SEARCH RESULTS

YOU WERE LOOKING FOR :The use of Data by Human Resources

Essays 1381 - 1410

Discrimination of Religion

Christians, Muslims, and Jews are the most discriminated religious groups in the world. This essay provides data about religious d...

Women Earn Less Than Men

Laws were passed five decades ago that mandated equal pay for equal work. That goal has not been realized. Women still earn about ...

Too Few Women Senators

Historically, very few women have has access in the political arena. This is beginning to change. While there are more in both Hou...

Hungry Children in America

This essay reports statistical data regarding families living below the poverty line and the numbers of children who are food inse...

An Example of Investment Appraisal Using NPV

Net present value is a method used to compare and contrast different potential investments. The process discount future net cash ...

Speech Recognition Medication Dictation Technology

This research paper pertains to speech recognition software that is used in regards to creating medical reports, such as those use...

Disparities in Health Care Access

Not every American has the same opportunity to access and receive quality health care services. There are a number of social, econ...

Psychodynamic Theories in Workplace

We know personality theories are used but psychodynamic theories have also been adopted in one way or another in organizations of ...

Digital Information Security

This paper considers the recent data breaches that have compromised our personal security and made identity theft a real threat. ...

Criminal Sexual-type Conduct Data

There have been a number of laws passed and numerous court cases regarding sexual harassment in the workplace. These span more tha...

Challenges Organizations Face

This essay identifies some of the many risks and challenges organizations and businesses face. This includes things like being hac...

Outline for Research Utilizing Existing Data

This paper presents a research outline for a research proposal provided by the student. The research proposal is for an ex post f...

EMAIL MARKETING TESTS -- A PROCESS

Analyzes the results of an email campaign, and suggests methods to interpret data. There are 3 sources in the bibliography of this...

Public Leaders

This essay describes and discusses four leadership styles that could be used in private or public settings. The behaviors of leade...

MMPI an Overview

The MMPI is the most commonly used assessment for its purpose, which is to assess personality traits. The design of the instrument...

Difficulty Proving Employee is Stealing

Unless an employee does something outlandish, it is very difficult to prove he or she is stealing from the company. In this essay,...

Data Collection Tools/Patient Safety

This research paper addresses selection of data collection and other relevant tools for use in a quality improvement project that...

4 Ps and New Product

This paper presents a case study about a brewery that wants to introduce a non-alcoholic beer to the market and uses the 4Ps metho...

Document Output Forms

provided by a digital card or mini CD. Color Photograph A color photograph that someone wants to frame and hang on a wall...

Information Security at Mayo Foundation

location and less obvious measures like monitoring Internet usage and document designations. While Mayo has an identified office ...

Marketing a Commodity; Coffee

Ps; product, price, placement and promotion. The first piece that of product. This is not only the commodity itself but the way in...

Identity Theft, Data Analysis and a Trend in Enterprise Integration

customers will immediately and the business relationship, and a further 40% will consider the ending of that relationship (Frieden...

Special Education Issues & Policy

with an appropriate education" (Douvanis and Husley). As this definition suggests, in general LRE is interpreted to mean general e...

A Hypothetical Research Study/Chessie System

agreed upon strategy," in which the CPS employees works cooperatively with parents to reduce risk, moving families toward specific...

Criminal Justice Issues

effect of showing mercy to the Manson murderers when they exhibited no mercy towards their innocent victims. According to Charlo...

Data Security Policies: A Comparison of Three Health Care Facility Policies

any unlawful or inappropriate use. Nor may such use result in "personal financial gain or the benefit of any third party", waste ...

Language and Communication Problems Associated with Learning Disabilities (ADD/ADHD) in the School Age Child

maintain that these individuals experience "deficits in behavioral, emotional, academic, and social functioning" that follow them ...

Brain Response/Males & Aggression

et al, 2006). In this study, it was found that girls at every age demonstrated "more self-regulated, committed compliance and less...

Structural Inequality And Diversity

Plessy vs. Ferguson case in 1896, the court ruled that "separate but equal" was fine, it was okay to have separate schools for whi...

Defense Spending and Fiscal Policy

This paper addresses pertinent data relating to military spending increases since 1990. This five page paper has five sources in ...