SEARCH RESULTS

YOU WERE LOOKING FOR :Methods of Data Collection

Essays 631 - 660

Adolescent Online Impact Study: Methods And Results

questionable impact over adolescent personality, values and manner. In gathering this information, several methods were utilized ...

Diabetes Self-Management - Hispanic Patients

has always been about the development of autonomy, equality, social justice and democracy" (Mezirow, 1999). The transformative app...

Michael J. Schmoker's "Results Fieldbook Practical Strategies From Dramatically Improved Schools" - Critique

foundation of Schmokers message: place the power with the teachers who serve as a reckoning force when it comes to empowerment, in...

Computer Forensics: A Rapidly Growing Discipline

of computer forensics technology). Whereas "computer evidence" used to refer to ordinary print-outs, now it includes not only the ...

Nursing Shortage

information about the shortage of nurses and the consequences. This was achieved as demonstrated in the following brief report of ...

School Funding With Emphasis On Texas

a good ranking. Texas, like most states, has a number of special grants schools or school districts may apply for. One is the Opt...

Family Nursing - Teen Suicide

apply to the many diverse factors related to teen suicide attempts and completions. Three of these objectives are: 1. Reduce fire...

Sterilization Methods, Ancient to Modern

and isolation of contagious patients would save lives and slow the transmission of illness. Sterilization and disinfection of mi...

Disproportionality In Special Education

this category (EMSTAC, Intro, 2007). Either overrepresentation or underrepresentation is a problem because it suggests the diagn...

Human Resources Information Systems

same responsibilities it did before the entire face of business changed over the past generation. Rather than being only a cleari...

Paleoclimatology

naturally and are not sufficient in size to significantly alter the current climate problems (Dawicki). Iron was added at 2 locati...

Sony Corporation - Organizational Analysis

2008). The company continued to grow and expand globally and consistently produced new and innovative products to its inventory (S...

Hackers Against Retail Stores

This essay focuses on the hackers that were able to access credit card data and information from Target's network. The paper repor...

Telecom Company Offers New Product

It has become essential for organizations to have a place to store and backup their data, which is increasing exponentially. Compa...

Hospital Upgrades IT Again

Memorial Hermann is a hospital system in Houston. This institution has been on the cutting edge of technology for years. They have...

Title IX Violations Colleges

Sexual harassment is covered under Title IX of the Educational Amendments of 1972. The EEOC defines this as unwelcome sexual advan...

Case STudy Hospital Readmissions

Hospital readmissions of patients is upsetting to patients and families, especially when that readmission occurs within 30 days of...

A Method to Make Decisions

There are many types of decisions made in organizations every day. This essay discusses a decision making process but within the d...

Corrupt Officials in the World

The UN reported there was an inverted U-relationship between democracy and corruption in public officials. Numerous reports do not...

"Discourse on the Method," Part 4, Descartes

Tis essay presents a summary and discussion of the perspectives presented by Rene Descartes in his "Discourse on the Method," part...

Issues with RHIOs

A RHIO is a type of health information exchange organization where certain professionals upload health/medical data and other prof...

Teenage Substance Abuse Treatment

Most programs intended to stop teenagers from using and abusing substances fail because the teenager does not want to be there and...

Past Research Methods for Examining Internet Purchases

Research methodologies used in research to identify influences in internet purchasing are reviewed. The research is examined in t...

Is the Teach-Back Model Effective

This essay follows a different format that usual. Questions are placed in a table with the answers following the question. Color c...

Determining Statistical Tests

Different types of tests may be used for differing purposes and with different types of data. This paper looks at how univariate ...

Digital Information Security

This paper considers the recent data breaches that have compromised our personal security and made identity theft a real threat. ...

Pricing Parking - Case Study

decks have led to a $100,000 deficit. Even in the most crowded months in the year, the new parking decks are only about half-full....

Diversity Audit; The Bank of America

orientation differences. This leaves diversity management for those who disabilities as a potential area for improvement, but the ...

Wary in Singapore

The government of Singapore maintains excellent information in a wealth of categories. Some Asian governments are less then forth...

Research Design and Methods Analysis

the traditional one-on-one model" (Herrara, Vang and Gale, 2002, p. 4). Prior to presenting their method analysis section, the res...