Wednesday, February 26, 2020

Audience analysis Research Paper Example | Topics and Well Written Essays - 250 words

Audience analysis - Research Paper Example PSAs that emphasize how people crashed cars under the influence of marijuana, for example, are not only blatant guilt trips likely to turn off teenagers, but in any respect are bad arguments, since many people clearly use marijuana without crashing their cars and in any respect alcohol is legal despite the risk of drunk driving. Children and teenagers in general need to be respected, not coddled: The idea that they are empty vessels just waiting to be filled by whatever comes along is totally absurd. Kids are more like clay: They can be molded to a shape, but they have their own give and push, and someone who thinks it's easy to control their behavior will struggle just as much as someone who doesn't know how to sculpt. My emphasis will be on harm reduction. People who are already smoking pot or are at risk to have far too many factors pushing towards marijuana use for a simple abstinence message to make any sense. Instead, I will talk to kids about why reducing their abuse and facin g up to the source of their problems could make it easier to get a job, make real relationships, find ways of enjoying themselves without smoking, and resolve some of the real issues that might be leading them to use pot as an escape.

Monday, February 10, 2020

The impact of mobile devices on Cyber Security Research Proposal

The impact of mobile devices on Cyber Security - Research Proposal Example The proposed topic has been developed in the context of a research developed in regard to Cyber Security. As an aspect of the IT discipline, Cyber Security is highly analyzed through existing literature. However, the relationship between the Cyber Security and the mobile devices has not been adequately explored. Indeed, the review of relevant literature revealed that not all aspects of Cyber Security have been explored in the context of academic research. In addition, the popularity of mobile devices has been highly increased today, especially due to the radical development of technology on with these mobile devices are based. From this point of view, the proposed topic is considered as quite valuable, offering important information in regard to the relationship between Cyber Security and the mobile devices that have become quite popular. Another aspect of the study’s value is the following one: in the context of the research developed for this study the literature developed i n this field is carefully reviewed; academic studies have been identified and analyzed as of their impact on Cyber Security. This task is quite important due to the uniqueness of the study. Indeed, the review of relevant literature has led to the assumption that there is no study with similar topic, a fact that increases the firm’s value for supporting the academic research in regard to Cyber Security. In addition, the proposed study serves an important need: the need for identifying current material related to Cyber Security.