Information Systems Essays (Examples)

Studyspark

Study Document Study Document

Grade Six Mathematics

Pages: 6 (2529 words) Sources: 2 Document Type:Lesson Plan Document #:85325876

Part 1:
Lesson plan 1
1. Lesson Plan information
Subject/Course: Mathematics
Name:
Grade Level: Sixth
Date: Time:
Topic: Fractions
Length of Period: 1hr 30 minutes
Standard: Pennsylvania’s Common Core State Standard CC.2.3.2.A.2 …
INTRODUCTION
Lesson will be introduced by reflecting on students understanding of fraction, through oral questions. The knowledge students have will inform the background information to be covered on fractions. The oral questions will be asked by the teacher on random students. The questions will be based on … methods will be used as discussed earlier so as to ensure inclusivity and learning of every student.
Lesson plan 2
1. Lesson Plan information
Subject/Course: Mathematics
Name:
Grade Level: twelfth
Date: Time:
Topic: Fractions
Length of Period: 1hr 30 minutes
Standard: Pennsylvania’s Common Core State Standard CC.2.3.2.A.2 ……

References

References

Spooner, F., Baker, J. N., Harris, A. A., Ahlgrim-Delzell, L., & Browder, D. M. (2007). Effects of training in universal design for learning on lesson plan development. Remedial and special education, 28(2), 108-116.

Wiggins, G. P., & McTighe, J. (2012). The Understanding by design guide to advanced concepts in creating and reviewing units. ASCD.

Studyspark

Study Document Study Document

Effectiveness Of In Home Monitoring Of CHF Patients

Pages: 9 (2655 words) Sources: 6 Document Type:Essay Document #:76857727

...Information systems How Does the Use of In-home Monitoring for CHF Impact Re-hospitalization Rates?
Impact on In-home Monitoring for CHF on Re-hospitalization Rates
Congestive heart failure (CHF) is one of the major cardiovascular diseases with high global incidence and prevalence in the United States. While numerous advances in evidence-based medical therapy continues to occur, congestive heart failure remains a major problem as it results in significant burden of mortality, morbidity, and costs. The United States has a prevalence of 5.8 million individuals with the condition and more than 960,000 cases annually. It is estimated that approximately one million hospitalizations linked to congestive heart failure occur annually. Most of these hospitalizations arise from worsened congestion among already diagnosed patients. The United States spends approximately $32.7 billion on congestive heart failure annually. Martirosyan et al. (2017) states that readmission rates for this condition remain high as nearly 20% of patients are readmitted within 30……

References

References

Bashi, N., Karunanithi, M., Fatehi, F., Ding, H. & Walters, D. (2017, January). Remote Monitoring of Patients with Heart Failure: An Overview of Systematic Reviews. Journal of Medical Internet Research, 19(1). DOI: 10.2196/jmir.6571

Conn, N.J., Schwarz, K.Q. & Borkholder, D.A. (2019). In-Home Cardiovascular Monitoring System for Heart Failure: Comparative Study. Journal of Medical Internet Research, 7(1). DOI: 10.2196/12419

Gonzalo, A. (2019, August 22). Nola Pender: Health Promotion Model. Retrieved May 18, 2020, from  https://nurseslabs.com/nola-pender-health-promotion-model/ 

Idris, S., Degheim, G., Ghalayini, W., Larsen, T.R., Nejad, D. & David, S. (2015). Home Telemedicine in Heart Failure: A Pilot Study of Integrated Telemonitoring and Virtual Provider Appointments. Reviews in Cardiovascular Medicine, 16(2), 156-162.

Khodaveisi, M., Omidi, A., Farokhi, S. & Soltanian, A.R. (2017, April). The Effect of Pender’s Health Promotion Model in Improving the Nutritional Behavior of Overweight and Obese Women. International Journal of Community-based Nursing and Midwifery, 5(2), 165-174.

Kohn, M. S., Haggard, J., Kreindler, J., Birkeland, K., Kedan, L., Zimmer, R., & Khandwalla, R. (2017). Implementation of a home monitoring system for heart failure patients: A feasibility study. JMIR Res Protoc, 6(3). DOI: 10.2196/resprot.5744

Martirosyan, M., Caliskan, K., Theuns, D., & Szili-Torok, T. (2017). Remote monitoring of heart failure: Benefits for therapeutic decision making. Expert Review of Cardiovascular Therapy, 15(7), 503-515. DOI: 10.1080/14779072.2017.1348229

Ong et al. (2016, March). Effectiveness of Remote Patient Monitoring After Discharge of Hospitalized Patients with Heart Failure. JAMA Internal Medicine, 176(3), 310-318.

Studyspark

Study Document Study Document

Enhancing Communication Migration From 4G To 5G

Pages: 6 (1692 words) Document Type:Essay Document #:96575438

… far, some of the constraints attached to migration from 4G to 5G include multi-mode user terminals, security, the choice among the various wireless systems available, jamming and spoofing, and network infrastructure and Quality of service (QoS) support (Alkhazaali 2017).
3. To establish strategies to maximize the effectiveness … to address the challenges that face migration from 4G to 5G. The strategies will include possible technological adjustments to improve 5G performance, support systems, and possible improvements that can be included in the next generation of network improvements.
The objectives of the dissertation are;
i. To determine … and better QoS and improved experience.
Scientific analysis
One of the risks in migrating from 4G to 5G is the choice of wireless systems. Evert wireless has specific roles and features. To determine the best wireless system can only be done for a specific technology at a ……

References

References

Alkhazaali, N.H., 2017. Mobile Communication through 5G Technology (Challenges and Requirements). International Journal of Communications, Network and System Sciences, 10(05), p.202.

Gandotra, P., and Jha, R.K., 2016. Device-to-device communication in cellular networks: A survey. Journal of Network and Computer Applications, 71, pp.99-117.

Penttinen, Jyrki T. J., et al. 2019. "Deployment," in 5G Explained: Security and Deployment of Advanced Mobile Communications, Wiley, pp.271-291

Shen, Xuemin. "Device-to-device communication in 5G cellular networks." IEEE Network 29, no. 2 (2015): 2-3.

Tehrani, M.N., Uysal, M., and Yanikomeroglu, H., 2014. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), pp.86-92.

Zhang, A., and Lin, X., 2017. Security-aware and privacy-preserving D2D communications in 5G. IEEE Network, 31(4), pp.70-77.

Studyspark

Study Document Study Document

Healthcare Scientific Merit

Pages: 11 (3267 words) Sources: 8 Document Type:Paper Document #:78470537

… turn, and reciprocally, is dependent on theories. Hence, this linkage is of a dialectic nature, a transaction by which theories help decide what information to gather, with research findings challenging accepted theories. Thus, this study has a pivotal part to play in adding to the theory revolving … family, and informal caregiver input (Eccles et al., 2005). As studies are done where the need arises to understand something or gain new information on a topic, the need for determining patient engagement effects resulted in this study. Scientific research aims at improving insights, a goal achieved … for determining patient engagement effects resulted in this study. Scientific research aims at improving insights, a goal achieved by adding to the existing information pool, and testing theories. Research efforts help generate the necessary knowledge and data for decision- making and issue resolution. These efforts may be … decision making is no new……

References

References

Brook, R. H., & Vaiana, M. E. (2015). Using the knowledge base of health services research to redefine health care systems. Journal of general internal medicine, 30(10), 1547-1556.

Cutcliffe, J. R., & McKenna, H. P. (1999). Establishing the credibility of qualitative research findings: the plot thickens. Journal of advanced nursing, 30(2), 374-380.

Doekhie, K. D., Strating, M. M., Buljac?Samardzic, M., van de Bovenkamp, H. M., & Paauwe, J. (2018). The different perspectives of patients, informal caregivers, and professionals on patient involvement in primary care teams. A qualitative study. Health Expectations, 21(6), 1171-1182.

Eccles, M., Grimshaw, J., Walker, A., Johnston, M., & Pitts, N. (2005). Changing the behavior of healthcare professionals: the use of theory in promoting the uptake of research findings. Journal of clinical epidemiology, 58(2), 107-112.

Leedy, P.D. & Ormrod, J. E. (2019). Practical research: Planning and design, 12th edition. Pearson Education, Hudson Street, NY.

Sanjari, M., Bahramnezhad, F., Fomani, F. K., Shoghi, M., & Cheraghi, M. A. (2014). Ethical challenges of researchers in qualitative studies: The necessity to develop a specific guideline. Journal of medical ethics and history of medicine, 7.

Swan, J., Clarke, A., Nicolini, D., Powell, J., Scarbrough, H., Roginski, C., ... & Taylor-Phillips, S. (2012). Evidence in Management Decisions (EMD): advancing knowledge utilization in healthcare management.

Thomas, D. R. (2017). Feedback from research participants: are member checks useful in qualitative research?. Qualitative Research in Psychology, 14(1), 23-41.

Studyspark

Study Document Study Document

Telemedicine And Its Impact On Patient Care

Pages: 11 (3241 words) Sources: 10 Document Type:Essay Document #:26347879

… to various researchers, the modern health care system is a managed one, and it widely uses technology in contrast to previous health care systems (Conklin, 2002). The many uses of technology in the modern health care system include the use of technology for diagnosis, for minimally invasive … that enables the delivery of health care in unique situations. More accurately, Telemedicine is defined as the utilization of communication technologies and electronic information to deliver or support health care in situations where there is a separation between the participants (Conklin, 2002; Tiago et al., 2016). In … directly to people in far off communities and talk to them and then perform audiometry and otoscopy. After doing this, they send the information to medical specialists in Fairbanks or Anchorage. The medical specialists then use the information given to them to make a decision on whether there is a need for a……

References

References

Meyers, A. J., Pontarelli, E., Dutta, S. K., Grinberg, G., & Yenumula, P. R. (2018). Telemedicine Follow-up After Bariatric Surgery. Surgery for Obesity and Related Diseases, 14(11), S168.

Tiago, M. T. B., Tiago, F., Amaral, F. E. B., & Silva, S. (2016). Healthy 3.0: Healthcare digital dimensions. In Reshaping medical practice and care with health information systems (pp. 287-322). IGI Global.

Conklin, T. P. (2002). Health care in the United States: An evolving system. Michigan Family Review, 7(1).

Board on Health Care Services; Institute of Medicine. (2012). \\\\\\\\\\\\"3The Evolution of Telehealth: Where Have We Been and Where Are We Going?\\\\\\\\\\\\" in The Role of Telehealth in an Evolving Health Care Environment: Workshop Summary. National Academies Press, Washington (DC).

Sada, A., Asaad, M., Reidt, W. S., Kellogg, T. A., Kendrick, M. L., McKenzie, T. J., & Habermann, E. B. (2019). Are In-Person Post-operative Clinic Visits Necessary to Detect Complications Among Bariatric Surgery Patients?. Obesity Surgery, 1-4.

Krupka, D. C., Sandberg, W. S., & Weeks, W. B. (2012). The impact on hospitals of reducing surgical complications suggests many will need shared savings programs with payers. Health Affairs, 31(11), 2571-2578.

Fasano, P. (2013). Transforming health care: The financial impact of technology, electronic tools, and data mining. John Wiley & Sons.

Burch, S., Gray, D., & Sharp, J. (2017). The power and potential of telehealth what health systems should know: proposed legislation in Congress offers the promise that the nation\\\\\\\\\\\\'s healthcare policy will support the expansion of telehealth, allowing hospitals and health systems to fully realize the benefits of this important emerging approach to care. Healthcare Financial Management, 71(2), 46-50.

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

… lure victims into traps or sites that have the appearance of legitimacy.
Cybercrime is committed by people who know computer code, understand computer systems and networks, know how to navigate databases, access data storage, get past firewalls, exploit cloud computing services, control the Internet of Things and … began to more operations online, individuals began to see an opportunity to exploit weak supports to gain access over company data, individual personal information, or access to financial accounts. Cybercrime has grown into a highly sophisticate and complex industry that is constantly pushing the boundaries and requiring … to focus on committing fraud in a variety of forms, identity theft, and hacking (Schjølberg, 2017). Today, cybercriminals can take control of radar systems, hijack ships, and steal data. Common cyber crime often takes the form of enterprise crime, in which illegal activities are united under a … a physical nature; it can……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

The Transformation Of The US Into Oceania

Pages: 9 (2807 words) Sources: 7 Document Type:Essay Document #:33502677

… have become the greatest issue facing 21st century ethical leadership. Indeed, public and private sector organizations of all types routinely collect consumers’ personal information and use it in ways that are violative of the spirit if not the letter of the law, and the proliferation of the … Although the concept lacks definitional clarity, the term “privacy” is generally used to refer to “a person's ability to control access to personal information” (Cantor, 2006). More specifically, the right of privacy is defined by Black’s Law Dictionary (1990) as “The right to be let alone; the … with which the public is not necessarily concerned” (p. 1195).
In theory, then, privacy therefore refers to the capacity to determine what personal information is available to others. In practice, however, few people besides some miserable hermits living in caves can be regarded as enjoying this ability … electronic health care records a……

References

References

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Cantor, M. D. (2006, Summer). No information about me without me: Technology, privacy, and home monitoring. Generations, 30(2), 49-55.

Ethical issues facing businesses. (2020). Florida Tech. Retrieved from https://www.floridatech online.com/blog/business/the-5-biggest-ethical-issues-facing-businesses/.

Haslag, C. (2018, Fall). Technology or privacy: Should you really have to choose only one? Missouri Law Review, 83(4), 1027-1033.

Karn, R. (2019). The biggest threat to data security? Humans, of course. The Privacy Advisor. Retrieved from  https://iapp.org/news/a/the-biggest-threat-to-data-security-humans-of-course/ .

Sharma, P. (2017, June). Organizational culture as a predictor of job satisfaction: The role of age and gender. Journal of Contemporary Management Issues, 22(1), 35-40.

Taslitz, A. E. (2009, Spring). The Fourth Amendment in the twenty-first century: Technology, privacy, and human emotions. Law and Contemporary Problems, 65(2), 125-131.

Studyspark

Study Document Study Document

Warehouse And Material Handling

Pages: 9 (2845 words) Sources: 13 Document Type:Research Proposal Document #:94857550

...Information systems Abstract
This paper explicates a proposal for a warehouse for Electrical Appliances for distribution both within Singapore and overseas. Logistics plays a pivotal role in the integration of supply chains within industries. One of the key components within the supply chain of an enterprise is warehousing. The warehouse will be a private warehouse, which implies that it will be owned by the company. This will be important for the enterprise in regard to increased control, flexibility, and cost. Concerning warehouse location accessibility, Tangjong Pagar is considered to be the most suitable location for the warehouse. This is linked to low inbound transportation cost and also distance to the port of Singapore. In addition, there is ready and accessible manpower for the distribution operations. The appropriate racking system for storage of the finished product will be a combination of block stacking and adjustable pallet racking storage. This will facilitate flexibility within……

References

References

Adler, D. (Ed.). (2007). Metric handbook. Routledge.

Alberto, P. (2000). The logistics of industrial location decisions: An application of the analytic hierarchy process methodology. International Journal of Logistics, 3(3), 273-289.

Bhatnagar, A. (2010). Textbook of supply chain management. New Delhi: Sanbun Publishers.

Buurman, J. (2002). Supply chain logistics management. New York: McGraw-Hill.

Heizer, J., & Render, B. (2006). Additional Problems: Principles of Operations Management/Operations Management. Prentice Hall.

Interlake. (2019). Warehouse layout design. Retrieved from:  https://www.interlakemecalux.com/warehouse-manual/warehouse-design/warehouse-layout 

Mulcahy, D. E., & Sydow, J. (2008). A supply chain logistics program for warehouse management. Auerbach Publications.

Radaev, A., & Leventsov, V. (2018). THE METHODOLOGY FOR SUBSTANTIATING THE MATERIALS HANDLING EQUIPMENT OF A UNIT LOAD WAREHOUSING SYSTEM. International Journal for Quality Research, 12(4).

Studyspark

Study Document Study Document

Counterintelligence

Pages: 12 (3490 words) Sources: 6 Document Type:question answer Document #:11133529

… 5. https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf]
Automation is another key aspect of the strategy and ONCIX plans to use automated records checkers to help identify applicable counterintelligence information that would assist in identifying an insider threat.[footnoteRef:4] Risk management is also part of its strategy: insider threat methods are meant to include … against a variety of other data sources to detect anomalies. Finally, the strategy uses an auditing function meant to prevent unauthorized retrieval of information and unauthorized activity by workers from occurring. The goal here is to maintain, ultimately, the most secure information infrastructure possible.[footnoteRef:6] [5: National Counterintelligence Strategy of the United States of America 2016 (Strategy), 5. https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf] [6: National Counterintelligence Strategy of the United … quality of trustworthy characters, without which the office will not be able to function in any meaningful manner, regardless of the technological support systems used to monitor employee behaviors.
The successful operations in U.S. Counter-Intelligence……

References

Bibliography

Counter intelligence for National Security, CIA, 1993. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol2no4/html/v02i4a10p_0001.htm

Johnston, David and James Risen, “U.S.had evidence of espionage,” New York Times, 2001. https://www.nytimes.com/2001/02/23/us/us-had-evidence-of-espionage-but-fbi-failed-to-inspect-itself.html

National Counterintelligence Strategy of the United States of America 2016 (Strategy).  https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf 

Prunckun, Hank. 2012. Counterintelligence Theory and Practice, Lanham: Rowman&Littlefield Publishers Inc. Read the following: Chapters 8 to 14, pages 131 to 217. Appendices A to D, pages 219 to 231.

Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September 17). National Security Archive. Accessed January 19, 2017.  http://nsarchive.gwu.edu/NSAEBB/NSAEBB230/ .

Van Cleave, Michelle. “Strategic Counterintelligence: What Is It and What Should We Do About It ?” 2007. CIA Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html

Studyspark

Study Document Study Document

Fiscal Health Of Public Administration

Pages: 8 (2386 words) Sources: 4 Document Type:response paper Document #:45658914

… the ability of individuals in public administration engage in fraud or deny people services that are their rightful due.
Third, using virtual learning systems can promote the application of free education and training for people in the community so that they can obtain skilled jobs for themselves. … can log into and learn from so that they can cultivate and develop skills that will be useful in a trade, such as information Technology, where a lot of jobs have been appearing in recent years.
Fourth, telehealth systems can provide virtual care to patients who receive medical benefits from the government but cannot drive long distances or overcome obstacles related to … government but cannot drive long distances or overcome obstacles related to time and distance to receive check-ups and other types of care. Telehealth systems allow doctors and nurses to check up on patients without patients have to leave……

References

RReferences

Abiad, A. & Khatiwada, S. (2019). 5 ways technology is improving governance, public service delivery in developing Asia. Retrieved from  https://blogs.adb.org/blog/5-ways-technology-improving-governance-public-service-delivery-developing-asia 

Florida Tech. (2019). Five global trends in public administration. Retrieved from  https://www.fit.edu/your-college-decision/trends-in-public-administration/ 

McDonald, B. (2017). Measuring the fiscal health of municipalities. Retrieved from  https://www.lincolninst.edu/sites/default/files/pubfiles/mcdonald_wp17bm1.pdf 

VCU. (2019). Public personnel administration. Retrieved from  https://commed.vcu.edu/IntroPH/Management/management/personnel.html 

Join thousands of other students and

"spark your studies".