SEARCH RESULTS

YOU WERE LOOKING FOR :Large Information Technology Projects Management

The Pharisee Who Became an Apostle

This paper focuses on St. Paul, the Pharisee to whom Christ appeared and to whom Christ gave a special mission. It was hard for pe...

Substance Abuse Effects

This essay provides information related to the ADA and substance abuse. It then discusses medical, social, psychological, and voca...

Educational Policies and Technology

In a paper of three pages, the writer looks at educational policies. Improvements in policies to better handle the use of technolo...

Performance Task on Technology

In a paper of three pages, the author provides an overview of a lesson plan on technology that is modified for use in varied learn...

Motherhood and Race, Michelle Obama, Lesbian and Gay Parents

This 10 page paper gives an explanation to many homework answers concerning motherhood and African Americans. This paper includes ...

Does the iPad Technology Disrupt?

This 4 page paper gives an overview of how the iPad's technology is changing standards. This paper includes an explanation of how ...

iPad Technology and the Changed it Caused

This 3 page paper gives an overview of how the iPad's technology is changing standards. This paper includes an explanation of how ...

Fort Bend County, Texas/Health Care Spending

This paper offers a summary of "Health care spending, quality and outcomes: More isn't always better" by Fisher, et al (2009). The...

Mobile Technology

Wireless and mobile devices have become part of everyone's life even if they do not own a smart phone. This paper defines these te...

Substance Abuse and Depression: Concurrent Disorders

This 3 page paper gives an outline of depression and substance abuse as concurrent disorders. This paper includes the general info...

Review: Critical Examination of Patronage

In 2009, Dominic Bearfield wrote an article that provides a history of the concept of patronage. This article is discussed relativ...

Breach of PHI Confidentiality

This paper discusses patient personal health information (PHI) in terms of a major breach in confidentiality. HIPAA regulations an...

Race, Gender, and Sexuality and the American Family

This 5 page paper gives a summary of how the homework reading informed the student's opinion on the American family. This paper in...

Legality and Ethical Concerns in Counseling

This 3 page paper gives an overview of many issues concerning ethics for the professional counselor. This paper includes issues su...

Brodwin and Frederick (2010), A Reaction Paper

This essay presents the writer's reaction to the information prevents by Brodwin and Frederick (2010). This article pertains to se...

Hospital Upgrades IT Again

Memorial Hermann is a hospital system in Houston. This institution has been on the cutting edge of technology for years. They have...

Drones Societal Potentials and Concerns

This paper considers drone technology from both a positive perspective and a cautious one. Social informatics are paramount. The...

How Hospitals Are Analyzing Data

Big Data Analytics is the most recent innovation to work with huge amounts of data. Hospitals not only have a massive amount of da...

Heart Failure and Telehealth

This research paper presents an descriptive discussion of scholarly literature that pertains to telehealth technology and its appl...

Colonization of America

This 3 page paper gives an overview of how geography, demographic, and the climates of the three colonial regions effects the deve...

Evaluating Reading Habits

This research paper analyzes a survey that provides information on 4 Australian students' reading interests and behaviors. Five p...

What Can Therapists Say About Patients

There are numerous regulations and codes that mandate and/or guide the mental health professional on the subject of confidentialit...

Posttraumatic Stress Disorder DSM-IV and DSM-5

There are many differences between the two latest versions of the Diagnostic and Statistical Manual of Mental Disorders. The diffe...

Hackers Against Retail Stores

This essay focuses on the hackers that were able to access credit card data and information from Target's network. The paper repor...

Polypharmacy in the Elderly

In a paper of forty pages, the author reflects on the current literature to propose a specific approach to studying and changing t...

Past Research Methods for Examining Internet Purchases

Research methodologies used in research to identify influences in internet purchasing are reviewed. The research is examined in t...

Comparing Two-Year Colleges

Two-year public colleges are more often referred to as community colleges. In recent years, their funding has been cut just as it ...

Interventions for Patients

This essay provides information and insight on different psychotherapeutic interventions for different mental illnesses. Psychodyn...

Web Site Analysis

Churches need to have attractive, effective Web sites just as any other business or organization. They need to provide information...

Nursing Theory, Focus on Caring

This paper begins by discussing the theoretical focus of Florence Nightingale and then relates this information to the nursing th...