Data Collection Essays (Examples)

Studyspark

Study Document Study Document

CFOs Big Data Opportunities In Firms

Pages: 7 (2057 words) Sources: 6 Document Type:Research Paper Document #:26742092

Introduction
The growth of big data has had significant transformative effects on several industries including technology, agriculture, health, education, and finance. Over the past decade, the number of humans … finance. Over the past decade, the number of humans using smartphones has increased tremendously and this has created a big pool of user data as smartphone users stamp their digital footprint all over the web. The electronic data collected as a result of these activities yield Big data that provide valuable insights to decision-makers looking for data points to inform their decision processes. The growth of Big data has necessitated the development of computer algorithms and tools that can analyze the data at scale. Good analysis and interpretation of the data allow organizations to ‘co-create’ solutions alongside their target users and create new value that is highly tailored to the needs of the market … the needs of the market……

References

References

Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and analytics: From big data to big impact. MIS quarterly, 36(4).

Jin, X., Wah, B. W., Cheng, X., & Wang, Y. (2015). Significance and challenges of big data research. Big Data Research, 2(2), 59-64.

Joshi, N. (2018). How Big Data Can Transform the Finance Industry. Retrieved October 7, 2019, from  https://www.bbntimes.com/en/technology/big-data-is-transforming-the-finance-industry .

Nath, T. I. (2019). How Big Data Has Changed Finance. Retrieved October 7, 2019, from  https://www.investopedia.com/articles/active-trading/040915/how-big-data-has-changed-finance.asp .

Turner, D., Schroeck, M., & Shockley, R. (2013). Analytics: The real-world use of big data in financial services. IBM Global Business Services, 27.

Yin, S., & Kaynak, O. (2015). Big data for modern industry: challenges and trends [point of view]. Proceedings of the IEEE, 103(2), 143-146.

Zhou, K., Fu, C., & Yang, S. (2016). Big data driven smart energy management: From big data to big insights. Renewable and Sustainable Energy Reviews, 56, 215-225.

Studyspark

Study Document Study Document

Security Of Computers Data

Pages: 2 (729 words) Sources: 3 Document Type:Essay Document #:20542054

… to maintain the strategic focus while ensuring that nothing is missed as they are performing the forensic investigation. There are numerous information and data that one will uncover in the performance of their duty. Therefore, one is required to be able to maintain objectivity when evaluating information … which the RCFL’s focus
The RCFL mainly focuses on providing forensic services and expertise aimed at supporting the law enforcement agencies in the collection and examination of digital evidence. The cases handled by the RCFL include Child pornography, fraud, terrorism,…[break]…Bureau of Investigation (July 2, 2019) when a ……

References

References

Federal Bureau of Investigation. (July 2, 2019). Workers’ Compensation Fraud.  https://www.fbi.gov/news/stories/workers-compensation-fraud-conspirators-sentenced-070219 

Kentucky RCFL. (June 6, 2013 ). Louisville Man Guilty of Harboring 20,000 Images of Child Pornography.  https://www.rcfl.gov/kentucky/news 

Regional Computer Forensic Laboratory. (n.d.). About the RCFL. Retrieved from  https://www.rcfl.gov/about 

Studyspark

Study Document Study Document

Discriminating Between Phenomenology And Grounded Theory Qualitative

Pages: 7 (2226 words) Sources: 7 Document Type:Case Study Document #:86692193

… (Starks & Brown Trinidad, 2007). The methods used for grounded theory approaches to research in the social science include observations and other ethnographic data collection techniques, coupled with open coding for data analysis (Creswell, 2013). Interviews are one of the most commonly used data collection methods in grounded theory, and is also used often in phenomenological research (Wimpenny & Gass, 2000). While the goals of grounded theory research … research participants and sample populations, phenomenology focuses more on the abstract qualities and categories of lived human experience (Creswell, 2013). In phenomenological research, data collection can also be ethnographic in nature or include specific methods like interviews and focus groups. Like grounded theory, phenomenology usually entails the recognition … an observer. The researcher used online discussion groups, serving as moderator and facilitator to stimulate the types of discussions that would yield viable data for the grounded theory research.
Applying the……

References

References

Baker, C., Wuest, J., & Stern, P. N. (1992). Method slurring: the grounded theory/phenomenology example. Journal of Advanced Nursing, 17(11), 1355–1360.doi:10.1111/j.1365-2648.1992.tb01859.x 

Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing among five approaches. eBook.

Norton, S.M. (2013). A phenomenological investigation into the self-efficacy beliefs of teachers who have presisted in the teaching profession. Liberty University Dissertation.

Starks, H., & Brown Trinidad, S. (2007). Choose Your Method: A Comparison of Phenomenology, Discourse Analysis, and Grounded Theory. Qualitative Health Research, 17(10), 1372–1380.doi:10.1177/1049732307307031 

Suddaby, R. (2006). From the Editors: What Grounded Theory is Not. Academy of Management Journal, 49(4), 633–642.doi:10.5465/amj.2006.22083020 

Wimpenny, P. & Gass, J. (2001). Interviewing in phenomenology and grounded theory: is there a difference? Journal of Advanced Nursing 31(6): 1485-1492.

Yalof, B. (2014). Marshaling resources. The Grounded Theory Review 13(1).

Studyspark

Study Document Study Document

School Uniforms

Pages: 5 (1474 words) Sources: 5 Document Type:Essay Document #:15058485

… Likert-type questions, and multiple choice questions. Students’ responses to Likert-type questions will be rated on a scale of 1 to 5. The two data collection instruments are suitable for the study since they will help generate qualitative and quantitative data that can be analyzed to draw relevant conclusions on the issue.
Proposed data Analysis Method
The proposed data analysis techniques for this study are triangulation and statistical analyses. Triangulation will be carried out on qualitative data to generate qualitative codes based on emerging themes and patterns. The codes will then be entered into a statistical analysis software alongside quantitative … to generate qualitative codes based on emerging themes and patterns. The codes will then be entered into a statistical analysis software alongside quantitative data to generate a single comprehensive data. The integrated data will be analyzed using statistical software SPSS version 2.0 to generate findings and relevant conclusions on……

References

References

Adams, B.J. (2007, May 2). The Effectiveness of School Uniforms on Students’ Academic Achievement and Overall Classroom Behavior. Retrieved from Rowan University website:  https://rdw.rowan.edu/cgi/viewcontent.cgi?article=1769&context=etd 

Creswell, J.W. (2014). Research design: Qualitative, quantitative and mixed methods approaches (4th ed.). Thousand Oaks, CA: SAGE Publications Inc.

DeMitchell, T.A. (2015, December 15). Does Wearing a School Uniform Improve Student Behavior? Retrieved October 19, 2019, from  http://theconversation.com/does-wearing-a-school-uniform-improve-student-behavior-51553 

Ordway, D. (2018, April 20). School Uniforms: Do They Really Improve Student Achievement, Behavior? Retrieved October 19, 2019, from  https://journalistsresource.org/studies/society/education/school-uniforms-research-achievement/ 

Sanchez, J. (2013, April 23). College of Education Researchers Conduct Study on Impacts of School Uniform. Retrieved from University of Nevada, Reno website:  https://www.unr.edu/nevada-today/news/2013/school-uniform-study 

Studyspark

Study Document Study Document

Healthcare Scientific Merit

Pages: 11 (3267 words) Sources: 8 Document Type:Paper Document #:78470537

… improving insights, a goal achieved by adding to the existing information pool, and testing theories. Research efforts help generate the necessary knowledge and data for decision- making and issue resolution. These efforts may be segregated into applied and basic/ pure research for distinguishing between research performed for … has grown into a political prerequisite in several nations and healthcare systems worldwide (Eccles et al., 2005; Vahdat…[break]…section. Given the above information, the data and resulting findings, as described, are consistent.
Strategies for Addressing the Ethical Concerns in the Design
In any research study, participants’ and researchers’ … take part in human activities, and they have a first-hand base of references to draw from, readers can trust their interpretations of qualitative data to be accurate. In this instance, the ‘no harm’ principle applies and the researchers should be wary of any kind of harm that … the exercise posed an ethical……

References

References

Brook, R. H., & Vaiana, M. E. (2015). Using the knowledge base of health services research to redefine health care systems. Journal of general internal medicine, 30(10), 1547-1556.

Cutcliffe, J. R., & McKenna, H. P. (1999). Establishing the credibility of qualitative research findings: the plot thickens. Journal of advanced nursing, 30(2), 374-380.

Doekhie, K. D., Strating, M. M., Buljac?Samardzic, M., van de Bovenkamp, H. M., & Paauwe, J. (2018). The different perspectives of patients, informal caregivers, and professionals on patient involvement in primary care teams. A qualitative study. Health Expectations, 21(6), 1171-1182.

Eccles, M., Grimshaw, J., Walker, A., Johnston, M., & Pitts, N. (2005). Changing the behavior of healthcare professionals: the use of theory in promoting the uptake of research findings. Journal of clinical epidemiology, 58(2), 107-112.

Leedy, P.D. & Ormrod, J. E. (2019). Practical research: Planning and design, 12th edition. Pearson Education, Hudson Street, NY.

Sanjari, M., Bahramnezhad, F., Fomani, F. K., Shoghi, M., & Cheraghi, M. A. (2014). Ethical challenges of researchers in qualitative studies: The necessity to develop a specific guideline. Journal of medical ethics and history of medicine, 7.

Swan, J., Clarke, A., Nicolini, D., Powell, J., Scarbrough, H., Roginski, C., ... & Taylor-Phillips, S. (2012). Evidence in Management Decisions (EMD): advancing knowledge utilization in healthcare management.

Thomas, D. R. (2017). Feedback from research participants: are member checks useful in qualitative research?. Qualitative Research in Psychology, 14(1), 23-41.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber warfare, helps to establish … enhances intelligence gathering. While the study provides significant insights on this topic, future studies should examine the issue based on empirical or primary data.
Keywords: cyber espionage, acceptability, state behavior, cyberattacks, relationship, intelligence gathering, national security, cyber warfare, cyber capabilities.
Introduction
Cyberspace has become an important element … as Iranian Hackers, UK Says”, Financial Times, 2019. https://www.ft.com/content/b947b46a-f342-11e9-a79c-bc9acae3b654]
Theme #3: Cyber espionage enhances intelligence gathering
The third emerging theme or pattern in data is the idea that cyber espionage enhances intelligence gathering capabilities of nation-states. Improvements in intelligence gathering is linked to the changing nature of … “Russia’s Approach to Cyber Warfare”,……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Studyspark

Study Document Study Document

Alzhemier S Prevention Healthcare

Pages: 6 (1871 words) Sources: 3 Document Type:Research Article Chart Document #:28350849

… A., & Tabet, N. (2015). Vitamin and mineral supplementation for prevention of dementia or delaying cognitive decline in people with mild cognitive impairment. Cochrane data of Systematic Reviews, (10).
Article 2:
Kwok, T. C. Y., Lam, L. C. W., Sea, M. M. M., Goggins, W., & Woo, J. ……

References

References

Abraham, R. P., Denton, D. A., Al?Assaf, A. S., Rutjes, A. W., Chong, L. Y., Malik, M. A., & Tabet, N. (2015). Vitamin and mineral supplementation for prevention of dementia or delaying cognitive decline in people with mild cognitive impairment. Cochrane Database of Systematic Reviews, (10).

Kwok, T. C. Y., Lam, L. C. W., Sea, M. M. M., Goggins, W., & Woo, J. (2012). A randomized controlled trial of dietetic interventions to prevent cognitive decline in old age hostel residents. European journal of clinical nutrition, 66(10), 1135.

Dangour, A. D., Whitehouse, P. J., Rafferty, K., Mitchell, S. A., Smith, L., Hawkesworth, S., & Vellas, B. (2010). B-vitamins and fatty acids in the prevention and treatment of Alzheimer\\'s disease and dementia: a systematic review. Journal of Alzheimer\\'s disease, 22(1), 205-224.

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384

… 10
2.4.3 Scalability and Flexibility 11
2.4.4 Security 11
2.4.5 Energy Efficiency 11
3 Methodology 12
3.1 Research Approach and Design 12
3.2 data collection Sources & Selection Plan 12
3.3 Proposed Interview Questions 13
3.4 Sample Population 13
3.5 Ethical Considerations 14
3.6 data Analysis Plan & Rationale 15
4 Contributions to Theory or Practice and their Significance 16
5 Ethical Issues and Methods to Address 17
… IT structures can preclude an accounting organization’s capability of conducting business operations productively, cloud computing can facilitate a greater level of control and data backup, security accessibilities and also enables the accounting enterprises in business diversification. Numerous accounting organizations are shifting towards cloud computing owing to the … cloud computing services to an accounting organization in terms of cost-effectiveness.
Methodology
The qualitative approach will be utilized in the research study. The data employed for this research study will be collected……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

Optimizing Health Information Systems

Pages: 12 (3717 words) Sources: 16 Document Type:Research Paper Document #:99273225

… capabilities, they typically share some common features that are related to improving the ability of health care organizations to more effectively manage patient-related data to identify problem areas and opportunities for improvement. For instance, according to Shahmoradi and Habibi-Koolaee (2016), the primary advantages of health information systems … to Shahmoradi and Habibi-Koolaee (2016), the primary advantages of health information systems relate to their ability to “provide assembly, analysis, and dissemination of data necessary to guide, promote and evaluate the disease prevention and health promotion programs” (p. 1096).
Conversely, the main disadvantages of health information system … prepared for some setbacks and mistakes.
At present, the usability of many health information systems remains suboptimal due to the manner in which data is stored and the difficulties that are frequency experienced in attempting to access it (Abouzhar, 2009). Likewise, the term “interoperability” refers to “the … different information systems, devices or……

References

References

Abouzhar, C. & Boerma, T. (2009, August). Health information systems: The foundations of public health. Bulletin of the World Health Organization, 83(8), 578-583.

Cresswell, K. & Aziz, S. (2013, May). Organizational issues in the implementation and adoption of health information technology innovations: An interpretative review. International Journal of Medical Informatics, 87(5), 73-86.

Drazen, E. L. (2006, February). Maximizing the benefits of health care information systems. Journal of Medical Systems, 10(1), 51-56.

Kruse, C. S. & Smith, D. (2017, July). Security techniques for the electronic health records. Journal of Medical Systems, 41(8), 127.

Kumar, V. (2011). Impact of health information systems on organizational health communication and behavior. The Internet Journal of Allied Health Sciences and Practice, 9(2), 37-44.

McGrail, K. M. & Black, C. (2009, August). Access to data in health information systems. Bulletin of the World Health Organization, 83(8), 563-569.

Murphy, M. L. (2019, March). Mastering accounting for business combinations: Mergers and acquisitions present challenges that finance can overcome by staying involved with the deal and preparing in advance of the closing. Journal of Accountancy, 227(3), 24-27.

NAHQ code of ethics for healthcare quality. (2019). National Association for Healthcare Quality. Retrieved from  https://nahq.org/about/code-of-ethics .

Studyspark

Study Document Study Document

Privacy In Social Networks Regarding Machine Learning

Pages: 8 (2537 words) Sources: 10 Document Type:Research Paper Document #:98311751

… how machine learning protocols have been developed both to enhance and secure privacy as well as to invade privacy and collect, analyze, predict data based on users’ information and experience online. The conflict between these two directions in machine learning is likely to lead to a system … to lead to a system wherein machine learning algorithms are actively engaged in the subversion of one another, with one attempting to conceal data and the other attempting to uncover it. This paper concludes with recommendations for social networks and the issue of privacy regarding machine learning.
… concludes with recommendations for social networks and the issue of privacy regarding machine learning.
Introduction
Social networks have allowed an ocean of personal data to form that is now sitting there waiting for machine learning algorithms to collect it, analyze it, and recognize individuals on social media … social media (Oh, Benenson, Fritz……

References

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".