Exploratory Essays (Examples)

Study Document

Cloud Computing And Cost Effectiveness

Pages: 5 (1591 words) Sources: 5 Document Type:Annotated Bibliography Document #:36737117

… Computing related to Cost-Effectiveness
Annotated Bibliography
Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of Information Systems Evaluation, 17(1), 3.
This article ascertains that the major reason why SMEs in Ireland adopt cloud computing is for ……

References

References

Attaran, M. (2017). Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance. Journal of International Technology and Information Management, 26(1), 112 – 137.

Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of Information Systems Evaluation, 17(1), 3.

Elmonem, M. A. A., Nasr, E. S., & Geith, M. H. (2016). Benefits and challenges of cloud ERP systems–A systematic literature review. Future Computing and Informatics Journal, 1(1-2), 1-9.

Shankar, K. (2016). Effectiveness of Cloud Computing in Global Business. Journal of Applied Management-Jidnyasa, 8(1), 66-73.

Xue, C. T. S., & Xin, F. T. W. (2016). Benefits and challenges of the adoption of cloud computing in business. International Journal on Cloud Computing: Services and Architecture, 6(6), 01-15.

Study Document

Internet Influence On Adolescents

Pages: 5 (1568 words) Sources: 6 Document Type:Essay Document #:37510468

… the studies are primarily quantitative and are not qualitative in design. The research could benefit from looking at more qualitative research that is exploratory in nature to see if there is any evidence that Internet addiction is causing depression or loneliness or vice versa. An exploratory study using the interview method could help to shed light on the nature of the relationship. Thus, future research on this topic should ……

References

References

Agarwal, A. K., Verma, A., & Agarwal, M. (2017). Internet victimization and depression among adolescents, 14(3), 60-62.

Cheung, J. C. S., Chan, K. H. W., Lui, Y. W., Tsui, M. S., & Chan, C. (2018). Psychological well-being and adolescents’ internet addiction: A school-based cross-sectional study in Hong Kong. Child and Adolescent Social Work Journal, 35(5), 477-487.

Festinger, D. S., Dugosh, K. L., Clements, N., Flynn, A. B., Falco, M., McLellan, A. T.,& Arria, A. M. (2016). Use of the internet to obtain drugs without a prescription among treatment-involved adolescents and young adults. Journal of child & adolescent substance abuse, 25(5), 480-486.

Görzig, A. (2016). Adolescents’ viewing of suicide-related web content and psychological problems: Differentiating the roles of cyberbullying involvement. Cyberpsychology, Behavior, and Social Networking, 19(8), 502-509.

Law, Y. M. (2019). Family factors and internet addiction among junior secondary school students in Hong Kong. Hong Kong Polytechnic University, Doctoral Dissertation.

Sajeev Kumar, P., Prasad, N., Raj, Z., & Abraham, A. (2015). Internet addiction and substance use disorders in adolescent students-a cross sectional study. J. Int. Med. Dent, 2, 172-179.

Study Document

Families Of Children With Autism Spectrum Disorder

Pages: 7 (2023 words) Sources: 12 Document Type:Research Paper Document #:27788997

...Exploratory Childcare Patterns and Issues for Families of Preschool Children with Autism

Children with autism spectrum disorders (ASD) are the most rapidly growing student population served in special education. As a result, several early childhood programs targeting such students have been established in the education sector. These programs are established to help meet the special needs of these children while promoting and enhancing their academic growth and achievements. In addition, family members play a critical role in the development and growth of these children with respect to meeting their special needs. Mereiou, Bland & Niemeyer (2015) state that the increase in diagnosis of ASD among children has made families and policymakers to champion for initiatives that enhance knowledge and understanding of their needs. Understanding these needs is essential toward improving the effectiveness of interventions and related services. Additionally, understanding the needs of these children help families to adopt suitable childcare patterns……

References

References

Coogle, C.G., Guerette, A.R. & Hanline, M.F 2013. Early Intervention Experiences of Families with an Autism Spectrum Disorder: A Qualitative Pilot Study. Early Childhood Research & Practice, vol. 15, no. 1. Viewed 7 August 2019, http://ecrp.uiuc.edu/v15n1/coogle.html

Forest, E.J., Horner, R.H., Lewis-Palmer, T. & Todd, A.W 2004. Transitions for Young Children with Autism from Preschool to Kindergarten. Journal of Positive Behavior Interventions, vol. 6, no. 2, pp.103-112.

Jansen, H 2010. The Logic of Qualitative Survey Research and its Position in the Field of Social Research Methods. Forum: Qualitative Social Research, vol. 11, no. 2, pp.1-21.

Ponto, J 2015. Understanding and Evaluating Survey Research. Journal of the Advanced Practitioner in Oncology, vol. 6, no. 2, pp.168-171.

Reeves, S., Kuper, A. & Hodges, B.D 2008. Qualitative Research Methodologies: Ethnography. BMJ, vol. 337. Doi:  https://doi.org/10.1136/bmj.a1020 

Reeves, S., Peller, J., Goldman, J. & Kitto, S 2013. Ethnography in Qualitative Educational Research: AMEE Guide No. 80. Medical Teacher, vol. 35, no. 8, pp.e1365-e1379.

Stahmer, A.C., Akshoomoff, N. & Cunningham, A.B 2011. Inclusion for Toddlers with Autism Spectrum Disorders. Autism, vol. 15, no. 5, pp. 625-641. 

Stahmer, A.C., Collings, N.M. & Palinkas, L.A 2005. Early Intervention Practices for Children with Autism: Descriptions from Community Providers. Focus on Autism and Other Developmental Disabilities, vol. 20, no. 2, pp.66-79.

Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

...Exploratory Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by China and Russia.
Keywords: cyber espionage,……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

...Exploratory Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber warfare, helps to establish appropriate countermeasures against cyberattacks and potential threats in cyberspace, and enhances intelligence gathering. While the study provides significant insights on this topic, future studies should examine the……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… as an acceptable state behavior for intelligence gathering though it is a form of unacceptable…[break]…data. For this study, the researcher will adopt an exploratory approach to qualitative case study to gain a deeper understanding of the acceptability of cyber espionage. Semi-structured interviews will be conducted on a ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Study Document

Depression Among Older Immigrant African Women In Metro West Massachusetts

Pages: 12 (3684 words) Sources: 20 Document Type:Capstone Project Document #:21927346

...Exploratory Prevalence of Depression in Massachusetts
Prospectus: Depression Among Older Immigrant African Women in Metro West Massachusetts
Abstract
In West Massachusetts United States, the most common health disorders are anxiety and depression. These health disorders are prevalent in elderly immigrant women aged between 50 and 79 years (Agbemenu, 2016). Despite a variety of efficacious interventions for depression and anxiety, elderly immigrant women experience mental health care disparities in their access to mental health services and the quality of treatment they receive (Sánchez et al., 2014). Researchers have determined that African American heterogeneity influences access to depression and anxiety treatment. In addition, African Americans are becoming an increasingly visible minority within the United States, especially in West Massachusetts. The intention in this current study is to understand the causes and prevalence of depression among older immigrant African American women in Metro West Massachusetts as well as how the older immigrants cope with……

References

References

Agbemenu, K. (2016). Acculturation and Health Behaviors of African Immigrants Living in the United States: An Integrative Review. ABNF Journal, 27(3).

Alegría, M., Álvarez, K., & DiMarzio, K. (2017). Immigration and mental health. Current epidemiology reports, 4(2), 145-155.

Baldwin-Clark, T., Ofahengaue Vakalahi, H. F., & Anderson, B. (2016). What about African American older women and depressive symptoms? Educational Gerontology, 42(5), 310-320.

Cassel, J. (1995). The contribution of the social environment to host resistance: the fourth wade Hampton frost lecture. American journal of epidemiology, 141(9), 798-814.

Cobb, S. (1976). Social support as a moderator of life stress. Psychosomatic medicine.

Delara, M. (2016). Social determinants of immigrant women’s mental health. Advances in Public Health, 2016.

Dow, H. D. (2011). An overview of stressors faced by immigrants and refugees: A guide for mental health practitioners. Home Health Care Management & Practice, 23(3), 210-217.

Emadpoor, L., Lavasani, M. G., & Shahcheraghi, S. M. (2016). Relationship between perceived social support and psychological well-being among students based on mediating role of academic motivation. International Journal of Mental Health and Addiction, 14(3), 284-290.

Study Document

General Strain Theory Bullying Childhood Abuse

Pages: 8 (2254 words) Sources: 5 Document Type:Research Paper Document #:59504241

...Exploratory General Strain Theory
Summary
General strain theory (GST) offers a unique explanation of delinquency and crime, which is in direct contrast to control and learning theories. The differentiation is through the type of social relationship that leads to delinquency, and the motivation for delinquency. By analyzing GST, we can determine the effect or how criminal behavior is developed. GST looks at how a negative relationship will affect and individual and their possibility of developing towards crime. A negative relationship can be defined as any relationship of other people that is not consistent with the individual's beliefs of how they should be treated. In this paper, we have analyzed two articles all focusing on GST. However, the two articles differ in the negative stimuli being researched. Cullen, Unnever, Hartman, Turner, and Agnew (2008) is analyzing the impact of bullying while Watts and McNulty (2013) is analyzing the impact of childhood abuse.……

References

References

Agnew, R. (2002). Experienced, vicarious, and anticipated strain: An exploratory study on physical victimization and delinquency. Justice Quarterly, 19(4), 603-632.

Agnew, R. (2007). Pressured into crime: An overview of general strain theory. Los Angeles,CA: Roxbury.

Cullen, F. T., Unnever, J. D., Hartman, J. L., Turner, M. G., & Agnew, R. (2008). Gender, bullying victimization, and juvenile delinquency: A test of general strain theory. Victims and Offenders, 3(4), 346-364.

Warner, B. D., & Fowler, S. K. (2003). Strain and violence: Testing a general strain theory model of community violence. Journal of Criminal Justice, 31(6), 511-521.

Watts, S. J., & McNulty, T. L. (2013). Childhood abuse and criminal behavior: Testing a general strain theory model. Journal of interpersonal violence, 28(15), 3023-3040.

Study Document

Angleton S Counterintelligence Program And What Went Wrong

Pages: 9 (2657 words) Sources: 8 Document Type:Essay Document #:36485484

… development and application of a standardized ethical approach to counterintelligence.
Research Design and Methods
The research design is qualitative because the subject is exploratory in nature. The aim of the research is to explore by way of case study analysis the counterintelligence program under James Jesus Angleton, ……

References

Reference List

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Bartos, C. and P. Wehr. 2002. Using conflict theory. UK: University of Cambridge.

Bellaby, Ross. "What's the Harm? The Ethics of Intelligence Collection." Intelligence and National Security 27, no. 1 (2012): 93-117.

Church Committee. “Final report of the Select committee to study governmental operations With respect to Intelligence activities United states senate Together with Additional, supplemental, and separate Views.” Intelligence.senate.gov, 1976. https://www.intelligence.senate.gov/sites/default/files/94755_I.pdf

Coyne, John, Peter Bell, and Shannon Merrington. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2, no. 10 (2013): 27-37.

Erskine, Toni. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19, no. 2 (2004): 359-381.

Nakashima, Ellen. “Top counterintelligence official challenges the private sector to step up defenses against foreign spying.” Washington Post, 2020. https://www.washingtonpost.com/national-security/top-counterintelligence-official-challenges-the-private-sector-to-step-up-defenses-against-foreign-spying/2020/02/10/d842d83c-4c15-11ea-9b5c-eac5b16dafaa_story.html

Pfaff, T., & Tiel, J. R. (2004). The ethics of espionage. Journal of Military Ethics, 3(1), 1-15.

Study Document

Peer Mentors Compare And Contrast

Pages: 7 (1958 words) Sources: 6 Document Type:Essay Document #:85195116

… obtain data on the feelings of the autistic students towards their level of social engagement when going to school. The study was more exploratory than the study by Ashbaugh et al. (2017) or the study by Lucas and James (2018), both of which were more evaluative. The ……

References

References

Ashbaugh, K., Koegel, R. L., & Koegel, L. K. (2017). Increasing social integration for college students with autism spectrum disorder. Behavioral Development Bulletin, 22(1), 183.

Beltman, S., Helker, K., & Fischer, S. (2019). ‘I really enjoy it’: emotional engagement of university peer mentors. International Journal of Emotional Education, 11(2), 50-70.

Colclough PhD, M. N. (2018). Exploring Student Diversity: College Students Who Have Autism Spectrum Disorders. Inquiry: The Journal of the Virginia Community Colleges, 21(1), 5.

Lucas, R., & James, A. I. (2018). An evaluation of specialist mentoring for university students with autism spectrum disorders and mental health conditions. Journal of Autism and Developmental Disorders, 48(3), 694-707.

Rando, H., Huber, M. J., & Oswald, G. R. (2016). An Academic Coaching Model Intervention for College Students on the Autism Spectrum. Journal of Postsecondary Education and Disability, 29(3), 257-262.

Sarrett, J. C. (2018). Autism and accommodations in higher education: Insights from the autism community. Journal of Autism and Developmental Disorders, 48(3), 679-693.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".