Telecommunications Essays (Examples)

Studyspark

Study Document Study Document

Customer Service In The Telecoms Industry

Pages: 8 (2268 words) Sources: 10 Document Type:Research Paper Document #:62761595

… to assess the relationship between multiple variables related to consumers’ experience of telecoms in China. The researchers conducted a survey of 118 Chinese telecommunications customers and found that service quality has a direct impact on value perception. Value and customer satisfaction, moreover, were found to determine the … do make a substantial difference in determining whether customers will be retained or not.
Kim, Park and Jeong (2004) examined how a Korean telecommunications company focused on retaining customers in their article entitled “The effects of customer satisfaction and switching barrier on customer loyalty in Korean mobile … can help to improve customer loyalty.
Khatibi, Ismail and Thyagarajan (2002) in their article entitled “What drives customer loyalty: An analysis from the telecommunications industry” look at the main telecoms provider in Malaysia, Digital line II Service offered by Telekom Malaysia Berhad (TMB). They use the SERVQUAL ……

References

References

Angelova, B., & Zekiri, J. (2011). Measuring customer satisfaction with service quality using American Customer Satisfaction Model (ACSI Model). International journal of academic research in business and social sciences, 1(3), 232. Retrieved from http://hrmars.com/admin/pics/381.pdf

Boohene, R., & Agyapong, G. K. (2011). Analysis of the antecedents of customer loyalty of telecommunication industry in Ghana: The case of Vodafone (Ghana). International Business Research, 4(1), 229-240. Retrieved from  http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.662.3208&rep=rep1&type=pdf 

Chu, P. Y., Lee, G. Y., & Chao, Y. (2012). Service quality, customer satisfaction, customer trust, and loyalty in an e-banking context. Social Behavior and Personality: an international journal, 40(8), 1271-1283.

Lai, F., Griffin, M., & Babin, B. J. (2009). How quality, value, image, and satisfaction create loyalty at a Chinese telecom. Journal of business research, 62(10), 980-986. Retrieved from shorturl.at/BMTY7

Lee, H. S. (2013). Major moderators influencing the relationships of service quality, customer satisfaction and customer loyalty. Asian Social Science, 9(2), 1. Retrieved from  http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.428.6730&rep=rep1&type=pdf 

Liu, C. T., Guo, Y. M., & Lee, C. H. (2011). The effects of relationship quality and switching barriers on customer loyalty. International Journal of Information Management, 31(1), 71-79.

Khatibi, A. A., Ismail, H., & Thyagarajan, V. (2002). What drives customer loyalty: An analysis from the telecommunications industry. Journal of Targeting, Measurement and Analysis for Marketing, 11(1), 34-44. Retrieved from  https://link.springer.com/content/pdf/10.1057/palgrave.jt.5740065.pdf 

Kim, M. K., Park, M. C., & Jeong, D. H. (2004). The effects of customer satisfaction and switching barrier on customer loyalty in Korean mobile telecommunication services. Telecommunications policy, 28(2), 145-159. Retrieved from shorturl.at/imDEX

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

...Telecommunications What is Cybercrime?
Definition of Cybercrime
Cybercrime is any criminal activity that is conducted using computers or the Internet. As today’s digital natives have the most experience with computers, cybercriminals tend to be of the Millennial generation—i.e., born after 1980. They are young, digitally sophisticated, and able to operate with a degree of professionalism and discipline that allows them to hide their crimes beneath legitimate-looking facades. Spearphishing is one example of a type of cybercrime used by professional criminals to lure victims into traps or sites that have the appearance of legitimacy.
Cybercrime is committed by people who know computer code, understand computer systems and networks, know how to navigate databases, access data storage, get past firewalls, exploit cloud computing services, control the Internet of Things and more. They
How Cybercrime Has Evolved over Time
Computers and the rise of the Internet ushered in the era of cybercrime. IBM’s first……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

...Telecommunications Executive Summary
The purpose of this study is to develop timely and informed answers to a series of guiding research questions and subquestions to identify the risks and barriers that are associated with Internet of Things implementations. These types of studies are important today because the Internet of Things is changing the manner in which companies of all sizes and types operate their businesses, and current trends indicate that these implementations are increasing exponentially. The Internet of Things allows conventional computer-based networks to incorporate data collected from everyday objects to provide real-time analyses and new applications for these technologies are being developed every day. Indeed, there are already more mobile devices in use around the world than there are people, and most authorities agree that the Internet of Things deployments will continue to increase well into the foreseeable future. Chapter one of the study provides the rationale in support of……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Online Auctions For Fund Raising By Non Profit Organizations

Pages: 8 (2322 words) Sources: 4 Document Type:Essay Document #:34213505

...Telecommunications A Systematic Review of Online Auctions for Fund Raising by Non-Profit Organizations
Background
Its origin dating back to Babylon in 500 BC auctions account as one of the oldest forms of price determination mechanism in the markets. Auction is negotiation protocols that entail simultaneous bidding with the price determined bidders and products or services allocated based on competition amongst potential buyers (McAfee, 2017).
Classifications of Auctions
There are four major classifications of auctions formats in the market based on the information asymmetry and the flow of prices. The auction types include English Auction, Dutch Auctions, sealed-bid first-price auctions, and Vickrey auctions (Klemperer, 2004).
English and Dutch auctions are both open auctions implying that they are orally implemented but entail distinguishing value setting features. According to Klemperer (2004), an English Auction also known as the oral ascending auction or first-price auction entails an ascending sequential price strategy where the auctioneer sets a……

References

References

Cachon, G. P., Daniels, K., & Lobel, R. (2015). The Role of Surge Pricing on a Service Platform with Self-Scheduling Capacity.  https://ssrn.com/abstract=2698192 

Connelly, A., & Winter, M. (2003). Going...Going...Gone!: Successful Auctions for Non-Profit Institutions (Second). Target Funding Group, Inc. All.

Fasli, M., Co, C., & Co, C. (2014). Designing and Implementing E-market Games. Designing and Implementing e-Market Games. January 2005.

Forbes Magazine. (2019). The 100 Largest U.S. Charities. Forbes Magazine.  https://doi.org/10.1007/springerreference_75918 

Hasker, K., & Sickles, R. (2010). eBay in the Economic Literature: Analysis of an Auction Marketplace. Review of Industrial Organization, 37(1), 3–42.  https://doi.org/10.1007/s11151-010-9257-5 

Kingston, K. (2015). A Higher Bid: How to Transform Special Event with Strategic Benefit Auctions. John Wiley & Sons, Inc., Hoboken, New Jersey.

Klemperer, P. (2004). Auctions: Theory and Practice. In Princeton University Press.  https://doi.org/10.4337/9781839107429.00004 

McAfee, P. (2017). The Ideal Auction - Numberphile. YouTube.  https://www.youtube.com/watch?v=4kWuxfVbIaU

Studyspark

Study Document Study Document

Homeland Defense And Private Security After September 11 Attacks

Pages: 6 (1861 words) Sources: 5 Document Type:Essay Document #:15174853

...Telecommunications Introduction
The most significant terrorist attack on American soil was the September 11 attacks by Al Qaeda terrorists. The attacks changed the perception that America cannot suffer such attacks, considering how far away it is from where terrorist organizations such as Al Qaeda are based. The attacks also initiated America’s war against terrorism, which continues to date. Before the September 11 attacks, Americans had never experienced a large scale terrorist incident within their country’s borders. Moreover, most local and state security agencies had no experience with such attacks and were, therefore, very ill-prepared to respond to them. The only historic attacks or incidents that compare to the September 11 attacks were the airplane hijackings of the seventies and the eighties. The fact that Americans were not prepared and for the attacks and never expected such attacks to happen on their soil resulted in many people being very surprised and mentally……

References

References

Chanley, V. (2002). Trust in Government in the Aftermath of 9/11: Determinants and Consequences. Political Psychology, 23(3), 469-483. Retrieved May 11, 2020, from https://www.jstor.org/stable/3792588

Dugulin, R., & Niglia, A. (2015, May 17). The private sector in the protection of critical infrastructure - GRI. Global Risk Insights. https://globalriskinsights.com/2015/05/the-private-sectors-vital-role-in-the-protection-of-critical-infrastructure/

Gramlich, J. (2018, September 11). Since 9/11, Americans have seen anti-terrorism policy as a top priority. Pew Research Center.  https://www.pewresearch.org/fact-tank/2018/09/11/defending-against-terrorism-has-remained-a-top-policy-priority-for-americans-since-9-11/ 

Morgan, D. (2019). Homeland Security Research and Development: Homeland Security Issues in the 116th Congress. Current Politics and Economics of the United States, Canada, and Mexico, 21(1), 43-46.

Moteff, J., Copeland, C., & Fischer, J. (2003, January). Critical infrastructures: What makes an infrastructure critical?. Library of Congress Washington DC Congressional Research Service.

Studyspark

Study Document Study Document

Shortages Of Health Care Providers

Pages: 7 (2037 words) Sources: 8 Document Type:Essay Document #:32789324

...Telecommunications Informatics Telehealth and the Health Care Shortage
Snavely (2016) shows that the looming nursing shortage is due to hit America hard in the coming years, and that shortage is now evident more than ever with the arrival of the novel coronavirus in America—especially in hard hit areas like New York City, where the hospitals are being overrun by patients infected by the virus. Shortages of health care providers is a major concern in the US, especially since the US is meant to be a world leader among other nations—and yet an element of its critical infrastructure, health care, is sorely lacking in support in the form of providers. Now that the country has gone into lockdown mode, it is only making matters worse from an economic point of view: going to school for medicine is expensive and individuals and families may reassess their commitment to the field if they see……

References

References

Clemmer, T. P. (1995). The role of medical informatics in telemedicine. Journal of Medical Systems, 19(1), 47-58.

Demiris, G. (2003). Integration of telemedicine in graduate medical informatics education. Journal of the American Medical Informatics Association, 10(4), 310-314.

Foster, M., & Sethares, K. (2017). Current strategies to implement informatics into the nursing curriculum: an integrative review. J Nurs Inform, 21(3).

Haddad, L. M., & Toney-Butler, T. J. (2019). Nursing shortage. In StatPearls [Internet]. StatPearls Publishing.

Hasbrouck, L. (2016). Strengthening local health department informatics capacity through advocacy, education, and workforce development. Journal of Public Health Management and Practice, 22(Suppl 6), S3.

IOM. (2010). The future of nursing. Retrieved from  http://nacns.org/wp-content/uploads/2016/11/5-IOM-Report.pdf 

O’Brien, J. (2003). How nurse practitioners obtained provider status: Lessons for pharmacists. American Journal of Health-System Pharmacy, 60(22), 2301-2307.

Snavely, T. M. (2016). A brief economic analysis of the looming nursing shortage in the United States. Nursing Economics, 34(2), 98-101.

Studyspark

Study Document Study Document

Telemedicine And Its Impact On Patient Care

Pages: 11 (3241 words) Sources: 10 Document Type:Essay Document #:26347879

...Telecommunications Telemedicine: How does it impact patient care?
Introduction
The modern health care system is better and considerably more complex than what the situation previously was a decade and several decades ago. According to various researchers, the modern health care system is a managed one, and it widely uses technology in contrast to previous health care systems (Conklin, 2002). The many uses of technology in the modern health care system include the use of technology for diagnosis, for minimally invasive treatments, and better monitoring of vital signs and other signs. Moreover, technology is now also being used to consult with medical experts from all over the world remotely. This has led to improved healthcare and has enhanced patent experience.
Furthermore, many mobile applications have been invented to help both patients and doctors specifically. Moreover, they are not only helping patients recover but also improving their quality of life (Tiago et al.,……

References

References

Meyers, A. J., Pontarelli, E., Dutta, S. K., Grinberg, G., & Yenumula, P. R. (2018). Telemedicine Follow-up After Bariatric Surgery. Surgery for Obesity and Related Diseases, 14(11), S168.

Tiago, M. T. B., Tiago, F., Amaral, F. E. B., & Silva, S. (2016). Healthy 3.0: Healthcare digital dimensions. In Reshaping medical practice and care with health information systems (pp. 287-322). IGI Global.

Conklin, T. P. (2002). Health care in the United States: An evolving system. Michigan Family Review, 7(1).

Board on Health Care Services; Institute of Medicine. (2012). \\\\\\\\\\\\"3The Evolution of Telehealth: Where Have We Been and Where Are We Going?\\\\\\\\\\\\" in The Role of Telehealth in an Evolving Health Care Environment: Workshop Summary. National Academies Press, Washington (DC).

Sada, A., Asaad, M., Reidt, W. S., Kellogg, T. A., Kendrick, M. L., McKenzie, T. J., & Habermann, E. B. (2019). Are In-Person Post-operative Clinic Visits Necessary to Detect Complications Among Bariatric Surgery Patients?. Obesity Surgery, 1-4.

Krupka, D. C., Sandberg, W. S., & Weeks, W. B. (2012). The impact on hospitals of reducing surgical complications suggests many will need shared savings programs with payers. Health Affairs, 31(11), 2571-2578.

Fasano, P. (2013). Transforming health care: The financial impact of technology, electronic tools, and data mining. John Wiley & Sons.

Burch, S., Gray, D., & Sharp, J. (2017). The power and potential of telehealth what health systems should know: proposed legislation in Congress offers the promise that the nation\\\\\\\\\\\\'s healthcare policy will support the expansion of telehealth, allowing hospitals and health systems to fully realize the benefits of this important emerging approach to care. Healthcare Financial Management, 71(2), 46-50.

Studyspark

Study Document Study Document

Trends In Civil And Criminal Liability In The Private Security Industry

Pages: 2 (698 words) Sources: 4 Document Type:Essay Document #:47555416

...Telecommunications The private security industry will become generalists in the next century. The industry must be well versed in a number of disciplines. It must base its operations and decisions on demographic and economic trends, and rapid technological changes. Traditionally, the private security industry focused mainly on security and safety of its subjects. Although they continue to be a major focus of the industry, prevailing trends indicate that the industry requires extensive knowledge in other emerging critical areas to become successful. The additional areas include, but are not limited to law, computers and management (Dempsey, 2008).
Current and future private security companies require extensive knowledge of the law. Legislations governing the industry have either been passed by various states or in the processed of being passed. Furthermore, several federal laws indirectly or directly affect management of the private security industry. For instance, legislation on denying employers polygraph use in pre-employment screening……

References

Works Cited

Dempsey, John S. Introduction to Private Security. Belmont, CA: Thomson Wadsworth, 2008. Print.

Encyclopedia of Security Management: Techniques & Technology. Place of publication not identified: Elsevier Science, Inc, 1993. Print.

Nemeth, C.P. (2018), Private Security: An Introduction to Principles and Practices, CRC Press

Nemeth, Charles. Private Security and the Law. , 2011. Internet resource.

Studyspark

Study Document Study Document

Culture Analysis At A Software Company

Pages: 5 (1573 words) Sources: 5 Document Type:Research Paper Document #:44019185

...Telecommunications Culture Analysis Paper
Company Overview
I’m studying a software company that shall be known as K. K is not based in Silicon Valley, but elsewhere in the US, with offices around the world. K sells SaaS products in the B2B market and has sales in the hundreds of millions, and over 1000 employees. This company has also acquired several small firms in recent years. Integrating all of those individual cultures into a cohesive one has been one of the organization’s biggest challenges. This paper will outline the culture at K via primary sources, supplemented with secondary source material on organizational culture theory.
Primary research consisting of several employee interviews revealed some challenges, especially the domains of underlying assumptions and values. There is a lack of artifacts that provide meaning, which is another problem that will need to be resolved.
Primary Research
As I know people who work in this company……

References

References

Chambers, K. & Honeycutt, A. (2009) Telecommunications mega-mergers: Impact on employee morale and turnover intention. Journal of Business & Economics Research. Vol. 7 (2) 43-52.

Dencker, J., Joshi, A, & Martocchio, J. (2007) Employee benefits as context for intergenerational conflict Human Resource Management Review. Vol. 17 (2) 208-220.

Lund, D. (2003) Organizational culture and job satisfaction. Journal of Business and Industrial Marketing. Vol. 18 (3) 219-236.

North, M. & Fiske, S. (2015) Intergenerational resource tensions in the workplace and beyond: Individual, interpersonal, institutional and international. Research in Organizational Behavior. Vol. 35 (2015) 159-179.

Yamanoi, J. & Sayama, H. (2013). Post-merger cultural integration from a social network perspective: A computational modeling approach. Computational and Mathematical Organization Theory Vol. 19 (2013) 516-537.

Studyspark

Study Document Study Document

Poland S Position In Europe

Pages: 3 (958 words) Sources: 3 Document Type:Essay Document #:77800582

...Telecommunications Poland is geographically situated in central Europe and is bordered by the Russian Federation and Baltic Sea in the north, Lithuania, Belarus and Ukraine in the east, Slovakia to the south, and Czech Republic and Germany in the west. Poland has 70 mountains that reach more than 6,500 feet high, all of which are located in the Tatras, the mountain range that serves as a natural border between Poland and Slovakia in the southern portion of the nation. There is also another mountain range—the Beskids, which forms part of the natural border between Poland and the Czech Republic and stretches all the way to the Ukraine in the east. There is also the Sudetes, which stretches from the north down to the Glubczyce Plateau. The Bieszczady Mountains in the southeast and the Gorce Mountains are small formations. The Vistula Dalta is the lowest point in Poland, 6 feet below sea……

References

References

Bradberry, B. (2012). The Myth of German Villainy. IN: AuthorHouse.

Nations. (2018). Poland. Retrieved from  https://www.nationsencyclopedia.com/economies/Europe/Poland-INFRASTRUCTURE-POWER-AND-COMMUNICATIONS.html 

Pew Research Center. (2017). Retrieved from  https://www.pewresearch.org/global/database/ 

Rempfer, K. (2018). Why Poland wants a permanent US military base, and is willing to pay $2 billion for it. Retrieved from  https://www.armytimes.com/news/2018/05/29/why-poland-wants-a-permanent-us-military-base-and-is-willing-to-pay-2-billion-for-it/ 

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".