SEARCH RESULTS

YOU WERE LOOKING FOR :Role Model Educators

Homeland Security's use of Geographical Information Systems

Homeland Security uses many different forms of technology in their role of protecting the US. One type of technology which is use...

Enlivening American History

This paper reviews the book A Young People's History of the United States. Written by Howard Zinn, this book provides an interest...

Policymaking Security

This essay demonstrates that psychologists are learning how to interview potential terrorists more effectively. It also explains t...

The Election Division of the Secretary of State

In a paper of four pages, the author considers the nature of the Elections Division of the Secretary of State of the State of Main...

Placebo Performance and Instructional Quality

In a paper of seven pages, the writer looks at placebo effectiveness. The role that expectation plays in placebo outcome is explor...

WalMart's Distribution Process

WalMart have a highly integrated logistics and distribution strategy. The writer looks at the way distribution takes place through...

Applying the Concept of the Truth to Organizational Research

The writer looks at how the concept of the truth is perceived and the role of the truth in research. The concept of the truth is e...

Issues in Group Dynamics

In this essay, a hospital was used as the organization that had problems. The research team identified four problems related to gr...

Pancreatic Cancer and Gene Mutations

In a paper of three pages, the writer looks at gene therapies for pancreatic cancer. The role of the KRAS gene is examined through...

Nosocomial Infection Risk and Basin Baths

This research paper begins with a problem statement that concerns the need to reduce the incidence of hospital-acquired (nosocomia...

Security Topics

In a paper of four pages, the writer looks at discussion questions related to security. Terrorism is also considered, as well as t...

Gun Control Debate, An Overview

This research paper offers background information pertaining to the gun control debate and then reviews 5 articles that pertain to...

Research Questions, HAIs and Basin Baths

This research paper discusses the problem of hospital-acquired infections (HAIs) and literature that indicates that traditional ba...

Nigerian Politics and Ethnic Tensions

In a paper of four pages, the writer looks at the issue of Nigerian politics. The role that restorative justice will play in resol...

The Color Purple by Alice Walker, A Critical Analysis

This essay offers critical analysis of Alice Walker's The Color Purple. The writer draws on supporting sources to argue that siste...

Adults and the Controversy Surrounding Video Games

This paper argues that both adults and children can be negatively impacted by violent video games. The medial plays a dual role i...

Child Welfare Policies and Social Workers

In a paper of seven pages, the writer looks at emerging child welfare policies. The role of social workers in creating more ethica...

Teaching Marketing

The writer looks at two issues associated with the teaching of marketing. The first considers the role of marketing in terms of su...

Jazz History, African Influences

This research paper offers a discussion of literature pertaining to the early history of jazz and the African influences that play...

Charismatic Leadership and Steve Jobs

models such as trait-based leadership. It is distinct in that the focus is not so much on the talents an individual possessing tha...

Presidency's Power

is that much attention has been paid to the fact that Hillary Clinton seems to be positioning herself for the presidency. Just rec...

Strategy at BMW

such had more benefit of economies of scope and scale. For example, the merger between Daimler and Chrysler in 1998 had been diffi...

Quran and Woman by Amina Wadud

within a larger holistic framework. For instance, in considering the first verse of the surah, which is entitled "Women" and dis...

Republic by Plato and its Concepts

importance and children were to be guarded from superfluous information to come from for example poetry and literature. Rather, th...

Seeing is Believing by Margaret Miles

religion is treated in Hollywood film; what forces of religion are considered "box office" (i.e., profitable); and what values do...

Asymmetrical Threat Assessment Through Geospatial Applications

"decision support tool " for those who work in the field of homeland security. It tells an observer where someone is, who he is as...

Psychological Articles Summary and Overview

author defines compromise formations as "the data of observation when one applies the psychoanalytic method and observes and/or in...

Examination of Database Security

that information. The database also holds historical records that organizations need for regulatory, operation and planning activ...

Virtual Private Network Between the U.S. and Malaysia and Security Concerns

to consider the complications that might be involved in establishing a virtual private network between Washington and Kuala Lumpur...

Hitler's Germany and the Jim Crow South/Similarities in Regards to Racism

some instances, for example, it refers to the social changes which when a lesser developed country (a preindustrial society in som...