Journal Essays (Examples)

Studyspark

Study Document Study Document

Professional Leadership Value Systems

Pages: 1 (328 words) Sources: 1 Document Type:Journal Document #:87260077

Professional leadership Journal – Value Systems
The art and science of leading people in an effective manner is an increasingly challenging process though it is a ……

References

Reference

Nahavandi, A. (2014). The art and science of leadership (7th ed.). Upper Saddle River, NJ: Pearson.

 

Studyspark

Study Document Study Document

Individuals Using Customary Practices In Times Of Crises

Pages: 17 (4950 words) Sources: 30 Document Type:Annotated Bibliography Document #:60738961

… traditional crisis and disaster management approaches could be enhanced to promote better outcomes on this front. The article appeared in a reputable peer-reviewed journal.
Bang,
H.N., Miles, L.S. & Gordon, R.D. (2019). Disaster Risk Reduction in Cameroon: Are Contemporary Disaster Management Frameworks Accommodating the Sendai Framework Agenda … Miles, L.S. & Gordon, R.D. (2019). Disaster Risk Reduction in Cameroon: Are Contemporary Disaster Management Frameworks Accommodating the Sendai Framework Agenda 2030? International Journal of Disaster Risk Science, 10, 462-477.
According to the authors of this present study, most disasters in Africa have severe implications on the … act together to exacerbate hazardous events in Africa. One of the critical factors that have been identified by the authors of the present journal article is the vulnerability of the continent’s rapidly increasing population. As other authors elsewhere in this annotation have pointed out, specifically Bonye and … level?
Bonye, S.Z. & Jasaw,……

References

Roberts. A.R. (Ed.). (2005). Crisis Intervention Handbook: Assessment, Treatment, and Research (3rd ed.). New York, NY: Oxford University Press.

Sama’ila, A. (2019). Economic crisis and the coping strategies of indigenous automobile entrepreneurs in northern Nigeria, 1983-2014. Sociology International Journal, 3(6), 437-442.

Studyspark

Study Document Study Document

Managing Behavior In Adolescents And Children Through Solution Focused

Pages: 10 (3015 words) Sources: 5 Document Type:Annotated Bibliography Document #:12594584

… expenses, the abilities gained by the five basic advances can assemble an establishment for financial education (Smith, Shelton & Richards, 2016). Currency: This Journal article was published in 2016, therefore it is current. Authority and credibility: It is located in FSCJ database cited four times by authors … Authority and credibility: It is located in FSCJ database cited four times by authors under library and learning commons with publication authority from Journal of Human Behavior in the Social Environment where the key focus is conflict management, literacy, negotiation, theory, financial management, a trans-theoretical model of … a trans-theoretical model of change, and couples therapy where it is cited fifteen times by Plum X metrics or Google scholar. Audience: The journal article is addressed to individuals to take note of financial literacy, financial management, and marital disputes using solution-focused therapy. Relevance to the thesis … change procedure would be sorted……

References

References

Boyer, B., MacKay, K. J., McLeod, B. D., & van der Oord, S. (2018). Comparing Alliance in Two Cognitive-Behavioral Therapies for Adolescents with ADHD Using a Randomized Controlled Trial. Behavior Therapy, 49(5), 781–795. 10.1016/j.beth.2018.01.003

Brockman, M., Hussain, K., Sanchez, B., & Turns, B. (2016). Managing Child Behavior Problems in Children with Autism Spectrum Disorders: Utilizing Structural and Solution Focused Therapy with Primary Caregivers. American Journal of Family Therapy, 44(1), 1–10. 10.1080/01926187.2015.1099414

Gonzalez, C. (2017). Recovering Process from Child Sexual Abuse During Adulthood from an Integrative Approach to Solution-Focused Therapy: A Case Study. Journal of Child Sexual Abuse, 26(7), 785–805. 10.1080/10538712.2017.1354954

Kiser, D. J., & Piercy, F. P. (2014). Creativity and family therapy theory development: Lessons from the founders of solution-focused therapy: The journal of solution focus in organizations. InterAction, 6(2), 51-851645018526?accountid=45782

Smith, T. E., Shelton, V. M., & Richards, K. V. (2016). Solution-focused financial therapy with couples. Journal of Human Behavior in the Social Environment, 26(5), 452–460. 10.1080/10911359.2015.1087921

Studyspark

Study Document Study Document

Depression Among Older Immigrant African Women In Metro West Massachusetts

Pages: 12 (3684 words) Sources: 20 Document Type:Capstone Project Document #:21927346

...Journal Prevalence of Depression in Massachusetts
Prospectus: Depression Among Older Immigrant African Women in Metro West Massachusetts
Abstract
In West Massachusetts United States, the most common health disorders are anxiety and depression. These health disorders are prevalent in elderly immigrant women aged between 50 and 79 years (Agbemenu, 2016). Despite a variety of efficacious interventions for depression and anxiety, elderly immigrant women experience mental health care disparities in their access to mental health services and the quality of treatment they receive (Sánchez et al., 2014). Researchers have determined that African American heterogeneity influences access to depression and anxiety treatment. In addition, African Americans are becoming an increasingly visible minority within the United States, especially in West Massachusetts. The intention in this current study is to understand the causes and prevalence of depression among older immigrant African American women in Metro West Massachusetts as well as how the older immigrants cope with……

References

References

Agbemenu, K. (2016). Acculturation and Health Behaviors of African Immigrants Living in the United States: An Integrative Review. ABNF Journal, 27(3).

Alegría, M., Álvarez, K., & DiMarzio, K. (2017). Immigration and mental health. Current epidemiology reports, 4(2), 145-155.

Baldwin-Clark, T., Ofahengaue Vakalahi, H. F., & Anderson, B. (2016). What about African American older women and depressive symptoms? Educational Gerontology, 42(5), 310-320.

Cassel, J. (1995). The contribution of the social environment to host resistance: the fourth wade Hampton frost lecture. American journal of epidemiology, 141(9), 798-814.

Cobb, S. (1976). Social support as a moderator of life stress. Psychosomatic medicine.

Delara, M. (2016). Social determinants of immigrant women’s mental health. Advances in Public Health, 2016.

Dow, H. D. (2011). An overview of stressors faced by immigrants and refugees: A guide for mental health practitioners. Home Health Care Management & Practice, 23(3), 210-217.

Emadpoor, L., Lavasani, M. G., & Shahcheraghi, S. M. (2016). Relationship between perceived social support and psychological well-being among students based on mediating role of academic motivation. International Journal of Mental Health and Addiction, 14(3), 284-290.

Studyspark

Study Document Study Document

Hand Hygiene And Infection In Hospitals

Pages: 7 (2096 words) Sources: 2 Document Type:Article Critique Document #:82779888

Quantitative Article
Tan Jr, A. K., & Jeffrey Olivo, B. S. (2015). Assessing healthcare associated infections and hand hygiene perceptions amongst healthcare professionals. International Journal of Caring Sciences, 8(1), 108.
1. Describe how the researcher addresses the following four areas in the selected journal article (Introduction, Literature Review, Methodology and Data Analysis:
The purpose of the study is to support the World Health Organization hand hygiene campaign … 0.05 were taken into consideration to be statistically significant.
2. Evaluate whether the evidence presented in each of the four areas of the journal article from part A1 supports the outcome of the study and implications for future research
The evidence that is presented in each of … hand hygiene.
3. Explain how the protection of human subjects and cultural considerations were addressed by the researcher, using specific information from the journal article from part A.
One of the key ways in which the……

References

References

Joshi, S. C., Diwan, V., Tamhankar, A. J., Joshi, R., Shah, H., Sharma, M., ... & Lundborg, C. S. (2012). Qualitative study on perceptions of hand hygiene among hospital staff in a rural teaching hospital in India. Journal of Hospital Infection, 80(4), 340-344.

Tan Jr, A. K., & Jeffrey Olivo, B. S. (2015). Assessing healthcare associated infections and hand hygiene perceptions amongst healthcare professionals. International Journal of Caring Sciences, 8(1), 108.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… in today’s world despite being seen as an acceptable state behavior. [1: Magnus Hjortdal, “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence”, Journal of Strategic Security 4, no. 2 (2011):1] [2: Atul Agarwal & CERT-IN, “Cyber Espionage, Infiltration and Combating Techniques”, Indian Computer Emergency Response Team, … legitimacy and view as an acceptable state behavior. [3: William C. Banks, “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage”, Emory law Journal 66, (2017):513.]
Problem Statement
Cyber espionage involves illegal practices that result in information theft that could be used to attack an adversary. It … cyber espionage to promote cyberattacks on a nation’s critical infrastructure. [5: Catherine Lotrionte, “Countering State-Sponsored Cyber Economic Espionage Under International Law”, North Carolina Journal of International Law and Commercial Regulation 40, (2015):445] [6: Martin Libicki, “The Coming of Cyber Espionage Norms”, 9th International Conference on Cyber Conflict, ……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Studyspark

Study Document Study Document

Cloud Computing And Cost Effectiveness

Pages: 5 (1591 words) Sources: 5 Document Type:Annotated Bibliography Document #:36737117

… to Cost-Effectiveness
Annotated Bibliography
Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of Information Systems Evaluation, 17(1), 3.
This article ascertains that the major reason why SMEs in Ireland adopt cloud computing is for cost-effectiveness. The … increased organizational scalability and also adaptability by enabling the entity to decrease its capacity.
Shankar, K. (2016). Effectiveness of Cloud Computing in Global Business. Journal of Applied Management-Jidnyasa, 8(1), 66-73.
This article examines the efficacy of cloud computing in the operation of global business. Shankar demonstrated that one of … and applications within their own IT divisions.
Attaran, M. (2017). Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance. Journal of International Technology and Information Management, 26(1), 112 – 137.
In recent times, cloud computing has emanated as a significant technology that could ……

References

References

Attaran, M. (2017). Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance. Journal of International Technology and Information Management, 26(1), 112 – 137.

Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of Information Systems Evaluation, 17(1), 3.

Elmonem, M. A. A., Nasr, E. S., & Geith, M. H. (2016). Benefits and challenges of cloud ERP systems–A systematic literature review. Future Computing and Informatics Journal, 1(1-2), 1-9.

Shankar, K. (2016). Effectiveness of Cloud Computing in Global Business. Journal of Applied Management-Jidnyasa, 8(1), 66-73.

Xue, C. T. S., & Xin, F. T. W. (2016). Benefits and challenges of the adoption of cloud computing in business. International Journal on Cloud Computing: Services and Architecture, 6(6), 01-15.

Studyspark

Study Document Study Document

Examining Sampling Methods

Pages: 10 (3107 words) Sources: 3 Document Type:Essay Document #:69865492

… apply. The author is making a scholarly, reasoned, and public critique of the works of two bioethicists and publishing it in an academic journal to await response from other medical peers. In this sense, the study follows sound ethical principles in terms of how an academic should … of how an academic should go about discussing a piece of scholarship. As for sampling, because the scholars’ arguments were presented in published journals, there is no ethical imperative for Mayes to obtain consent forms in order to name them or discuss their arguments in a separate … imperative for Mayes to obtain consent forms in order to name them or discuss their arguments in a separate article in an academic journal.
The data from the sample obtained by Mayes (2015) is presented in a manner that it appears to be applicable to the general … data was applied, and where……

References

References

Mayes, C. (2015). The harm of bioethics: A critique of Singer and Callahan on obesity. Bioethics, 29(3), 217-221.

Pause, C. (2017). Borderline: The ethics of fat stigma in public health. Journal of Law, Medicine & Ethics, 45, 510-517.

Wetter, S., Hodge, J. (2016). Taxing sugar-sweetened beverages to lower childhood obesity. Ethical and Legal Issues in Pediatrics, 44, 359-363.

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

...Journal Executive Summary
The purpose of this study is to develop timely and informed answers to a series of guiding research questions and subquestions to identify the risks and barriers that are associated with Internet of Things implementations. These types of studies are important today because the Internet of Things is changing the manner in which companies of all sizes and types operate their businesses, and current trends indicate that these implementations are increasing exponentially. The Internet of Things allows conventional computer-based networks to incorporate data collected from everyday objects to provide real-time analyses and new applications for these technologies are being developed every day. Indeed, there are already more mobile devices in use around the world than there are people, and most authorities agree that the Internet of Things deployments will continue to increase well into the foreseeable future. Chapter one of the study provides the rationale in support of……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".