SEARCH RESULTS

YOU WERE LOOKING FOR :Modern Corporations and Data Processing

Essays 2101 - 2130

Analysis of Jeff Bezos' Amazon.com

(Hoovers, 2001). Bezos describes the birth of Amazon.com. As Bezos was working on Wall Street, he saw that Web usage was growin...

Research Proposal on Conducting a Community Needs Assessment on Domestic Violence

of community outreach education efforts which could be employed to target domestic violence issues. The most appropriate mechanis...

Preventing Crime

crime prevention officer might begin by giving information at day care or at schools with hand-outs for children to take home. ...

Book Review of Curriculum and Aims by Decker F. Walker and Jonas F. Soltis

This well written and thought provoking book that is supported by factual data and statistics is reviewed in five pages. Two sour...

STDs Increasing

The introduction reports data about the incidence of Chlamydia and uses that as a catalyst to discuss health programs in schools; ...

EMAIL MARKETING TESTS -- A PROCESS

Analyzes the results of an email campaign, and suggests methods to interpret data. There are 3 sources in the bibliography of this...

Corrupt Officials in the World

The UN reported there was an inverted U-relationship between democracy and corruption in public officials. Numerous reports do not...

Difficulty Proving Employee is Stealing

Unless an employee does something outlandish, it is very difficult to prove he or she is stealing from the company. In this essay,...

Overview Major Health Organization

This paper discusses a major health care organization and its diversity. Several topics are discussed: data regarding diversity, m...

Analysis Culture and Teen Pregnancy

Teen pregnancy is a problem with rising rates in most industrial countries. The incidence differs greatly by race/ethnicity. This ...

Shell Companies

With the release of the Panama papers, attention has been focused on overseas transactions and shell companies. This paper reports...

Case Study Faculty-Student Manuscript

In this scenario, a faculty researcher has two research assistants to help with the project. It is labor-intensive with the assist...

Students Are Note Learning Languages

In today's global world, it is necessary for businesspersons and others to be proficient in at least one other language, yet, enro...

Hackers Against Retail Stores

This essay focuses on the hackers that were able to access credit card data and information from Target's network. The paper repor...

Telecom Company Offers New Product

It has become essential for organizations to have a place to store and backup their data, which is increasing exponentially. Compa...

Title IX Violations Colleges

Sexual harassment is covered under Title IX of the Educational Amendments of 1972. The EEOC defines this as unwelcome sexual advan...

Case STudy Hospital Readmissions

Hospital readmissions of patients is upsetting to patients and families, especially when that readmission occurs within 30 days of...

Issues with RHIOs

A RHIO is a type of health information exchange organization where certain professionals upload health/medical data and other prof...

Legalizing Marijuana Compared to the Prohibition

Special interest groups and propaganda played a strong role in Prohibition and they have played a strong role in drug laws today, ...

Article Review on Management Learning

In five pages this paper critiques the article Responding to New Roles A Qualitative Study of Managers as Instructors' in terms o...

Images, Ideas, and Belief According to Rene Descartes

his previous beliefs had rested, since he intends to analyse philosophically whether these beliefs are in fact valid, and if they ...

Internet Effects on the Contemporary World

In five pages this paper examines the contemporary social effects generated by the Internet with such issues as the law, data usag...

Nursing Scholarships and Practice

This 4 page paper gives an overview of using concept analysis within the field of nursing. This paper explains how different appro...

Teenage Substance Abuse Treatment

Most programs intended to stop teenagers from using and abusing substances fail because the teenager does not want to be there and...

Computer Vulnerabilities in the Energy Industry

Cyber security is an important issue within the energy sector. The Stuxnet targeting of Iranian nuclear facilities demonstrated th...

The Adult Children of Alcoholics

children living with an alcoholic parent develops psychopathology but a large percentage of them do indeed develop behavior disord...

Is the Teach-Back Model Effective

This essay follows a different format that usual. Questions are placed in a table with the answers following the question. Color c...

Determining Statistical Tests

Different types of tests may be used for differing purposes and with different types of data. This paper looks at how univariate ...

Digital Information Security

This paper considers the recent data breaches that have compromised our personal security and made identity theft a real threat. ...

A Statistical Analysis of Unemployment in Philadelphia

its foremost functions is to define the relationship between sets of data. This is useful because the relationship can be quantita...