SEARCH RESULTS

YOU WERE LOOKING FOR :Information Science Cognitive Learning or Social Learning Theory

Essays 2101 - 2130

Social Workers and Critically Evaluating the Practice and Theory of Inter-Personal Joint Working

(Leason, 2002). The idea of joint working may have different manifestations, one of these may be the development of single ...

Thibaut and Kelley's Social Exchange Theory of Communication

to determine the best possible behavior is not a new idea. This is basically what John Stuart Mill proposed with his philosophy of...

Social Problems and the Theories of Emile Durkheim

In ten pages the theories of Emile Durkheim inclusive of anomie are applied to such social problems as poverty, homelessness, and ...

Groups, Self Esteem, and Social Identity Theory

In five pages this research proposal discusses the relationship between the desire to belong to a group and low self esteem or lac...

Theory and Social Control

Social institutions, such as organized religion, the family, educational institutions, and political groups were radically questio...

Group Conflict and Social Identity Theory

In five pages social identity theory is examined in a consideration of its various elements as well as group conflict. Five sourc...

Conflict and Social Identity Theory

In five pages this paper examines group social identity in a consideration of the personality conflict perspectives of Carl Rogers...

Hirschi, Durkheim, and Social Control Theory

In four pages this paper examines human behavior in a consideration of the social control theoretical perspectives of Hirschi and ...

Social Theory and Juvenile Delinquency

In ten pages this research study proposal considers whether or not single parent households are responsible for the increases in j...

Theories on Social Progress

In six pages this research paper examines social progress from a theoretical perspective. Five sources are cited in the bibliog...

Gift Exchange and Social Theory

In ten pages this paper examines the exchanging of gifts in this consideration of the social exchange theory from a phenomenolog...

Proposal Hospital Implement Electronic Management

Information technology plays a major role in mitigating different issues such as increasing demand, constrained resources, continu...

Adult Diabetic Education, Overview of a Meeting

This paper reports on an educational information intervention for adults with diabetes mellitus, which was designed to provided th...

Article Review on Skin Care

In a paper of three pages, the author reflects on an article entitled: Providing Patients with Information on Caring for Skin. T...

Issues with RHIOs

A RHIO is a type of health information exchange organization where certain professionals upload health/medical data and other prof...

Hospital Technology

The purpose of technology in hospitals is to increase efficiency and accuracy of their healthcare systems and to improve patient c...

Information Management

to consider which include the need to protect the data. A basic system, will include a filing cabinet with files organized accordi...

Research into Real Estate Agent Services

in addition to the basic property details (locations, bedrooms, facilities, construction etc)? ___________________________________...

Experimental Social Psychology

of flawed findings that other methods might produce. It is a matter of personal opinion which data collection method a social psy...

Law Regarding Protecting Information

Online (Legal Information Institute, 2011). Websites that target children as their audience and deliberately collect unauthorized ...

"The Crucible" and State Control of Social Compliance

social compliance is often maintained as a result of the purposeful exploitation of societal guilt by dominant power structures. P...

Substance Abuse in Older Populations

processes, and appropriate diagnosing, as well as proposing specific interventions that can be used and preventative strategies fo...

Issue in Social Psychology

with the group existed with two people, and compliance and conformity existed with the third one. On the one hand, two were confor...

Proposal for a New Assessment Model Aimed at Analysis of Information Technology Use within a Firm

which an organisation competes. Porter (1985, p13) has designed two differing categories of competitive advantage; cost advantage ...

Survey Asthmatic Children

(HealthyPeople.gov, 2012)? All parents who have children with asthma will be invited to a meeting at the school. At that meeting,...

Architecture of Information Systems

this paradigm, it is also useful to understand that basic information systems architecture is divided into two key areas: hardware...

An Interview Using the ADDRESSING Format

In a paper of six pages, the author integrates information derived from an interview into a specific format, providing information...

Competitive Advantage Through Information Systems

same way that would have once happened in a paper environment (Kumar & Babu, 2011). In other words, a J2EE developer in such an or...

Case Study Diagnosis

2010). In addition, Moniques behaviors, including drinking to the point where she blacks out and being unable to participate in w...

Sources of Information for a Strategic Analysis

realistic objectives or goals, whereas the vision statement should be inspirational. The values statements should be deemed as com...