. This problem goes beyond only communication equipment and affects all kinds of outdated … identified in the poll. This problem goes beyond only communication equipment and affects all kinds of outdated equipment used in the hospital. Outdated technology supposedly causes as much as 35% waste in healthcare. This waste occurs in areas such as increased downtime, maintenance costs, reduced productivity, etc. ……

References

References

Healthcare Business. (2013, May 15). Report: Hospitals waste billions using outdated technology. Retrieved from Health Care Business Tech:  http://www.healthcarebusinesstech.com/outdated-technology-wastes-money/ 

Lee, J. (2016, April 14). Top five risks of using outdated technology. Retrieved from Meridian:  http://www.whymeridian.com/blog/top-5-risks-of-using-outdated-technology 

Moran, W. J. (2019). Hospital Fundraising Best Practices. Retrieved from The Moran Company:  https://morancompany.com/hospital-fundraising-best-practices/ 

Parand, A., Dopson, S., A. R., & Vincent, C. (2014). The role of hospital managers in quality and patient safety: a systematic review. BMJ Open.

Pohjola, T., Suhonen, M., Mattila, K., & Meretoja, R. (2016). The work done in healthcare projects . Journal of Nursing.

Ponemon Institute. (2013). The Economic and Productivity Impact of IT Security on Healthcare. Imprivata.

Studyspark

Study Document Study Document

COVID 19 In South Africa Nigeria And Swaziland

Pages: 7 (2030 words) Sources: 6 Document Type:literature review Document #:53851517

...Technology Literature Review on Coping Through The Use Of Informal Institutions during COVID 19 in South Africa, Nigeria, and Swaziland
The institutional theory deals with the outlines, regulations, standards, and procedures that are formulated in the institutions as commanding instructions for social behavior. This theory gives an understanding of how institutions are shaped, and the societal norms and frameworks are informed to all people of an organization. Communication is the sole indicator of how organizations are formulated with the help of formal rules and regulations, as that would reflect how they are conversed across all levels of the firm and in what way people are obeying them. This would ultimately build an organizational culture for coping with social and political issues. The informal institutions are socially shared instructions, typically unwritten, that are formed, transferred and imposed outside the official boundaries (Torniainen & Sasstamoinen, 2007), for example, giving tips to the food……

References

References

Coelho, A. (2019). The role of informal institutions in the enforcement of rules and how to improve corporate and public governance in Brazil: Studies based on a set of corporate governance cases involving state-owned companies (Working Paper). Retrieved from SSRN website  https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3434037 

Dacin, M.T., Goodstein, J. & Scott, W.R. (2002). Institutional theory and institutional change: Introduction to the special research forum. Academy of Management Journal, 45(1), 45- 47. DOI: 10.2307/3069284

Escandon-Barbosa, D.M., Urbano, D., Hurtado-Ayala, A., Paramo, J.S. & Dominguez, A.Z. (2019). Formal institutions, informal institutions, and entrepreneurial activity: A comparative relationship between rural and urban areas in Colombia. Journal of Urban Management, 8(3), 458-471.  https://doi.org/10.1016/j.jum.2019.06.002 

Estrin, S. & Prevezer, M. (2010). The role of informal institutions in corporate governance: Brazil, Russia, India, and China compared. Asia Pacific Journal of Management, 28, 41- 67.  https://doi.org/10.1007/s10490-010-9229-1 

Kaufmann, W., Hooghiemstra, R. & Feeney, M.K. (2018). Formal institutions, informal institutions, and red tape: A comparative study. Public Administration, 96(2), 386-403. https://doi.org/10.1111/padm.12397

Meluch, A.L. (2016, August). Understanding the organizational and institutional origins of social support in a cancer support center. (Unpublished doctoral dissertation). Retrieved from https://etd.ohiolink.edu/!etd.send_file?accession=kent1466944822&disposition=inline

Torniainen, T.J. & Sasstamoinen, O.J. (2007). Formal and informal institutions and their hierarchy in the regulation of the forest lease in Russia. Forestry: An International Journal of Forest Research, 80(5), 489-501.  https://doi.org/10.1093/forestry/cpm033 

Studyspark

Study Document Study Document

Swapping The Studio Based Pedagogy For Online Learning

Pages: 6 (1926 words) Sources: 5 Document Type:Research Paper Document #:33333539

… shared, discussed, obtained, and processed. Students who have grown up in the digital age are digital natives and are more comfortable using digital technology than being without it. For design educators who are used to the studio-based pedagogy that has been in use for a century, shifting ……

References

References

Fleischmann, K. (2013). Big Bang Technology: What's Next in Design Education, Radical Innovation or Incremental Change?. Journal of Learning Design, 6(3), 1-17.

Justice, L. (2019). The Future of Design Education. Design Management Review, 30(1), 33-37.

Mayadas, A. F., Bourne, J., & Bacsich, P. (2009). Online education today.  Science, 323(5910), 85-89.

Souleles, N. (2015). Elearning in art and design: the elephant in the room. In 9th International Technology, Education and Development Conference (pp. 6659-6665).

Vaughan, S., Austerlitz, N., Blythman, M., Grove-White, A., Jones, B. A., Jones, C. A.,... & Shreeve, A. (2008). Mind the gap: Expectations, ambiguity and pedagogy within art and design higher education. In The student experience in art and design higher education: Drivers for change (pp. 125-148). Jill Rogers Associates Limited.

Studyspark

Study Document Study Document

Domestic Terrorism And Extremist Groups

Pages: 13 (3981 words) Sources: 12 Document Type:Research Paper Document #:80039324

… the wider Internet with its various platforms where extremists can meet and gather online is even more difficult to monitor and control. Digital technology has allowed for unprecedented growth in communications, and the more connected people become, the easier it is for extremist groupthink to proliferate. For ……

References

References

Barnett, B. A. (2015). 20 Years Later: A Look Back at the Unabomber Manifesto.  Perspectives on Terrorism, 9(6), 60-71.

Beinart, P. (2017). The rise of the violent left. Retrieved from  https://www.theatlantic.com/magazine/archive/2017/09/the-rise-of-the-violent-left/534192/ 

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Costello, M., & Hawdon, J. (2018). Who are the online extremists among us? Sociodemographic characteristics, social networking, and online experiences of those who produce online hate materials. Violence and gender, 5(1), 55-60.

DeCook, J. R. (2018). Memes and symbolic violence:# proudboys and the use of memes for propaganda and the construction of collective identity. Learning, Media and Technology, 43(4), 485-504.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Hamm, M &Spaaj, R. (2015). Lone wolf terrorism in America: Using knowledge of radicalization pathways to forge prevention strategies. U.S. Department of Justice. Retrieved from  https://www.ncjrs.gov/pdffiles1/nij/grants/248691.pdf 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Studyspark

Study Document Study Document

The Cleveland Clinic Health

Pages: 7 (2139 words) Document Type:Case Study Document #:69047640

… in recent years been an innovator in a number of areas, and an early adopter in others such as the use of information technology. These approaches have set the Clinic up for success. Since 1999, operating revenue has increased consistently, each year, including the recession years of … a number of strategic and tactic options on the table, including those with respect to international expansion, operating structure and use of information technology. The choice of different options will reflect the broader strategic thrust of the organization, so the first step in determining the optimal strategy … physicians who are often more specialized by their nature.
A second element of the differentiated strategy is the focus on IT innovation. Information technology is becoming increasingly important in health care, not just for the things in the case like electronic health records and use of diagnostic … use of diagnostic tools, but……

Studyspark

Study Document Study Document

Shortages Of Health Care Providers

Pages: 7 (2037 words) Sources: 8 Document Type:Essay Document #:32789324

… with health care providers to go over options, and so on.
Health care shortages are an issue, but the possibilities afforded by communications technology in the 21st century show promise. Informatics may be luring potential nurses away from actual nursing, but the plus side is that informatics ……

References

References

Clemmer, T. P. (1995). The role of medical informatics in telemedicine. Journal of Medical Systems, 19(1), 47-58.

Demiris, G. (2003). Integration of telemedicine in graduate medical informatics education. Journal of the American Medical Informatics Association, 10(4), 310-314.

Foster, M., & Sethares, K. (2017). Current strategies to implement informatics into the nursing curriculum: an integrative review. J Nurs Inform, 21(3).

Haddad, L. M., & Toney-Butler, T. J. (2019). Nursing shortage. In StatPearls [Internet]. StatPearls Publishing.

Hasbrouck, L. (2016). Strengthening local health department informatics capacity through advocacy, education, and workforce development. Journal of Public Health Management and Practice, 22(Suppl 6), S3.

IOM. (2010). The future of nursing. Retrieved from  http://nacns.org/wp-content/uploads/2016/11/5-IOM-Report.pdf 

O’Brien, J. (2003). How nurse practitioners obtained provider status: Lessons for pharmacists. American Journal of Health-System Pharmacy, 60(22), 2301-2307.

Snavely, T. M. (2016). A brief economic analysis of the looming nursing shortage in the United States. Nursing Economics, 34(2), 98-101.

Studyspark

Study Document Study Document

Weapons Of Mass Destruction WMD Antifa

Pages: 13 (3787 words) Sources: 12 Document Type:Research Paper Document #:67320498

… systems, the complexity of the security services of a country grows and intensifies. Is it possible therefore that there is an overreliance upon technology and that this overreliance can actually compromise a country’s progress and increase its risk of falling into ruin should a sudden attack like … essence: the security of the people of the nation is at stake.
A question to consider is this: with the reliance up cyber technology for maintaining energy infrastructure, what is the likelihood that cyber warfare could be used to attack America’s energy infrastructure in the event that ……

References

References

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Christenson, G. (2015). CBRN response. National Guard Bureau.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from  https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat 

Jennings, P. (2006). Miami port poses serious risks. Retrieved from  https://abcnews.go.com/WNT/story?id=131634&page=1 

Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from  http://www.johnstonsarchive.net/terrorism/chembioattacks.html 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Maras, M-H. (2014). Transnational Security. Florida: CRC Press.

Studyspark

Study Document Study Document

Integration Of Social Networking In Design Education In China

Pages: 3 (809 words) Sources: 1 Document Type:Article Review Document #:38182762

… between teachers and students in a Chinese high school. The investigations into the utility of social networks were conducted among various design and technology classrooms in high schools throughout China. Based on the findings, Jiang et al. (2018) were able to produce a theoretical framework for web-based … p. 189). The overall finding was that social networking sites help to enhance the collaborative and interactive aspects of learning for design and technology students and teachers.
The study begins with a discussion of the prevalence of social media usage in China with nearly 500 million people … and potentially collaborate and interact with one another.
The researchers also show that there is demand in modern Chinese classrooms for design and technology instruction. With 1000 design schools but only 10 of them being of high quality, there is a problem of deficiency in Chinese design ……

References

References

Jiang, H., Tang, M., Peng, X., & Liu, X. (2018). Learning design and technology through social networks for high school students in China. International Journal of Technology and Design Education, 28(1), 189-206.

Join thousands of other students and

"spark your studies".