Data Analysis Essays (Examples)

Studyspark

Study Document Study Document

Poverty And Education The Problem And The Solution

Pages: 9 (2580 words) Sources: 7 Document Type:Essay Document #:73771272

… become educated. They do this by interviewing two parents – one parent for the first student and the other for the other student. data was then gathered in the study from the two parents and the families they represent and subsequently analyzed to find out the role … and resources which require finances and usually result in academic success) in how their children were progressing in school. The researchers gathered the data by interviewing the parents. The results of the analysis revealed that the community the parents came from, the schools to which they sent their children, and their homes did not have sufficient … their homes did not have sufficient academic capital, and this hurt how the children were progressing in school. Nevertheless, the results of the analysis also revealed that the parents and their families had access to other types of capital, including academic, social capital, and……

References

Bibliography

The Problem

Compton-Lilly, C., & Delbridge, A. (2019). What Can Parents Tell Us About Poverty and Literacy Learning? Listening to Parents Over Time. Journal of Adolescent & Adult Literacy, 62(5), 531–539.

Dickerson, A., & Popli, G. K. (2016). Persistent poverty and children\\\\\\\\\\\\'s cognitive development: evidence from the UK Millennium Cohort Study. Journal of the Royal Statistical Society: Series A (Statistics in Society), 179(2), 535-558.

Hampden-Thompson, G., & Galindo, C. (2017). School-family relationships, school satisfaction, and the academic achievement of young people. Educational Review, 69(2), 248–265.

Thompson, K., Richardson, L. P., Newman, H., & George, K. (2019). Interaction Effects of Socioeconomic Status on Emerging Literacy and Literacy Skills among Pre-Kindergarten and Kindergarten Children: A Comparison Study. Journal of Human Services: Training, Research, and Practice, 4(1), 5.

The Solution

Borre, A., Bernhard, J., Bleiker, C., & Winsler, A. (2019). Preschool Literacy Intervention for Low-Income, Ethnically Diverse Children: Effects of the Early Authors Program Through Kindergarten. Journal of Education for Students Placed at Risk (JESPAR), 24(2), 132–153.

Comber, B., & Kamler, B. (2004). Getting Out of Deficit: Pedagogies of reconnection. Teaching Education, 15(3), 293–310.

Studyspark

Study Document Study Document

External Environment Of Salesforce

Pages: 3 (1049 words) Sources: 4 Document Type:Essay Document #:20905623

… barriers (Pratap, 2019). It constricts the scope of the business. Also, as the technology is increasing, the governments are moving towards more private data conservation due to which there are frameworks and laws protecting their countries’ data (Salesforce.com SWOT and Pestle Anlaysis, 2018) threatening the growth of the company.
There are some socio-economic threats and challenges as well as the … market. Also, since there has been an upward growth of technology, there are a number of threats that has come with it like data hacking and data stealing. Since it’s a software company, it is prone to hacking and stealing of the data (Salesforce.com SWOT and Pestle Anlaysis, 2018) causing the core competencies of the company to be easily copied and taken advantage of.
Opportunities
There … the software company provides solutions to various companies, the economic factors are very much in favor of the growth of Salesforce……

References

References

Pratap, A. (2019, November 18). PESTEL ANALYSIS OF CRM BRAND SALESFORCE. Notesmatic. Retrieved from  https://notesmatic.com/2019/10/pestel-analysis-of-crm-brand-salesforce/ 

Pratap, A. (2019, March 2). SALESFORCE.COM SWOT ANALYSIS. Notesmatic. Retrieved from  https://notesmatic.com/2018/09/salesforce-com-swot-analysis/ 

Salesforce.com SWOT Analysis, Competitors & USP. (n.d.). MBA Skool. Retrieved from  https://www.mbaskool.com/brandguide/it-technology/2609-salesforcecom.html 

Salesforce.com SWOT and Pestle Anlaysis. (2018, December). S & P Swot and Pestle.com. Retrieved from  https://www.swotandpestle.com/salesforce/ 

Studyspark

Study Document Study Document

Understanding The Factors Affecting The Success Of Credit Risk In

Pages: 11 (3237 words) Sources: 15 Document Type:Research Paper Document #:41178734

… estimation of the likelihood that the prospective borrowers will end up defaulting in their loan obligations. In the course of this process, the analysis of credit risk is purpose to curtail the potential loss to the acceptable levels of risk (Derelioglu and Gurgen, 2011).
The fundamental income ……

References

References

Bhattarai, Y. R. (2016). Effect of credit risk on the performance of Nepalese commercial banks. NRB Economic Review, 28(1), 41-64.

Das, A. and Ghosh, S. (2007). Determinants of Credit Risk in Indian State-owned Banks: An Empirical Investigation. Economic Issues, 12(2): 48-66.

Derelio?lu, G., & Gürgen, F. (2011). Knowledge discovery using neural approach for SME’s credit risk analysis problem in Turkey. Expert Systems with Applications, 38(8), 9313-9318

Garr, D. K. (2013). Determinants of credit risk in the banking industry of Ghana. Developing Country Studies, 3(11), 64-77.

Gizaw, M., Kebede, M., & Selvaraj, S. (2015). The impact of credit risk on profitability performance of commercial banks in Ethiopia. African Journal of Business Management, 9(2), 59-66.

Johnson, B., & Christensen, L. (2008). Educational research: Quantitative, qualitative, and mixed approaches. New York: Sage.

Kithinji, A. M. (2010). Credit risk management and profitability of commercial banks in Kenya. (Doctoral dissertation, University of Nairobi).

Limam, I. (2001). Measuring technical efficiency of Kuwaiti banks. Kuwait: Arab Planning Institute.

Studyspark

Study Document Study Document

Investigative Conclusion And Testimony

Pages: 9 (2819 words) Sources: 6 Document Type:Research Paper Document #:77583608

… note that according to Reddy (2019), owing to their portability and storage capacity, thumb drives are tools commonly used by employees to steal data. In the short summary to be submitted to the laboratory, I would request for specific information relating to; the files that were opened … to other mediums would also be of interest given that Mr. Belcamp could have tried to cover his tracks by either deleting stored data or transferring it to other storage devices.
Question 2: Locations outside of Mr. Belcamp's immediate work space where pertinent digital evidence might be … as court procedures are concerned and it has to adhere to various court rules. To a large extent, the said report details the analysis of the expert witness and the conclusions arrived at as a consequence of the said analysis. To ensure that the expert witness is sufficiently cross-examined, the other parties must……

References

References

Adam, C. (2016). Forensic Evidence in Court: Evaluation and Scientific Opinion. Hoboken, NJ: John Wiley & Sons.

Casey, E. (Ed.). (2009). Handbook of Digital Forensics and Investigation. Burlington, MA: Academic Press.

Maras, M. (2014). Computer Forensics: Cybercriminals, Laws, and Evidence (2nd ed.). Burlington, MA: Jones & Bartlett Publishers.

Newman, R.C. (2007). Computer Forensics: Evidence Collection and Management. New York, NY: CRC Press.

Reddy, N. (2019). Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations. New York, NY: Springer.

U.S. Department of Justice (2018). Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft. Retrieved from  https://www.justice.gov/criminal-ccips/file/891011/download 

Studyspark

Study Document Study Document

Alzhemier S Prevention Healthcare

Pages: 6 (1871 words) Sources: 3 Document Type:Research Article Chart Document #:28350849

… A., & Tabet, N. (2015). Vitamin and mineral supplementation for prevention of dementia or delaying cognitive decline in people with mild cognitive impairment. Cochrane data of Systematic Reviews, (10).
Article 2:
Kwok, T. C. Y., Lam, L. C. W., Sea, M. M. M., Goggins, W., & Woo, J. ……

References

References

Abraham, R. P., Denton, D. A., Al?Assaf, A. S., Rutjes, A. W., Chong, L. Y., Malik, M. A., & Tabet, N. (2015). Vitamin and mineral supplementation for prevention of dementia or delaying cognitive decline in people with mild cognitive impairment. Cochrane Database of Systematic Reviews, (10).

Kwok, T. C. Y., Lam, L. C. W., Sea, M. M. M., Goggins, W., & Woo, J. (2012). A randomized controlled trial of dietetic interventions to prevent cognitive decline in old age hostel residents. European journal of clinical nutrition, 66(10), 1135.

Dangour, A. D., Whitehouse, P. J., Rafferty, K., Mitchell, S. A., Smith, L., Hawkesworth, S., & Vellas, B. (2010). B-vitamins and fatty acids in the prevention and treatment of Alzheimer\\'s disease and dementia: a systematic review. Journal of Alzheimer\\'s disease, 22(1), 205-224.

Studyspark

Study Document Study Document

Privacy In Social Networks Regarding Machine Learning

Pages: 8 (2537 words) Sources: 10 Document Type:Research Paper Document #:98311751

… how machine learning protocols have been developed both to enhance and secure privacy as well as to invade privacy and collect, analyze, predict data based on users’ information and experience online. The conflict between these two directions in machine learning is likely to lead to a system … to lead to a system wherein machine learning algorithms are actively engaged in the subversion of one another, with one attempting to conceal data and the other attempting to uncover it. This paper concludes with recommendations for social networks and the issue of privacy regarding machine learning.
… concludes with recommendations for social networks and the issue of privacy regarding machine learning.
Introduction
Social networks have allowed an ocean of personal data to form that is now sitting there waiting for machine learning algorithms to collect it, analyze it, and recognize individuals on social media … social media (Oh, Benenson, Fritz……

References

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

Studyspark

Study Document Study Document

Application Of Quality And Safety Concepts

Pages: 11 (3179 words) Sources: 8 Document Type:Case Study Document #:72132391

… exchange when patients are shifted between departments or hospitals. Conventionally-performed record sharing of patients is ineffective and time-consuming, as well as puts patient data in jeopardy (i.e., risk of data leaks and loss of confidentiality/ privacy). Inefficient or partial information interchange may be highly dangerous if the patient requires complex or emergency treatment.
… healthcare experience to allow diverse entities participating in the healthcare process (namely physicians, patients, and healthcare insurance and scheme providers) to exchange patient data in a secure and timely manner.
Brief literature review
Federico and Alotaibi (2017) state that ever since the IOM (Institute of Medicine) report … general IT on account of its particular focus and possibly more inflexible and limiting standards and framework. AST (Adaptive Structuration Theory) improves IT analysis, especially in case of new adoption. Based on the 1984 Structuration Theory of Gidden, Poole and…[break]…assess community-based telemonitoring or remote monitoring of patients……

References

Bibliography

Alotaibi, Y. K., & Federico, F. (2017). The impact of health information technology on patient safety. Saudi Med J, 38(12), 1173–1180.

Amit, M. (2019, January 28). 5 Problems Which Healthcare Technology Can Solve for a Healthier World. Retrieved from Net Solutions:  https://www.netsolutions.com/insights/5-healthcare-problems-which-digital-technologies-can-solve-for-a-fit-and-healthy-world/ 

DeSanctis, G., & Poole, M. S. (1994). Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory. Organization Science, 5(2), 121-147.

Feldman, S. S., Buchalter, S., & Hayes, L. W. (2018). Health Information Technology in Healthcare Quality and Patient Safety: Literature Review. JMIR Med Inform, 6(2).

Halamka, J., Mandl, K., & Tang, P. (2008). Early Experiences with Personal Health Records. Journal of the American Medical Informatics Association, 15(1), 1-7.

IOM. (1999). To Err is Human: Building a Safer Health System. National Academy of Sciences.

Singh, H., & Sittig, D. (2016). Measuring and improving patient safety through health information technology: The Health IT Safety Framework. BMJ Quality & Safety, 25, 226-232.

Weigel, F., Hall, D. J., & Landrum, W. H. (2009). Human/Technology Adaptation Fit Theory for Healthcare. SAIS 2009 Proceedings.

Studyspark

Study Document Study Document

Terrorist Group IRA

Pages: 8 (2476 words) Sources: 8 Document Type:Essay Document #:71228383

… reviewing the literature available on the IRA and by conducting interviews using Zoom with different generations of Irish Catholics, this study will produce data that will be used to fill the gap in present literature regarding the IRA and why it came about whether it still holds … The IRA wanted a victory in socio-political terms—a victory for Catholic Ireland in ideological terms. The co-founder of the IRA, Sean…[break]…subjects experience. The data collected is usually analyzed in a subjective manner.
While it is true that both qualitative and quantitative studies can have hypotheses, the reality … quantitative studies tend to have testable hypotheses while qualitative studies tend to formulate an hypothesis during the iterative process of obtaining and analyzing data. In other words, a quantitative study will pose hypotheses at the outset and then set about testing them to see whether they can … qualitative study on the other……

References

References

Bamford, B. (2005). The Role and Effectiveness of Intelligence in Northern Ireland. Intelligence and National Security, 20(4), 581-607.

Bell, J. B. (2008). The Secret Army: The IRA. London: Transaction Publishers.

IRA Green Book. (1977). Accessed 14 Dec 2015 from  https://tensmiths.files.wordpress.com/2012/08/15914572-ira-green-book-volumes-1-and-2.pdf 

Maloney, E. (2010). Voices from the Grave: Two Men’s War in Ireland. NY: Faber, Faber.

O’Brien, B. (1999). The Long War: The IRA and Sinn Fein. NY: Syracuse University Press.

Rooney, N. (2007). Violent nationalism in catholic communities: The Provisional IRA and ETA. Studies in Ethnicity and Nationalism, 7(3), 64-77.

Shanahan, Timothy. (2008). The Provisional IRA and the Morality of Terrorism. UK: Edinburgh University Press.

Taylor, P. (2001). Brits. UK: Bloomsbury Publishing.

Studyspark

Study Document Study Document

Developing A Research Hypothesis

Pages: 8 (2368 words) Sources: 10 Document Type:Essay Document #:36304259

… is a core aspect of the medical profession. EBM provides statistical analyses and matters of clinical concern. It is based on research, reading, analysis, and combining many papers generated within the medical fraternity. EBM applications based on research evidence and clinical knowledge and reviews of the system … care extended to the patient (Eriksen & Frandsen, 2018).
The PICO framework encourages designing clinical questions based on the four categories of clinical data: i. the population referred to by the question, ii. The intervention used in the population, iii. the comparison criteria and iv. the results … PICO. While it can be used to create research questions associated with a diagnosis or prognosis, it is not suitable for certain clinical data requirements. Apart from being used as a tool for developing concepts for research and clinical questions, the model can be applied to develop ……

References

References

Considine, J., Shaban, R. Z., Fry, M., & Curtis, K. (2017). Evidence-based emergency nursing: designing a research question and searching the literature. International emergency nursing, 32, 78-82.

Eriksen, M. B., & Frandsen, T. F. (2018). The impact of patient, intervention, comparison, outcome (PICO) as a search strategy tool on literature search quality: a systematic review. Journal of the Medical Library Association: JMLA, 106(4), 420.

Yuan, X., Xiaoli, L., Shilei, L., Qinwen, S., & Ke, L. (2019, May). Extracting PICO elements from RCT abstracts using 1-2gram analysis and multitask classification. In Proceedings of the third International Conference on Medical and Health Informatics 2019 (pp. 194-199).

Scells, H., Zuccon, G., Koopman, B., Deacon, A., Azzopardi, L., &Geva, S. (2017, November). Integrating the framing of clinical questions via PICO into the retrieval of medical literature for systematic reviews. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management (pp. 2291-2294).

Basmaci, R., Vazouras, K., Bielicki, J., Folgori, L., Hsia, Y., Zaoutis, T., &Sharland, M. (2017). Urinary tract infection antibiotic trial study design: a systematic review. Pediatrics, 140(6).

Misra, D. P., & Agarwal, V. (2018). Systematic reviews: challenges for their justification, related comprehensive searches, and implications. Journal of Korean medical science, 33(12).

Belcher, B. M., Rasmussen, K. E., Kemshaw, M. R., &Zornes, D. A. (2016). Defining and assessing research quality in a transdisciplinary context. Research Evaluation, 25(1), 1-17.

Fu, D. Y., & Hughey, J. J. (2019). Meta-Research: Releasing a preprint is associated with more attention and citations for the peer-reviewed article. Elife, 8, e52646.

Studyspark

Study Document Study Document

The Extent To Which Group Policy Evaluation Vs Individual Evaluation

Pages: 3 (999 words) Sources: 3 Document Type:Essay Document #:33568686

… evaluation vs. individual evaluations differ is that context is the deciding factor, and contextual factors are always shifting. Therefore, a case by case analysis is required rather than a one size fits all universal evaluation. As Briggs and Helms (2015) explain, there are actors and roles and … into subjective experiences. Qualitative research focuses on exploring a problem and investigating it using in-depth methods such as interviews, focus groups, case study analysis or immersion into the field to experience firsthand what the subjects experience. The data collected is usually analyzed in a subjective manner. Quantitative research is more concerned with testing a hypothesis and identifying variables to see what … a subjective manner. Quantitative research is more concerned with testing a hypothesis and identifying variables to see what their relationship is. It collects data that is more objectively analyzed via statistical analysis, such as t-tests or chi-square tests, and……

References

References

Briggs, S., & Helms, L. B. (2015). The practice of American public policymaking. New York: Routlege Taylor & Francis Group.

Reich, R. (Harvard Book Store, Producer). (2010). Robert B. Reich: The next economy and Americla's future. Frontline: Inside the Meltdown Series. [Video] Retrieved from [ https://forum-network.org/lectures/robert-b-reich-the-next-economy-and-america-s-future/ ]

Schaufele, B., McMillian, M. L., Boxall, P. C., Adamowicz, W. L., & Rivera, C. S. (2010). Measuring social preferences in groups versus as individuals: Income inequality aversion using the leaky bucket method. Journal of Applied Economics and Policy, 29(1), 1-1

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".