SEARCH RESULTS

YOU WERE LOOKING FOR :Two Data Sets Assessed

Essays 991 - 1020

Hospital Upgrades IT Again

Memorial Hermann is a hospital system in Houston. This institution has been on the cutting edge of technology for years. They have...

Determining Statistical Tests

Different types of tests may be used for differing purposes and with different types of data. This paper looks at how univariate ...

Digital Information Security

This paper considers the recent data breaches that have compromised our personal security and made identity theft a real threat. ...

Title IX Violations Colleges

Sexual harassment is covered under Title IX of the Educational Amendments of 1972. The EEOC defines this as unwelcome sexual advan...

Case STudy Hospital Readmissions

Hospital readmissions of patients is upsetting to patients and families, especially when that readmission occurs within 30 days of...

Hackers Against Retail Stores

This essay focuses on the hackers that were able to access credit card data and information from Target's network. The paper repor...

Issues with RHIOs

A RHIO is a type of health information exchange organization where certain professionals upload health/medical data and other prof...

Difficulty Proving Employee is Stealing

Unless an employee does something outlandish, it is very difficult to prove he or she is stealing from the company. In this essay,...

Legalizing Marijuana Compared to the Prohibition

Special interest groups and propaganda played a strong role in Prohibition and they have played a strong role in drug laws today, ...

EMAIL MARKETING TESTS -- A PROCESS

Analyzes the results of an email campaign, and suggests methods to interpret data. There are 3 sources in the bibliography of this...

Corrupt Officials in the World

The UN reported there was an inverted U-relationship between democracy and corruption in public officials. Numerous reports do not...

Teenage Substance Abuse Treatment

Most programs intended to stop teenagers from using and abusing substances fail because the teenager does not want to be there and...

Final Project Proposal, Childhood Obesity Research

This paper offers an overview of the plans for a research study that pertains to childhood obesity. The study will target a specif...

Computer Vulnerabilities in the Energy Industry

Cyber security is an important issue within the energy sector. The Stuxnet targeting of Iranian nuclear facilities demonstrated th...

Nursing Scholarships and Practice

This 4 page paper gives an overview of using concept analysis within the field of nursing. This paper explains how different appro...

Teen Obesity

This research paper pertains to data on the prevalence of obesity among American adolescents. This information reveals that it is ...

Organizations, Communities, Poverty

can and do influence the characteristics of the organizations within the society" (p. 76). It is also true that the industry withi...

Project: Largest Cruise Ship in World

that even with this economic downturn, the company has experienced strong pre-bookings for the cruises (Barnes, 2009). STX Finlan...

Development and Budgeting for a Remuneration Package

a group of workers who were placed in marginally improved working condition, this group of people demonstrated an increase in prod...

Health Care Marketing - A Binary Approach

purposes of this example, one might consider Southwest General Hospital in San Antonio, Texas. This facility makes for a good exam...

Healthy People 2020

who have these risks. They are: inactivity, 39.5 percent; obesity, 33.9 percent; high blood pressure, 20.5 percent; cigarette smok...

Patient Harassment of Nurses

had even been stalked by patients (Global Forum for Health Research, 2000). A major study in Australia found that there is a sign...

Gas Prices Assessed Econometrically

to modern business. OPEC began increasing oil prices less than two years later; the country and indeed the entire developed world...

Data Protection Act of 1998

being largely inconsequential. Verkaik (2002) reports that, rather than serving to protect the public from abuse of the Data Prot...

The Impact of Multinational Labor On Host Nations

and Prague (Bello, 2001). The demonstrators argued that multinational corporations, i.e., globalization, ruins the host nations i...

Safety in Schools

remains a mystery. Professor Ewing has studied juvenile murders for years and has written several books about this topic (Perrita...

Corporate Governance

is why incentive awards are generous (SEC, 2010). Further, the salaries themselves are directly linked to that executives performa...

Intimidation

the most recent evolution of this age-old behavior. Cyber-bullying refers to use of any type of technology such as cell phones and...

Capacity Planning: The Strategic Value

clearly aware at all times of such matters as the number of workers in an organization, their various competencies, the number of ...

IT Auditing and Internal Controls: Personal Experiences

it is secure, and companies that fail to secure vital information are at risk for a data breach. Studies show that data breaches a...