SEARCH RESULTS

YOU WERE LOOKING FOR :personal essay examples

Essays 1231 - 1260

Need a Brand New Custom Essay Now?  click here
What is Identity Theory

Social psychologists have identified at least four types of identity theories. This paper discusses two of them, identity as in pe...

The Internet and its Impact on Ethics

This paper considers the loss of privacy and personal susceptibility that have been ushered in with the Information Age. There ar...

Technology as a Non Racist Tool in the Fight Against Terrorism

In the twenty first century we are faced with a definite challenge in regard to how to go about balancing our...

Learning to Educate Adult Students

This 19 page paper provides an overview of teaching adult age students. This paper includes strategies needed to assess the person...

Sociological Theories and Mass Media

This research paper pertains to the way in which media influences society from the conflict, structural functionalist and symbolic...

Social Media and Profit from Personal Information

Digitized information has generated a new economic era, the era of a personal information economy. Privacy has been sabotaged by ...

Worldviews, History in Nursing

This offers three posts that will be submitted to a nursing discussion board. These posts address various world views on science, ...

Family Nurse Practitioner's Role

This research paper offers an overview of the role of Family Nurse Practitioner (FNP). The writer discusses the metaparadigm conce...

Personal and Professional Goals

This 5 page paper outlines some personal goals on how to achieve professional appeal. This paper states various minor goals such a...

Nursing Taxonomy, Orem, Watson and Personal

This paper begins by discusses the taxonomy of both Watson and Orem's theories and then draws on these theories to relate a person...

Digital Information Security

This paper considers the recent data breaches that have compromised our personal security and made identity theft a real threat. ...

Biggest Hacking in U.S. History

Just before Thanksgiving 2013, malware was installed on Target's security and payments system that was designed to capture all the...

Midnight Rising, Tony Horwitz

This book reviews pertains to Tony Horwitz's text "Midnight Rising, John Brown and the raid that sparked the Civil War," which des...

Interview and Assessment of Leadership Style

Leadership takes place in many ways. The aim of this paper is to examine a leader and their leadership style with an interview, an...

Alcoholism, Soldiers' Stories of Addiction

This paper discusses the personal narratives of soldiers and indicates the parts of these narratives that are applicable to Procha...

Impact on Language Learning, Global Issues

This research paper explored organizational websites of intuitions that focus on global issues, such as environmental issues, pove...

Application Responses for Parsons Design School

fashion that exists within a single country, indicating the vast social divides that exist all across the world. Even within my ow...

Belief Systems

and how we react within that world. It includes our values and beliefs about anything that we encounter. Initial paradigms are dev...

Financial Goals and Planning

time job more difficult. At the current time I do not have plans to start working while at university so I can concentrate on my s...

A Personal Accounting of Human Growth and Development

personal life. At the core of the debate about human behavior is the question of whether behavior is predominately controlled by o...

Old Testament Devotionals and Contemporary Interpretations

poured into thy lips: therefore God hath blessed thee for ever. Gird thy sword upon thy thigh, O most Mighty, with thy glory and t...

Two Responses to Disaster

This research paper, first of all, describes the characteristics of the Disaster Management Cycle and the Disaster-Development Con...

A Scenario Analysis Using Morgan's Metaphors

are inherently composed of a wide variety of interacting systems, each of which is composed of a number of policies, processes, an...

Health Care Economics and Funding in the United States - A History

the consideration of dozens of microeconomic systems that operate as a function of the national macroeconomic picture. It is often...

Group Work - Benefits and Drawbacks

down to discuss the material and our thoughts about it. This discussion allowed us to brainstorm, explore different opinions, and ...

Ecological Footprint - The Value of the Model

began to question my own behavior and activities in regards to how environmentally friendly they were. In other words, by calculat...

The Stigma Borne by Muslim Women

Muslim women who are living in mainstream US society in many cases struggle with a definite societal stigma....

Mental Health Counseling and Self-Supervision

their practices for lapses in technique, identify areas of improvement, and continue to grow as professionals. This paper will pre...

An Interview Incorporating Appreciative Inquiry

The air transportation industry offers numerous high performing job positions. When a manager is selecting from a pool of applica...

IT Auditing and Internal Controls: Personal Experiences

it is secure, and companies that fail to secure vital information are at risk for a data breach. Studies show that data breaches a...