Decision Making Process Essays (Examples)

Studyspark

Study Document Study Document

Application Of Quality And Safety Concepts

Pages: 11 (3179 words) Sources: 8 Document Type:Case Study Document #:72132391

… problems is through the utilization of more, advanced technology for delivering an all-inclusive healthcare experience to allow diverse entities participating in the healthcare process (namely physicians, patients, and healthcare insurance and scheme providers) to exchange patient data in a secure and timely manner.
Brief literature review
Federico …
HIT has been conceptualized to cover information technology articles and associated nomological networks that encompass systems promoting the healthcare goal, including CDSS (clinical decision support systems), EHR/ EMR (electronic health/ medical records), CPOE (computerized physician order entry), PCHR (personally-controlled health record which can be accessed by patients … capable of influencing via policies. Digital healthcare services are highly diverse in their types. The term ‘monitoring’ may be described as “the continuous process of collecting and analyzing data to compare how well an intervention is being implemented against expected results”. Therefore, this involves “the routine collection, … towards achieving intervention objectives”. The……

References

Bibliography

Alotaibi, Y. K., & Federico, F. (2017). The impact of health information technology on patient safety. Saudi Med J, 38(12), 1173–1180.

Amit, M. (2019, January 28). 5 Problems Which Healthcare Technology Can Solve for a Healthier World. Retrieved from Net Solutions:  https://www.netsolutions.com/insights/5-healthcare-problems-which-digital-technologies-can-solve-for-a-fit-and-healthy-world/ 

DeSanctis, G., & Poole, M. S. (1994). Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory. Organization Science, 5(2), 121-147.

Feldman, S. S., Buchalter, S., & Hayes, L. W. (2018). Health Information Technology in Healthcare Quality and Patient Safety: Literature Review. JMIR Med Inform, 6(2).

Halamka, J., Mandl, K., & Tang, P. (2008). Early Experiences with Personal Health Records. Journal of the American Medical Informatics Association, 15(1), 1-7.

IOM. (1999). To Err is Human: Building a Safer Health System. National Academy of Sciences.

Singh, H., & Sittig, D. (2016). Measuring and improving patient safety through health information technology: The Health IT Safety Framework. BMJ Quality & Safety, 25, 226-232.

Weigel, F., Hall, D. J., & Landrum, W. H. (2009). Human/Technology Adaptation Fit Theory for Healthcare. SAIS 2009 Proceedings.

Studyspark

Study Document Study Document

Assessment Activity Language Assessment

Pages: 6 (1926 words) Sources: 8 Document Type:Essay Document #:97194304

… identification of pupils who require specific services. For deaf and hard hearing learners, participating in meaningful education tests is a multifaceted and complex process (Pizzo & Chilvers, 2019). Assessments that are done well will support growth and learning, while poorly and inaccurately designed assessments have the potential … 2019). Assessments that are done well will support growth and learning, while poorly and inaccurately designed assessments have the potential to cause wrong decision-making in schools for deaf and hard of hearing learners. This report, therefore, presents three language assessment instruments for deaf and hard of hearing ……

References

References

Bond, L. A. (1996). Norm-and criterion-referenced testing. Practical Assessment, Research, and Evaluation, 5(1), 2.

Carrow-Woolfolk, E. (2014). Test for auditory comprehension of language (4th ed.). Austin, TX: PRO-ED.

Carrow-Woolfolk, E., & Allen, E. A. (2014). TEXL: Test of expressive language. Austin, TX: PRO-ED.

Fudala, J.B. & Stegall, S. (2017). Arizona-4: Arizona Articulation and Phonology Scale, Fourth Revision. Western Psychological Services.

Fudala, J.B. (2000). Arizona Articulation Proficiency Scale (3rd ed.). Los Angeles, CA: Western Psychological Services.

Haug, T. (2005). Review of sign language assessment instruments. Sign Language & Linguistics, 8(1-2), 61-98.

Maller, S., Singleton, J., Supalla, S., & Wix, T. (1999).  The development and psychometric properties of the American Sign Language Proficiency Assessment (ASL-PA). Journal of Deaf Studies and Deaf Education, 4(4), 249-269.

Pizzo, L., & Chilvers, A. (2019). Assessment of Language and Literacy in Children Who Are d/Deaf and Hard of Hearing. Education Sciences, 9(3), 223.

Studyspark

Study Document Study Document

Incident Command System ICS

Pages: 9 (2818 words) Sources: 7 Document Type:Essay Document #:51934248

… model or method for incident response and management during disasters. The system is made up of standard management and leadership hierarchy procedures, including processes meant to support various types of incidents. It does not just respect jurisdictional and agency authority, but also supports synchronized efforts among different … also supports synchronized efforts among different disaster response and management teams and agencies. ICS supports fast, effective and efficient development of universal planning processes and management of facilities, personnel, communication, and equipment within a common structure of organization and operations. Based on pre-determined standards that involved authorities … common structure of organization and operations. Based on pre-determined standards that involved authorities agree upon, personnel are trained in a common language and processes, and tasks assigned to each. The ICS system ensures that disaster response teams experience increased organization from the initial phases of a disaster … of resources or efforts but……

References

References

AmeriCorps St. Louis. (2016). “Missouri Winter Flooding 2016.” Retrieved from https://www. americorps-stl.org/our-teams/emergency-response-team/disaster-deployment-archive/missouri-winter-flooding-2016/.

Buck, Dick A., Joseph E. Trainor, and Benigno E. Aguirre. (2006). “A Critical Evaluation of the Incident Command System and NIMS.” Journal of Homeland Security and Emergency Management, 3(3).

Bigley, Gregory A. and Karlene H. Roberts. (2001). “The Incident Command System: High-Reliability Organizing for Complex and Volatile Task Environments.” Academy of Management Journal, 44(6): 1281-1299.

Butterfield, Karen. (2016, January 21). “AmeriCorps Helping Flood Victims Find Place to Stay.” The Missourian. Retrieved from http://www.emissourian.com/local_news/washington/americorps-helping-flood-victims-find-place-to-stay/article_56f75bab-87de-5198-843e-bdfdb8229b5a.html.

Cardwell, Michael D. and Patrick T. Cooney. (2000). “Nationwide Application of the Incident Command System: Standardization Is the Key.” FBI Law Enforcement Bulletin 69.10: 10-16.

Cole, Dana. (2000). The Incident Command System: A 25-Year Evaluation by California Practitioners. National Fire Academy.

Corporation for National and Community Service (CNCS). (2014). “Disaster Response Framework.” Retrieved from  http://www.nationalservice.gov/sites/default/files/documents/CNCS%20DSU%20  Disaster%20Response%20Framework.pdf.

Dynes, Russell Rowe. (1970). Organized Behavior in Disaster. Lexington, MA: Heath Lexington.

Studyspark

Study Document Study Document

Using Tactical Empathy And Effective Silence To Negotiate An Outcome

Pages: 8 (2314 words) Sources: 7 Document Type:Essay Document #:57733718

… important because it would only dehydrate and dull the senses. Among a group of sailors, the captain should have the most voice when making a decision about determining what items are most important, and just because the ship has sunk does not mean the captain has gone down with … a defensive strategy, which would put others on the offensive. Cooperation is best here because a favorable outcome relies on recognizing that any decision must be viewed as a win-win for all sides. Dismissing the needs of others will not help anyone—thus, if one party sees the … addressed earlier and had everyone done his homework, so to speak, and understood why certain items would be effective in prolonging one’s life.
decision making was not done in the democratic style but rather by a leader organically appearing to direct the negotiation process. Tactical empathy and effective silence were used……

References

References

Brown, M. E., & Treviño, L. K. (2014). Do role models matter? An investigation of role modeling as an antecedent of perceived ethical leadership. Journal of Business Ethics, 122(4), 587-598.

Combs, J. P., Harris, S., & Edmonson, S. (2015). Four Essential Practices for Building Trust. Educational Leadership, 72(7), 18-22.

Fisher, R. & Ury, W. (1991). Getting to Yes. NY: Penguin.

Lunenburg, F. C. (2012). Power and leadership: An influence process. International Journal of Management, Business, and Administration, 15(1), 1-9.

Maslow, A. H. (1943). A theory of human motivation. Psychological Review, 50(4), 370.

Ritzer, G. & Stepnisky, J. (2017). Modern sociological theory. Thousand Oaks, CA: SAGE.

Singh-Sengupta, S. (1997). Leadership: A Style or an Influence Process. Indian Journal of Industrial Relations, 265-286.

Studyspark

Study Document Study Document

Effectiveness Of In Home Monitoring Of CHF Patients

Pages: 9 (2655 words) Sources: 6 Document Type:Essay Document #:76857727

… re-admission of CHF-diagnosed persons. Hence, the chosen PICO question is, “Does in-home monitoring (I) of CHF patients (P), reduce re-hospitalization rates (O)?”
Literature Search Process
The process of reviewing existing literature on this topic begins with a literature search using the Chamberlain College of Nursing library. The terms “heart failure” … The terms “heart failure” “congestive heart failure” “rehospitalization rates”, “health promotion using mHealth”, and “in-home monitoring” were utilized to commence the literature search process. Through the university’s library, numerous databases were available to generate substantial peer-reviewed articles relating to impact in-home monitoring of CHF-diagnosed patient on rehospitalization … While the search produced numerous articles, six articles were selected to support the PICO question and quality improvement project. During the literature search process, specialty organizations like American Heart Association, Alliance for Heart Failure, American College of……

References

References

Bashi, N., Karunanithi, M., Fatehi, F., Ding, H. & Walters, D. (2017, January). Remote Monitoring of Patients with Heart Failure: An Overview of Systematic Reviews. Journal of Medical Internet Research, 19(1). DOI: 10.2196/jmir.6571

Conn, N.J., Schwarz, K.Q. & Borkholder, D.A. (2019). In-Home Cardiovascular Monitoring System for Heart Failure: Comparative Study. Journal of Medical Internet Research, 7(1). DOI: 10.2196/12419

Gonzalo, A. (2019, August 22). Nola Pender: Health Promotion Model. Retrieved May 18, 2020, from  https://nurseslabs.com/nola-pender-health-promotion-model/ 

Idris, S., Degheim, G., Ghalayini, W., Larsen, T.R., Nejad, D. & David, S. (2015). Home Telemedicine in Heart Failure: A Pilot Study of Integrated Telemonitoring and Virtual Provider Appointments. Reviews in Cardiovascular Medicine, 16(2), 156-162.

Khodaveisi, M., Omidi, A., Farokhi, S. & Soltanian, A.R. (2017, April). The Effect of Pender’s Health Promotion Model in Improving the Nutritional Behavior of Overweight and Obese Women. International Journal of Community-based Nursing and Midwifery, 5(2), 165-174.

Kohn, M. S., Haggard, J., Kreindler, J., Birkeland, K., Kedan, L., Zimmer, R., & Khandwalla, R. (2017). Implementation of a home monitoring system for heart failure patients: A feasibility study. JMIR Res Protoc, 6(3). DOI: 10.2196/resprot.5744

Martirosyan, M., Caliskan, K., Theuns, D., & Szili-Torok, T. (2017). Remote monitoring of heart failure: Benefits for therapeutic decision making. Expert Review of Cardiovascular Therapy, 15(7), 503-515. DOI: 10.1080/14779072.2017.1348229

Ong et al. (2016, March). Effectiveness of Remote Patient Monitoring After Discharge of Hospitalized Patients with Heart Failure. JAMA Internal Medicine, 176(3), 310-318.

Studyspark

Study Document Study Document

MacBook Pro By Apple Inc Quality Management

Pages: 11 (3159 words) Sources: 5 Document Type:Essay Document #:17953236

… Summary
Quality management is pivotal in any product or service. One of the key aspects of ensuring this is through the product development process. The product taken into account is MacBook Pro by Apple Inc. Research indicates that the product goes through various steps in the production … The product taken into account is MacBook Pro by Apple Inc. Research indicates that the product goes through various steps in the production process, including designing, the formation of a new product team, Apple New product Process, product review, product redesign, assessment and feedback, and then finally product launching. Research also indicates that designing for manufacturing is a pivotal component … designing for manufacturing is a pivotal component of the product development cycle. It encompasses the optimization of the product's design for the different processes of manufacturing and assembly, assimilating the various product design needs and requirements with its production approach.……

References

References

Hill, C. W., Jones, G. R., & Schilling, M. A. (2014). Strategic management: theory: an integrated approach. Cengage Learning.

Panzarino, M. (2012). This is how Apple\\\\\\'s top-secret product development process works. The Next Web. Retrieved from:  https://thenextweb.com/apple/2012/01/24/this-is-how-apples-top-secret-product-development-process-works/ 

Interaction Design Foundation. (2020). Apple\\\\\\'s Product Development Process – Inside the World\\\\\\'s Greatest Design Organization. Retrieved from:  https://www.interaction-design.org/literature/article/apple-s-product-development-process-inside-the-world-s-greatest-design-organizatio " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

CEOs And Presidents

Pages: 11 (3242 words) Sources: 13 Document Type:Essay Document #:96542123

Influence Practices of Elon Musk and Jeff Skilling
CEOs and Presidents
Abstract
This paper looks at the influence processes of three CEOs: Elon Musk of Tesla, Alex Gorsky of Johnson & Johnson, and Jeff Skilling of Enron. These leaders have various strengths … seen a string of successes and failures during the course of his tenure as head of Tesla. This paper discusses their various influence processes, analyzes their strengths and weaknesses and summarizes their key attributes that effect positive organizational change and improved performance.
Introduction to the Concept of … their strengths and weaknesses and summarizes their key attributes that effect positive organizational change and improved performance.
Introduction to the Concept of Influence Processes
The concept of influence processes is that it is an action a leader takes to have an impact on followers immediately and the organization overall. Lunenburg (2012) states … a leader takes to have an……

References

References

Bromley, H. R. (2007). Are you a transformational leader?. Physician Executive, 33(6), 54.

Brown, M. E., & Treviño, L. K. (2014). Do role models matter? An investigation of role modeling as an antecedent of perceived ethical leadership. Journal of Business Ethics, 122(4), 587-598.

Chamers, M.M. (2014). An Integrative Theory of Leadership (4thed.). New York, NY: Psychology Press.

De Vries, M.F.K. (1998). Charisma in action: The transformational abilities of Virgin's Richard Branson and ABB's Percy Barnevik. Organizational Dynamics, 26(3), 7-21.

Healthcare Technology Report. (2019). Alex Gorsky is the all-American CEO. Retrieved from  https://thehealthcaretechnologyreport.com/alex-gorsky-is-the-all-american-ceo/ 

Holmes, A. (2007). Ethics: Approaching moral decisions. Downers Grove, IL: InterVarsity Press.

Kameda, T., Ohtsubo, Y., & Takezawa, M. (1997). Centrality in sociocognitive networks and social influence: An illustration in a group decision-making context. Journal of personality and social psychology, 73(2), 296.

Kolodny, L. (2018). Elon Musk’s extreme micromanagement has wasted time and money at Tesla, insiders say. Retrieved from  https://www.cnbc.com/2018/10/19/tesla-ceo-elon-musk-extreme-micro-manager.html

Studyspark

Study Document Study Document

The Government S Economic Policies Effect Good Or Bad Economy

Pages: 4 (1226 words) Sources: 5 Document Type:Essay Document #:48706943

Introduction
Public policy is government decision and actions designed to deal with problems and issues affecting the public (Madimutsa, 2008). The U.S. government policy areas include monetary policy, immigration, ……

References

References

Federal Reserve. (2020, March 15). Federal open market committee. Retrieved March 30, 2020, from  https://www.federalreserve.gov/monetarypolicy/fomccalendars.htm 

Labonte, M. (2020). Monetary policy and the Federal Reserve: Current policy and conditions (RL30354). Retrieved from Congressional Research Service website:  https://fas.org/sgp/crs/misc/RL30354.pdf 

Madimutsa, C. (2008). The Policy Formulation Process. Retrieved from  https://www.researchgate.net/publication/336927323_The_Policy_Formulation_Proce ss

McGraw-Hill Education. (n.d.). The role of government. Retrieved from  https://www.jasonsclassroom.com/social-studies/cc-basics/chapter-5/lesson-5.3/ 

Suman, S. (2015, October 26). Monetary policy: Objectives, advantages, and disadvantages. Retrieved from  https://www.economicsdiscussion.net/monetary-policy/advantages/monetary-policy-objectives-advantages-and-disadvantages/12768 

Studyspark

Study Document Study Document

Customer Persona For Filshie Clip System

Pages: 12 (3656 words) Sources: 11 Document Type:Capstone Project Document #:94593472

… histories and expectations. These women are interested in a reversible contraception method that is safe and effective since it enables them to make decision on getting pregnant when they want. Finally, justified recommendations with respect to the marketing mix have provided. 

Introduction

Femcare is a group of … customers. Through these online communities, Facebook, Twitter and Google obtain information on value-in-use. The information is then utilized to shape their value creation processes and enhance service delivery, which in turn generates significant competitive advantage over rivals.

Duran (2018) opines that developing buyer or customer personas is … personas influence product design plans, help to develop relationships between the business and its customers, and helps to incorporate everyone in the business process. 

The company will benefit from describing customer persona with respect to the selected target market in order to enhance its competitive advantage. This … strategy for Filshie Clips because……

References

References

Antoun, L., Smith, P., Gupta, J. K., & Clark, T. J 2017. The feasibility, safety, and effectiveness of hysteroscopic sterilization compared with laparoscopic sterilization. American journal of obstetrics and gynecology, vol. 217, no. 5, pp.e571-570. e576. 

Beerthuizen, R 2010. State-of-the-art of non-hormonal methods of contraception: V. Female sterilisation. The European Journal of Contraception & Reproductive Health Care, vol. 15, no. 2, pp.124-135.

De Toni, D., Milan, G.S., Saciloto, E.B., & Larentis, F 2017. Pricing strategies and levels and their impact on corporate profitability. Revista de Administracao, vol. 52, no. 2, pp.120-133.

Duran, A 2018. Sink or swim: how to create buyer personas to ensure marketing success. Forbes. Viewed 20 August 2019,

Griffin, A, Noble, CH, Durmusoglu, SS, Luchs, MI, & Swan, S 2015. ‘Chapter 3 Personas: powerful tools for designers’, in Design Thinking : New Product Development Essentials from the PDMA, John Wiley & Sons, Incorporated, Hoboken.

Johnson, S., Pion, C. & Jennings, V 2013. Current methods and attitudes of women towards contraception in Europe and America. Reproductive Health, vol. 10, no. 7, pp.1-9.

Kotler, P., & Keller, K. L. (2015). Marketing Management, Global Edition. Pearson Education Limited: Boston, MA.

Magrath, A.J 1986. When Marketing Services, 4Ps are not enough. Business Horizons, pp.4450.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… complex international problem in the modern world. Cyber espionage is largely viewed as a new intelligence gathering approach and strategy for national security decision. However, cyber espionage remains a form of cyberattack, which is legally and ethically unacceptable.
Research Question
How is cyber espionage an acceptable state … to intercept communication between two or more parties. Using electronic surveillance, adversaries intercept what is said and planned. Such surveillance always result in processing and exploitation of huge volumes of communications transmitted on the Internet. Therefore, electronic surveillance has provided an avenue for transformation of conventional state-sponsored … gathering. [31: Michael Connell & Sarah Vogler, “Russia’s Approach to Cyber Warfare”, CNA Analysis and Solutions, 2017. https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf]
Probable Errors in Analysis or decision-making
As shown in the analysis, existing data provides explanations for the acceptability of cyber espionage as a state behavior based on three major … countermeasures. While these themes help……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".