Google Essays (Examples)

Studyspark

Study Document Study Document

The Use Of Clinical Systems To Improve Outcomes And Efficiencies

Pages: 6 (1709 words) Sources: 5 Document Type:literature review Document #:97226415

...Google Literature Review
The Use of Clinical Systems to Improve Outcomes and Efficiencies: Special Focus on Patient Portals in Diabetes Management
Patient portals come in handy in seeking to promote the access that patents have to their personal healthcare data. Of relevance on this front could be patient lab results, doctor notes, prescriptions, billing, the relevant information regarding the next appointment, etc. It is also important to note that in some instances, patient portals do permit patients to actively communicate with their healthcare providers. Thus, from a general perspective, patient portals could be described as online tools designed to promote the health and wellbeing of patients by offering patients access to their personal health information (Sun, Korytkowski, Sereike, Saul, Li, and Burke, 2018). In essence, there is need for a reliable internet connection for patent portals to function as intended. At present, patient portals continue to be widely utilized by healthcare……

References

References

Amante, D.J., Hogan, T.P., Pagoto, S.L. & English, T.M. (2014). A Systematic Review of Electronic Portal Usage among Patients with Diabetes. Diabetes Technology & Therapeutics, 16(11), 112-118.

Jackson, S.L., DesRoaches, C.M., Frosch, D.L., Peacock, S., Oster, N.V. & Elmore, J.G. (2018). Will Use of Patient Portals Help to Educate and Communicate With Patients With Diabetes? Patient Educ Couns., 101(5), 956-959.

Ronda, M.C., Dijkhorst-Oei, L., Vos, R.C. & Rutten, G.E. (2018). Diabetes Care Providers’ Opinions and Working Methods after Four Years of Experience with a Diabetes Patient Web Portal; A Survey among Health Care Providers in General Practices and an Outpatient Clinic. BMC Family Practice, 19(94), 79-84.

Sun, R., Korytkowski, M.T., Sereike, S.M., Saul, M.L., Li, D. & Burke, L.E. (2018). Patient Portal Use in Diabetes Management: Literature Review. JMIR Diabetes, 3(4), 41-48.

Dendere, R., Sade, C., Burton-Jones, A., Sullivan, C., Staib, A. & Janda, M. (2019). Patient Portals Facilitating Engagement with Inpatient Electronic Medical Records: A Systematic Review. J Med Internet Res, 21(4), 60-66.

Studyspark

Study Document Study Document

Cognitive Theory Clinical Social Work Practice

Pages: 7 (2210 words) Sources: 11 Document Type:question answer Document #:73366521

...Google 1. How does this theory fit with a clinical social work perspective?
Continuous concern with the individual in-situation is often regarded as social work’s most unique or distinguishing feature. In spite of the debate on where emphasis should be placed, both internal psychodynamics and environmental determinism are regarded as important for proper social work practice. Recent contributions made to the theoretical groundwork by cognitive-behavioral studies show that both needs can be dealt with simultaneously. Social work practice is anchored on the important, perhaps pivotal, notion that overall human behavior is usually the sum of both environmental and personal realities. Though yet to be developed thoroughly into a formal and widely accepted paradigm, the cognitive learning perspective draws from several perspectives including clinical experience, behaviorism, and cognitive psychology (Berlin, 1987).
According to the Code of Ethics published by the National Association of Social Workers (1996), there is a need to respect……

References

Bibliography

Adefolalu, A. O. (2018). Cognitive-behavioural theories and adherence: Application and relevance in antiretroviral therapy. South Afr J HIV Med., 762.

Bandura A. Organizational applications of social cognitive theory. Aust J Manage. 1988;13(2):275–302. https://doi.org/10.1177/031289628801300210 [Google Scholar]

Berlin, S. B. (1987). Cognitive behavioral interventions for social work practice. National Association of Social Workers, Inc.

Gitterman, A., & Heller, N. (2011). Integrating Social Work Perspectives and Models with Concepts, Methods and Skills with Other Professions’ Specialized Approaches. Clinical Social Work Journal, 204-211.

Gonzalez-Prendes, A. (2012). Cognitive-behavioral practice and social work values: A critical analysis. Journal of Social Work Values and Ethics.

National Association of Social Workers. (1996). Code of Ethics. Retrieved from http://www.naswdc.org/pubs/code/code.asp.

Nevill, D. (2014). Positive Interventions: Developing a Theoretical Model to Guide Their Development and Use. Master of Applied Positive Psychology (MAPP) Capstone Projects.

Parks, A. C., & Biswas-Diener, R. (2013). Positive interventions: Past, present, and future. In T. Kashdan & J. Ciarrochi (Eds.), Mindfulness, acceptance, and positive psychology: The seven foundations of well-being (pp.140-165). Oakland, CA: New Harbinger Publications

Studyspark

Study Document Study Document

Intelligence Oversight Ethics

Pages: 11 (3311 words) Sources: 15 Document Type:Research Paper Document #:23829007

… data with the NSA; private conversations were data mined and monitored by the NSA with the collaboration of ITC giants such as Apple, Google, Facebook and Microsoft” (Cantarella 2016, 21). It was a brave new world in which all digital information was up for grabs and no ……

References

References

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Brown, William F., and Americo R. Cinquegrana. \\\\\\\\\\\\"Warrantless Physical Searches for Foreign Intelligence Purposes: Executive Order 12,333 and the Fourth Amendment.\\\\\\\\\\\\" Cath. UL Rev. 35 (1985): 97.

Cantarella, Michele. \\\\\\\\\\\\"Intelligence ethics in the digital age.\\\\\\\\\\\\" (2016).

Congressional Research Service, “CIA Ethics Education: Background and Perspectives” (2018).

Ferrari, Rachel. \\\\\\\\\\\\"Moral Relativism and Dangerous Ethical Dilemmas in the US Intelligence Community.\\\\\\\\\\\\" (2018).

Ford, Christopher M. \\\\\\\\\\\\"Intelligence Demands in a Democratic State: Congressional Intelligence Oversight.\\\\\\\\\\\\" Tul. L. Rev. 81 (2006): 721.

Goldman, Jan. \\\\\\\\\\\\"Teaching About Intelligjence and Ethics.\\\\\\\\\\\\" Journal of US Intelligence Studies 20, no. 2 (2013): 79.

Hayes, Jonathan. \\\\\\\\\\\\"The Cinema of Oliver Stone: Art, Authorship and Activism by Ian

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

...Google Abstract
Cyber espionage has become a critical component of modern cyber warfare as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber warfare, helps to establish appropriate countermeasures against cyberattacks and potential threats in cyberspace, and enhances intelligence gathering. While the study provides significant insights on this topic, future studies should examine the……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Studyspark

Study Document Study Document

Final Report On Presidents Task Force

Pages: 4 (1198 words) Sources: 3 Document Type:Essay Document #:56235974

...Google Final Report of President’s Task Force: Key Points in Building Trust and Legitimacy
Key Points
The key points of Pillar One of the Final Report of the President’s Task Force on 21st Century Policing (2015) are that 1) People are more likely to obey the law when they see that those who enforce it follow the law as well and thus have the legitimate authority to enforce it; 2) trust and confidence play an important part in developing relations between officers and members of the community; 3) appreciating diversity is instrumental in promoting community relations; and 4) a democratic approach to leadership can help cultivate a more integrated and cohesive police department, which in turn can help to promote systematically the values that the department wants to implement.
The report recommends several action items; however, the most important of them have to do with the integrity and legitimacy of law……

References

References

Cao, L. (2015). Differentiating confidence in the police, trust in the police, and satisfaction with the police. Policing: An International Journal of Police Strategies & Management, 38(2), 239-249.

Final Report of the President’s Task Force on 21st Century Policing. (2015). Retrieved from  https://drive.google.com/file/d/1qkyvcmq379R6_xw-Phd1DhUYgIGmgb2A/view 

Peak, K. J., & Glensor, R. W. (1999). Community policing and problem solving: Strategies and practices. Upper Saddle River, NJ: Prentice Hall.

Studyspark

Study Document Study Document

Evolving Public Interpretation Of Gentrification

Pages: 15 (4506 words) Sources: 25 Document Type:Term Paper Document #:63686489

...Google Just like pornography, everyone seems to know \"gentrification\" when they see it. See a Starbucks or Whole Foods move into a neighborhood? That's gentrification. Find out that a house sold for an exorbitant amount or that rents at some building doubled? That's gentrification. See bike lanes added to your street, or a rack of bike-share bikes pop up near a busy corner? That's gentrification.
– Pete Saunders, 2017
Gentrification is one of the most controversial issues in American cities today. But as the epigraph above clearly indicates, it also remains one of the least understood. Few agree on how to define it or whether it is boon or curse for cities. Due in large part to this lack of definitional clarity, opinions about gentrification in the past have been largely shaped by the negative connotations and effects of gentrification that have been highlighted by the mainstream media. For instance, according……

References

Bibliography

Anderson, Elijah. 1990. Streetwise. Chicago: Univ. of Chicago Press.

Betancur, John J. “Gentrification in Latin America: Overview and Critical Analysis.” Urban Studies Research 37-41.

Berrey, Ellen C. 2005. Divided over diversity. City & Community 4 (2): 143-70

Black’s Law Dictionary. 1990. St. Paul, MN: West Publishing Co.

Bostic, Raphael W., and Richard W. Martin. 2003. Black home-owners as a gentrifying force? Urban Studies 40 (12): 2427-49.

Brown-Saracino, Japonica. 2004. Social preservationists and the quest for authentic community. City & Community 3 (2): 135-56.

Brummet, Quentin, and Davin Reed. “The Effects of Gentrification on the Well-Being and Opportunity of Original Resident Adults and Children.” Working Paper (Federal Reserve Bank of Philadelphia), 2019.

Capps, Kriston. “The Hidden Winners in Neighborhood Gentrification.” CityLab, July 22, 2019.

Studyspark

Study Document Study Document

Privacy In Social Networks Regarding Machine Learning

Pages: 8 (2537 words) Sources: 10 Document Type:Research Paper Document #:98311751

...Google Abstract
This paper discusses the issue of privacy in social networks with respect to advances in machine learning. It shows how machine learning protocols have been developed both to enhance and secure privacy as well as to invade privacy and collect, analyze, predict data based on users’ information and experience online. The conflict between these two directions in machine learning is likely to lead to a system wherein machine learning algorithms are actively engaged in the subversion of one another, with one attempting to conceal data and the other attempting to uncover it. This paper concludes with recommendations for social networks and the issue of privacy regarding machine learning.
Introduction
Social networks have allowed an ocean of personal data to form that is now sitting there waiting for machine learning algorithms to collect it, analyze it, and recognize individuals on social media (Oh, Benenson, Fritz & Schiele, 2016). Machine learning……

References

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

Studyspark

Study Document Study Document

Biblical Mysteries

Pages: 8 (2451 words) Sources: 15 Document Type:Essay Document #:22562699

...Google Introduction
Western scholars came up with the term mysticism to describe a special religious phenomenological concept. The term is general utilized today based on a very broad assumption that things found in every religion e.g. the rituals, the practices, the goals, and the experiences are also found in other religions and outside the domain of religion (Keller, 1978; Katz, 1978). The concept of mysticism has fascinated generations. It is a concept that has gathered a lot of attention especially in the modern day world with the increasing influence of eastern religions and the New Age Movement. It has blurred the lines between general mystical experiences and experiences with the true Living God. Nowadays, some experiences of consciousness are regarded as authentic spiritual experiences (Florovsky, 1972). This research proposal is thus an investigation of biblical mysticism and major biblical mysteries found in the Christian bible and how the mysteries found in the……

References

References

Addington, J. E. (1969). The Hidden Mystery of the Bible. DeVorss & Company.

Ahn, E., & Kang, H. (2018). Introduction to systematic review and meta-analysis. Korean journal of anesthesiology, 71(2), 103.

Beale, G. K., & Gladd, B. L. (2014). Hidden but now revealed: A Biblical theology of mystery. InterVarsity Press.

Catholic Church. (1997). Catechism of the Catholic Church: Revised in accordance with the official Latin text.  Promulgated by Pope John Paul II (2nd edition). Washington, D.C.: United States Catholic Conference.

Cook, D. J., Mulrow, C. D., & Haynes, R. B. (1997). Systematic reviews: synthesis of best evidence for clinical decisions. Annals of internal medicine, 126(5), 376-380.

Florovsky, G. (1972). Bible, church, tradition: an Eastern Orthodox view (Vol. 1). Nordland Publishing Company.

Jeffrey, G. R. (2013). Unveiling Mysteries of the Bible. WaterBrook.

Katz, S.T. (1978). Language, Epistemology, and Mysticism. New York, Oxford University Press.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".