SEARCH RESULTS

YOU WERE LOOKING FOR :Learning Theories Applied to Computer Education

Essays 1621 - 1650

How Structuralism, Functionalism, Evolution And Applied Behavior Analysis Relate To Psychology

plays from a developmental standpoint. Historically, men who abandoned one woman to go to another left the first woman without th...

Behaviorism And Annotated Bibliography For Applied Behavior In Autism

nature of normalization is to remove the stigma that has hovered over the developmentally disabled population. The author effecti...

Erikson as Applied to Poe

Psychosexual Development or Eriksons Stages of Psychosocial Development. Since Erikson is more compressive in terms of early exper...

Applying Marketing Concepts to Increase the Sale of Tickets at a Sports Stadium

support a football club; they will purchase tickets for the games of their top placing, which may be tickets from the home stadium...

Defining and Applying Public Health

innovations as penicillin and automobile seat belts. It encompasses the provisions that are used to insure a safe blood supply an...

Microsoft and the Value of Applying Strategic Tools and Concepts

to have a competitive advantage, he identified two sources of competitive advantage; cost advantage and differentiation (Porter, 1...

Levi Strauss' Myth Analysis by Applying Ferdinand de Saussure's Structural Linguistics

but an anthropologist and he made use of the theorist in his studies, including kinship and myths. The idea of Saussures t...

Leadership Styles Applied to Scenario

This leadership paper discusses Hersey and Blanchard's Situational Leadership model and Blake and Mouton's Managerial Grid as they...

Applying Conflict Models

This paper presents a scenario wherein an employee tells a colleague a secret, he promises to keep it, he tells everyone, she is a...

Applying Content of Articles on Marketing Regulations

Marketers should be aware of marketing regulations. This paper outlines the content of three articles concerning different aspects...

Applying Psychological Code of Ethics

This report is based on a hypothetical case where a post-graduate student falsified data in an article for a journal. This student...

Benchmarking as Applied to Business

1993). Meanwhile, competitive benchmarking measures a companys performance against that of its "best in class" competition so that...

Signage Industry and Applied Technology

the meaning and context of the written word (Calnon, 2004). When this purpose is accomplished successfully, it attracts attention ...

Scientific Management Theories, Motivation, and Theories

scientifically managed (Accel, 2003). Taylor had particular objectives for scientific management which are still used today in man...

Kaplan and Reckless Theories' Overview

living on the edge. Reckless and Kaplan do have similar ideas but it pays to take a look at each of their theories and also the co...

Totalizing Theories Replaced by Postmodern Theories

that the world is undergoing a period of economic globalization and political fragmentation. If one accepts that as truth, one c...

Political Theory, Human Nature, and the Theories of Thomas Paine, John Locke, and Martin Luther

In five pages this paper examines how political theory incorporates human nature concepts articulated by Thomas Paine, John, Locke...

Japanese Management Theory and the Theory Z Text of William G. Ouchi

In four pages this paper compares American and Japanese businesses in this overview of the organizational theory text by William G...

Internet Usage by Two Companies - Gateway 2000 and DLJ Direct

taking itself too seriously and has collectively remembered to have fun in business as well as build profitability. All com...

Media Communications Theory versus Organizational Theory

In nine pages this paper examines the corporate sector in an analysis of organizational theory and role of media communications. ...

Selfish Gene Theory v. Heterozygote Superiority Theory

views on heterozygote superiority, we first must consider the views of Richard Dawkins. Dawkins The Selfish Gene articulates his ...

Computer Security

a large group of Milwaukee hackers known as 414s, whose infiltration impacted such organizations as the Los Alamos National Labora...

The Basics of Goal Setting Theory and Expectancy Theory

who value money may be motivated towards a goal that will increase the amount of money they receive, however an individual who val...

MOTIVATIONAL THEORIES: EXPECTANCY THEORY AND INTRINSIC MOTIVATION

relationship with expectancy theory; people will generally perform a task in the expectation that a reward will be offered at the ...

A Deviance Theories' Study

In a paper containing ten pages constructivist and etiologic deviance theories are discussed along with differences, similarities,...

Automotive Industry and Management Theory's Evolution

employed skilled craftsmen, and if an employee left a replacement would be easy to train (Taylor, 1998). The development of Sci...

Schultz's FIRO-B Theory And Leadership: Trait Theory - Work Environment

and how he or she is perceived by others" (Muller, 2005) that inevitably allows managers and staff alike to align perceived impres...

Maturational Theory of Gesell and Cognitive Development Theory of Piaget

In eight page the effectiveness of these theories is assessed. Eleven sources are cited in the bibliography....

Labor Theories of Adam Smith and Karl Marx Theory

increased productivity stimulates market growth, if the market is such that it can absorb the growth. The cumulative effect of the...

IT Forensics: Digital Evidence

reason than the tangible factor inherent to typical sites. The extent to which tangible investigations are inherently valuable to...