SEARCH RESULTS

YOU WERE LOOKING FOR :Obtaining Information From Theses

Essays 481 - 510

Child Abuse History and Definition

Journal of Psychohistory, deMauses story tells a story of thousands of years of crimes against children, ranging from infanticide ...

Jane Tompkins' Indians Textualism, Morality, and the Problem of History

historians that ignore crucial elements doom those very elements to invisibility for future generations. To Miller, the Indians th...

Review of Anne Twinam's Public Lives, Private Lives

inter-relationships of family, sexuality, and social mobility, are discussed an illuminated as well as the history of Bourbon rule...

Sex Tourism According to Cynthia Enloe

Western Europe cringe - is taken as just another day on the job by women in these countries. According to...

An At-Risk Brooklyn Youth Case Study

involved in drug dealing and in fact, by the time he would turn 14 years old, would carry a gun ("Shawn," 1993). By the time he is...

The Long Shadow by Thomas Berger

native people for their own agendas toward cleaning up the earth. Those in the environmental movement dont seem to care about the ...

Comparing Special Education Teachers with Teachers in a Regular Classroom

teacher with the additional course requirements. As a result these teachers are spending longer periods of time at their college o...

Juvenile Delinquency and A Child's Emotional Needs

contributing to delinquent behavior it may be nearly impossible to formulate an appropriate and meaningful intervention or treatme...

Information Systems Technology Projects Fail

all projects falls between 66 percent and 90 percent depending on which survey data one relies on. Engle (2007) reported that 90 ...

Assumptions About The Male Gender And Eating Disorders

eating disorder can affect those who are average-sized, as well. It is estimated that one to two percent of American adults are b...

Taking Video Games to China

two or three weeks, so that they will get hooked" (Srinivasan, 2005). Indian programmers are indeed being "hooked" and the compan...

Organizational Information Systems

Originally seeking to be a virtual company carrying no inventory of its own (Gruppo, 2000), Amazon abandoned that plan shortly aft...

Data Warehouse Architecture Model For The NHS

This 92 page paper examines the potential of peer to peer (P2P) as an efficient architecture for the UK National Health Service (N...

Epidemiology & STDs

associations, testing hypotheses, and identifying the causes of health-related states or events" (Merrill and Timmreck, 2006, p. 2...

Health People 2010: Low-Income, Low Literate, Diabetic New Yorkers

prevention; one of the most effective ways to achieve this objective is by empowering inadequately literate individuals with the a...

Influences Buying Decision Process

A generally accepted process divided damage different stages, including the recognition, information search, assessment or evaluat...

Article Review Fiscal Issues Knowledge Businesses

Do you ever wonder why some companies work hard to hold large cash reserves and others don't? Companies that need to have a lot of...

Modallity Preferences

We all have a preference in terms of how we want to receive information and how we tend to convey information. This essay describe...

HRIS Discussion

Since the 1990s, information systems have played a key role in managing the functions of this division. Today, human resource info...

The Benefits and Challenges Associated with IFMIS Implementation in a Developing Country

may not only facilitate further donor aid, may also increase the potential level of trust that trading partners or investors may h...

Censorship

in 2005, according to the American Library Association (ALA) (Manzo 26). The ALA defines a "challenge" as "any formal, written com...

Healthcare Associated Infection/MRSA & VRE

guidelines on how to address cleaning and disinfecting issues as they impact on the problem of HAIs. Before offering conclusion, t...

Information Systems and Information Technology: Still Providing a Competitive Advantage?

on the manufacturing sector. There, the author says, the "competitive advantage is provided by integrated information systems" (T...

"Internet and Computer Law: Cases-Comments-Questions": A Discussion of the Principles Illuminated by Authors Peter B. Maggs, John T. Soma, and James A. Sprowl

and Computer Law: Cases-Comments-Questions", a casebook compiled by authors Peter B. Maggs, John T. Soma, and James A. Sprowl, out...

Do Humans Manage Information Systems or are Information Systems Managing Humans?

dependent on their computers could not work. Information systems manage us, not the other way around. Information systems affec...

Federal Shield Law: A Journalist's Right

From anonymous to citizen to professional to criminal, informants are comprised of various types of individuals who uphold an asso...

Coca-Cola Company Analysis

term Coca-Cola and penned the script that we all know so well today (The Coca-Cola Company, Heritage, 2006). Pembertons first fora...

Cognitive Psychology as a Neurological Framework

of cognitive neuropsychology finds its contemporary origins in the 1960s, there are famous cases in history that appear to substan...

The Concept of Learning

along the details of a high-profile news story that illustrates the person has discovered something he did not previously know. T...

Social Networking and the Learning Organization

there are at least six characteristics common to all organizations that others can label as being attuned to learning from events ...