Literature Analysis Essays (Examples)

Studyspark

Study Document Study Document

Effectiveness Of The War On Drugs

Pages: 14 (4146 words) Sources: 18 Document Type:Reaction Paper Document #:69451857

… n.d.; Coomber, Moyle, Belackova, V., et al., 2018; Pearl, 2018).
2. White collar crime (tobacco and pharmaceutical industries) (Netherland, & Hansen, 2017).
III. literature Review
A. Balancing public health/safety with personal liberty/self-empowerment (ACLU, 2020; Payne & Hutton, 2017).
B. Alternate strategies, pilot projects
1. Cannabis law reform … inhumane policy that criminally penalizes users of non-state-sanctioned drugs. Alcohol and opioids cause many more deaths—not to mention ruined lives—than the illegal drugs.
literature Review
Scholarly databases contain over a million entries related to the war on drugs, covering perspectives linked to psychology, sociology, public health, history, … children of those who are serving time in prison and the reverberations within the global economy (“America is At War,” n.d.). Thus, the literature shows that the War on Drugs is more responsible for breaking apart families and communities than the drugs themselves. The Center for American … policy, advocating for widespread reform……

References

References

ACLU (2020). Against drug prohibition. Retrieved from:  https://www.aclu.org/other/against-drug-prohibition " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

War On Drugs

Pages: 13 (4034 words) Sources: 13 Document Type:Essay Document #:73696424

… global affairs
C. Criminalization, justice
D. Other sociological issues
1. Organized crime and terrorism
2. White collar crime (tobacco and pharmaceutical industries)
III. literature Review
A. Balancing public health/safety with personal liberty/self-empowerment
B. Alternate strategies, pilot projects
1. Cannabis law reform
2. Psychedelics
IV. Discussion
V. Conclusions
… inhumane policy that criminally penalizes users of non-state-sanctioned drugs. Alcohol and opioids cause many more deaths—not to mention ruined lives—than the illegal drugs.
literature Review
Scholarly databases contain over a million entries related to the war on drugs, covering perspectives linked to psychology, sociology, public health, history, … children of those who are serving time in prison and the reverberations within the global economy (“America is At War,” n.d.). Thus, the literature shows that the War on Drugs is more responsible for breaking apart families and communities than the drugs themselves. The Center for American … policy, advocating for widespread reform……

References

References

ACLU (2020). Against drug prohibition. Retrieved from:  https://www.aclu.org/other/against-drug-prohibition " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Hand Hygiene And Infection In Hospitals

Pages: 7 (2096 words) Sources: 2 Document Type:Article Critique Document #:82779888

… healthcare professionals. International Journal of Caring Sciences, 8(1), 108.
1. Describe how the researcher addresses the following four areas in the selected journal article (Introduction, literature Review, Methodology and Data analysis:
The purpose of the study is to support the World Health Organization hand hygiene campaign against healthcare associated infections (HAIs). The study aims … towards hand hygiene amid healthcare professionals within the hospital. In particular, the study seeks to ascertain perceptions on HAIs and hand hygiene. The literature review conducted by the researcher was not quite extensive. Nonetheless, the previous research studies included by the author demonstrate that the execution of … making use of a standardized survey questionnaire of the WHO. The main purpose of the descriptive research survey was to facilitate observation, description, analysis and also documenting elements of situation as it naturally takes place. In this regard, the perceptions regarding HAI and hand hygiene were the ………

References

References

Joshi, S. C., Diwan, V., Tamhankar, A. J., Joshi, R., Shah, H., Sharma, M., ... & Lundborg, C. S. (2012). Qualitative study on perceptions of hand hygiene among hospital staff in a rural teaching hospital in India. Journal of Hospital Infection, 80(4), 340-344.

Tan Jr, A. K., & Jeffrey Olivo, B. S. (2015). Assessing healthcare associated infections and hand hygiene perceptions amongst healthcare professionals. International Journal of Caring Sciences, 8(1), 108.

Studyspark

Study Document Study Document

Developing A Research Hypothesis

Pages: 8 (2368 words) Sources: 10 Document Type:Essay Document #:36304259

… is a core aspect of the medical profession. EBM provides statistical analyses and matters of clinical concern. It is based on research, reading, analysis, and combining many papers generated within the medical fraternity. EBM applications based on research evidence and clinical knowledge and reviews of the system … answer. After a question is formed properly, the researcher is placed in a better situation to run studies and dig into the available literature for evidence that will anchor their PICO question (Eriksen & Frandsen, 2018).
Although there are other models, including SPIDER, SPICE, sample, design evaluation, ……

References

References

Considine, J., Shaban, R. Z., Fry, M., & Curtis, K. (2017). Evidence-based emergency nursing: designing a research question and searching the literature. International emergency nursing, 32, 78-82.

Eriksen, M. B., & Frandsen, T. F. (2018). The impact of patient, intervention, comparison, outcome (PICO) as a search strategy tool on literature search quality: a systematic review. Journal of the Medical Library Association: JMLA, 106(4), 420.

Yuan, X., Xiaoli, L., Shilei, L., Qinwen, S., & Ke, L. (2019, May). Extracting PICO elements from RCT abstracts using 1-2gram analysis and multitask classification. In Proceedings of the third International Conference on Medical and Health Informatics 2019 (pp. 194-199).

Scells, H., Zuccon, G., Koopman, B., Deacon, A., Azzopardi, L., &Geva, S. (2017, November). Integrating the framing of clinical questions via PICO into the retrieval of medical literature for systematic reviews. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management (pp. 2291-2294).

Basmaci, R., Vazouras, K., Bielicki, J., Folgori, L., Hsia, Y., Zaoutis, T., &Sharland, M. (2017). Urinary tract infection antibiotic trial study design: a systematic review. Pediatrics, 140(6).

Misra, D. P., & Agarwal, V. (2018). Systematic reviews: challenges for their justification, related comprehensive searches, and implications. Journal of Korean medical science, 33(12).

Belcher, B. M., Rasmussen, K. E., Kemshaw, M. R., &Zornes, D. A. (2016). Defining and assessing research quality in a transdisciplinary context. Research Evaluation, 25(1), 1-17.

Fu, D. Y., & Hughey, J. J. (2019). Meta-Research: Releasing a preprint is associated with more attention and citations for the peer-reviewed article. Elife, 8, e52646.

Studyspark

Study Document Study Document

Angleton S Counterintelligence Program And What Went Wrong

Pages: 9 (2657 words) Sources: 8 Document Type:Essay Document #:36485484

Counterintelligence Thesis Proposal
Abstract
This proposal describes the need for an ethical standard in counterintelligence. It discusses how an analysis of the formation of the counterintelligence program under Angleton can provide insight into what went wrong with counterintelligence and how those problems can … culture plays in influencing ethical decision-making. In qualitative studies, hypotheses are generally avoided or formed at the conclusion of the study following an analysis of the data obtained through exploration of the topic. Nonetheless, it is hypothesized here that an analysis of the past transgressions of counterintelligence can be prevented in the future through the development and application of a standardized ethical approach to … design is qualitative because the subject is exploratory in nature. The aim of the research is to explore by way of case study analysis the counterintelligence program under James Jesus Angleton, including the literature of the past and present. Scholarly articles,……

References

Reference List

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Bartos, C. and P. Wehr. 2002. Using conflict theory. UK: University of Cambridge.

Bellaby, Ross. "What's the Harm? The Ethics of Intelligence Collection." Intelligence and National Security 27, no. 1 (2012): 93-117.

Church Committee. “Final report of the Select committee to study governmental operations With respect to Intelligence activities United states senate Together with Additional, supplemental, and separate Views.” Intelligence.senate.gov, 1976. https://www.intelligence.senate.gov/sites/default/files/94755_I.pdf

Coyne, John, Peter Bell, and Shannon Merrington. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2, no. 10 (2013): 27-37.

Erskine, Toni. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19, no. 2 (2004): 359-381.

Nakashima, Ellen. “Top counterintelligence official challenges the private sector to step up defenses against foreign spying.” Washington Post, 2020.  https://www.washingtonpost.com/national-security/top-counterintelligence-official-challenges-the-private-sector-to-step-up-defenses-against-foreign-spying/2020/02/10/d842d83c-4c15-11ea-9b5c-eac5b16dafaa_story.html 

Pfaff, T., & Tiel, J. R. (2004). The ethics of espionage. Journal of Military Ethics, 3(1), 1-15.

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384

… Research Problem 5
1.4 Research Questions 5
1.5 Purpose of the Study 5
1.6 Methodology 5
1.7 Good Title for Study 5
2 literature Review 6
2.1 Cloud Computing Definition 6
2.2 Types of Cloud Computing Services 6
2.2.1 Infrastructure as a Service (IaaS) 6
2.2.2 Platform …
3.2 Data Collection Sources & Selection Plan 12
3.3 Proposed Interview Questions 13
3.4 Sample Population 13
3.5 Ethical Considerations 14
3.6 Data analysis Plan & Rationale 15
4 Contributions to Theory or Practice and their Significance 16
5 Ethical Issues and Methods to Address 17
6 … and Skype.
Good Title for Study
A suitable title for the study would be The cost-effectiveness of cloud computing within an accounting organization.
literature Review
Cloud Computing Definition
Cloud computing is delineated as a computing capability that facilitates a construct between the computing resource and its fundamental … party. Moreover, no financial incentives……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

Terrorist Group IRA

Pages: 8 (2476 words) Sources: 8 Document Type:Essay Document #:71228383

… why the IRA formed and what the group sought to do, operating in an underground terroristic fashion as it did. By reviewing the literature available on the IRA and by conducting interviews using Zoom with different generations of Irish Catholics, this study will produce data that will … using Zoom with different generations of Irish Catholics, this study will produce data that will be used to fill the gap in present literature regarding the IRA and why it came about whether it still holds any interest or support from Irish Catholics today.
By understanding what … Western world where cultural rifts, rising nationalism, and a sense of disenfranchisement may be seeding ground for new terror organizations to crop up.
literature Review
This literature review used sources that focused specifically on the cultural and historical characteristics of the IRA and what the counter-insurgency efforts of the British … specifically on……

References

References

Bamford, B. (2005). The Role and Effectiveness of Intelligence in Northern Ireland. Intelligence and National Security, 20(4), 581-607.

Bell, J. B. (2008). The Secret Army: The IRA. London: Transaction Publishers.

IRA Green Book. (1977). Accessed 14 Dec 2015 from  https://tensmiths.files.wordpress.com/2012/08/15914572-ira-green-book-volumes-1-and-2.pdf 

Maloney, E. (2010). Voices from the Grave: Two Men’s War in Ireland. NY: Faber, Faber.

O’Brien, B. (1999). The Long War: The IRA and Sinn Fein. NY: Syracuse University Press.

Rooney, N. (2007). Violent nationalism in catholic communities: The Provisional IRA and ETA. Studies in Ethnicity and Nationalism, 7(3), 64-77.

Shanahan, Timothy. (2008). The Provisional IRA and the Morality of Terrorism. UK: Edinburgh University Press.

Taylor, P. (2001). Brits. UK: Bloomsbury Publishing.

Studyspark

Study Document Study Document

Application Of Quality And Safety Concepts

Pages: 11 (3179 words) Sources: 8 Document Type:Case Study Document #:72132391

… the healthcare process (namely physicians, patients, and healthcare insurance and scheme providers) to exchange patient data in a secure and timely manner.
Brief literature review
Federico and Alotaibi (2017) state that ever since the IOM (Institute of Medicine) report was published, health IT (HIT) is being created … and measures for dealing with safety concerns.
Feldman, Hayes, and Buchalter’s (2018) article titled “Health Information Technology in Healthcare Quality and Patient Safety: literature Review” assumed the form of a review of literature for identifying peer-reviewed texts dealing with actual HIT employment in the areas of patient safety and healthcare quality. The authors classified 41 research … general IT on account of its particular focus and possibly more inflexible and limiting standards and framework. AST (Adaptive Structuration Theory) improves IT analysis, especially in case of new adoption. Based on the 1984 Structuration Theory of Gidden, Poole and…[break]…assess community-based telemonitoring or remote……

References

Bibliography

Alotaibi, Y. K., & Federico, F. (2017). The impact of health information technology on patient safety. Saudi Med J, 38(12), 1173–1180.

Amit, M. (2019, January 28). 5 Problems Which Healthcare Technology Can Solve for a Healthier World. Retrieved from Net Solutions:  https://www.netsolutions.com/insights/5-healthcare-problems-which-digital-technologies-can-solve-for-a-fit-and-healthy-world/ 

DeSanctis, G., & Poole, M. S. (1994). Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory. Organization Science, 5(2), 121-147.

Feldman, S. S., Buchalter, S., & Hayes, L. W. (2018). Health Information Technology in Healthcare Quality and Patient Safety: Literature Review. JMIR Med Inform, 6(2).

Halamka, J., Mandl, K., & Tang, P. (2008). Early Experiences with Personal Health Records. Journal of the American Medical Informatics Association, 15(1), 1-7.

IOM. (1999). To Err is Human: Building a Safer Health System. National Academy of Sciences.

Singh, H., & Sittig, D. (2016). Measuring and improving patient safety through health information technology: The Health IT Safety Framework. BMJ Quality & Safety, 25, 226-232.

Weigel, F., Hall, D. J., & Landrum, W. H. (2009). Human/Technology Adaptation Fit Theory for Healthcare. SAIS 2009 Proceedings.

Studyspark

Study Document Study Document

Examining Sampling Methods

Pages: 10 (3107 words) Sources: 3 Document Type:Essay Document #:69865492

… the sample is selective in the sense that two specific bioethicists are selected for examination in this study. This is not a general literature review or a systematic literature review of scholarly data on the subject of obesity. Rather, Mayes (2015) specifically sets out to examine the works of Singer and Callahan … but that Singer and Callahan have attempted to alter how the academic and medical professional community should view not only the history of literature on the subject but the subject itself. For that reason, Mayes (2015) sets about to identify some of the underlying positions and assumptions … ethical principles that are reflected in the sampling criteria used for this critique are those that are consistent with any critique of existing literature. The aim is identified, the theoretical approach is discussed, and the analysis is conducted according to the parameters set out at the beginning of……

References

References

Mayes, C. (2015). The harm of bioethics: A critique of Singer and Callahan on obesity. Bioethics, 29(3), 217-221.

Pause, C. (2017). Borderline: The ethics of fat stigma in public health. Journal of Law, Medicine & Ethics, 45, 510-517.

Wetter, S., Hodge, J. (2016). Taxing sugar-sweetened beverages to lower childhood obesity. Ethical and Legal Issues in Pediatrics, 44, 359-363.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

… a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data … will be utilized for the purposes of this study only.
Data obtained from the interviewees and the publications will be analyzed through thematic analysis. The thematic analysis will entail constant comparison and triangulation of the data to identify emerging themes that answer the research question. While the research design will ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf 

National Counterintelligence and Security Center. “Foreign Economic Espionage in Cyberspace.” Office of the Director of National Intelligence, 2018.  https://www.dni.gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf 

Rubenstein, D. “Nation State Cyber Espionage and its Impacts.” Washington University in St. Louis, December 2014.  https://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/ 

Weissbrodt, D. “Cyber-Conflict, Cyber-Crime, and Cyber-Espionage.” Minnesota Journal of International Law 22, no. 2 (2013).

Join thousands of other students and

"spark your studies".