Use our essay title generator to get ideas and recommendations instantly
messaging has become a common method of communication in the modern society because of the proliferation of mobile phones and Internet-based instant messaging platforms. Text messaging has permeated nearly every facet of the society including the healthcare sector where medical personnel utilize it to relay patient information. The increased use of text messaging in the healthcare sector is attributable to the fact that medical personnel are increasingly looking for measures for improved collaboration towards better patient outcomes. Even though text messaging enhances collaboration, the problem is it's unsecured and characterized by security risks and concerns.
Using risk analysis and gap analysis approach, a SWOT analysis is carried out to examine the significance of text messaging in clinical communication with regards to its impact on medical personnel and patients. The strengths of text messaging in clinical communication include improved collaboration between medical personnel, seamless and smooth communication between medical personnel, and…
Doucette, J.N. (2014, October). Is Staff Text Messaging Bad News? Nursing Management, 45(10), 56.
Love, R. (2016, November 1). Text Messaging and Secure Communication in Healthcare. Retrieved February 27, 2017, from https://www.devero.com/text-messaging-home-healthcare/
Mortier, N.C., Mellette, P.C. & Williamsburg, V.A. (2015). Time to Get the Message: The Risks of Text Messaging of Patient Information. ABA Health eSource, 12(3). Retrieved from http://www.americanbar.org/publications/aba_health_esource/2015-2016/november/messaging.html
Tiger Text. (2016). Secure Text Messaging for Healthcare. Retrieved February 27, 2017, from https://www.tigertext.com/secure-text-messaging-for-healthcare/
There are, however, admitted limits to the study. Firstly, the sampling size was relatively small and from a homogeneous population. There may also be correlational factors that affect the result which do not reflect the causation of higher rates of student literacy who text. Students who are highly plugged in to Internet technology, for example, may be more affluent and thus more apt to have advanced technology which enhances texting -- and also to more educational resources which enable the students to effectively distinguish between appropriate and inappropriate contexts for texting. Improved but more expensive smartphones that have grown more common in the past years may be a particularly important component of the degree to which affluence affects enhanced used of texting. The fact that students who cannot distinguish between appropriate contexts to use textese have poorer literacy skills does not seem surprising.
One way to examine the degree to…
Drouin, M.A. (2011). College students' text messaging, use of textese and literacy skills.
Journal of Computer Assisted Learning, 27, 67 -- 75.
That is because texting also involves the same brain regions and cognitive processes as communicating by telephone that are responsible for the dangers associated with cell phones and driving and combines that risk factor with another additional independent risk factor: visual distraction.
Unlike cell phones, which distract the driver visually for only a small percentage of the time when they are being used for verbal communication, texting while driving is a continuous visual distraction by its very nature that makes it much more dangerous by comparison. Whereas cell phone users only look at their devices to dial and identify in-coming calls drivers who text must continually shift their attention back and forth from watching the road to looking at their communications devices. Especially at typical highway speeds, the amount of time typically required to look at a mobile device for texting purposes is too much time to look away from…
AHAS. (2005). Fact Sheet: Speeding Accessed 26 Nov 2010 from:
Chisholm, S.L., Caird, J.K., and Lockhart, J. "The effects of practice with MP3 players on driving performance." Accident Analysis & Prevention, Vol. 40, No. 2;
messaging during simulated driving," Drews et al. (2009) study the effect that text messaging has on driver attention spans and response times. The authors studied drivers in a driving simulation to examine how the drivers responded to texting while driving. Their findings indicate that texting while driving results in poor driver performance with respect to attention span and response time. The authors note the their scores, which are some of the first in the field, indicate that texting while driving is more dangerous than other forms of driver distraction.
The authors first provide an extensive literature review discussing the issue of distracted driving. They present evidence of how different forms of distracted driving have been show to affect driver competence. The authors also discuss the issue of texting and driving specifically, noting that there has not been much research to this point on the subject, but that they believe texting…
Drews, F., Yazdani, H, Godfrey, C., Cooper, J. & Strayer, D. (2009). Text messaging during simulated driving. Human Factors: The Journal of the Human Factors and Ergonomics Society. Vol. 51 (2009) 762.
By not waiting for an answer, though, "S" also deflects attention from the Prague issue. Second, by changing the subject to "oh we're all going to see Judge Jewels aren't we on the Thursday second November obviously" "S" brings up something else before committing to going, perhaps implying she wishes to still remain non-committal about Prague, but also reconfirm their friendship by reminding "A" about Judge Jewels, a social engagement (even if "S" doesn't go to Prague) that would "obviously" include "A."
But then "A" asks (about Judge Jewels) "when's that'd" replies "Thursday second of November," but then "A" repeats the question: "when'e that." "S" says, again: "Thursday." "A" then asks "S": "when's that (.) you know what I mean."
The implication of "when's that (.) you know what I mean" is apparently clear to both speakers (but not to someone reading a transcription of the conversation).
Then "S" reminds…
Bee, S.B., 2001, Critical discourse analysis of the Mission Statement of Education in Singapore. Paper Presented at the AARE 2001 Conference, n.p.]. 2-6 December 2001.
Fairclough, N., 1995, Critical discourse analysis: The critical study of language,
Foucault, M, 1970a, Discipline and punish: The birth of the prison, Allen Lane,
Ethics of Client Messaging
As is made clear in the document Online Patient-Clinician Messaging: Fundamentals of Ethical Practice, a publication of the National Ethics Committee of the Veterans Health Administration (2004), there are man broad and varied ethical considerations when it comes to using online communications to facilitate healthcare inquiries and provision. These concerns range from security and privacy issues, and the manner in which online communication could potentially lead to greater threats in these areas, to the quality of care and the relationship of the clinician and the patient that develops via such communications (VHA, 2004). Also of importance are the elements of technical expertise on the part of both clinicians and patients, which could affect utilization of these technologies, and the need to keep such programs voluntary and on par with non-electronic healthcare provision (VHA, 2004).
There are many steps that hospitals and other healthcare institutions can take…
CrazyTalk. (2012). Accessed 19 July 2012. http://www.reallusion.com/crazytalk/
Fox News. (2008). Over 120 UCLA Hospital Staff Saw Celebrity Health Records.
SlideShare. (2012). Accessed 19 July 2012. http://www.slideshare.net/
VHA. (2004). Online Patient-Clinician Messaging: Fundamentals of Ethical Practice.
Organizational Policy on the Acceptable Use of Email and Text Messaging
Good Morning Staff,
In the past few years, this company has experienced tremendous growth and productivity because of your significant contributions towards the realization of the firm's objectives. The management team wishes to express our appreciation of your input towards the achievement of organizational objectives and increased productivity. Secondly, the message comes as a friendly reminder of the major components of the firm's policy regarding the acceptable use of email and text messaging in relation to the accomplishment of organizational goals. However, the policy does not seek to restrict or gag employees' email and texting but to promote proper use of these messaging systems through effective guidelines. The management team encourages all employees to be aware of acceptable and unacceptable practices regarding email and text messaging because the policy applies to all staff. The purpose of the guidelines provided…
Employee Privacy Torts
History of Employee Privacy
Changing Trends of Employee Privacy
Impact of Innovative Technology on Employee Privacy
ole of Social Media towards Employee Privacy
Impact of Changing Community/Society on Employee Privacy
Adaptation to the new Environment pertaining to Employee Privacy
Employee Monitoring and Surveillance
Laws and Employer Policies for Text Messaging and Social Media
Electronic Communication Privacy Act
Monitoring of Employee Conversations over Telephone & Email
ecommendations for creating Effective Policies
Future Implications of Employee Privacy
As years have passed and the human race has penetrated into the epoch of twenty first century, the technological advancements have conquered almost every facet of human life, especially the workplace. The widespread platform of the internet has become the integral part of a person's life, in the same manner as businesses are employing technological advancements to perform numerous activities like internet infrastructure, maintenance of computers and so on. It means that…
Baker, D., Buoni, N., Fee, M. & Vitale, C. (2011). Social Networking and Its Effects on Companies and Their Employees. Retrieved from: http://www.neumann.edu/academics/divisions/business/journal/Review2011/SocialNetworking.pdf
Bergh, N.V.D. (2000). Emerging Trends for Eaps in the 21st Century. Haworth Press, Incorporated.
Campbell, D. (2007). The Internet 2007: Laws and Regulatory Regimes. USA: Lulu.com.
Cate, F.H. (1997). Privacy in the Information Age. USA: Brookings Institution Press.
However, those participants that chose to ignore sleep disturbances, engaged in sleep-promoting activities, or attempted unsuccessfully to overcome sleeping problems had poor sleep quality. The study also found that regardless of the coping strategy used daytime sleepiness still persisted. Yang et al. set out to establish the coping mechanisms used by young adults as it pertained to sleeping disturbances.. The research confirms that sleep disturbances lead to daytime sleepiness. This information is useful for colleges and for students because it presents the opportunity to educate students concerning how they can cope with sleep problems. The article is articulate and informative.
Caldwell K, Harrison M, Adams M, Quin RH, Greeson J.(2010) Developing mindfullness in college students through movement-base courses: Effects on self-regulatory self-efficacy, mood, stress, and sleep quality." J. Am Coll Health. 2010 Mar-58(5):433-42.
College can be a stressful time for students because of the responsibilities associated with classes and social…
Insomnia is a significant problem amongst all age groups. Young adults are particularly vulnerable to experiencing sleep disturbances. The inability to slessp can lead to a myriad of physical and social problems. As a result many researchers have studied the impact of sleep disturbances on young people. This is also the case with Yang et al. (2003) as they studied the ways in which this particular population copes with insomnia and other sleep disturbances. Te study also examined the effectiveness of young adults coping strategies on daytime tiredness and sleep quality. A total of 1,922 college freshmen participated in the study. Of the participants 44% indicated that they had sleep disturbance issues. The most common the disturbances was insufficient sleep. The study found that the adjustment of sleep schedules and naps were the types of coping strategies that were correlated with higher qualities of sleep. However, those participants that chose to ignore sleep disturbances, engaged in sleep-promoting activities, or attempted unsuccessfully to overcome sleeping problems had poor sleep quality. The study also found that regardless of the coping strategy used daytime sleepiness still persisted. Yang et al. set out to establish the coping mechanisms used by young adults as it pertained to sleeping disturbances.. The research confirms that sleep disturbances lead to daytime sleepiness. This information is useful for colleges and for students because it presents the opportunity to educate students concerning how they can cope with sleep problems. The article is articulate and informative.
Caldwell K, Harrison M, Adams M, Quin RH, Greeson J.(2010) Developing mindfullness in college students through movement-base courses: Effects on self-regulatory self-efficacy, mood, stress, and sleep quality." J. Am Coll Health. 2010 Mar-58(5):433-42.
College can be a stressful time for students because of the responsibilities associated with classes and social life. These stresses can effect mindfulness. With this in mind Caldwell et al. (2010) sought to evaluate if mindfulness improved when students participated in movement-based courses. In addition the study examined whether changes in mood, self-regulatory self-efficacy, and stress reconciles the relationship between more mindfulness and improved sleep. There were a total of 166 college students that participated in the study. The research took place during the 2007-2008 academic year. All participants were enrolled in Pilates classrooms. The result of the study reveal that total mindfulness scores and mindfulness subscales rose. In addition more significant changes in mindfulness were correlated to improved sleep quality at the end to the semester when compared to the beginning of the semester. . The authors therefore concluded that Movement-based courses are effective at improving mindfulness in this particular population. The researchers were thorough in their explanation of mindfulness and the impact of physical activity on the ability of people to remain mindful. The information presented is important because it reveals some of the steps that colleges can take to ensure that students have movement-based courses or activities so that mindfulness increases.
Employee Privacy Torts
Issues relating to employee privacy have been at the forefront of businesses for many years. This has been fuelled by the dynamic workplace which changes constantly and also by employees and employers being more litigation-conscious. Technology has also spurred on employee privacy issues with e-mail and the internet being related to heightened concerns about vulnerability of employers to litigation. Many employers have thus exacerbated their concerns relating to employee privacy and especially monitoring of employee behavior. Employee privacy is respected in many of the large corporations. However, there still exist some breaches in employee privacy. Small business owners are at most risk as a result of their increased monitoring practices and close employer-employee interaction.
oberson v. ochester Folding Box Company
One of the major cases that brought employee privacy to the limelight was oberson v. ochester Folding Box Company
Franklin Mills Co. decided to appeal…
Anderson v. City of Philadelphia, 845 F. 2d 1216 (1988).
Borse v. Piece Goods Shop, 963 F.2d 611 (1991).
Burlington Industries, Inc. v. Ellerth, 524 U.S. 742 (1988).
City of Ontario v. Quon, 130 S.Ct. 2619, 560 U.S. (2010).
Pamela a Virtue Rewarded written Samuel Richardson
ext Message from Pamela
Hi mum and Dad, we travelled well and reached our destination safely. We are grateful to God for bringing us to our new home safely. My Husband has gone through a great deal in making our new home. He is hesitant at changing the design of the house. He argues that the house looks its best the way it is. Am not so sure as to whether we should change the decor and design or leave it as it is. Anyhow, we hope to come to a consensus soon.
Good news though, my husband proposes that we have the work start on refurbishing the house. Last evening he shared with me his desired designs that he already has figured out. How I wish that the new house would sever between the sounds from the noisy hornbill…
The length of letters makes them boring and monotonous. The use of text messages makes the message shorter and less monotonous. Text messages allows for a dialogue of sorts between the parties conversing. Letters embody a monologue type of communication allowing only one party to communicate at a time. Text messages are similar to phone conversation only that in their case the message is not passed via sound.
Text messages, or SMS as they are commonly known, have risen to replace letters in modern day conversation. According to Robinson (2008), conversation is a language used in social worlds. Effective conversation is important for the message to be received and remembered when need be. Letters formed the old modes of conversation. The long time that took between dispatch and receipt of missives made the mode less desirable for the passing of urgent messages and those messages that need urgent reply.
Messaging or Short Message Service (SMS)
In Contemporary Culture
After the Second World War, technological advancement increasingly progressed especially after the television was introduced to the commercial market. After the advent of television, various technologies were innovated, including the computer technology that we are now enjoying and utilizing. The new computer technology became the catalyst for more advancements to come our way, and one of the sectors that benefited from these new technologies are the communications sector. Communications technology include the Internet, mobile phones, satellite broadcasting, and other innovations that developed and made communication more prevalent, improved, and clearer especially for people communicating or sharing information from distant places. The communications technology that the contemporary culture has will be the focus of this paper, particularly the advancements made to telephone communication. Telephones are considered one of the most vital devices invented over many centuries. Telephones evolved from being the telephone…
The characteristics of multi-channel management strategies are often organized around the most effective aspects of each channel and the potential they have to contribute to the overarching marketing and selling goal (Wilson, Hobbs, Dolder, McDonald, 2004). McDonald's and their multichannel strategy across Australia, Hong Kong and the United Kingdom (UK) are unified from the standpoint of supporting the corporate messaging and branding of McDonald's. Each geography and region requires a different series of strategies and messages however if McDonald's is going to succeed. The intent of analysis is to evaluate how McDonald's structures its multichannel strategy, varying messaging, content and delivery to fit the specific expectations, needs and wants of each region and country.
Analysis of Multichannel Strategies
The case provides interesting insights into how McDonald's uses their websites as branding platforms that extend into delivering memorable, fun and unique experiences for it customers. Making the point that…
James B. Arndorfer. 2005. McDonald's Lovin' Its New Model. Television Week, August 1, 17.
Danielle Long. 2006. McDonald's unveils digital strategy. Revolution, December 1, 15.
Jennifer Rowley. 2004. Online branding: the case of McDonald's. British Food Journal 106, no. 2/3, (February 1): 228-237.
Smith, C.. 2007. Doing content for the kids. Marketing, October 24, 25.
Online bullying and online harassment typically happens through chat rooms, text messages, and emails, and it generally happens when teens aren't in school, the studies show.
The findings appear in a special edition of the Journal of Adolescent Health.
Internet Harassment: What to Do?
Focus on safe use of new technology, not banning the technology.
Today's kids and teens are major media users, but they need grown-up guidance about safe media use, note the CDC's Corinne David-Ferdon, PhD, and Marci Feldman Hertz, MS. They predict that "with the development of new cell phones that are small enough to fit into young children's hands and that are designed to be visually attractive to a younger audience, more and younger children will become competent and frequent users of this technology."
That means that research on preventing online harassment "must be rapid and flexible enough to keep up with the evolving nature of…
Be Safe Bullying. (2002). Online Bullying. Retrieved on March 23, 2008 at http://www.besafeonline.org/English/bullying_online.htm
Belsey, Bill. (2004). Cyberbullying.ca. Retrieved March 23, 2008, from Web site: www.cyberbullying.ca
Liz Carnell and Bullying UK. (2008). Formally Bullying Online. Advice for Pupils. Retrieved on March 23, 2008 at http://www.bullying.co.uk/pupils/index.aspx
Li, Q. (2006). Cyberbullying in Schools: A Research of Gender Differences. School Psychology
To facilitate effective communications, organizational managers must understand the social dynamics of all of these employee communications networks.
7. Understanding Cultural Diversity
Cultural diversity has emerged as one of the most significant social issues in the contemporary workplace. That is largely attributable to the increasing cultural diversity in society and especially to the increased globalization of business in general. Today, it is no longer possible to assume that business partners and other stakeholders will necessarily share the same cultural perspective. In many instances, the failure to appreciate and respond appropriately to cultural diversity can make the difference between success and failure of business negotiations, particularly those conducted across international borders.
8. Promoting and Inclusion by Acknowledging Dissimilarity
While the purpose of cultural sensitivity awareness training is always to reduce or entirely eliminate tensions resulting from cultural differences, the road to achieving that goal often starts with an open and frank…
" New York State has imposed stricter laws regarding cell phone use which call for a ban on wearing even head-sets or hands-free phones. These laws also require drivers to pull up if they need to answer a phone. But people have serious objection to this requirement as we are all aware of the lack of parking spaces in NY. "Where do you get the space to put your car? & #8230; "Pull over to the side to talk and you will get a parking ticket." (Grynbaum, 2009)
All these arguments against cell phone use appear plausible and logical but there is a serious "But" involved. The number of accidents on the road due to drivers' use of cell phone indicates that talking while driving actually keep the mind off the road which is highly dangerous. To allow free use of cell phones while driving is to invite more accidents…
Wood, Daniel B. "How ultimate car culture handles a cell phone ban." Christian Science Monitor. 10 June 2003
Sibbald, Barbara. Jury calls for cell phone ban for drivers." CMAJ: Canadian Medical Association Journal 167-8 (2003)
Grynbaum, Michael M. "Taxi Commission seeks new ways to enforce cell phone ban for Cabbies." New York Times, 17 Oct, 2009
"Safety Group seeks ban on cell phone use for all drivers." Cement Americas, Mar
iegele indicates that "employers often wish to know whether they are entitled to contact an applicant's references and what obligations they may have in this regard. ith respect to obtaining consent to contact such references, it is accepted that an applicant who lists references on a job application or resume is implicitly consenting to a prospective employer contacting and obtaining information from those references. Similarly, it is generally accepted that an applicant who lists former employers is deemed to be giving consent to have those employers contacted for references." (iegele, p. 3)
This speaks to the fundamental condition in the relationship between employer and prospective employee. The latter must make available willingly certain information that would otherwise be considered private and protected. This is part and parcel to the process of attempting to gain employment and provides the prospective employer with avenues to determine the suitability of the individual…
Draper, H. (2012). Facebook Privacy Issues Arising in Hiring Process. Biz Journals.
Fleischer, M. (2010). A Legal Landmine: Privacy Issues in the 21st Century. Med Team Support Staffing.
Forster, E. & Garakani, G. (2007). Critical Issues in the Hiring Process. Blaney McMurtry Barristers & Solicitors, LLP.
Waggott, G. (2011). Law Note -- Pre-Hiring Background Checks. McMillan.ca.
Chemical and Biological Terroism
Biological and Chemical Terrorism Prevention
The United States Government has identified the potential of chemical, biological, radiological and/or nuclear (termed CBN) terrorism, especially after the September 11 attacks. They have been concerned ever since Sarin was used in a Tokyo subway (Aum Shinrikyo in 1995) and the anthrax case (in November 2001). The chances of terrorists resorting to these agents in warfare are pretty high considering their advantages over conventional methods. Most organizations fighting terrorism are not equipped well enough to detect such chemicals. A closed container can help most of them escape discovery. The low cost involved in their production increases the dangers manifold. Since most of the above agents affect the human body directly, they are essentially more efficient than conventional warfare.
Chemical weapons have four major classifications. Choking agents are aimed at being fatal and are easily accessible. Phosgene is one such industrial…
Khan, A. Levitt, A. Sage, M. (2000). Centers for Disease Control and Prevention. Biological and Chemical Terrorism: Strategic Plan for Preparedness and Response. 7-19. Retrieved From http://www.southernnevadahealthdistrict.org/download/epi/mmwr-plan.pdf
Ashraf H. European dioxin-contaminated food crisis grows and grows [news]. Lancet
Khan, A. Swerdlow, D. Juranek, D. (2001) Precautions Against Biological and Chemical Terrorism directed at Food and Water Supplies. Retrieved from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1497290/pdf/11571403.pdf
This is going to get done by means of using email, text messaging and the Internet to interact with my workers in a professional manner. egardless, I am shaping my staff to change and become better people. I will have to maintain an open mind to their various ideas, and see whether or not they are able to get implemented within the Hospice.
As I strive to become a better leader through using humility, freewill and delegation. I know that I can positively impact others through my hard work. They may want to one day become a Nurse Practioner themselves in any setting of their choosing. The decisions I make could become the deciding factor on whether or not they go further in the medical field. I want to set aside my pride, and become a better servant and transformational leader. This will mean that I strive to put others…
Collins, J. (2001). Good to great. New York, NY: HarperBusiness.(Chapters 2).
Collins, J. (2005). Good to great and the social sectors, A monograph to accompany Good to Great. Boulder, CO: Jim Collins.
Goleman, D. Emotional intelligence: Why it can matter more than IQ. New York: Bantam
Over time, from one second to the next, human behavior constantly changes, contributing to the fact that human behavior, consequently human cognition, constitutes a dynamic process. (Thelen and Smith, 1994). Communication, also a continuous interactive process, serves as the overtime interaction between the human motivated information processing system and the communication message. (Geiger and Reeves, 1993; Lang, 2000; Rafaeli, 1988)
Media multitasking indicates a user will simultaneously experience exposure to content from various media. As an individual possesses only a limited number of cognitive resources, he/she will not be able to process information at the same level of efficiency as media single use. As a result, the continuing, shifting attention results in less effective retrieval of information, as well as, experiencing challenges retrieving, encoding and storing information.
Statement of Problem
Despite contradictory indications from communication and cognitive psychology, younger adults' fill their lives with multitasking around media, as well…
Modern Communication Technology and Its Benefits
While opponents and critics of modern communication technology like social media platforms Twitter and Facebook argue that these tools invariably bring pain and problems to people’s lives, this one-sided and ultimately shallow approach to modern communication technology ignores the many benefits that text messaging, smartphones, social media, the Internet, and other communication tools in the Digital Era provide to individuals, businesses, organizations, governments and law enforcement all over the world. This paper will show that modern communication technology has many benefits for people today and that these tools have, in fact, changed the world for the better by 1) connecting more human beings than ever before, 2) allowing information to flow and be shared more easily than ever before, and 3) allowing people to overcome time and space barriers so that they can work together and assist one another with ideas, guidance, directions, and…
As a result they demand more convenient means of addressing communications needs like text messaging and are more prone to use Blackberry-like devices for their SMS needs. The development of the Blackberry came far after Hong Kong users had mastered the art of SMS on standard cellphones. The product "mapping," as Norman (1996) describes, is more intuitive on the Blackberry but the technology arrived too late to compete with the Hong Kong market. This supports what (author of "Do Artifacts Have Politics") describes as the "social determination of technology."
Sociological theories of technology suggest that artifacts may reflect political and cultural realities. Differential cellular phone usage between North America and Canada reflects a political and cultural reality: telecommunications infrastructure in the United States and Canada continues to emphasize land lines, and cellular phone services are less entrenched as a result. In Hong Kong the reverse is true: land lines were…
Cell Phone Usage Statistics." CellNumbers.com Retrieved April 1, 2007 at http://www.cellnumbers.com/cell-phone-usage.aspx
Chowdhury, Mridul & Yeung, Steve. "Hong Kong SAR." Retrieved April 1, 2007 at http://www.cid.harvard.edu/cr/profiles/Hong%20Kong%20SAR.pdf
Do Artifacts Have Politics?"
Heilbroner, Robert L. (1967). "Do Machines Make History?" Technology and Culture. 8(3). July 1967: 335-345.
he increased affordability of cellular devices and service plans has lead to dramatic growth in the use of mobile phones over the past decade. Over time, as devices have become more sophisticated, new uses have become popular. Initially, text messaging became a very popular form of communication, with individuals quickly sending short text-based messages to each other through their phones (Smith, 2011). he cellular service providers charge for text-messages, which are instantaneously delivered to another user's device. he charges associated with text-messaging have become cumbersome for some users, with individuals not subscribing to text-messaging plans often finding hundreds of dollars in text-message charges on their monthly statements (Smith, 2011). One solution to this problem has become the use of applications that attempt to mimic the behavior of text messages (Smith, 2011). One such app is the WhatsApp application, available on multiple cellular platforms, including iOS, Android and…
The WhatsApp application mimics the experience of sending and receiving text messages, but does so through using the cellular device's data plan or wireless connection (WhatsApp, 2013). When a phone is connected to a wireless source of Internet connection, users avoid any charges associated with sending and receiving messages. When the phone is using a data plan, users may still encounter charges if they go over their data plan limitations, but they still avoid paying specific text-messaging fees. As such, the WhatsApp application has become quite popular as a method of communication that avoids additional charges and does not place financial limitations on the number of messages that can be exchanged.
Despite the growing popularity of the WhatsApp application, there are potential consequences for how we communicate with one another as a function of using WhatsApp. Because WhatsApp functions as an external application installed on a mobile device, the relaying of messages is dependent upon WhatsApp's servers. Traditional text-messages are sent directly through the cellular network, which can often make them more reliable than messages sent through programs such as WhatsApp. One serious consequence of this integral difference between WhatsApp and traditional text messaging is the opportunity for messages to be lost or delayed (CNet Staff, 2012). Successful communication often relies upon a flow of conversation in which responses are received in order and in a timely manner. If the technology that supports the WhatsApp application crashes or experiences temporary problems, communication can be delayed or relayed out of order. A common experience for WhatsApp users is that their messages arrive quite a while after they were originally sent and sometimes arrive out of order, consequently making it difficult for the recipient to understand what exactly the sender is trying to communicate. Such experiences can lead to frustration, miscommunication, misunderstandings, and even conflict.
In addition to the potential consequences of miscommunication caused by delayed or out of order messages, the use of WhatsApp may also change our expectations concerning communication. With no limits on the number of messages that can be sent and the ability to use the application on either a data plan or while connected to a wireless network, users may come to expect the ability to constantly communicate. While constant contact and communication can be helpful in some situations, it can also be a deterrent in others. For example, it can become difficult to ignore a message while in the midst of working on something important because one feels the need to be in constant contact and to respond immediately. Individuals often forget that if it
Technology has reached into the lives of each of us. Regardless of how we might try to avoid modern technology it affects cannot be denied. Cell phones, email, internet, GPS are just a few of the modern technological devices that have changed the way we live. Cell phones make us available nearly anywhere to nearly everyone. The internet has become the chic way to meet potential partners. The GPS has replaced the use of maps as the preferred method of finding directions while traveling while stock trading online has caused many stock brokers sleepless nights.
A mere twenty years ago many of the technological changes that are in common usage today were mere ideas. Yet, they have quickly been incorporated into each of our lives and the changes seem to be occurring with increasing rapidity.
The most obvious effect to the increased use of technology in our communications is…
Apgar, M. (1998). The Alternative Workplace: Changing Where and How People Work. Harvard Business Review, 121-136.
Aragon, A.R. (1999). Competing Telecommunications and Cyber Regulation: Is There a Need for Transatlantic Regulatory Framework. International Journal of Communications Law and Policy, 3 Int't J. Comm. L. & Policy 8.
Bregman, P. (2010, May 20). How (and Why) to Stop Multitasking. Retrieved December 11, 2010, 2010, from Harvard Business Review: http://blogs.hbr.org/bregman/2010/05/how-and-why-to-stop-multitaski.html
Bureau of Labor Statistics. (2010). Occupational Outlook Handbook 2010-2011. Retrieved December 10, 2010, from Bureau of Labor Statistics: http://www.bls.gov/oco/
Cell Phones (Technology) On Communication
Cell phones and other cellular communication equipment are omnipresent in today's digital age, with roughly 1.5 billion cellular phones used, at present, across the globe; on an average, 75 billion SMSs are sent globally, in a month (Merry, Domlija & Mackenzie, 2005). While the use of cellular communication has greatly contributed to the area of communication, cellular interferences have hampered functioning in various contexts, including driving, parenting task completion, and enrolment in academic courses. Strayer and colleagues (2005) proved that cognitive impairments linked to cell phone usage while driving may be the same as those linked to drunken driving. Impacts of distractions from cell phones have been observed in laboratory as well as naturalistic settings. Here, the word 'distraction' implies the unintentional inattention to the task at hand, which is characteristic of unlooked-for events (e.g. a call on one's cell phone). By contrast, the word…
Adler, I. (2013 January 17). How our digital devices are affecting our personal relationships. WBUR. Retrieved on 4 December 2015 from http://www.wbur.org/2013/01/17/digital-lives-i
Baron, N.S. (2008). Always on: Language in an online and mobile world. New York: Oxford.
Brignall, T.W., & van Valey, T. (2005). The impact of Internet communications on social interaction. Sociological Spectrum, 335-348.
Campbell, S.W. & Kwak, N. (2011). Mobile communication and civil society: Linking patterns and places of use to engagement with others in public. Human Communication Research, 37, 207-222.
Orange Strategic Marketing Plan
Hello Kind Customer! ( I have added in additional comments in your paper per your instructions. Thanks again for being awesome to work with and please let me know if I can be of any additional assistance. Your changes and additions are marked with red text. Cheers!
Based on the successful merger of Orange and T-Mobile, the company is one of the world's largest mobile operators and the second leading operator throughout Western Europe. The company has over 30M subscribers worldwide, with 10M on the more profitable and long-term post-paid plans and leads Europe with over 1.5M users subscribing to the GSM 3G speed class of performance (Orange Investor elations, 2012). As of January, 2012 the company and its subsidiaries operate in 25 nations worldwide and has an aggregator market share of 40.4% and one of the highest consistent Average evenue Per User (APU) levels of…
Andlauer, S. & Pouillot, D. 2011, "The Future of Telecoms - Strategies for 2020 (*)," Communications & Strategies,, no. 82, pp. 161-166,179,181.
Bacchiocchi, E., Florio, M. & Gambaro, M. 2011, "Telecom reforms in the EU: Prices and consumers satisfaction," Telecommunications Policy, vol. 35, no. 4, pp. 382-396.
Becerra, E.P. & Korgaonkar, P.K. 2011, "Effects of trust beliefs on consumers online intentions," European Journal of Marketing, vol. 45, no. 6, pp. 936-962.
Benzoni, L., Deffains, B., Nguyen, A.T. & Saleese, O. 2011, "Competitive Dynamics Between MNOs in the Mobile Telecommunications Single Market: Lessons from the U.S. Experience," Communications & Strategies,, no. 82, pp. 127-145,179-180,182.
Communicating in Today's orkplace
Communicating in Today's orkplace
Communicating in Today's orkplace
"the single biggest problem in communication is the illusion that it has taken place."
George Bernard Shaw
Communication is essential to every organization for it to function effectively. And as Shaw observes, effective communication can be challenging, particularly in today's workplace. Communication is required to increase efficiency, satisfy customers, improve quality, and create innovative products and services. Communication links everyone together and facilitates organizational success.
Effective communication is so important for organizational success that not only managers but employees as well must be effective communicators. One task of a manager is to help employees improve their communication skills. hen all members of a team, department, or organization are able to communicate effectively with each other and with people outside their group, they are all more likely to perform well.
Merriam-ebster defines communication as "a process by…
BOMI International. (2011). Effective communication in the workplace. FMLink. Retrieved August 3, 2011 from: http://www.fmlink.com/article.cgi?type=How%20To&title=Effective%20Communication%20in%20the%20Workplace&pub=BOMI%20International&id=31179&mode=source
Craemer, M. (2010). 5 tips for workplace communication. Retrieved August 3, 2011 from: http://blog.seattlepi.com/workplacewrangler/2010/06/09/5-tips-for-workplace-communication/
Effective Communication in the Workplace. (2011). Retrieved August 3, 2011 from: http://www.effective-communication-skills.net/effective-communication-in-the-workplace/
Feigenbaum, E. (2011). About barriers to effective communication within the workplace. The Houston Chronicle Small Business. Retrieved August 3, 2011 from: http://smallbusiness.chron.com/barriers-effective-communication-within-workplace-3185.html
Communications # Technologies #Organization
What is Information Communications and Media Technology (ICMT)
ICMT is derived from two fundamental terminologies -- information communication technology and media technology. Information communication technologies refer to the resources and tools used to create, manage, store, and disseminate information (Gray, 2012). They include telephony, broadcasting technologies (television and radio), computers, and other technological media for communication. Each of these media has its technological limitations -- radio, for instance, could broadcast an event live, but one would only hear the sound and not be able to see the performers; similarly, a television would be able to deliver video and sound, but not text (Croteau, Hoynes & Milan, 2011). Media technologies are platforms of computer networks that allow for the delivery of all media forms; interactive, video, picture, sound, text and live (Croteau et al., 2011). Information communications and media technologies, therefore, refer to the various…
Croteau, R., Hoynes, W. D. & Milan, S. (2011). Media/Society: Industries, Images and Audiences (4th ed.). Thousand Oaks, CA: Sage Publications.
Gray, D. (2012). The Connected Company. Sebastopol, CA: O'Reilly Media Inc.
Townsend-Hall, B. (n.d.). Communications Audit: How can it Help You? The Sideroad. Retrieved December 2, 2015 from http://www.sideroad.com/Business_Communication/communications-audit.html
Marketing Plan of Cingular Wireless
Cingular Wireless is a U.S.-based company that is focused on providing cellular mobile services through its wireless data services, which includes GSM and TDMA technologies. GSM (Global Systems for Mobile Communication) technology is the most basic form of wireless service that allows users to receive data service by connecting their mobile phones to cell site towers of Cingular. TDMA (Time Division Multiple Access) technology, meanwhile, allows users to use the same communication medium over different time slots. With the help of these technologies, Cingular Wireless is able to offer services ranging from text messaging, voice calls, and even multi-media messaging (MMS) that allows users to capture images and use video streaming/messaging with the use of their mobile phones.
Cingular Wireless' Promotions strategy is geared toward the mass communication media, such as broadcast (television) and print media. Through these very powerful media forms, Cingular was able…
Cingular Wireless Official Web site. Available at http://www.cingular.com.
Leotta, J. "A Singular Stance: Cingular's Commitment to Creative Expression." 17 June 2002. iCan! Incorporated Web site. Available at http://www.ican.com/news/fullpage.cfm/articleid/73-85BA77B465798635/cx/employment.for_employers/article.cfm .
Mucha, T. "Cingular Sensation?" 19 March 2003. Business 2.0 Newsletter Online Web site. Available at http://www.business2.com/articles/web/0,48145,00.html.
The first is by demographically-based segmentation attributes, and the second is through services offered. Neither of these is optimal for understanding and responding to unmet needs in the users bases, a point discussed in the following section of this paper.
Demographic segments include the following:
General Consumer/Residential: The largest segment of users, this is the segment that also generates the highest level of price competition and pressure in the market as well. Churn is highest in this segment.
Small and Medium businesses:
The primary segment where bundling is used for generating high loyalty due to the ability of members of this segment to overcome price pressure due to the need to have services in place to support their business models.
The most profitable of segments and also the more difficult to penetrate and sustain customers, AT&T Wireless has successfully served this segment with Wide Area Networks (WLAN) and hotspot…
Ahn, Jae-Hyeon Sang-Pil Han, Yung-Seop Lee. (2006). Customer churn analysis: Churn determinants and mediation effects of partial defection in the Korean mobile telecommunications service industry. Telecommunications Policy, 30(10/11), 552. Retrieved March 15, 2008, from ABI/INFORM Global database. (Document ID: 1166810491).
Allison, Kevin (2007, November). at&T spills beans on faster 3G iPhone launch. FT.com,1. Retrieved March 17, 2008, from ABI/INFORM Global database. (Document ID: 1391331811).
Randolph Beard, George S. Ford, Richard P. Saba. (2006). An Econometric-Driven Merger Simulation: Considerations and Application. International Journal of the Economics of Business, 13(2), 217. Retrieved March 12, 2008, from ABI/INFORM Global database. (Document ID: 1149224251).
Robin Bienenstock, Paola Bonomo, Richard Hunter. (2004). Keeping mobile customers. The McKinsey Quarterly,(1), 9. Retrieved March 15, 2008, from ABI/INFORM Global database. (Document ID: 542491091).
Cellular service was launched in UK in 1985. Cantel and affiliates of Mobility UK were licenced to operate at 800 MHz. Personal Communications Services (PCS) operating at 1.8 GHz was licenced in UK in December 1995 with two new players, Clearnet and Microcell each receiving 30 MHz of spectrum. Mobility UK affiliates and Cantel each received 10 MHz of new spectrum. PCS service was launched in late 1997. Today, a wide variety of national and regional licenced wireless carriers, along with numerous resale partners, provide wireless voice and data services covering more than 99 per cent of the UK population:
Petro UK Mobility
7-Eleven Speak Out Wireless
Fan Fiction Annotated Bibliography
Baron, N. Always On: Language in an Online and Mobile World. New York: Oxford University Press, 2008. Print.
n our viritual community, people still need to have a way of communicating their words and messages. This is done through a keyboard -- texting, email, or online chat. Texting, or text messaging, is a modern colloquial term that refers to the exchange of information between mobile devices, made possible by transmitting messages through cellular networks. Typically, these types of messages are sent using a Short Message Service (SMS), but with the advances in cellular technology and memory, a new Multimedia Message Service (MMS) made it possible to send messages containing images, video, and sound. Email of course is simply messaging sent through an nternet account, and M the virtual equivalent of texting. more private even than voice (Crystal 2009).
Texting is a global phenomenon, and in some…
In Walk, Talk, Cook, Eat: A Guide to Using Sources, author Cynthia Haller focuses on a methodology of helping learners understand that there are different ways of evaluating source material in order to use that material for divergent types of writing. For instance, simply because something is posted on the Internet does not make it correct, simply putting in a generalized search term does not always result in meaningful content. For the modern learner, with literally millions of possibilities for sources, the key is to think of finding source information that produces new meaning- taking from the given material, but moving far beyond the rote and into synthesis, analysis and eventually, a new and creative product. Overall, Haller divides her recommendations into four models for more effective source utilization: 1) Walk -- knowing where sources exist and finding them; 2) Talk -- who are the sources, what is their expertise, their bias, and from what point-of-view do they supply the data? 3) Cook -- How do we process these sources? What ingredients do we use to make a better product (the research paper), and how are the sources combined appropriately? And, 4) Eat -- Taking the sources, internalizing them, adding past knowledge and a critique, and digesting them so that something is new and part of the person (Haller)
Hellelson, K., et al., eds. Fan Fiction and Fan Communities in the Age of the Internet. Jefferson, NC: McFarland, 2011. Print.
This is an edited book containing several articles that surround the phenomenon known as fan fiction. It is meant for a mixed audience -- either interested and intelligent laypersons or scholars in the subject of sociology, anthropology, popular culture or history. Briefly, the book contains articles that try to define and explain fan fiction. For the authors, fan fiction is stories about characters or settings written by fans of the original work, other than the original creator. These works are rarely commissioned or authorized, but appear in fanzines or in what is known as the canonical fictional universe. The works are primarily for a specialized fan audience, with the presumption that the fans have known of the universe in which the works are based. Because of a lack of publishing restrictions, fan fiction is very popular on the Internet, widely shared globally. This would be an ideal text for an introduction to the topic.
Twelve ESL learners who participated subsequently found that participating in text-based online chat rooms promoted a noticeable difference in their face-to-face conversations, particularly in noticing their own linguistic mistakes.
Psychologists stress little if any learning occurs without attention. "Text-based online chat, a particular form of synchronous computer-mediated communication (CMC) involving written oral-like conversation, has the great potential of increasing noticing for two reasons:
1. Compared to face-to-face conversations, CMC allows conversations to flow at slower speeds than face-to-face; consequently permitting "speakers" to have longer times to process receiving and producing the target language.
2. CMC can save texts (previous messages) in format that users may later access. (Lai and Zhao)
The following copy of "ESL Online Talk Community" illustrates concept Lai and Zhao present.
Practice makes perfect, but many ESL students do not have opportunities to practice speaking English. This Website is trying to establish an online community to enable…
4. Anderson, B. (1983). Imagined Communities: Reflections on the Origin and Spread of Nationalism. London: Verso.
Parent Communication Plan
Parent-teacher communication is one of the bedrocks of education. The reason for this is that education is not something that solely transpires in the classroom. It extends outside its walls and continues on into the real world. The student’s home is one area where education also occurs, and that is not the realm of the teacher but rather of the parent. Thus, to ensure that both parent and teacher are on the same page and are communicating the same vital messages and lessons to the child, it is wise that they themselves communicate with one another, share ideas, and discuss important issues that are likely to be faced by the child (Graham-Clay, 2005). As Merkley, Schmidt, Dirksen and Fuhler (2006) point out, there are many ways in which parent-teacher communication can be conducted today: the face-to-face meeting is always an option, but technological advancements have also…
cell phone technology in Japan. Specifically it will discuss the moral and ethical issues brought about by Japanese cell phones. In Japan, cell phones are as ubiquitous as they are in the United States. However, the ethics and morals of cell phone usage in Japan are very different from usage in the United States, largely because of moral and ethical issues of how the Japanese view cell phones and their usage.
In Japan, everyone from schoolchildren to the elderly carry cell phones. A group of writers note, "The Japanese term for mobile phone, keitai (roughly translated as 'something you carry with you'), evokes not technical capability or freedom of movement but intimacy and portability, defining a personal accessory that allows constant social connection" (Ito, et al., 2005). This very definition shows that the Japanese view cell phones differently than many other parts of the world, and because of this, they…
Author not Available. (2009). Japanese cell phone culture. Retrieved 29 July 2009 from the Japanese Lifestyle Web site: http://www.japaneselifestyle.com.au/culture/japanese_cell_phone_culture.html.
Betts, R.F. (2004). A history of popular culture: More of everything, faster, and brighter. New York: Routledge.
Dziesinski, M.J. (2004). What is "keitai culture"? Retrieved 28 July 2009 from the Towakudail Blogs Web site: http://towakudai.blogs.com/Keitai.Research.Survey.pdf .
Ito, M., Okabe, D., and Matsuda, M. (2005). Personal, portable, pedestrian: Mobile phones in Japanese life. Retrieved 28 July 2009 from the Massachusetts Institute of Technology Web site: http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=10610 .
Technology in the Classroom
As technology advances, teachers are able to implement tools to adapt and communicate with their students and provide an ease in the learning environment. Teachers are capable of connecting with their students by using tools such as social networks, websites, promethean boards, digital gaming, text messaging, and email communication in. This allows teachers to connect and interact with students and parents to answer questions, provide tutorials, and alert or inform about grades, missing assignments, homework, and other unanswered questions.
Social networks and other websites formulate students to experience an ease when communicating with their teachers by interacting with them on a personal level in a casual environment. Those students confused with a homework assignment may be able to confirm the homework assignment, view tutorials, and ask and answer questions with the teacher and friends through a social network or other website. Teachers will be able to…
Klopfer, Eric, Osterweil, Scot, Groff, Jennifer, & Haas, Jason. (2009). The instructional power of digital games, social networking, simulations, and how teachers can leverage them.
Manuscript submitted for publication, Massachusetts Institute of Technology, Cambridge, Massachusetts. Retrieved from http://education.mit.edu/papers/GamesSimsSocNets_EdArcade.pdf
PrometheanWorld.com. (2011). Global vision: About us. Retrieved April 21, 2011 from http://www.prometheanworld.com/server.php?show=nav.21201
Globalization, Technology Privacy Topic: How Whatsapp App
There is a lot of evidence that suggests that WhatsApp, one of the most popular apps utilized for communication between people, is invading the social life of college students. In fact, one can argue that WhatsApp is one of the most widespread mechanisms used by college students for socializing with one another. According to Susilo (2014), WhatsApp is one of "the most popular messenger applications among…college students" (10). It was largely due to the tendency of college students and young people to utilize this app that Facebook spent billions of dollars acquiring the company that makes it (Duryee, 2014). There are a number of different areas of life in which WhatsApp is impacting the social communication between college students. Many of these areas (including romance, long and short distance communication, and academics) pertain to some of the features of this app.
Duryee, T. (2014). WhatTheApp? Why Facebook would spend $16billion on an app with no advertising. www.Geekwire.com. Retrieved from http://www.geekwire.com/2014/whattheapp-facebook-spend-16-billion-app-advertising/
Lyman, E.J. (2014). Having an affair in Italy? You may want to avoid WhatsApp. www.usatoday.com Retrieved from http://www.usatoday.com/story/news/world/2014/12/02/italy-affair-whatsapp/19775751/
May, S. (2014). DU college students use WhatsApp to leak paper in exam. www.saharasmay.com Retrieved from http://www.saharasamay.com/regional-news/national-capital-region-news/676565878/du-college-students-use-whatsapp-to-leak-paper-in-exams.html
Susilo, A. (2014). "Exploring Facebook and Whatsapp as supporting social network applications for English learning in higher education. www.putsaka.ut Retrieved from http://www.pustaka.ut.ac.id/dev25/pdfprosiding2/Exploring%20Facebook%20and%20Whatsapp%20As%20Supporting%20Social%20Network%20Applications%20For%20English.pdf
The focus must also be on how to create the place or location so it is eclectic enough to meet the diverse expectations of the customer base.
When the Gap Model of Service Quality is applied to Place there are many areas of marketing strategy that need to be taken into account. First, there is the need to ensure the Place or location does not cause the need for service recovery completely on its own. This can happen if the variation in quality of locations varies so significantly that customers perceive big differences in expeie3nces between floors of the club Pacha for example. As the website and club have shown through marketing, each floor is unique yet of consistent high quality in terms of sound systems and seating, lighting and dance floors. All of these factors or place service to differentiate the club overall but also create the potential of…
Berger, C. et al. (1993) Kano's Methods for Understanding Customer-defined Quality, in Center for Quality of Management Journal, Vol. 2, 1993, Nr. 4, pg. 3-36
Booms, B.H. And Bitner M.J. (1981) 'Marketing Strategies and Organization Structures for service firms' inD onnelly, J .H.and George, W.R. (eds) (1981) Marketing of Services, Chicago: American Marketing Association, pp. 47 -- 52.
Carlos JF Candido, & DS Morris. (2000). Charting service quality gaps. Total Quality Management, 11(4-6), S463-S472.
Crosby, L.. (2010). The experienced relationship. Marketing Management, 19(2), 10.
Of these three approaches ad-hoc is considered the most adaptable to roaming users and therefore shows the greatest opportunity to support contextual-based use of wireless networks. The concept of the cellular network on the other hand is much more stationary and focused on a set of base stations that require base controllers and network infrastructure to effectively function. This fixed platform nature of the cellular network approach is juxtaposed with the approach increasingly being relied of using ad hoc networks for enable peer-to-peer communications throughout wireless networks. This aspect of ad hoc wireless network architectures is gaining high levels of interest due to wireless due to WiFi-enabled devices being able to access Facebook, MySpace and other social networking applications. As the ad-hoc architecture inherently supports peer-based communications and is rapidly becoming the foundation of social networking, this type of network architecture is considered highly distributed in nature. Often wireless network…
Cisco Tutorial. Basics of the OSI Model and associated documents. Accessed from the Internet on February 12, 2009 from location:
http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/introint.htm (Chek, Kwok, 2007)
Michael Cho-Hoi Chek, Yu-Kwong Kwok. (2007). Design and evaluation of practical coexistence management schemes for Bluetooth and IEEE 802.11b systems*. Computer Networks, 51(8), 2086. Retrieved February 17, 2009, from ABI/INFORM Global database. (Document ID: 1244657901). (Diegel, Bright, Potgieter, 2004)
Olaf Diegel, Glen Bright, Johan Potgieter. (2004). Bluetooth ubiquitous networks: seamlessly integrating humans and machines. Assembly Automation, 24(2), 168-176. Retrieved February 4, 2009, from ABI/INFORM Global database. (Document ID: 636242101). (Fantacci, Vannuccini, Vestri, 2008)
Social Media and the ed Shirt evolution
Most scholars are in conflict with regard to the subject of revolution in the age of social media. Until now, revolution has been considered a top-down process. In Thai situation, things might have been different. The ed Shirt evolution in Thailand was one of the first of the "Twitter" revolutions, that is one that was fueled by social media and Web 2.0 technology. Since then, other revolutions have come as well. The lone citizen is now no longer on their own. The dissident in Chiang Mai now can commiserate with their brother or sister in Tahrir Square and plan revolution on a country to country or even on a global basis. Even as this writer types up a dissertation proposal, demonstrators coordinate strategy on a global basis to protest corporate greed. It is with this in mind that this study looks back at…
Bailey, M and Labovitz C (2011). Censorship and Co-option of the Internet Infrastructure. Ann Arbor,
MI: University of Michigan. p1-14.
Bajpai, K and Jaiswal, A (2011). A Framework for Analyzing Collective Action Events on Twitter.
Lisbon, Portugal: Proceedings of the 8th International ISCRAM Conference. p1-10.
ECS can be set-up as an early warning and emergency communications system in areas usually affected by natural disasters or conflicts and with high volume of mobile phone users and text message/SMS users. In case of an impending political conflict or natural disaster, UniComm's ECS will be part of an area's communication plan as people take action in response to the information/message they received through the ECS.
UniComm, as part of its preparations for the international launch, will set-up special launchings in one country in Asia (Philippines) and Africa (Kenya) where the ECS can be tested in terms of its overall packaging. As the nature of the ECS service is more on the side of public service, UniComm will seek partners from the private sector with strong relationships with the government and non-government units operating within the chosen sites in each country. ECS will be tested in the…
Coyle, D. And M. Childs. (2005). "The role of mobiles in disasters and emergencies."Enlightenment Economics. Accessed on April 24, 2014. Accessed at: http://www.enlightenmenteconomics.com/about-diane/assets/disasterreport.pdf
Habschle, A. (2011). "Novel uses of mobile phones, the Internet and Social Media." Institute for Security Studies. Accessed on April 24, 2014. Accessed at: http://www.issafrica.org/iss-today/novel-uses-of-mobile-phones-the-internet-and-social-media
Robnagel, H. And O. Junker. (2010). "Evaluation of a mobile emergency management system -- a simulation approach." 7TH International ISCRAM Conference, Seattle, USA.
The marketing plans for developing growth of the base customer subscribers include lower cost trial for prototype testing period. These programs will run for four to six weeks to revise and implement any additional customizations before final subscription pricing for two to 10-year contracts. The price will not be extremely low, but based on the competitor rates and what the market is willing to pay due to pricing trends for of competitors in the same location. This way the pricing will accurately reflect the cost that the market will bear for that specific location vs. charging the same rate at each location. This will be a way to ensure there is no loss of potential revenue, due to pricing too low for the market based on standard rates at Wpro Headquarters. The advertising promoted will be focused on meeting IMC standards of quality, reliability and customer satisfaction.…
Shimp, T.A. (2008). Advertising, promotion and other aspects of integrated marketing
Communications. Cengage Learning.
Watiniya.com (2011). Telecom Homepage. Retrieved December 18, 2011 from http://10.wataniya.com/business/wprobusinesssolutions/default_en_gb.aspx
APPENDIX A Financial Statement 2010-2011 (Watiniya, 2011)
"Numerous studies have shown that impressive results in student achievement have come from students in technology-rich learning environments. Additional benefits such as improved student attitude, enthusiasm and engagement have also been found." (Sebastian J.)
However technology is not a solution in itself but can be a useful and often powerful means of enhancing the educational process. In this process technology does not replace teaching as an essential function but is rather used to the advantage of the teacher and students. As one study succinctly summarizes the relationship between pedagogy and technology; "...the teacher is essential to the integration of the technological potential in education. Teachers need the access, training, ongoing support and time to become proficient, productive users of technology. This is crucial in order for teachers to fulfill their roles as facilitators of learning and information literacy." (Sebastian J.)
Building a Nation of Learners Key to U.S. Meeting…
Building a Nation of Learners Key to U.S. Meeting Global Competition, Report by Business-Higher Education Forum Concludes. (2003) Retrieved Sept 2, 2006, at http://www.bhef.com/media/building_anation.cfm
Ferris William R. Using Computers in Education National Endowment for the Humanities Preps Schools for New Millennium. Retrieved Sept 2, 2006, at http://govinfo.library.unt.edu/accessamerica/docs/milleniumschool.html
Ross S. Feature Article. Retrieved Sept 2, 2006, at http://www.uky.edu/~casenet/RTD/newsletter/june98/june98.html#ross
Sebastian J. (1996) Education Technology: The Teachers' Role. Retrieved Sept 2, 2006 at http://www.altp.org/SSP/TeachersRoleWhitePaper.htm
For example, as Sheridan (2003) emphasizes, "When Short Message Service (SMS) was first introduced on mobile phones, it was seen merely as an extra feature that might be used by people on an irregular basis. But in fact, text-messaging turned out to be one of the device's most desirable assets, and is regarded by many as one of the most significant cultural developments of the past decade" (p. xxviii).
Given its enormous popularity, this feature of the company's product line could be refined, for example, to provide instant language translation services into the predominant languages used throughout the European Union. Language translation features, especially Spanish to English, would also be desirable for the company's strategic partner in Mexico, Grupo Iusacell, the country second largest wireless carrier (Business and your money, 2001). Likewise, the existing charges for SMS services could be reduced (or even eliminated), thereby keeping existing customers satisfied while…
Business & Your Money: Market on Edge as City Looks to U.S.; Stocks and Shares." The News Letter (Belfast, Northern Ireland), 10.
Chan, Wai-Chan, T.C. Chu, Allan R. Gold and Glenn Leibowitz. 2001. "Thinking out of the boXX." The McKinsey Quarterly, 43.
Culpan, Refik. 2002. Global Business Alliances: Theory and Practice. Westport, CT: Quorum Books.
Gillingham, John. 2003. "European Integration, 1950-2003: Superstate or New Market Economy?" Cambridge, England: Cambridge University Press.
TV and Magazine Ads. There are five references used for this paper.
Americans see numerous advertisements on TV and in magazines, all aim at getting them to spend their money. It is interesting to look at five such ads and who their target audience is.
The Libmen Company offers a wide array of products for cleaning the home. Their newest product is the Nitty Gritty Roller Mop which is targeted for the middle-class, homemaker.
The ad promises the product will "get to the nitty, gritty of cleaning a floor (Libmen)."
The company demonstrates this benefit by showing the consumer bristles on the mop, as well as the roller portion.
The consumer is shown the mop being used, further successfully illustrating the virtues of the product.
Odor Eaters has a product called Odor Eaters Plus. The product is aimed mainly at middle-class athletes or workers who may…
AT&T Text Messaging Ad. (observed 02 September, 2002 at 1:20 P.M.).
Jeep Grand Cherokee Ad. Time. (2003): 10 February.
Liberman Nitty Gritty Mop Ad. (observed 02 September, 2003 at Noon).
Odor Eaters Plus Ad. (observed 02 September, 2003 at 12:45 P.M.).
Cellular Phones in Japan:
It's different here.
Cell phone usage has undergone a tremendous jump in a relatively short amount of time. Indeed, the time has come when one feels slightly "naked" if one is out and about without one. Interestingly, however, cell phone technology within the United States is in its infancy compared to that found over the Pacific in Japan. In fact, the Japanese are so enamored of their cell phones and new cell phone technologies that Japanese companies are striving to create novel and powerful products to keep pace with the overwhelming demand.
Compared to American cell phone technology, Japanese products are truly striking. Indeed, for an industrialized nation, and a "world leader" at that, it is truly surprising to note the tremendous disparity between United States cell phone technology (in use), and the technology available and utilized even in the developing world. Consider, for example, that…
Earthlink. "Japan Developing Cell-Phone Wallet." Technology News. 25 July, 2004. Retrieved from Web site on August 13, 2004 http://start.earthlink.net/newsarticle?cat=2&aid=D841P6880_story
Gecko. Gecko Beach. "The Japanese Cell Phone Market." Web site. Retrieved from Web site on August 13, 2004 www.geckobeach.com/cellular/articles/japan.asp2002
Suzuki, Shou. Cell Phone Gaming in Japan. Gaming Age Online. 11 June, 2002. Retrieved from Web site on August 13, 2004 http://www.gaming-age.com/cgi-bin/specials/special.pl?spec=celphone&pagenum=1
Suzuki, David. Oiwa, Keibo. The Other Japan, Voices beyond the Mainstream. Fulcrum. New York. 1999.
Others include delays in data accessibility, albeit shorter delays and the continued need for source data verification (Donovan, 2007).
Other obstacles have occurred in the developing of mobile healthcare applications. These have included mobile device limitations, wireless networking problems, infrastructure constraints, security concerns, and user distrust (Keng and Shen, 2006).
A third problem that has been encountered is that of a lack of education on not only the importance of the information technology but also training on how to use the specific pieces of equipment. The tools that are provided to people are only as good as the training that is provided on how to use them. The tools may be able to do wonderful things, but if those that are using them do not know how to get the best use out of them they will in the end be less efficient.
According to an Institute of…
Al-Assaf, Al F., Bumpus, Lisa J., Carter, Dana, and Dixon, Stephen B. (2003). Preventing Errors
in Healthcare: A Call for Action. Hospital Topics. 81(3), 5-12.
Brommeyer, Mark. (2005). e-nursing and e-patients. Nursing Management -- UK. 11(9), 12-13.
Damberg, Cheryl L., Ridgely, M. Susan, Shaw, Rebecca, Meili, Robin C., Sorbero, Melony E.,
GP will significantly improve the accuracy of air traffic control, and also provide a platform for the efficient increase of aircraft traffic. It is however somewhat unclear why it has taken so long to implement a technology that has such obvious advantages and that has been in existence for such a long time. Perhaps the time and cost involved was a determining factor. From the current viewpoint, it has become essential to upgrade ATC technology.
Like the ground-based ATC system, the current separations system for aircraft is becoming unviable in terms of the anticipated and current increase in aircraft using airspace. Alternative ways have therefore been investigated to safely handle the increase in aircraft, and also to address the increasing delays that have plagued American airports. The Free Flight concept is one such possible alternative.
According to J.M. Hoekstra (2002), commercial aircraft to date have been operating under the…
ADS-B Technologies LLC. Automatic Dependent Surveillance -- Broadcast. (2009). http://www.ads-b.com/home.htm
Freudenrich, Craig (2009). How Air Traffic Control Works. http://science.howstuffworks.com/air-traffic-control.htm
Hoekstra, J.M. (2002, June). Free Flight with Airborne Separation Assurance. http://www.nlr.nl/smartsite.dws?id=2942
Knorr, Dave & Bennet, Mike. (2003, Nov 4). Lessons Learned from FAA Free Flight's En Route Modeling Workshop. http://www.tc.faa.gov/acb300/ap5_workshops/documents/Modeling%20CPDLC%20Benefits.pdf
This only furthers the problems associated with insufficient sleep because of the body's natural physiological response to excessive sugar intake and leads to a constant repetitive cycle of sugar highs and corresponding crashes shortly afterwards.
Furthermore, the excessive caffeine consumption throughout the school day only makes it that much harder for students to wind down and go to sleep as early as they would need to receive adequate sleep. Finally, in that regard, the regular substitution of healthy breakfasts for non-nutritious fast food and vending machine substitutes contributes substantially to the epidemic of overweight and obese American teenagers.
According to Houston, delaying the start time of American high schools would help resolve most of these problems.
Houston's observations are very consistent with what one observes in high school.
Very often, students skip class to take naps and others simply sleep in their classes.
Other times, students take unauthorized days off…
Second, the Internet allows access to the world and therefore a pedophile can pray on a victim that lives 1000 miles away just as easily as if the intended victim were next door. Technology virtually obliterates geographic distance. A cyberpredator can in fact be more alluring for a disenchanted youth by offering a plane ticket to some exotic location. The enticement of being independent might cause some naive adolescents to travel to meet the cyberpredator, or the cyberpredator can also arrange to fly long distances to meet the intended victim in person.
Third, technology enables long-term and intimate communications that would otherwise not be possible. It would be far more difficult to "groom" children without the Internet except when the pedophile is a member of that child's family or immediate social network without attracting attention. Online grooming can take place over a long period of time, giving the child a…
Ohio Attorney General. "Internet Safety and Cyber Predator Awareness." Retrieved April 20, 2007 at http://www.ag.state.oh.us/citizen/isafety/index.asp
Social media involves online content that people use via highly accessible technologies. Basically, social media marks a change in the way people read, discover and share information, news and content. Therefore, social media fuses technology and sociology leading to a change in monologues into dialogues and also marks information democratization, making everyone an author instead of being a mere content reader. Social media has become very popular since it enables people interaction through the internet to create relations useful for different reasons including political, personal and business. Businesses consider social media to be an amalgamation of consumer-generated media. The social media takes different forms like, blogs, Internet forums, wikis, pictures, podcasts and video. Therefore, it is obvious that the Internet is a fundamental social medium (Customer Centric Business Strategies, n.d.). This may not change since people endeavor to engage with each other online; hence, social media is going to be…
Ali, S. (2012, August 8). Social Media - A Good Thing or a Bad Thing? Retrieved, from http://www.socialmediatoday.com/content/social-media-good-thing-or-bad-thing
Fernandez, A. (2011). Clinical Report: The impact of social media on children, adolescents and families. Archivos de Pediatriadel Uruguay, 82(1), 31-32.
Gaal, Z., Szabo, L., & Obermayer-Kovacs, N. (2015).The Power of Social Media in Fostering Knowledge Sharing. Proceedings Of The European Conference On Intellectual Capital, 114-121.
Hajli, M.N. (2014). A study of the impact of social media on consumers. International Journal Of Market Research, 56(3), 387-404. doi:10.2501/IJMR-2014-025
This means that designers do not have the ultimate control, as they have had for centuries in other printed matter. The user now has the ultimate control, and they can alter the aspects of a Web page at the click of a mouse.
Internet typography has evolved from very simple fonts and colors on a plain background, to intensely graphic and easy to navigate Web sites that draw the user in to a totally unique and visual experience. Colors, textures, and variations are endless, and typography is really still in the infant stages on the Internet, so it is clear there will be many more innovations to come. Internet typography has revolutionized how the world accesses information, and it is one of the most important developments of the information age. It will be extremely interesting to see where typography goes in the future on the Internet, and it will be…
Heller, Steven and Philip B. Meggs. Texts on Type: Critical Writings on Typography. New York: Allworth Press, 2001.
Holt, Richard. Dialogue on the Internet: Language, Civic Identity, and Computer-Mediated Communication. Westport, CT: Praeger, 2004.
Jones, Scott L. "Evolution of Corporate Homepages: 1996 to 2006." The Journal of Business Communication 44.3 (2007): 236+.
Morrison, Matt "A History of Typography." A History of Typography. 9 Jul. 2006. EzineArticles.com. 17 May 2008 http://ezinearticles.com/?a-History-of-Typography&id=239551 .
gathered using a number of key word searches and combinations of terms, such as "adolescent," "substance abuse," "treatment," "drug," "outcome," "drug abuse, "juvenile drug abusers," juvenile drug use," "juvenile drug treatment," "adolescent drug treatment," and "adolescent drug use." These key word searches were conducted in online databases such as PsychInfo, PubMed, NCBI, JSTO, National Institute of Mental Health, National Criminal Justice eference Service, and Google Scholar. These searches resulted in a number of studies that appeared useful for this analysis. The five chosen were chosen because of common key words and their relevance to this study's focus on if adolescent males with substance disorder are given inpatient treatment instead of outpatient treatment whether they will have a greater chance of maintaining their sobriety.
Description and Technique
Branson, Clemmey, and Mukherjee (2013). This study is a sample size 48 adolescents with roughly half Latino and half African-American, male and female.…
Branson, C., Clemmey, P., Mukherjee, P. (2013). Text message reminders to improve outpatient therapy attendance among adolescents: a pilot study. Psychol Serv, 10(3): 298-303.
Esposito-Smythers, C., Spirito, A., Kahler, C., Hunt, J., Monti, P. (2011). Treatment of Co-Occurring Substance Abuse and Suicidality among Adolescents: A Randomized Trial. Journal of Consulting and Clinical Psychology, 79(6): 728-739.
Friedman, A, Terras, A., Ali, A. (1998). Differences in characteristics of adolescent drug abuse clients that predict to improvement: for inpatient treatment versus outpatient treatment. Journal of Child and Adolescent Substance Abuse, 7(3): 97-119.
Waldron, H., Slesnick, N., Brody, J. (2001). Treatment outcomes for adolescent substance abuse at 4 and 7-month assessments. Journal of Consulting and Clinical Psychology, 69(5): 802-813.
Disappearing Ink -- Todd Gitlin
In a September 1999 Op-Ed piece in the New York Times, New York University Professor Todd Gitlin wrote of a new trend in university education, cropping up amongst American colleges -- an Internet company posting free notes for core required courses at 62 major universities. He was reminded of his days at Berkeley, in which a note taking service attended lectures (always a graduate student), take notes, type them, and sell for a nominal fee. The notes were professionally done, organized in a manner that would suit "most of the group," and even the professor could use them as a template for courses. However, soon class attendance began to wane; why go to class if you could get the materials elsewhere? And those who attended were far less lively and willing to discuss key events in a cogent and active manner. Gitlin notes that education…
Bloom, A. The Closing of the American Mind. New York: Simon and Schuster, 1988.
Broughton, J. Wikipedia - The Missing Manual. New York: O'Reilly Media, 2008.
Gitlin, T. "Disappearing Ink." 10 Septmber 1999. The New York Times. October 2010 .
"Technology's Impact on Learning." June 2003. NSBA.org. October 2010 .
Now, the way to get found is through the internet. There are several different methods that can be used, too, and may businesses will choose a combination of methods so that they are able to reach out to the largest number of people without spending too much money. Even the largest and most prosperous companies have a budget, and they probably do not want to (or cannot) go over that budget in order to get results. With that being the case, these companies have to focus on the most popular ways to reach out to customers. To do that, the company needs to know the market it is targeting with its product or service (Amor, 1999; Beynon-Davies, 2004; Frieden & oche, 2006; Tcakz & Kapczynski, 2009).
A target market is vital to success, because any business (online or not) has to market to people who want and need what the…
Amor, D. (1999). The e-business (r)evolution. Upper Saddle River: Prentice Hall.
Beynon-Davies P. (2004). E-Business. Palgrave: Basingstoke.
Charlesworth, A. (2009). Internet marketing: a practical approach. New York: Butterworth-Heinemann.
Chaudhury, A. & Kuilboer, J.P. (2002). e-Business and e-Commerce Infrastructure. New York: McGraw-Hill.
STEP 8 - INTEVENTION IMPLEMENTATION PHASING
The initial implementation of the automated calling system will require a significant amount of data entry concerning patient contact data; however, this data can be integrated in digital form from existing healthcare information management system as discussed further below.
PLANNING MODULE III - DETAILED HIMS PLANNING and COSTING
Although the actual acquisition of the automated calling system selected for this initiative will be completed by the hospital's purchasing department, a preliminary review of available representative systems that meet the needs of the ENT department is provided in Table 1 below.
epresentative Automated Calling Systems and Specifications
BroadcastByPhone: Automated dialing software can reach people by phone or by voice mail with personalized messages the auto-dialer uses a computer to deliver personal calls or leave answering machine messages in a human voice or a computer-generated voice. Calls are delivered…
Cyr, F., King, M.C. & Ritchie, P.L. (1999). Quality management for psychology services in health care facilities. Canadian Psychology, 36(3), 201-204.
Tidwell, R. (2004). The 'no-show' phenomenon and the issue of resistance among African
American female patients at an urban health care center. Journal of Mental Health
Counseling, 26(1), 1-3.
Internet has grown exponentially since its first introduction to the public. The precursor to the Internet was the ARPANET. The Advanced Research Projects Agency (ARPA) of the Department of Defense (Carlitz and Zinga, 1997) and the National Science Foundation (NSF) were the primary creators of the ARPANET. Subsequently however, efforts from private entities and universities have helped develop the network infrastructure, as it exists today. "The goals of ARPA's 'Resource Sharing Computer Network' project were to develop the technology for and demonstrate the feasibility of a computer network while improving communication and collaboration between research centers with grants from ARPA's Information Processing Techniques Office (IPTO)." (Press, 1996) J.C.R. Licklider of MIT undertook groundbreaking work in developing computer interactivity. Later, he implemented his vision though time-sharing systems-affordable interactive computing. The effort of the NSF also helped to distribute the features of this new networking capability to all major universities and research…
Ansari, Asim, Skander Essegaier, and Rajeev Kohli. "Internet Recommendation Systems." Journal of Marketing Research 37.3 (2000).
Bannan, Karen J. "Clean It Up." PC Magazine 20.16 (2001).
Beguette, Glenda, et al. Internet Content Filtering and Cipa Legislation. 2002. Available: http://lrs.ed.uiuc.edu/students/tsullivl/469Sp02/filtering.html. June 26, 2005.
Bell, Bernard W. "Filth, Filtering, and the First Amendment: Ruminations on Public Libraries' Use of Internet Filtering Software." Federal Communications Law Journal 53.2 (2001): 191-238.
Technology With egards to Dating
Dating is an activity typically used by people to choose potential romantic partners and to initiate the process of finding a mate (Strong & Cohen, 2013). The process of dating has undergone many changes through the course of history; however, technological innovations have dramatically altered the process. This paper will discuss how technology has influenced the dating process in both positive and negative ways. First the concept of dating is defined and explored followed by a discussion of how the dating process has been altered by technological changes.
The term dating has several meanings but typically refers to a meeting of two individuals with the goal of engaging in some form of mutually agreed-upon social activity (Strong & Cohen, 2013). Thus, dating is most often considered to be an activity that is part of the mating or selection process in humans where…
Bailey, C.M. (2010). Match. com and Chadwick Martin Bailey 2009-2010 Studies:
Recent Trends: Online Dating. Retrieved on June 5, 2015 from http://cp.match.com/cppp/media/CMB_Study.pdf
Brown, S.L., & Lin, I.F. (2012). The gray divorce revolution: Rising divorce among middle-aged and older adults, 1990 -- 2010. The Journals of Gerontology Series B: Psychological Sciences and Social Sciences, 67(6), 731-741.
Couch, D., & Liamputtong, P. (2008). Online dating and mating: The use of the internet to meet sexual partners. Qualitative Health Research, 18(2), 268-279.
Technology: Use of Technology in Politics
Use of Technology in Politics: Technology
Technology's Political Impact
Technology has changed the way we live our lives, influencing how we work, conduct business, and even interact with each other. Technology has also become an integral and indispensable part of our political processes. No individual perhaps demonstrates the significance of technology in the political arena better than President Barrack Obama. Obama is president today partly because of his aggressive use of social media and technology in his campaign processes. Obama's campaign in 2008 used technology, particularly social networks, online video, text messaging, and email advocacy to raise money and develop volunteers (ospars et al., 2010). It sent out a billion emails, including unique campaign messages targeted at certain segments of the 13 million members (ospars et al., 2010).
The campaign created a personalized social network (www.mybarrackobama.com) (MyBO), which allowed members to connect and interact…
Couldry, N. (2012). Media, Society, World: Social Theory and Digital Media Practice. Cambridge, Polity.
Rospars, J., Hughes, C., Graham-Felsen, S., Albright-Hanna, K., Goodstein, S., Grove, S., ... Bohnet, B. (2010). Obama and the Power of Social Media and Technology. The European Business Review. Retrieved from https://faculty-gsb.stanford.edu/aaker/pages/documents/TEBRMay-June-Obama.pdf
Mitigating Lawless African Acts
Problem Definition and Intervention Description
Boko Haram is a militant Islamist organization that it terrorizing large portions of Nigeria, since at least 2011 (Uhrmacher and Sheridan, 2106). Their methods are fairly typical of terrorists. These include suicide bombings, kidnappings, and attacks on everyday civilians. The crux of their methodology is that they are targeting civilians since they do not have the means to battle the largely Christian government via conventional warfare. Therefore, they have resorted to terrorist attacks to cause residents to flee and to attempt to gain territory in such a manner.
The principle means of intervening in this activity is to aid the Christian government of Nigeria with forces that are opposed to terrorism. This aid will include those marshaled and containing troops from the United States, Western Europe, and the United Nations in general. It is critical to supply the Nigerian government with…