SEARCH RESULTS

YOU WERE LOOKING FOR :Data Collection Methods

Essays 1261 - 1290

Using Elasticity to Set a Price

of a product then the demand will increase (Nellis and Parker, 2006). This is the pattern for most goods, but not all, as some goo...

Accounting Case Study

once again making a profit, with a gross profit margin of 7% and an operating profit margin of 4.81%, this is significant not only...

Hackers Against Retail Stores

This essay focuses on the hackers that were able to access credit card data and information from Target's network. The paper repor...

Telecom Company Offers New Product

It has become essential for organizations to have a place to store and backup their data, which is increasing exponentially. Compa...

Title IX Violations Colleges

Sexual harassment is covered under Title IX of the Educational Amendments of 1972. The EEOC defines this as unwelcome sexual advan...

Case STudy Hospital Readmissions

Hospital readmissions of patients is upsetting to patients and families, especially when that readmission occurs within 30 days of...

A Method to Make Decisions

There are many types of decisions made in organizations every day. This essay discusses a decision making process but within the d...

Corrupt Officials in the World

The UN reported there was an inverted U-relationship between democracy and corruption in public officials. Numerous reports do not...

"Discourse on the Method," Part 4, Descartes

Tis essay presents a summary and discussion of the perspectives presented by Rene Descartes in his "Discourse on the Method," part...

Issues with RHIOs

A RHIO is a type of health information exchange organization where certain professionals upload health/medical data and other prof...

One Method for Quality Improvement

Dr. W. Edwards Deming was a statistician and was asked to help the Japanese government with their post-war census. While there, he...

Legalizing Marijuana Compared to the Prohibition

Special interest groups and propaganda played a strong role in Prohibition and they have played a strong role in drug laws today, ...

STDs Increasing

The introduction reports data about the incidence of Chlamydia and uses that as a catalyst to discuss health programs in schools; ...

Overview Major Health Organization

This paper discusses a major health care organization and its diversity. Several topics are discussed: data regarding diversity, m...

Analysis Culture and Teen Pregnancy

Teen pregnancy is a problem with rising rates in most industrial countries. The incidence differs greatly by race/ethnicity. This ...

Different Method to Control Mental Health Patients

Seclusion and constraints have been the traditional way to control mental health patients when they lose control. This has always ...

Case Study Faculty-Student Manuscript

In this scenario, a faculty researcher has two research assistants to help with the project. It is labor-intensive with the assist...

Difficulty Proving Employee is Stealing

Unless an employee does something outlandish, it is very difficult to prove he or she is stealing from the company. In this essay,...

Students Are Note Learning Languages

In today's global world, it is necessary for businesspersons and others to be proficient in at least one other language, yet, enro...

Shell Companies

With the release of the Panama papers, attention has been focused on overseas transactions and shell companies. This paper reports...

A Deadly Epidemic That Lasted Centuries

There are dozens of infectious diseases that have taken the lives of millions and millions of people. Some data back to many centu...

Teenage Substance Abuse Treatment

Most programs intended to stop teenagers from using and abusing substances fail because the teenager does not want to be there and...

Determining Statistical Tests

Different types of tests may be used for differing purposes and with different types of data. This paper looks at how univariate ...

Digital Information Security

This paper considers the recent data breaches that have compromised our personal security and made identity theft a real threat. ...

Is the Teach-Back Model Effective

This essay follows a different format that usual. Questions are placed in a table with the answers following the question. Color c...

Hospital Upgrades IT Again

Memorial Hermann is a hospital system in Houston. This institution has been on the cutting edge of technology for years. They have...

Past Research Methods for Examining Internet Purchases

Research methodologies used in research to identify influences in internet purchasing are reviewed. The research is examined in t...

Interviewing Vulnerable Elders, MDS 3.0

This essay presents a summary and analysis of "Video on Interviewing Vulnerable Elders (VIVE)," which instructs nurses and long-te...

Program Assessment, Mixed Method Approach

This research paper discusses mixed methods that combine qualitative and quantitative approaches to research in order to discern t...

Computer Vulnerabilities in the Energy Industry

Cyber security is an important issue within the energy sector. The Stuxnet targeting of Iranian nuclear facilities demonstrated th...