SEARCH RESULTS

YOU WERE LOOKING FOR :Data Collection Methods

Essays 1081 - 1110

Digitization and the Threat it Presents to Privacy

This paper laments the loss of privacy that has occurred with the increased digitization of data and, in particular, the advent of...

Women Earn Less Than Men

Laws were passed five decades ago that mandated equal pay for equal work. That goal has not been realized. Women still earn about ...

Too Few Women Senators

Historically, very few women have has access in the political arena. This is beginning to change. While there are more in both Hou...

Discrimination of Religion

Christians, Muslims, and Jews are the most discriminated religious groups in the world. This essay provides data about religious d...

Adolescent Online Impact Study: Methods And Results

questionable impact over adolescent personality, values and manner. In gathering this information, several methods were utilized ...

California Drug Statistics

groups during the ten-year period: 16.5% juveniles and 42.1% adults (Bureau of Criminal Information and Analysis, 2000). Gender p...

Recall and the Use of a Self Referent Framework

The writer presents data regarding an experiment to test the influence of self referencing frameworks on recall ability. The write...

Protecting Patients Privacy

The writer looks at the way a healthcare organizations protect their patients data. The writer looks at processes which are in pl...

Supply Chain and Operations Management Questions

user. Firms may compete using logistics in order to gain a competitive advantage. Effective supply chain management can help to cr...

Corporate Culture, Customer Relations, Social Responsibility

get a real live person on the telephone (PR News, 2007). This author recommends integrating communications and customer service de...

Methods of Leadership in Health Care

This four page paper provides an overview of strategies used in healthcare leadership and considers the implications. There are f...

Using Technology in Education

In a paper of ten pages, the author reflects on the use of technology as a tool for instruction. The author considers the use of ...

Using T Scores

The paper is based in a case study provided by the student with a set of questions. The data used in the case study provides the ...

Depression, An EBP Project

This research paper offers a plan that pertains to a planned project based on Evidence-Based Practice (EBP) in the treatment of de...

Student Nursing Clinical Practice and Assessment

This research paper offers summations of three research studies that focus on assessment of clinical practice performance in regar...

Diabetes Self-Management - Hispanic Patients

has always been about the development of autonomy, equality, social justice and democracy" (Mezirow, 1999). The transformative app...

Sociological Research Method Issues

In a paper of eight pages, the writer looks at sociological research. Problems with method are illustrated by looking at two key s...

Three Disasters at a Time

In March, 2011, Japan suffered a massive earthquake, a massive tsunami, and a nuclear accident. No country has ever experienced su...

Agricultural Methods in Seven Areas of the World

When examining various regions around the world—Central Asia, East Asia, South Asia, the Caribbean, Sub-Saharan Africa, North Afri...

Efficacy of Bar Code Medication Administration

This research paper offers a literature review of studies that pertain to bar code medication administration (BCMA) systems. The p...

Methods of Conducting Effective Research

The author discusses how to avoid plagiarism and validate sources. There are four sources in this four page paper. ...

Disparities in Health Care Access

Not every American has the same opportunity to access and receive quality health care services. There are a number of social, econ...

Hungry Children in America

This essay reports statistical data regarding families living below the poverty line and the numbers of children who are food inse...

Interviewing Vulnerable Elders, MDS 3.0

This essay presents a summary and analysis of "Video on Interviewing Vulnerable Elders (VIVE)," which instructs nurses and long-te...

Program Assessment, Mixed Method Approach

This research paper discusses mixed methods that combine qualitative and quantitative approaches to research in order to discern t...

Computer Vulnerabilities in the Energy Industry

Cyber security is an important issue within the energy sector. The Stuxnet targeting of Iranian nuclear facilities demonstrated th...

Teen Obesity

This research paper pertains to data on the prevalence of obesity among American adolescents. This information reveals that it is ...

Example Problem Solving Analysis Method

A men's clothing store in Quebec adopted a new incentive plan two years ago. It has had a number of unexpected negative results, i...

Using T-Tests and Excel

The paper presents results based on data supplied by the student. Two hypothesis tests are presented, with the excel output, to sh...

Aversive Childhood Experiences (ACE), Overview and Study Hypothesis

This research paper concerns Aversive Childhood Experiences (ACE) and the incidence of depression. The writer explains this term a...