SEARCH RESULTS

YOU WERE LOOKING FOR :The use of Data by Human Resources

Essays 1561 - 1590

Principles of Univariate Data Analysis

of measurement are called into question. Parameters must be set. However, the researcher could choose to report more than just t...

Western Religion - Trends

faith, new scientific discoveries and theories appear to be offering support for many traditional religious views, particularly in...

Tesco's, Technology, and Strategy

If we use Porters five forces the industry may be analyses in terms of existing competitors, the threat of new entrants, substitut...

Education and Enrollment Decline

secure knowledge of basic skills is highly important. In this day and age of technological advancements taking the place of funda...

The Difficult Problem of the Nursing Shortage

Statistics expects that number to rise to more than one million in less than 20 years. The American Nurses Association and Monste...

Data Collection Approaches and Their Strengths and Weaknesses

is suitable to be used as a method of determining cause and effect relationships (Anonymous, 2000). The methodologies will often b...

Organizational Conflict Theoretical Model and Rondell Data Corporation

and negative, as has happened with Rondell. Research, overall, demonstrates that conflict can be multidimensional (Amason,...

Internet Marketing Information Management

is the electronic process of searching for patterns in events that have already occurred (Nash, 1998). The purpose can be to dete...

Internet Marketing Information Management II

In ten pages data mining is discussed with the focus being on opt in mailing list approaches. Thirteen sources are cited in the b...

Overview of Necrotizing Enterocolitis Gastrointestinal Disorder

In six pages NEC is defined with statistical data, surgical alternatives, and management of this medical condition also provided. ...

Case Analysis of Information Systems Management

In five pages this case analysis presents a problem definition regarding privacy invasion through data mining, problem justificati...

A Tutorial on Comcast

Income $1,066 9.6% # Employees 25,700 51.2% At this point, the student may want to include additional fiscal data, such as a com...

Chippewa Cree and the 'Psychological Sense of Community'

in nine pages a community's psychological sense is the focus of this fictional research project on Montana's Chippewa Cree Rocky B...

Overview of the Air Data Computer

In five pages the air data computer is examined in terms of its operations and role in flight crew information relaying. Five sou...

Empirical Data on Divorce and Its Effect on Children

This research paper addresses the facts discovererd by recent research concerning the ramifications of divorce on children. The wr...

U.S. Current Statistics

Full time.............................| 91,868 Part time.............................|...

Minority-Owned Business in the UK and USA

produce twice as many product innovations and significant innovations as large firms, and obtain more patents per sales dollar tha...

Student Case Study on the Seventh Week of a New Product Launch

To break even in period seven we need to divide the amount outstanding at the end of that period by the contributions to get the n...

Shoplifting and Its Effects

loses $23.21. In other words, stores recover very little of the value of the stolen merchandise. Still, the statistics improve in ...

Information Gathering Application of Artificial Intelligence

In five pages the major impact the potential artificial intelligence offers for research applications is considered in the creatio...

Psychology Articles Major Components Assessed

Three articles that appeared in psychology journals are assessed in this paper consisting of fifteen pages which includes data pre...

Bowling Alone Message and Data Assessment

In seven pages the text by Robert Putnam that evaluates America's diminishing attention to social capital maintenance is examined ...

Psychodynamic Theories in Workplace

We know personality theories are used but psychodynamic theories have also been adopted in one way or another in organizations of ...

Digital Information Security

This paper considers the recent data breaches that have compromised our personal security and made identity theft a real threat. ...

Criminal Sexual-type Conduct Data

There have been a number of laws passed and numerous court cases regarding sexual harassment in the workplace. These span more tha...

Outline for Research Utilizing Existing Data

This paper presents a research outline for a research proposal provided by the student. The research proposal is for an ex post f...

Challenges Organizations Face

This essay identifies some of the many risks and challenges organizations and businesses face. This includes things like being hac...

EMAIL MARKETING TESTS -- A PROCESS

Analyzes the results of an email campaign, and suggests methods to interpret data. There are 3 sources in the bibliography of this...

MMPI an Overview

The MMPI is the most commonly used assessment for its purpose, which is to assess personality traits. The design of the instrument...

Public Leaders

This essay describes and discusses four leadership styles that could be used in private or public settings. The behaviors of leade...