Database Essays (Examples)

Studyspark

Study Document Study Document

Demographic Profile And Motivation Of Suicide Bombers

Pages: 5 (1591 words) Sources: 6 Document Type:Essay Document #:63328521

… female. Merari (2010) states that a “rough profile” does exist and that the primary source material that he has been compiling in his database for decades supports his assertion (p. 61). Merari admits that his data is not complete and that it essentially consists of the facts ……

References

References

Bandura, A. (2018). Toward a psychology of human agency: Pathways and reflections. Perspectives on Psychological Science, 13(2), 130-136.

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Costello, M., & Hawdon, J. (2018). Who are the online extremists among us? Sociodemographic characteristics, social networking, and online experiences of those who produce online hate materials. Violence and gender, 5(1), 55-60.

DeCook, J. R. (2018). Memes and symbolic violence:# proudboys and the use of memes for propaganda and the construction of collective identity. Learning, Media and Technology, 43(4), 485-504.

Koch, A. (2018). Trends in Anti-Fascist and Anarchist Recruitment and Mobilization. Journal for Deradicalization, (14), 1-51.

Merari, A. (2010). Driven to death. Oxford University Press.

Studyspark

Study Document Study Document

Data Security Using RFID Bands At Music Festivals

Pages: 5 (1616 words) Sources: 6 Document Type:Essay Document #:97930410

… a locked or unlocked manner for the user's data protection. A key identification is generated, which is checked by the reader on the database; if the data corresponds, then the key unlocks allows full retrieval of the user's data. With non-cryptographic systems, rag killing is put to ……

References

References

Event Tribe. (n.a.). The top 10 benefits of using RFID for events. Retrieved from  https://www.eventbrite.com/blog/academy/the-top-10-benefits-of-using-rfid-for-events/ 

ID&C. (n.a.). How to RFID wristbands work? Retrieved from  https://www.idcband.com/blog/how-do-rfid-wristbands-work/ 

Kacicki, T. (2019, July 15). 4 commonly overlooked facts about RFID wristbands. Intellitix. Retrieved from  https://intellitix.com/hub/four-commonly-overlooked-facts-rfid 

OECD. (2008). OECD policy guideline on RFID.  https://www.oecd.org/sti/ieconomy/40892347.pdf 

Quirk, R.E. & Borrello, S.J. (2005). RFID: Rapid deployment and regulatory challenges. Retrieved from  https://www.pharmamanufacturing.com/assets/Media/MediaManager/VenableRFIDpaper.pdf?SESSID=62935cf41f5a19909f5bb3ae3a598490 

Williamson, A., Tsay, L., Kateeb, I.A. & Burton, L. (2013). Solutions for RFID smart tagged card security vulnerabilities. AASRI Procedia, 4, 282-287. DOI: 10.1016/j.aasri.2013.10.042

Studyspark

Study Document Study Document

Criminal Profiling Of Serial Killers

Pages: 12 (3545 words) Sources: 10 Document Type:Essay Document #:59713406

… individual is most likely to engage in this kind of act. Based upon the data collected on crime reports from the various crime databases like the UCR, the typical demographic for serial killers is white, middle-aged and male (Miller, 2014). Another data source used by profilers is … is essentially the culmination of police and investigatory work. It is the culmination of the information collected from crime reports and indexed in databases like the UCR. It is the expression of knowledge that professionals in the criminal justice field have in understanding motives for crime, the ……

References

References

Alldredge, J. (2015). The" CSI Effect" and Its Potential Impact on Juror Decisions. Themis: Research Journal of Justice Studies and Forensic Science, 3(1), 6.

Bonn, S. (2019). How the FBI Profiles Serial Offenders. Retrieved from https://www.psychologytoday.com/us/blog/wicked-deeds/201905/how-the-fbi-profiles-serial-offenders

Dogra, T.D. et al. (2012). A psychological profile of a serial killer: A case report. Omega: Journal of Death & Dying 65(4), 299-316.

FBI. (2019). Summary of the Uniform Crime Reporting Program. Retrieved from  https://www2.fbi.gov/ucr/killed/2009/aboutucr.html 

Karson, M. (2017). Why Profiling Serial Killers Can’t Work. Retrieved from https://www.psychologytoday.com/us/blog/feeling-our-way/201711/why-profiling-serial-killers-can-t-work

Miller, L. (2014). Serial killers: I. Subtypes, patterns and motives. Aggression and Violent Behavior 19, 1-11.

Samuel, D. B., & Widiger, T. A. (2007). Describing Ted Bundy's personality and working towards DSM-V. Practice, 27, 20-22.

Sarteschi, C. M. (2016). Serial Murder. In Mass and Serial Murder in America (pp. 45-67). Springer, Cham.

Studyspark

Study Document Study Document

Virtual Learning Solutions For English As Second Language Students

Pages: 11 (3230 words) Sources: 10 Document Type:Research Paper Document #:70086670

...Database How Technology Enhances ESL Students’ Learning Experience
Introduction
In the COVID-19 era, education has taken a dramatic turn towards distance learning, meaning that virtual classrooms are now more popular than ever. But what is the effect of the use of technology in an ESL classroom? Evidence shows that technology actually does enhance ESL students’ learning experience (Kasapoglu-Akyol, 2010). The fact is that ESL students use technology tools in their daily lives and thus not to use technology for learning purposes is akin to taking a fish out of water and then asking it to learn to swim. In the digital era, digital natives have been using technology since birth and it is older teachers and educational systems that are slow to recognize this fact. This paper will show how technology enhances ESL students' learning experience related to ESL instructional practices and analyze how that topic or trend impacts the district,……

References

References

Alvarez-Marinelli, H., Blanco, M., Lara-Alecio, R., Irby, B. J., Tong, F., Stanley, K., & Fan, Y. (2016). Computer assisted English language learning in Costa Rican elementary schools: an experimental study. Computer Assisted Language Learning, 29(1), 103-126.

Beetham, H., & Sharpe, R. (Eds.). (2013). Rethinking pedagogy for a digital age: Designing for 21st century learning. NY: Routledge.

Cassady, J. C., Smith, L. L., & Thomas, C. L. (2017). Supporting emergent literacy for English language learners with computer?assisted instruction. Journal of Research in Reading.

Jiang, H., Tang, M., Peng, X., & Liu, X. (2018). Learning design and technology through social networks for high school students in China. International Journal of Technology and Design Education, 28(1), 189-206.

Kahai, S. S., Carroll, E., & Jestice, R. (2007). Team collaboration in virtual worlds. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 38(4), 61-68.

Kasapo?lu-Akyol, P. (2010). Using educational technology tools to improve language and communication skills of ESL students. Novitas-Royal, 4(2).

Meskill, G., & Mossop, J. (2003). Technologies use with learners of ESL in New Your State: Preliminary report. Retrieved from  https://www.albany.edu/lap/Papers/technology%20use.htm 

Park, J. Y. (2011). Design education online: Learning delivery and evaluation. International Journal of Art & Design Education, 30(2), 176-187.

Studyspark

Study Document Study Document

Psychological Health

Pages: 11 (3279 words) Sources: 10 Document Type:Evidence Based Practice Document #:50896264

… cognitive biases,” “evidence-based psychology health,” and “evidence-based psychological interventions.” A thorough cross-search was also carried out using different keyword combinations via the EBSCO database of research, which allowed for the simultaneous such of several databases, like Alt Healthwatch, Academic Search Premier, MEDLINE, CINAHL, PsycINFO, and PsycArticles among others. Additionally, further research was carried out via Google Scholar and ……

References

References

Australian Psychological Society. (2010). Evidence?based psychological interventions in the treatment of mental disorders: A literature review. Victoria: Australian Psychological Association.

Barth, J., Munder, T., Gerger, H., Nüesch, E., Trelle, S., Znoj, H., ... & Cuijpers, P. (2016). Comparative efficacy of seven psychotherapeutic interventions for patients with depression: a network meta-analysis. Focus, 14(2), 229-243.

Castelnuovo, G. (2017). New and old adventures of clinical health psychology in the twenty-first century: standing on the shoulders of giants. Frontiers in psychology, 8, 1214.

Hofmann, S. G., Asnaani, A., Vonk, I. J., Sawyer, A. T., & Fang, A. (2012). The efficacy of cognitive-behavioral therapy: A review of meta-analyses. Cognitive therapy and research, 36(5), 427-440.

Hughes, A. M., Gordon, R., Chalder, T., Hirsch, C. R., & Moss?Morris, R. (2016). Maximizing the potential impact of experimental research into cognitive processes in health psychology: A systematic approach to material development. British journal of health psychology, 21(4), 764-780.

Kirkham, J. G., Choi, N., & Seitz, D. P. (2016). Meta?analysis of problem solving therapy for the treatment of major depressive disorder in older adults. International Journal of Geriatric Psychiatry, 31(5), 526-535.

Lenz, A. S., Hall, J., & Bailey Smith, L. (2016). Meta-analysis of group mindfulness-based cognitive therapy for decreasing symptoms of acute depression. The Journal for Specialists in Group Work, 41(1), 44-70.

Linde, K., Rücker, G., Sigterman, K., Jamil, S., Meissner, K., Schneider, A., & Kriston, L. (2015). Comparative effectiveness of psychological treatments for depressive disorders in primary care: network meta-analysis. BMC family practice, 16(1), 103.

Studyspark

Study Document Study Document

Effectiveness Of The War On Drugs

Pages: 14 (4146 words) Sources: 18 Document Type:Reaction Paper Document #:69451857

… criminally penalizes users of non-state-sanctioned drugs. Alcohol and opioids cause many more deaths—not to mention ruined lives—than the illegal drugs.
Literature Review
Scholarly databases contain over a million entries related to the war on drugs, covering perspectives linked to psychology, sociology, public health, history, and the law. ……

References

References

ACLU (2020). Against drug prohibition. Retrieved from:  https://www.aclu.org/other/against-drug-prohibition " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Veteran Benefits Administration

Pages: 8 (2465 words) Sources: 3 Document Type:Implementation Paper Document #:56829115

… undertakings in this case will be inclusive of:
a) Converting hardcopy records into e-records
b) Verification of data
c) Creation of an ERM database
d)
Transfer of the relevant data to the ERM system
e) Legacy data verification and testing
V. User Training
The relevance of user ……

References

References

Aziz, A.A., Mohammad Y., Mokhtar, U.A. & Ambari, D.I. (2017). Establishing Policy for the Implementation of Electronic Document and Records Management System in Public Sector in Malaysia: The Influencing Factors. Advanced Science Letters, 23(11), 10732-10736.

National Archives and Records Administration (2016). Department of Veterans Affairs Records Management Program: Records Management Inspection Report. Retrieved from  https://www.archives.gov/files/records-mgmt/pdf/va-2016-inspection.pdf 

U.S. Department of Veteran Affairs (2020). About VBA. Retrieved from  https://www.benefits.va.gov/BENEFITS/about.a sp

Studyspark

Study Document Study Document

War On Drugs

Pages: 13 (4034 words) Sources: 13 Document Type:Essay Document #:73696424

… criminally penalizes users of non-state-sanctioned drugs. Alcohol and opioids cause many more deaths—not to mention ruined lives—than the illegal drugs.
Literature Review
Scholarly databases contain over a million entries related to the war on drugs, covering perspectives linked to psychology, sociology, public health, history, and the law. ……

References

References

ACLU (2020). Against drug prohibition. Retrieved from:  https://www.aclu.org/other/against-drug-prohibition " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

… have the appearance of legitimacy.
Cybercrime is committed by people who know computer code, understand computer systems and networks, know how to navigate databases, access data storage, get past firewalls, exploit cloud computing services, control the Internet of Things and more. They
How Cybercrime Has Evolved over ……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

Firewalls And Filtering

Pages: 4 (1317 words) Sources: 4 Document Type:Research Paper Document #:22384393

… servers, firewalls and security measures for their data. Technology companies burn the midnight oil trying to provide the highest level of security to databases, and a breach of security can be deemed a lapse by the technology company or that their security measures being ineffective. Hackers might ……

References

References

Anderson, R. O. (1997). EMERGING CHALLENGE: SECURITY AND SAFETY IN CYBERSPACE. In R. O. Anderson, In Athena's Camp: Preparing for Conflict in the Information Age (pp. 231–252). RAND corporation.

Martin C. Libicki, L. A. (2015). The Efficacy of Security Systems. In L. A. Martin C. Libicki, The Defender’s Dilemma: Charting a Course Toward Cybersecurity (pp. 23-40). Santa Monica: RAND Corporation.

Mays, J. (2018, September 24). Understanding Load Balancing for Web Servers. Retrieved from Liquid Web:  https://www.liquidweb.com/kb/understanding-load-balancing/ 

Thu, A. A. (2013). Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment. International Journal of Computer Applications, 9-13.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".