Literature Review Essays (Examples)

Studyspark

Study Document Study Document

Hand Hygiene And Infection In Hospitals

Pages: 7 (2096 words) Sources: 2 Document Type:Article Critique Document #:82779888

… healthcare professionals. International Journal of Caring Sciences, 8(1), 108.
1. Describe how the researcher addresses the following four areas in the selected journal article (Introduction, literature review, Methodology and Data Analysis:
The purpose of the study is to support the World Health Organization hand hygiene campaign against healthcare associated infections … towards hand hygiene amid healthcare professionals within the hospital. In particular, the study seeks to ascertain perceptions on HAIs and hand hygiene. The literature review conducted by the researcher was not quite extensive. Nonetheless, the previous research studies included by the author demonstrate that the execution of the … confidentiality.
4. Describe one strength and one limitation of the study
A key strength of the study is that there exists a limited literature in regard to the subject manner of multifaceted interventions that could be employed in addressing the problem being faced in Iran. In this ……

References

References

Joshi, S. C., Diwan, V., Tamhankar, A. J., Joshi, R., Shah, H., Sharma, M., ... & Lundborg, C. S. (2012). Qualitative study on perceptions of hand hygiene among hospital staff in a rural teaching hospital in India. Journal of Hospital Infection, 80(4), 340-344.

Tan Jr, A. K., & Jeffrey Olivo, B. S. (2015). Assessing healthcare associated infections and hand hygiene perceptions amongst healthcare professionals. International Journal of Caring Sciences, 8(1), 108.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

… though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Application Of Quality And Safety Concepts

Pages: 11 (3179 words) Sources: 8 Document Type:Case Study Document #:72132391

… the healthcare process (namely physicians, patients, and healthcare insurance and scheme providers) to exchange patient data in a secure and timely manner.
Brief literature review
Federico and Alotaibi (2017) state that ever since the IOM (Institute of Medicine) report was published, health IT (HIT) is being created and … and measures for dealing with safety concerns.
Feldman, Hayes, and Buchalter’s (2018) article titled “Health Information Technology in Healthcare Quality and Patient Safety: literature review” assumed the form of a review of literature for identifying peer-review texts dealing with actual HIT employment in the areas of patient safety and healthcare quality. The authors classified 41 research works through the … of collecting and analyzing data to compare how well an intervention is being implemented against expected results”. Therefore, this involves “the routine collection, review and analysis of data, either generated by digital systems or purposively collected, which measure implementation fidelity……

References

Bibliography

Alotaibi, Y. K., & Federico, F. (2017). The impact of health information technology on patient safety. Saudi Med J, 38(12), 1173–1180.

Amit, M. (2019, January 28). 5 Problems Which Healthcare Technology Can Solve for a Healthier World. Retrieved from Net Solutions:  https://www.netsolutions.com/insights/5-healthcare-problems-which-digital-technologies-can-solve-for-a-fit-and-healthy-world/ 

DeSanctis, G., & Poole, M. S. (1994). Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory. Organization Science, 5(2), 121-147.

Feldman, S. S., Buchalter, S., & Hayes, L. W. (2018). Health Information Technology in Healthcare Quality and Patient Safety: Literature Review. JMIR Med Inform, 6(2).

Halamka, J., Mandl, K., & Tang, P. (2008). Early Experiences with Personal Health Records. Journal of the American Medical Informatics Association, 15(1), 1-7.

IOM. (1999). To Err is Human: Building a Safer Health System. National Academy of Sciences.

Singh, H., & Sittig, D. (2016). Measuring and improving patient safety through health information technology: The Health IT Safety Framework. BMJ Quality & Safety, 25, 226-232.

Weigel, F., Hall, D. J., & Landrum, W. H. (2009). Human/Technology Adaptation Fit Theory for Healthcare. SAIS 2009 Proceedings.

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">

Studyspark

Study Document Study Document

Violence Prevention Programs

Pages: 9 (2805 words) Sources: 6 Document Type:Essay Document #:52417572

… abusive communication (Alternative Paths, 2020). This paper will discuss this topic, explain it from the theoretical perspective of strain theory, describe the present literature, and make recommendations based on the problems with violence prevention programs from a strain theory perspective and what can be done to solve … pulls back a little and sees how they are genuinely supportive of one another in terms of allowing a holistic view to appear.
literature review
One of the older studies on violence prevention programs argues that they do not work for four main reasons: “1) failure to target ……

References

References

Altafim, E. R. P., & Linhares, M. B. M. (2016). Universal violence and childmaltreatment prevention programs for parents: A systematic review. Psychosocial Intervention, 25(1), 27-38.

Alternative Paths. (2020). Violence prevention. Retrieved from  https://www.alternativepaths.org/services/diversion-programs/violence-prevention-program 

Farrell, A. D., Meyer, A. L., Kung, E. M., & Sullivan, T. N. (2001). Development and evaluation of school-based violence prevention programs. Journal of clinical child psychology, 30(2), 207-220.

Johnson, D. W., & Johnson, R. T. (1995). Why violence prevention programs don't work--and what does. Educational Leadership, 52(5), 63-68.

Lee, C., & Wong, J. S. (2020). Examining the effects of teen dating violence prevention programs: a systematic review and meta-analysis. Journal of Experimental Criminology, 1-40.

Siegel, L. (2018). Criminology, 7th Ed. Cengage Learning.

Stagg, S. J., & Sheridan, D. (2010). Effectiveness of bullying and violence prevention programs: A systematic review. Aaohn Journal, 58(10), 419-424.

Studyspark

Study Document Study Document

Domestic Violence Trauma

Pages: 7 (2069 words) Sources: 5 Document Type:Annotated Bibliography Document #:76636110

literature review
Buss, K. E. & Warren, J. M. (2015, March 1). Trauma and treatment in early childhood: A review of the historical and emerging literature for counselors. The Professional Counselor,5(2), 225-231.
The first author, Buss, is a counselor at Hope-Thru-Horses, Inc. in Lumber Bridge, North Carolina and the ……

References

Plumb, J. L. & Bush, K. A. (2016, April 1). Trauma-sensitive schools: An evidence-based approach. School Social Work Journal, 40(2), 37-41.

If 20 million people were infected by a virus that caused anxiety, impulsivity, aggression, sleep problems, depression, respiratory and heart problems, vulnerability to substance abuse, antisocial and criminal behavior, . . . and school failure, we would consider it an urgent public health crisis. Yet, in the United States alone, there are more than 20 million abused, neglected and traumatized children vulnerable to these problems. Our society has yet to recognize this epidemic, let alone develop an immunization strategy.

Smith, T. J. & Holmes, C. M. (2018, January 1). Assessment and treatment of brain injury in women impacted by intimate partner violence and post-traumatic stress disorder. The Professional Counselor, 8(1), 1-4.

In 1981, the U.S. Congress declared October as Domestic Violence Awareness Month, marking a celebratory hallmark for advocates and survivors nationwide (National Resource Center on Domestic Violence, 2012). Since this time, similar social and legislative initiatives have increased overall awareness of gender inequality, thus influencing a decline in women\\\\\\'s risk for intimate partner violence (IPV; Powers & Kaukinen, 2012). Recent initiatives, such as a national briefing focused on brain injury and domestic violence hosted by the Congressional Brain Injury Task Force, continue to call increased attention to the various intersections and implications of this national public health epidemic (Brain Injury Association of America, 2017). Unfortunately, despite various social advocacy movements, IPV remains an underrepresented problem in the United States (Chapman & Monk, 2015). As a result, IPV and related mental and physical health consequences continue to exist at alarmingly high rates (Chapman & Monk, 2015).

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… one of the study provides the rationale in support of this research together with the guiding research questions and subquestions followed by a review of the relevant literature in chapter two. Chapter three provides a detailed description of the study’s qualitative methodology and chapter four presents the results of the data …
The Implementation of Internet of Things (IoT): A Case Study of the Barriers that Prevent Implementation of IoT within Small Businesses
Chapter 2: literature review
Chapter Introduction
The review of literature will be critical to establishing the current scope of innovation related to the IoT as well as its potential for expansion, especially into … of IoT by small businesses. Finally, a summary of the research and the key findings that emerged from a synthesis of the relevant literature conclude the chapter.
Theoretical/Conceptual Framework
The theoretical/conceptual framework that will be used in this study was originally developed……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Including Deaf And Hard Of Hearing Students In The General Education

Pages: 15 (4479 words) Sources: 12 Document Type:Research Paper Document #:71231641

Abstract
This paper provides an extensive review of literature on deaf students and deafness. The purpose of the literature review is to obtain an understanding of what deafness is, what causes deafness, how it occurs, and what deaf culture is like for deaf … obtain an understanding of what deafness is, what causes deafness, how it occurs, and what deaf culture is like for deaf people. The review identifies schools and programs that are used to help the deaf community and it also examines the outcomes of deaf students in general … the main method of communication
· Hard of Hearing—having a defective or impaired but functional sense of hearing
· Hearing Impairment—unable to hear well
review of literature
The History of Deafness/Hard of Hearing
The first free public school for the deaf was created in 1760 by a French Catholic priest. … teachers to see if it is a viable……

References

References

Arizona Office for Americans with Disabilities. (2007). Retrieved from  https://know-the-ada.com/t4/history-deafness.html 

Centers for Disease Control and Prevention. (2019). Retrieved from  https://www.cdc.gov/ncbddd/hearingloss/language.html 

Curhan, G., & Curhan, S. (2016). Epidemiology of hearing impairment. In Hearing Aids (pp. 21-58). Springer, Cham.

Gallaudet University. (2019). Retrieved from  https://www3.gallaudet.edu/clerc-center/info-to-go/national-resources-and-directories/schools-and-programs.html 

Hill, M. (2019). Embryology Sensory - Hearing Abnormalities. Retrieved from  https://embryology.med.unsw.edu.au/embryology/index.php/Sensory_-_Hearing_Abnormalities 

Hyde, M., Nikolaraizi, M., Powell, D., & Stinson, M. (2016). Critical factors toward the Inclusion of deaf and hard-of-hearing students in higher education. Diversity in deaf education, 441-472.

Individuals with Disabilities Education Act. (2006). Retrieved from  https://sites.ed.gov/idea/ 

Padden, C. A. & Humphries, T. (2005). Inside Deaf Culture. Cambridge, MA: Harvard University Press.

Studyspark

Study Document Study Document

Social Skills Training With Autism In Secondary Classroom

Pages: 10 (3100 words) Sources: 10 Document Type:Research Proposal Document #:23519150

… of this present study is to develop a group intervention for social skills training for youths with autism in a high school setting.
literature review
Social Skills
Social skills include all elements of understanding, behavior, and communication that are important for effective social interactions. Young people with autism … conducted another language which is not English (2) include young people with other intellectual disabilities (3) are protocols, theses, abstracts, conference proceedings, or review. Studies not in English will be excluded to reduce possible translation errors or lost cultural meanings, while studies including children with intellectual disabilities … meanings, while studies including children with intellectual disabilities will be excluded to ensure low sample heterogeneity.
Quality Assessment: Risk of Bias
Two independent review will separately conduct the quality assessment of the selected studies utilizing the Cochrane Collaboration Risk of Bias (RoB) v2 tool (Higgins & Green, … the quality assessment of……

References

References

Adams, C., Lockton, E., Freed, J., Gaile, J., Earl, G., McBean, K., ... & Law, J. (2012). The Social Communication Intervention Project: a randomized controlled trial of the effectiveness of speech and language therapy for school?age children who have pragmatic and social communication problems with or without autism spectrum disorder. International Journal of Language & Communication Disorders, 47(3), 233-244.

Adams, C., Lockton, E., Freed, J., Gaile, J., Earl, G., McBean, K., Nash, M., Green, J., Vail, A., and Law, J. (2011). An evidence-based program for school, & aged children: Social communication intervention project. Research report. Uppsala: Inst.

American Psychological Association (APA) (2006). Evidence-Based Practice in Psychology. American Psychologist, 61(4), 271–285. doi: 10.1037/0003-066X.61.4.271

Cohen, J. (2013). Statistical power analysis for the behavioral sciences. Routledge.

Egger, M., Smith, G. D., Schneider, M., & Minder, C. (1997). Bias in meta-analysis detected by a simple, graphical test. Bmj, 315(7109), 629-634.

Higgins, J. P., & Green, S. (Eds.). (2011). Cochrane handbook for systematic reviews of interventions (Vol. 4). John Wiley & Sons.

Hutchins, N. S., Burke, M. D., Bowman-Perrott, L., Tarlow, K. R., & Hatton, H. (2019). The Effects of Social Skills Interventions for Students With EBD and ASD: A Single-Case Meta-Analysis. Behavior modification, 0145445519846817.

Radley, K. C., O’Handley, R. D., & Sabey, C. V. (2017). Social Skills Training for Children and Adolescents with Autism Spectrum Disorder. In Handbook of Treatments for Autism Spectrum Disorder (pp. 231-254). Springer, Cham.

Studyspark

Study Document Study Document

Domestic Extremism And Terrorism

Pages: 12 (3640 words) Sources: 12 Document Type:Research Paper Document #:16554681

… are emerging into popular culture and have the potential of disrupting and subverting mainstream cultural norms. To accomplish this objective, this paper first review the literature on the subject, then provides profiles of both groups while comparing and contrasting them and also discussing ways to counter violent extremism; finally, … right worldviews can be acquired and how those worldviews feed into, support, and diverge from the extremist groups that purport to project them.
review of the literature
One of the problems of today’s American socio-political system is that it is a two-party system in which all of society is essentially … in order to beat back what it perceives as a rising tide of Fascism in society (Doyle, 2018).
The themes associated with the literature on domestic terrorism, extremism and violence focus three important categories: 1) how culture makes extremism socially acceptable; 2) how culture fosters violent attitudes ………

References

References

Breger, M. L. (2017). Reforming by re-norming: How the legal system has the potential to change a toxic culture of domestic violence. J. Legis., 44, 170.

Beinart, P. (2017). The rise of the violent left. Retrieved from  https://www.theatlantic.com/magazine/archive/2017/09/the-rise-of-the-violent-left/534192/ 

Brockhoff, S., Krieger, T. & Meierrieks, D. (2014). Great expectations and hard times: the (nontrivial) impact of education on domestic terrorism. Journal of Conflict Resolution, 59(7), 1186-1215.

Brown, D. (2017). Proud boys founder. Retrieved from  https://www.portlandmercury.com/blogtown/2017/12/12/19540403/proud-boys-founder-wants-to-trigger-the-entire-state-of-oregon-by-helping-patriot-prayers-joey-gibson-win-the-oregon-person-of-the-year- p

Cramer, E. P., Choi, Y. J., & Ross, A. I. (2017). Race, Culture, and Abuse of Persons with Disabilities. In Religion, Disability, and Interpersonal Violence (pp. 89-110). Springer, Cham.

Dalgaard-Nielsen, A. (2016). Countering violent extremism with governance networks. Perspectives on Terrorism, 10(6), 135-139.

DeCook, J. R. (2018). Memes and symbolic violence:# proudboys and the use of memes for propaganda and the construction of collective identity. Learning, Media and Technology, 43(4), 485-504.

Doyle, E. (Ed.). (2018). Antifa and the Radical Left. Greenhaven Publishing LLC.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".