Case Studies Essays (Examples)

Studyspark

Study Document Study Document

Understanding The Value Of Qualitative Research

Pages: 6 (1754 words) Sources: 8 Document Type:Research Paper Document #:52738822

Understanding the Value of Qualitative Research
Qualitative researchers have a number of different research strategies available to them, including case studies, phenomenology, grounded theory and ethnography. Each of these research strategies has its respective strengths and weaknesses, but ethnography in particular represents a special ……

References

References

Abrahams, M. (2011, March 10). Boxing proves a hit for French sociologist. The Guardian. Retrieved from  https://www.theguardian.com/education/2011/jan/10/improbable-research-boxing-sociologist .

Asselin, M. E. (2009, March-April). Insider research: Issues to consider when doing qualitative research in your own setting. Nurses in Professional Development, 19(2), 99-103.

Burress, C. (2003, December 8). UC’s ‘boxing sociologist’ / Combative French professor spent 3 years in ring. SFGate. Retrieved from  https://www.sfgate.com/bayarea/article/UC-s-boxing-sociologist-Combative-French-2509824.php#photo-2684464 .

Creswell, J. W. (2003). Qualitative inquiry and research design: Choosing among five traditions. Thousand Oaks, CA: Sage Publications.

Creswell, J. W., & Creswell, J. D. (2018). Research design: Qualitative, quantitative, and mixed methods approaches (5th ed.). Retrieved from  https://content.ashford.edu 

Ishioka, T. (2015, March). How can one be a boxer?: Pain and pleasure in a Manila boxing camp. International Journal of Japanese Sociology, 24(1), 92-105.

Neuman, W. L. (2003). Social research methods: Qualitative and quantitative approaches, 5th ed. New York: Allyn & Bacon.

Wacquant, L. (2011). Habitus as topic and tool: Reflections on becoming a prizefighter. Qualitative Research in Psychology, 8(1), 81-92.

Studyspark

Study Document Study Document

Government Politics And Political Corruption Values

Pages: 4 (1102 words) Sources: 5 Document Type:Annotated Bibliography Document #:94706420

… government activities. Rigging and bribery are extreme examples of this type of corruption. The authors analyze the quantitative indicators of corruption, and provide case study examples of policy reform but also of instances in which such policies failed. Ultimately, this source corroborates the others used in my … methods used to measure and assess corruption, and also how to analyze the causal variables implicated in government corruption. In fact, Newell offers case study examples from different types of contemporary governments including both democratic and non-democratic regimes. One of the unique features of the book is … the other sources and will become a valuable source of information.
Annotation 4
Prato G.B. (2019) On the Legitimacy of Democratic Representation: Two case studies from Europe. In: Pardo I., Prato G. (eds) Legitimacy. Palgrave studies in Urban Anthropology. Palgrave Macmillan, Cham
This research covers the issues of political representation and political change……

Studyspark

Study Document Study Document

Understanding The Factors Affecting The Success Of Credit Risk In

Pages: 11 (3237 words) Sources: 15 Document Type:Research Paper Document #:41178734

...Case studies Introduction
The banking business sector is enormously impacted by the perceptive and imperceptive factors in an intensely competitive environment. In recent times, this competition has stiffened all the more with the advancement of globalization. In each regard of their business operations, banks ought to take effective measures in order to diminish risk by pinpointing the prospective causes based on real-world circumstances. Imperatively, the banking sector is deemed to be a significant source of financing for several companies and entrepreneurs. In the past decade, there have been dramatic changes concerning the management of risk in the banking industry. Progressively more financial institutions and managers have augmented the focus on the significance of risk management. In delineation, risk management encompasses the practice of identifying, assessing and listing of risks followed by organized and cost-effective application of resources to curtail, supervise and control the probability and influence of disastrous events or to capitalize……

References

References

Bhattarai, Y. R. (2016). Effect of credit risk on the performance of Nepalese commercial banks. NRB Economic Review, 28(1), 41-64.

Das, A. and Ghosh, S. (2007). Determinants of Credit Risk in Indian State-owned Banks: An Empirical Investigation. Economic Issues, 12(2): 48-66.

Derelio?lu, G., & Gürgen, F. (2011). Knowledge discovery using neural approach for SME’s credit risk analysis problem in Turkey. Expert Systems with Applications, 38(8), 9313-9318

Garr, D. K. (2013). Determinants of credit risk in the banking industry of Ghana. Developing Country Studies, 3(11), 64-77.

Gizaw, M., Kebede, M., & Selvaraj, S. (2015). The impact of credit risk on profitability performance of commercial banks in Ethiopia. African Journal of Business Management, 9(2), 59-66.

Johnson, B., & Christensen, L. (2008). Educational research: Quantitative, qualitative, and mixed approaches. New York: Sage.

Kithinji, A. M. (2010). Credit risk management and profitability of commercial banks in Kenya. (Doctoral dissertation, University of Nairobi).

Limam, I. (2001). Measuring technical efficiency of Kuwaiti banks. Kuwait: Arab Planning Institute.

Studyspark

Study Document Study Document

Social Skills Training With Autism In Secondary Classroom

Pages: 10 (3100 words) Sources: 10 Document Type:Research Proposal Document #:23519150

… the theory or evidence or practice is really regarded to be evidence-based. The types of research that are considered include meta-analyses, efficacy research studies, effectiveness research concerning interventions, process-outcome studies, ethnographic studies, public health studies, single-case experimental studies, systematic case studies, qualitative research studies, and clinical observations (APA, 2006).
In short, the APA requires the consideration of rigorous research studies to establish evidence as well as the use of professional knowledge when providing treatment to patients. This is evidence-based practice according…[break]…2018). Works will … another language which is not English (2) include young people with other intellectual disabilities (3) are protocols, theses, abstracts, conference proceedings, or reviews. studies not in English will be excluded to reduce possible translation errors or lost cultural meanings, while studies including children with intellectual disabilities will be excluded to ensure low sample heterogeneity.
Quality Assessment: Risk of Bias
Two independent reviewers will separately ………

References

References

Adams, C., Lockton, E., Freed, J., Gaile, J., Earl, G., McBean, K., ... & Law, J. (2012). The Social Communication Intervention Project: a randomized controlled trial of the effectiveness of speech and language therapy for school?age children who have pragmatic and social communication problems with or without autism spectrum disorder. International Journal of Language & Communication Disorders, 47(3), 233-244.

Adams, C., Lockton, E., Freed, J., Gaile, J., Earl, G., McBean, K., Nash, M., Green, J., Vail, A., and Law, J. (2011). An evidence-based program for school, & aged children: Social communication intervention project. Research report. Uppsala: Inst.

American Psychological Association (APA) (2006). Evidence-Based Practice in Psychology. American Psychologist, 61(4), 271–285. doi: 10.1037/0003-066X.61.4.271

Cohen, J. (2013). Statistical power analysis for the behavioral sciences. Routledge.

Egger, M., Smith, G. D., Schneider, M., & Minder, C. (1997). Bias in meta-analysis detected by a simple, graphical test. Bmj, 315(7109), 629-634.

Higgins, J. P., & Green, S. (Eds.). (2011). Cochrane handbook for systematic reviews of interventions (Vol. 4). John Wiley & Sons.

Hutchins, N. S., Burke, M. D., Bowman-Perrott, L., Tarlow, K. R., & Hatton, H. (2019). The Effects of Social Skills Interventions for Students With EBD and ASD: A Single-Case Meta-Analysis. Behavior modification, 0145445519846817.

Radley, K. C., O’Handley, R. D., & Sabey, C. V. (2017). Social Skills Training for Children and Adolescents with Autism Spectrum Disorder. In Handbook of Treatments for Autism Spectrum Disorder (pp. 231-254). Springer, Cham.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in … behavior for intelligence gathering though it is a form of unacceptable…[break]…data. For this study, the researcher will adopt an exploratory approach to qualitative case study to gain a deeper understanding of the acceptability of cyber espionage. Semi-structured interviews will be conducted on a representative sample from a … of cyber espionage. Semi-structured interviews will be conducted on a representative sample from a group of professionals within this field and examine existing case on cyber espionage by China and Russia.
Since this research is a qualitative design, the researcher will first code the data collected to … While the research design will……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf 

National Counterintelligence and Security Center. “Foreign Economic Espionage in Cyberspace.” Office of the Director of National Intelligence, 2018.  https://www.dni.gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf 

Rubenstein, D. “Nation State Cyber Espionage and its Impacts.” Washington University in St. Louis, December 2014.  https://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/ 

Weissbrodt, D. “Cyber-Conflict, Cyber-Crime, and Cyber-Espionage.” Minnesota Journal of International Law 22, no. 2 (2013).

Studyspark

Study Document Study Document

Is Homegrown Terrorism A Real Threat In The US Chesser Report

Pages: 1 (342 words) Sources: 1 Document Type:Essay Document #:38450443

… skepticism is justified, considering the lengths to which the intelligence community will go to engage in counter-intelligence.
However, not knowing anything about the case other than what is contained in the Chesser Report (Majority and Minority Staff Senate Committee on Homeland Security and Governmental Affairs, 2012), I … the aid of our intelligence agencies.
References
Majority and Minority Staff Senate Committee on Homeland Security and Governmental Affairs. (2012). Zachary Chesser: A case Study in Online Islamist Radicalization and Its Meaning for the Threat of Homegrown Terrorism.…

References

References

Majority and Minority Staff Senate Committee on Homeland Security and Governmental Affairs. (2012). Zachary Chesser: A Case Study in Online Islamist Radicalization and Its Meaning for the Threat of Homegrown Terrorism.

 

Studyspark

Study Document Study Document

Criminal Profiling Of Serial Killers

Pages: 12 (3545 words) Sources: 10 Document Type:Essay Document #:59713406

Does Criminal Profiling Work or is it Unjustified The case of Tim Masters
Introduction
Criminal profiling allows law enforcement to develop their understanding of particular types of crime, criminals, criminal behaviors, and crime-ridden … has definitions and typographies that can be used to assist law enforcement investigations in the identification of or search for serial killers in case where serial killing is suspected. The term serial killer stems from the Son of Sam killings in the 1970s when the phrase serial … the social-psychology field. Biology, society, and psychology are often studied to help researchers better understand what goes into making a serial killer, and case studies like those of Ted Bundy help researchers identify patterns and behaviors that are common among serial killers (Samuel & Widiger, 2007). To develop … Gilles de Rais of the 15th century in France, to Jack the Ripper in 19th century England, the West……

References

References

Alldredge, J. (2015). The" CSI Effect" and Its Potential Impact on Juror Decisions. Themis: Research Journal of Justice Studies and Forensic Science, 3(1), 6.

Bonn, S. (2019). How the FBI Profiles Serial Offenders. Retrieved from https://www.psychologytoday.com/us/blog/wicked-deeds/201905/how-the-fbi-profiles-serial-offenders

Dogra, T.D. et al. (2012). A psychological profile of a serial killer: A case report. Omega: Journal of Death & Dying 65(4), 299-316.

FBI. (2019). Summary of the Uniform Crime Reporting Program. Retrieved from  https://www2.fbi.gov/ucr/killed/2009/aboutucr.html 

Karson, M. (2017). Why Profiling Serial Killers Can’t Work. Retrieved from https://www.psychologytoday.com/us/blog/feeling-our-way/201711/why-profiling-serial-killers-can-t-work

Miller, L. (2014). Serial killers: I. Subtypes, patterns and motives. Aggression and Violent Behavior 19, 1-11.

Samuel, D. B., & Widiger, T. A. (2007). Describing Ted Bundy's personality and working towards DSM-V. Practice, 27, 20-22.

Sarteschi, C. M. (2016). Serial Murder. In Mass and Serial Murder in America (pp. 45-67). Springer, Cham.

Studyspark

Study Document Study Document

The Immigrant Advantage

Pages: 5 (1640 words) Sources: 1 Document Type:Book Review Document #:54416483

… provide through their own cultural experiences. The first chapter shows how to save money and uses the Vietnamese immigrants in America as the case study for this good habit. The second chapter focuses on how to take care of one’s parents and looks at the Hispanic-American culture ……

References

Works Cited

Kolker, Claudia. The Immigrant Advantage. Free Press, 2011.

 

Studyspark

Study Document Study Document

Death Penalty In Canada

Pages: 10 (3008 words) Sources: 5 Document Type:Essay Document #:67727921

… for crime? The concept of an “eye for an eye” punishment is an ancient one that stretches back thousands of years. In the case of premeditated murder, therefore, one might well ask whether the forfeit of one’s own life for the deliberate killing of another is fair. … virtue. Can it be said that the death penalty might assist one in obtaining virtue? It is possible that this could be the case. For instance, if one is deterred from unleashing one’s violent rage on another because one knows he might have to die if he ……

References

Works Cited

Capote, Truman. In Cold Blood. NY: Vintage, 1994.

Holmes, A. Ethics: Approaching moral decisions. Downers Grove, IL: InterVarsity Press, 2007.

Hursthouse, Rosalind. “Virtue Ethics.” Stanford Encyclopedia of Philosophy, 2016. https://plato.stanford.edu/entries/ethics-virtue/

Kronenwetter, M. Capital Punishment: A Reference Handbook. CA: ABC-CLIO, 2001.

Robbins, Tim, dir. Dead Man Walking. Gramercy Pictures, 1995. Film.

Studyspark

Study Document Study Document

Confidentiality Breach And Unfair Dismissal Law

Pages: 5 (1435 words) Sources: 5 Document Type:Memorandum Document #:19305184

… convinced that the company does indeed have significant strengths in as far as its legal claim is concerned. This is more so the case given that Jennifer Lawson did indeed sign a confidentiality agreement whereby she made a commitment to keep any information gathered relating to the … this text not only analyze the facts and laws relevant to the scenario presented, but also evaluate the various facts to be determined. case that support the position of Greene’s Jewelry will also be highlighted.
II. Client’s case
A. Facts and Laws
Jennifer has been sued by Greene’s Jewelry for breach of the confidentiality agreement she signed. In the said confidentiality ……

References

References

Bagley, C.E. (2012). Managers and the Legal Environment: Strategies for the 21st Century (7th ed.). Mason, OH: Cengage Learning.

Chociey, E.F. (2018). The Defend Trade Secrets Act of 2016: An Overview and Analysis of the Statute Establishing a Federal Civil Cause of Action for Trade Secret Misappropriation and Notable Case Law to Date. Retrieved from https://www.lexology.com/library/detail.aspx?g=a6c6cf8f-5d89-4cbd-9c64-82ca38e53006

Justia (2020). Chestnut v. Stone Forest Industries, Inc., 817 F. Supp. 932 (N.D. Fla. 1993). Retrieved from https://law.justia.com/cases/federal/district-courts/FSupp/817/932/1459432/

Peacock, W. (2013). Breach of Contract, Confidential Info Leak Case: Hallmark Prevails. Retrieved from https://blogs.findlaw.com/eighth_circuit/2013/01/hallmark-prevails-in-breach-of-contract-confidential-info-leak-case.html

U.S. Department of Labor (2020). Plant Closings and Layoffs. Retrieved from https://www.dol.gov/general/topic/termination/plantclosings

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".