SEARCH RESULTS

YOU WERE LOOKING FOR :Data Mining and Ethics

Essays 961 - 990

MIS at Merck

is that of product information. This process may lead to increased value in the company. The idea is that the ability to...

Creating a Customer Survey

D. I am employed ____ unemployed ____ E. (Only if employed) I work for a private company ___ in the public sector ____ F. I am ...

Global Warming: Liberal Perspective

spite of the fact that China has attempted to address its number of people, there is no denying how this huge nation requires a si...

Methamphetamine Prevention Program For Teens

to one of three groups, one of which was a control group with 208 students in it (Ferlazzo, 2006). The rest of the group were divi...

SMEs and Banking in Saudi Arabia; Methodology and Findings Paper

There are three general structures that can be used in research terms; exploratory, descriptive and explanatory (Eriksson and Wied...

Graphs

This 12 page paper is a selection of different types of graphs provided on a set of data including box and whisker, stem and leaf ...

The Sharing of Private Data Across Government Departments; Creating Efficiency of a Violation of Personal Liberty?

and hold personal information, the second is whether or not the system itself is right, with a concentration of data all in a sing...

Medicaid

state may cover infants under the age of one but whose income is 185 percent of the poverty line or disabled persons, such as the ...

Hypothetical Interview With Case Manager, Laura's House

like a project management situation wherein several resources are coordinating services. Keeping track and monitoring how all serv...

To What Extent Do Bilateral Investment Treaties Encourage Foreign Investment?

impact of reducing these barriers by determining an agreed framework (Wong, 2007). This is an agreement between two states...

Call Centre Case

of the results around the mean, this is quire wide. It is important to note that if this were presented as a bell shaped graph th...

Exercise, Bone Density & Menopause

a 2-year randomized placebo-controlled study that was designed to determine whether not increased intake of dietary calcium, combi...

Teenage Substance Abuse Treatment

Most programs intended to stop teenagers from using and abusing substances fail because the teenager does not want to be there and...

Digital Information Security

This paper considers the recent data breaches that have compromised our personal security and made identity theft a real threat. ...

Determining Statistical Tests

Different types of tests may be used for differing purposes and with different types of data. This paper looks at how univariate ...

Teen Obesity

This research paper pertains to data on the prevalence of obesity among American adolescents. This information reveals that it is ...

Using T-Tests and Excel

The paper presents results based on data supplied by the student. Two hypothesis tests are presented, with the excel output, to sh...

Nursing Scholarships and Practice

This 4 page paper gives an overview of using concept analysis within the field of nursing. This paper explains how different appro...

Using Technology in Education

In a paper of ten pages, the author reflects on the use of technology as a tool for instruction. The author considers the use of ...

Computer Vulnerabilities in the Energy Industry

Cyber security is an important issue within the energy sector. The Stuxnet targeting of Iranian nuclear facilities demonstrated th...

Is the Teach-Back Model Effective

This essay follows a different format that usual. Questions are placed in a table with the answers following the question. Color c...

Hospital Upgrades IT Again

Memorial Hermann is a hospital system in Houston. This institution has been on the cutting edge of technology for years. They have...

Hackers Against Retail Stores

This essay focuses on the hackers that were able to access credit card data and information from Target's network. The paper repor...

Telecom Company Offers New Product

It has become essential for organizations to have a place to store and backup their data, which is increasing exponentially. Compa...

Title IX Violations Colleges

Sexual harassment is covered under Title IX of the Educational Amendments of 1972. The EEOC defines this as unwelcome sexual advan...

Case STudy Hospital Readmissions

Hospital readmissions of patients is upsetting to patients and families, especially when that readmission occurs within 30 days of...

Case Study Faculty-Student Manuscript

In this scenario, a faculty researcher has two research assistants to help with the project. It is labor-intensive with the assist...

Students Are Note Learning Languages

In today's global world, it is necessary for businesspersons and others to be proficient in at least one other language, yet, enro...

Shell Companies

With the release of the Panama papers, attention has been focused on overseas transactions and shell companies. This paper reports...

A Deadly Epidemic That Lasted Centuries

There are dozens of infectious diseases that have taken the lives of millions and millions of people. Some data back to many centu...